Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020)

China is currently engaged in a very aggressive, massive espionage, cyber, and covert action assault on the US with the goal of catching up with it technologically, militarily, and economically as quickly as possible. China hopes to eventually become the world’s dominant power. Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Victories on the intelligence front have likely most satisfied People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, as under his leadership, China’s intelligence capabilities have been greatly enhanced and have evolved. In his monograph, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that will shock its readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined.

Since the era of the People’s Republic of China’s Second Chairman Deng Xiaoping, from 1976 to 1994, the Communist Party of China’s leadership has lived in optimistic expectation of better fortune for the Chinese people in terms of economics and their standard of living. Party leaders covet the position the US holds as the dominant power in the world. In accordance with that thinking, long range plans were formulated. Such really should have been the expected response of Chinese national leaders who were first and foremost dedicated to a very aggressive revolutionary movement. It was determined in Beijing that espionage offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. At that time, many of China’s largest companies were state owned, or had close linkages to the government. From all accounts, China thereby embarked on what has become a very aggressive and massive espionage, cyber, and covert action assault on the US with the ever-fixed goal of catching up with it technologically, militarily, and economically as quickly as possible.

Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Chinese intelligence officers have experienced innumerable satisfactions in the spy war. According to a former chief of Counterintelligence for the Central Intelligence Agency (CIA), James Olson, in his superb book, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), China is presently in a class by itself in terms of its espionage, covert action, and cyber capabilities. (The January 31, 2021 greatcharlie post is a review of Olson’s To Catch a Spy.) The struggle on the intelligence front impacts the whole climate of the relations with China. Even when China is engaged in bilateral or multilateral talks, whether on trade, security, or the environment, Chinese intelligence services never cease engaging in robust espionage. Imaginably, victories on the intelligence front provide a most satisfying opportunity for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, to cock-a-doodle, about how, under his leadership, China’s intelligence capabilities have evolved to the point at which the intelligence services can carry the battle to the home ground of the US itself and win. Senior executives and managers in US counterintelligence services doubtlessly stand exasperated over regular disappointments.

In A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that, although well-known within the US Intelligence Community and within other intelligence services worldwide, will shock nonpracticioners among his monograph’s readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined. As might be expected, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. The revelation will be that Chinese espionage activity is not the exclusive purview of China’s civilian and military intelligence services. In addition to government organizations, commercial entities, academic institutions, and private individuals, entrepreneurs are heavily engaged in espionage against preferred targets in highly industrialized countries. Chinese firms have proved themselves to be quite capable at performing such work. Surely, if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

Eftimiades examination is based on his study on the nature of Chinese espionage worldwide and in-depth understanding developed through decades of experience in the intelligence field. He reviews intelligence processes, setting objectives and tasking, organizations that engage in espionage, looks at their efforts through case studies and analysis of them. He also discusses how China’s espionage activities worldwide has had an impact on US national security, international security, the international political economy, and geopolitics. Eftimiades delves into the practical matters that concern intelligence officers of government organizations and employees of commercial entities and academic institutions as they engage in espionage, and how the Chinese government manages the hybrid government and “independent” civilian intelligence system it has created. While Series on Chinese Espionage, Vol. I: Operations and Tactics is the actual title of Eftimiades’ monograph, the monograph is listed on Amazon.com as Chinese Espionage Operations and Tactics (Vitruvian Press, 2020). The monograph is heretofore referenced in this essay by the latter title. (It might be best for those who may wish to possess a copy to research the text under the latter title. The publication date is September 3, 2020).

A sidelight, as defined by the Oxford English Dictionary, is a piece of information usually given by accident or in connection with another subject, that helps one to understand somebody or something. The goal of sidelights offered in this essay is to present Eftimiades’ monograph in a way that will give our readers a good sense of both what is in it and sort of ideas and insights they might draw from it. In effect, it is a review. For those who may excavate through the monograph and thoroughly and consider points of exposition concerning specific malign activities conducted by China, his work will prove to be substantially edifying. What is most impressive to greatcharlie about the monograph is the manner in which it stimulates thought on a grave issue concerning China. As stated in prior posts, greatcharlie prefers to review texts that can stir a fire inside a reader, and transmit the author’s passion for a subject. Those writings are the most memorable and most enjoyable to sit with. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

The role of reviewer, an unsolicited intermediary between a text’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a work then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil. It is greatcharlie’s preference to provide reviews, sidelights here, that readers of the blog can enjoy and from which they may edify themselves. Nothing greatcharlie states in this essay is intended to give Eftimiades some stick–perish the thought. In greatcharlie’s view, he is brilliant, and works such as his monograph educate nonpracticioners as greatcharlie. They are very much appreciated. This review is not an inquiry into facts presented. All that is being presented here are insights greatcharlie birthed while parsing out the text. Although important details of Eftimiades monograph are discussed here, not everything is revealed. This is greatcharlie’s hard and fast rule on reviews, whether books, or as in this case a monograph. Plenty is left for readers to discover and draw their own insights upon.

Nicholas Eftimiades, the author (above), among other high level positions in the US government, was formerly the Director of Counterintelligence at the Central Intelligence Agency. He is highly regarded for his expertise on China and national security space issues. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. Eftimiades holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University.

The Author

Eftimiades, among other high level positions in the US government, was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. The Intelligence Community awarded Eftimiades with its highest honors to include the National Intelligence Council Achievement Award and DIA Director’s Intelligence Award. As of this writing, Eftimiades holds appointments on the National Intelligence Council as an Intelligence Community Associate, Homeland Security Advisory Council, Economic Security Subcommittee, and the Defense Science Board. Although he has left the CIA, one does not get the impression that Eftimiades has left the fight yet! Eftimiades has testified before several US Congressional and Presidential Commissions concerning National Security issues, future technology development, and the future of the US space program. 

Among several high level positions, Eftimiades was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University. He has lived and studied in Asia. He once served as a senior research fellow at King’s College, War Studies Department in London. During that period, Eftimiades authored books, reports, and a number of articles on China’s intelligence methodology, national security, technology, and space issues. Currently, Eftimiades is a professor at Pennsylvania State University, Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. 

As Eftimiades possesses such formidable credentials, it seems needless to say that readers should approach all matters of fact presented by Eftimiades as true to the best of his knowledge and belief. Eftimiades spoke truth to power within halls of the US national security bureaucracies and in the White House. He presents the monograph’s discussion essentially in that same mode, discussing only what he knows to be the truth on Chinese Intelligence Operations. His proceeding publication, Chinese Intelligence Operations is regarded as the seminal work in the field. In the period surrounding its publication in 1994, greatcharlie’s editor did not have the pleasure to read Nicholas Eftimiades, Chinese Intelligence Operations (CreateSpace Independent Publishing Platform, 1994) and in fact was not even aware of its existence. Having read through it in preparation for this review, the book impressed as being a damnably good breakdown of the organization departments, the missions, guiding concepts and intent of its leaders, and the tactics, techniques, procedures, and methods of each service of the “Chinese Intelligence Community” during what could now be called a bygone era. 

To the extent that it has relevance other than by mere subject matter with regard to Eftimiades Chinese Espionage Operations and Tactics. The preceding enables one, through comparisons of assessments of the work performed in varied operational and functional areas, to observe how far Chinese intelligence services have evolved, among many things, as organizations, within the country’s foreign and national security policy bureaucracy, and as vital tools in the hands of the leadership of the Communist Party of China. Interestingly, by examining both Chinese Espionage Operations and Tactics and Chinese Intelligence Operations, one is also provided the opportunity to examine an evolution in the experience, education, thinking and type of insights developed on Chinese intelligence services.. Perhaps readers will discover, much as greatcharlie did, that Chinese Espionage Operations and Tactics takes the reader to a higher level of understanding of the topics and raises the level of discourse to a seasoned intelligence analyst on China. For China watchers in particular, the monograph provides a loom from which new understandings and fresh insights can be crafted. Of course, for those who have not read or do not plan to read Eftimiades, Chinese Intelligence Operations, the opportunity still exists to prosper intellectually by plotting Chinese Espionage Operations and Tactics as the start point on the figurative charts of their respective learning curves on Chinese Intelligence.

Make no mistake, Eftimiades worked at the sharp end of intelligence work and knows the true value of each bit, even trifles, emphasizing in the text what is important to know in order to get the counterintelligence job done. Indeed, through his monograph, readers get a small taste of the discourse between intelligence officers within the bureaucracies in which Eftimiades served, and the flavor of its tone. One might as far as to say that by reading Eftimiades monograph, one gets a sense of the thinking within key US national security bureaucracies on Chinese intelligence activities in the US in the current climate.

Previous Reviews

Among reviews of Chinese Espionage Operations and Tactics published on Amazon.com are a few from former and current US senior executives and intelligence officers of the US Intelligence Community. Their glowing expressions of satisfaction and appreciation,reviews attest to the value, positive impact the monograph had on their thinking and their work. One such review was by Maryann Fialdini, Former Chief, Counterintelligence Operations of the US Defense Intelligence Agency (DIA). She explained: “Mr Eftimiades has broken new ground on his closely researched series on Chinese Espionage Operations and Tactics. His work on Chinese espionage spans 30 years in the intelligence community. In the 90’s he sounded the alarm on China’s rising espionage activities directed against US corporate and government entities. His current series on Chinese Espionage identifies for the reader China’s massive “whole of Society” approach to espionage activity and offers the exceedingly rare combination of insight and judgement from a professional who has a wealth of firsthand experience. Eftimiades work fills an important gap in US literature as it relates to Chinese intelligence. I highly recommend this book!” Another fine review was from David Tsai, formerly of the Library of Congress. He stated: “Most up-to-date comprehensive and detailed treatment of the subject based on the author’s objective analysis of close to 600 cases! An intelligence practitioner as well as academic scholar Mr. Eftimiades has given his readers a clear picture of Chinese espionage doctrine and tradecraft, based on a combination of his experience and scholarship. This excellent and insightful book is highly recommended for both professionals and novices who are interested in this subject.” A review from Nicholas Kikis, former Director of the DIA’s Defense Clandestine Service and Chief of East Asia Division, that appears on the back of the monograph, proffers: “A must-read for professionals in Counter intelligence, security and government affairs. The author has crafted the most detailed account ever published on China’s espionage operations and tactics . . . The USA is loosing its secrets and technology to China’s “whole of society” approach . . . Our Nation’s need for good counterintelligence has never been greater . . . Mr. Eftimiades is the real deal, a veteran of the Intelligence Community who describes the challenges and provides recommendations on how to do a better job in protecting America.”

Interestingly, Eftimiades does not mention anything about having to submit his monograph to the Publications Review Board of his former employer, CIA, for review. For security reasons, it is a requirement for officials from the US Intelligence Community with backgrounds as his. One might expect his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any of that information could possibly provide some important bit, some nuance on what the US knows about China’s espionage operations and tactics in the US. Surely, the Publications Review Board stopped anything from going into the text if in its view it even approximated classified information. Hypotheses and arguments are a bit more challenging to judge for security reasons. Certain facts, even if left out hypotheses and arguments, can be assessed as being confirmed by some clever sorts in an adversaries camp seeing that those facts might alone be the sole solid basis upon which a particular inference might logically be made.

Sidelights

Eftimiades’ monograph is divided into 12 sections. They are entitled as follows: Section1: “Preface”; Section 2: “Key Findings”; Section 3: “Introduction”; Section 4: “Analytical Methodology”; Section 5: “China’s Legal Framework for Espionage”; Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; Section 9: “Analysis of Espionage Tradecraft”; Section 10: “Impact”; Section 11: “Summary”; and, Section12: “Link to video Analysis of China’s Economic Espionage Tactics.” Since the monograph is only 56 pages in total, it seemed apropos for this review to condense the discussion of 8 of its 12 sections, highlighting from each what might be its most intriguing elements/aspects for our readers. For 9 of the monographs sections, to include one not précised, greatcharlie provides sidelights.

Section 1: “Preface”

From the outset, Eftimiades makes it clear that the focus of his monograph, although there is some emphasis on espionage activities against the US, is on China’s worldwide human intelligence operations. The monograph does not include a discussion of China’s intelligence analysis capabilities, technology collection, not domestic operations against perceived internal threats. He indicates that cyber espionage is only addressed in select cases which were enabled by humans providing insider access. Eftimiades notes that he brings his own experiences and perceptions into his interpretations of those cases.

Eftimiades also gives notice to readers that the monograph only reflects known Chinese intelligence operations. Even with a review of hundreds of espionage cases, he recognizes that certain matters are left open such as the number of individuals engaged in espionage activities worldwide for China, and whether the cases he analyzed represent as much as 90 percent of the total or as little as 10 percent. (The word “worldwide” qualified the former statement of the two. Perchance the number operating in the US is known!) Eftimiades insists that even the Chinese government does not know the precise number of individuals spying on its behalf. He suggests that uncertainty about that total would be due to China’s decentralized “whole of society” approach to intelligence collection. Still, he felt enabled due to the volume of cases and careful–experienced, astute–analysis of operational details, he could draw certain conclusions about China’s espionage operations and tactics.

Eftimiades’ statement about Chinese intelligence operations and tactics practiced in the US is a very bold one to make starting off from scratch in his “Preface”. Writing in that manner, Eftimiades was sure to create more questions than anything else. Reading what was stated by a number of reviewers of the monograph from outside the US national security bureaucracies, this point could perhaps be deemed as the metaphorical low-hanging fruit for criticism. Given the strength of the mind of a man as Eftimiades, it could be the case that he has dangled this statement on the number of Chinese officers and operatives around the world, aware that it would draw a strong reaction among close readers and light the fire that would ignite a lively discourse within and among them. He is a former director of CIA Counterintelligence, which makes him a member of a rather unique caste of singular individuals who would hardly do anything without considerable forethought. To go a bit further, given Eftimiades background one might think perhaps there is some counterintelligence benefit in refusing to confirm publicly, not allowing an adversary to discover what the accepted size and strength of its espionage operations are. Imaginably that information might aid them in planning around US thinking, potentially finding some advantage if the estimated figures are too high, too low, or spot on. 

The likely first impression of readers resulting from Eftimiades’ “declaration of nescience” on the numbers of would be Eftimiades could not have managed to effectively consider the ends, was, and means of Chinese organizations engaged in espionage if an important leg of the three leg “strategy stool”, means, which includes the resources, size and strength of those organizations, was unknown to him. Unaware of that it was harder to see how he could delve into a more elaborate discussion of their operations and tactics. Curiosity over how Eftimiades managed everything would surely compel the many readers to push forward into the text. However, it would very likely be regularly done with some reservation. To the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US, to be both above board and fair, are only proffered in the abstract.   

Readers looking at the matter on their own might wonder what is the average caseload for a Chinese intelligence officer from either the civilian or military service If it is more than one, let one surmise three or four, then one might begin to believe the espionage crisis is much greater in magnitude. One might consider that given likely number of Chinese intelligence officers and operatives in the field, the true number of Chinese personnel involved increases exponentially when the number likely needed to provide logistical support for such a grand number of officers and operatives in the field and their operations which appear to vary in size and scope, are considered. One might not only infer from the number and size of known operations, their intensity and tempo, and apparent effective level of support for each the totality of Chinese intelligence officers and operatives in the field, but a close approximation of their number might be reached by considering just how much has been stolen, usually detected well after the fact. Later, in the “Summary” section, Eftimiades notes that although he may not be certain of the true number of Chinese intelligence officers that are on the ground in the US but himself surmised it must be in the thousands.

There have been claims that the number of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field. The issue of numbers of Chinese spies in the US is not limited to debate within the US Intelligence Community. It has been widely reported by the mainstream newsmedia in the US that China’s intelligence services have established espionage networks throughout the country. Guo Wengui is a billionaire businessman who claimed to have close ties to China’s civilian and military intelligence services and broke with the regime. Guo revealed in his first interview in the US that those espionage networks reportedly include up to 25,000 Chinese intelligence officers and more than 15,000 recruited operatives. Guo explained that he learned about Chinese spy activities from Ma Jian, a former vice minister of the civilian intelligence service and Ji Shengde, a former military intelligence chief. As that figure, 25,000, was put forward nearly 5 years ago, the number of Chinese intelligence officers who have essentially strolled into the US and are now operating clandestinely and successfully on the ground now may be much higher. Surely, there is an officially estimated number of Chinese intelligence officers and operatives in the US Intelligence Community. Whether it will ever be made public remains to be seen, but surely, even without that figure, there is some general acceptance that what is coming toward the US is à la débandade.

People’s Republic of China Minister of State Security, Chen Wenqing (above). Chen studied Law and Political Science at Southwest University in Chongqing, and joined the Ministry of Public Security in 1984, where he worked for a decade. In 1994, Chen was assigned to the Ministry of State Security (MSS), becoming Deputy Director at the Sichuan provincial state security department. In 1998 Chen took over leadership of the State Security Department in Sichuan. He held that position until 2002, when he was appointed Chief Prosecutor at the Sichuan Provincial People’s Procuratorate. In 2006, Chen transferred to Fujian, serving as Deputy Party Secretary and concurrently head of the provincial Commission for Discipline Inspection (CCDI) until 2012. Following the 18th National Congress of the Communist Party China, Chen was brought to Beijing to serve as a Deputy Secretaries of the CCDI. He was appointed Party Secretary of the MSS in October 2016 and Minister in November 2016.

Section 2: “Key Findings”

In the section, “Key Findings”, Eftimiades provides a list of judgments supported by the information and data in his monograph. For readers, especially students, they may provide some guidance on an academic inquiry concerning Chinese intelligence. Right out of the gate, he notes that his “Key Findings” section is the product of his earlier analysis of 595 documented cases of China’s worldwide collection efforts. Thereby, they stand here independent of, but a primary feature of what is discussed in the monograph. In the monograph’s “Preface”, Eftimiades plainly states that “the focus of this work is on [China’s] worldwide human intelligence (HUMINT) operations.” Yet, in his key findings, he seems to indicate that the true focus of the monograph’s discussion, rather than being the aggregate espionage efforts of government organizations and commercial entities, academic institutions, and independent individuals in the US, is Chinese government civilian and military operations. Imaginably for some, Eftimiades may appear to shortshrift readers on any findings developed through the study of the totality of China’s espionage in the US. Perhaps in Eftimiades’ defense, his omission may very well have been more of an issue of editing and oversight.

To the extent that his key findings are limited to government espionage activities, some might readily assert that rather than opening up new territory, his findings were nearly all well-trodden ground. Indeed, at first blush, one might view what Eftimiades presents as his findings as a somewhat prosaic enumeration of highlights from his examination of the 595 cases. However, greatcharlie assures that they are much more as there are some striking elements among them. Eftimiades 10 key findings were a follows: 1) Chinese espionage activity  has greatly expanded in the past 20 years; 2) Chinese entities conducting espionage include government agencies, the People’s Liberation Army, State Owned Enterprises, private companies, individuals, and several universities; 3) Approximately half of China’s worldwide intelligence collection efforts target military and space technologies; 4) Over 90 percent of China’s espionage activities are performed by ethnic Chinese and males perform more than 80 percent of it; 5) The Ministry of State Security, China’s main civilian intelligence service, exploits social media to target foreigners with access to sensitive information. Those recruitment efforts vary in quality considerably; 6) The Ministry of State Security make use of China’s visa and border control system to identify potential recruitment and manage clandestine assets; 7) Ministry of State Security espionage tradecraft has improved over the last four years, due in part to pressure against it from US counterintelligence services; 8) Nearly half of China’s traditional espionage efforts–pursuing political and military secrets–and covert action campaigns are targeted against Taiwan; 9) China’s foreign science and technology collection efforts correlate closely to the priority technologies identified in government strategic planning documents; and, 10) China’s “whole society approach” to espionage has a harmful effect on the US economy, diplomatic influence, and military capabilities. Furthermore, China’s actions threaten European national and economic security through espionage and coercion against government entities and business decision making.

What sparked greatcharlie’s interest considerably was Eftimiades finding concerning non-ethnic-Chinese recruitment, that more ethnic Chinese recruits are used than nonethnic ones by Chinese government organizations and commercial entities engaged in espionage in the US. Multum in parvo. (Much in little. (Small but significant.))

He makes an impressive statement, but regrettably, he does delve deeper into this issue at any point later in the monograph allowing readers to understand how he got there.  His “Analysis of Espionage Tradecraft” section would have been taken to even greater heights. Useful at some point of the monograph’s discussion also would have been some background on the evolution of Chinese intelligence practices to recruit nonethnic Chinese as well as ethnic Chinese as operatives. With regard to greatcharlie’s aforementioned presumption concerning Eftimiades somewhat likely effort to stoke debate on the monograph, perchance once again he is providing more grist for the mill on this score. Perhaps a set plan regarding the monographs page length did not allow him to expound on the matter.

Perhaps it would be enough for some to say in this case that Chinese intelligence services may have recognized they can achieve their respective goals more efficiently and effectively by working mainly with ethnic Chinese recruits. Yet, surely, Chinese espionage in the West has evolved from pursuing ethnic Chinese sources alone. All things considered, such a limited effort by Chinese government organizations and commercial entities would hardly be the case. It stands to reason that the number of nonethnic recruits with which they have been successful is far higher than the few he has enumerated. To an extent, in Eftimiades own examples there is evidence that a number of nonethnic Chinese operatives were targeted and successfully recruited. Chinese intelligence services clearly have the interest and capabilities to bring in such recruits presumably as would Chinese commercial entities engaged in espionage in the US.

As discussed in the July 31, 2020 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, it was once generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers, businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections, and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use. However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method.

Guo Wengui, aforementioned here as the billionaire businessman who broke with the regime and revealed information from highly placed sources in the Chinese intelligence services that China’s espionage networks reportedly include up to 25,000 officers and 15,000 operatives, also spoke on the matter of non-ethnic-Chinese recruitment. Guo said Ma Jian, who recall was the vice minister for the civilian intelligence service, told him that a major shift by the Chinese was expanding the scope of agent recruitment from Asians to other ethnic groups.

One might argue that if Chinese government organizations and commercial entities engaged in espionage in the US were running only a few nonethnic operatives in the field, an idea Eftimiades’ statistics would apparently support, those few nonethnic operatives were doing a colossal amount of work alone to collect the loads of information from institutions where ethnic Chinese may not necessarily have been well represented or significant at all. In the abstract, and not to cast aspersions on any employees anywhere in which the erstwhile spies worked, but it may have been the case that other nonethnic Chinese employees were involved in espionage in those same institutions who went undetected and whose work was completely unknown to those who were caught.

Imaginably from a counterintelligence standpoint, if Chinese government organizations and commercial entities engaged in espionage in the US were running merely two or a few more nonethnic operatives in the field, trying intercept so few well-concealed individuals from a field of dozens of potential spies would conceivably be rather challenging. Finding them all during the past few years would be nothing less than spectacular accomplishment. C’est chercher une aiguille dans une botte de foin.

Chinese government organizations and commercial entities engaged in espionage in the US go after whomever might be best suited to meet their needs. For the accomplished services in the intelligence industry, espionage is a results focused business, not an ethnocentric one. It was noted earlier that Eftimiades insists that no one really knows how many officers and operatives working for China are on the beat in the US, but later in his “Summary” section suggests that they may very well number in the thousands. Aforementioned, too, were claims that the numbers of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field would be enormous. If those high numbers are accurate, it would likely mean those officers would be going after greater numbers of recruits. Surely, along with increased ethnic Chinese recruiting, nonethnic Chinese recruiting numbers would see far more than a nominal increase as a result.

Incidentally, Eftimiades mention of the balance between ethnic and nonethnic Chinese recruitment by Chinese government organizations and commercial entities engaged in espionage in the US, determined as a product of his analysis of the 595 cases, somewhat flies in the face of what he boldly asserted earlier in the discussion on the general on the unawareness of numbers of officers and operatives working on the ground there for China. As stated earlier, to the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US is in the abstract.   

People’s Republic of China PLA Major General Chen Guangjun (above), Chief of Central Military Commission (CMC) Joint Staff Department Intelligence Bureau. The 54 year-old Chen currently serves as chief of Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau as well as an Assistant to the Chief of the Joint Staff. Chen joined the Rocket Forces of the PLA in 1984. In the mid-2000s, he earned a Ph.D. from Northwestern Polytechnical University. The PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. Chen achieved some notoriety prior to taking over the Joint Staff Department Intelligence Bureau. Through 2007 and 2008, Chen was the focus of several newsmedia reports chronicling his role in improving levels of education in his unit.

Section 3: “Introduction”

Eftimiades begins his Introduction by stating that while espionage is often employed to support foreign policy, a country’s clandestine activities rarely become the subject of foreign policy. However, despite how rare it might be, he says that is the case for the People’s Republic of China with its massive “whole of society” approach to conducting espionage. Eftimiades believes its approach is creating a new paradigm on how intelligence activities are conducted, viewed, and addressed by countries. He notes that a key element in the US-China trade war and downward spiral in relations–a matter the received much attention from the US newsmedia at the time he penned his monograph–is Washington’s demands that Beijing cease stealing US intellectual property and trade secrets. Despite China’s denials, Eftimiades stressed that “hundreds of recently prosecuted espionage cases” prove otherwise. China’s espionage activities are changing the global balance of power, impacting the US and foreign economies, and providing challenges to domestic, national security, and foreign policy formulation.

Not to be an apologist, but rather, to be fair-minded, Eftimiades notes that there are otger governments, companies, and individual entrepreneurs that violate US laws in the drive to possess or sell US technology, government and corporate secrets. He states: “Violating a country’s laws is common practice in the murky world of espionage. According to Eftimiades, almost every time an intelligence service conducts espionage in another country, it violates that country’s laws, and that includes US intelligence operating overseas.” However, he insists that the difference is that the US and other countries engage in espionage to determine and counter hostile or potentially hostile adversaries. The purpose of espionage is not to develop their countries’ own industries or transfer foreign wealth which is a main focus of China’s activities.

There is little doubt that the public affairs departments of nearly every bureaucracy under the State Council, and Propaganda Department and Foreign Affairs section of the Communist Party of China would chomp at the bit to enthusiastically and gloatingly state in response that the US space program was developed through the employment of scientists and engineers from Occupied Germany. The resettlement of the professionals and all of their research and development was facilitated by intelligence elements of the US national security bureaucracies. The Chinese would doubtlessly assert that US activities on that matter essentially established the model for acquiring foreign capabilities through national security bureaucracies to support their technological needs and channel down to large industries mostly related to defense and intelligence to support their advancement. Chinese public affairs spokespersons would surely go on to state, likely with the pretension of lamenting, that as a result of depriving Germany of its own citizens best efforts in aerospace technologies, the country was denied trillions in revenue from potentially providing the world the fruit of their expertise. Indeed, Germany could have become the epicenter of aerospace technology development and research in the world. (Mind readers this is a presumed argument of the Communist Party of China, not at all the position of greatcharlie.) Mayhap, the counterpunch would be that Werner Von Braun and the other German scientists and engineers sought to to the US and if they were left to their devices in Occupied Germany, the Soviet Union would have surely grabbed them up to use for Soviet Premier Joseph Stalin’s sinister purposes. Germany as a whole benefited immensely from postwar reconstruction due to the US Marshall Program. German industries were given an excellent restart as a result of their rebuilding and retooling under that program.

Section 4: “Analytical Methodology”

Eftimiades explains that for purposes of this study, all of the legal definitions of criminal acts in the statutes and administrative regulations found in the export violations–International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), International Emergency Economic Powers Act (IEEPA), as well as covert action, and research violations, are categorized as espionage. Eftimiades again explains that over a period of 10 years, he compiled and analyzed 595 cases of Chinese espionage that have occurred worldwide. He notes that over 450 of those cases occurred after 2000. He states again that through the analysis of these cases, sufficient evidence provided on espionage by the Chinese government, Beijing’s promotion and support of organizations outside of the government responsible for the same, and the information objectives, determines gaps in their knowledge, and operational “tradecraft” techniques of those organizations.

There is perhaps an argument to be made that once Eftimiades decided upon the definition of espionage mentioned in this section, he shaped his discussion of what Chinese non-government entities, institutions, and individuals would be viewed as engaging in espionage. One could hardly find fault with his decision. After all, his choice was not without precedent as certain bureaucracies of the US government involved in the 595 cases he studied made the same decision based on the law. However, from the lens of the accused Chinese non-government entities, institutions, and individuals, it may be the case that they were stealing trade secrets and intellectual property, but they may not have viewed their actions as espionage, rather just theft and just a part of business. One could imagine individuals of elements involved with such thefts saying with acidulous humor that if those, who possess information that they desired to purloin, really wanted to prevent theft, they would do a far better job at securing that information. Those with such larcenous instincts might go on to insist that those possessing the information would need to look deeper within to find the answer as to why they have so often left themselves wide open to theft. This thought, on the perception of thieving Chinese non-government entities, institutions, and individuals on whether their actions are a matter of espionage or “merely” grand larceny, is developed further in this essay in the “Analysis of Espionage Tradecraft” section.

The monograph’s following four sections on Chinese operations and tactics were meat and drink for greatcharlie and will likely be for like-minded souls. They are: Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; and, Section 9: “Analysis of Espionage Tradecraft”. Only three of the four are fully discussed in this review.

Section 6: “PRC Organizations Conducting Espionage”

The espionage effort by Chinese government organizations and commercial entities, as explained by Eftimiades, has features that are entirely its own. From an analysis of his 595 cases, Eftimiades explains espionage activities correlated to their sponsoring organization (the “customer” receiving the information or technology) showed five distinct clusters of organizations engaging in espionage. The governing Communist Party of China uses government, quasi government, academic, and commercial entities as mechanisms to conduct all forms of espionage abroad. Most interesting of these are China’s “non-traditional collectors”, which include State Owned Enterprises, universities, and private companies. He confirms that the employment of such a broad set of entities for intelligence collection evinces China’s “whole of society” approach to espionage. The list of includes: 1) the Ministry of State Security, the Guojia Anquan Bu, China’s preeminent intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad; 2) the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology; 3) State Owned Enterprises (SOE), include the 50,000 aerospace and defense companies, subordinate research institutions, and technology transfer organizations owned by the central government; 4) Private Chinese companies or individuals acting unilaterally for commercial benefit only were engaged in espionage in approximately 22 percent of cases Eftimiades analyzed, and in nearly 30 percent of those cases, there was a clearly identifiable Chinese government, SOE, or university as the ultimate customer for illegal exports or trade secrets; and, 5) Other Chinese government elements that collect intelligence (information) and technology include the PLA Political Department Liaison Office (targeted against Taiwan), the United Front Work Department (UFWD), and many universities under the State Administration for Science, Technology, and Industry for National Defense (SASTIND). 

Most intriguing to greatcharlie was Eftimiades’ discussion of the PLA Political Department Liaison Office, the UFWD, and SASTIND. Beginning in reverse with SASTIND, Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Clearly put by Eftimiades, as the start point of a virtual wheel of information exchange, SASTIND assigns projects to ministries with military production responsibilities. Those ministries pass the work to the research institutes under their auspices. The associated research institutes send their information and technology gaps back to SASTIND. There are two departments within SASTIND,responsible for developing and tasking technologically related intelligence requirements and for collecting intelligence against those requirements.They are the Comprehensive Planning Department and the International Cooperation Department. The Comprehensive Planning Department tasks collection to the MSS and most likely to the PLA Joint Intelligence Bureau. The International Cooperation Department has its own independent collection capability. Members of this department travel with China’s scientists to collect information against specific requirements.

Eftimiades reports that SASTIND also has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. Some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. That list includes: Beijing Institute of Technology; Beijing University of Aeronautics and Astronautics; Beijing Engineering University; Harbin Engineering University; Harbin Institute of Technology; Northwestern Polytechnical Institution [University]; Nanjing University of Aeronautics and Astronautics; and, Nanjing University of Science and Technology. As of the monograph’s writing, over 35 Chinese universities (or professors from those universities) have been identified in US federal court documents as having some role in China’s overseas espionage cases, according to Eftimiades.

Eftimiades explains that the distribution of Chinese espionage cases worldwide illustrates the magnitude of Communist Party of China controlled businesses, research entities and business organizations involved in espionage activities. Providing superb graphs and charts for readers to examine while following along with his discussion, he shows that there is a near equal distribution of espionage activities between the four major organizational clusters (MSS, PLA, SOEs, and Private Companies). Eftimiades explains that the distribution indicates a concerted effort to use all mechanisms of government and the economy to collect foreign information and technology. To date, the Communist Party of China and the Chinese government have not taken steps to impede illegal activities (according to foreign countries laws) of their state corporations, private businesses, universities, and citizens. Eftimiades says China, referring to it once again as a “digital authoritarian state”, is clearly capable of doing so. He suggests that the Communist Party of China sees the appropriation of foreign innovations and technology as part of a policy aimed at developing domestic technology and increasing production.

In addition, his statistical breakdown of the 595 espionage cases illustrates that Chinese private companies have an aggressive posture in conducting espionage, resulting in 136 cases or approximately 23 percent of all activity worldwide. Similarly, SOEs were surreptitiously examining or collecting information or technology in 121 cases or 20 percent of the total. The SOEs are primarily collecting advanced military technology and associated research. Private companies and individuals primarily pursue commercial technologies, intellectual property and military technologies. Espionage activities conducted by the PLA Joint Intelligence Bureau give primacy to defense information, armaments, and military (or dual use) technology. The PLA was involved in 122 instances of espionage or 19 percent of all cases. Eftimiades reports that the MSS was involved in 95 instances of espionage or 16 percent of all cases. Preferred MSS targets included political or defense information, foreign policy, overseas dissidents, military capabilities, too, and foreign intelligence services. The final category of entities conducting espionage on behalf of China were Chinese universities and the UFWD. The universities generally targeted foreign technology to support advanced military weapons systems development and commercial endeavors.

Regarding the PLA Political Department Liaison Office, Eftimiades, in a markedly  unadorned way, explains that it is targeted against Taiwan. However, some confusion may befall those readers who perhaps may think of the Communist Party of China’s International Liaison Department when they come across the title, International Liaison Office. Among the pertinent facts, as part of Xi’s military reforms, in November 2015 the General Political Department of the Central Military Commission was abolished and was replaced with the Political Work Department. In January 2016, the Political Work Department became official. Its primary role as the chief political organ under the Central Military Commission is to integrate the Communist Party of China and its ideology and propaganda into the People’s Liberation Army. In that role, its responsibilities include: preparing political and economic information for the reference of the Political Bureau; conducting ideological and political work on foreign, particularly adversarial armed forces, by promoting China’s policies among their ranks, and disrupting unit cohesion within adversarial forces by withering their morale. It also has the duty to incite descension and rebellions particularly within the Taiwan army and other foreign armed forces. The Political Work Department’s Liaison Department controls a united front organization called the China Association for International Friendly Contact (CAIFC) that is active in overseas intelligence gathering and influence operations. Reportedly, the International Liaison Office has dispatched agents to infiltrate Chinese-funded companies and private institutions in Hong Kong. Their mission is also counter-espionage, monitoring their own agents, and preventing their recruitment of Chinese personnel by foreign intelligence services.

The International (Liaison) Department of the Communist Party of China is a very different organization. It stands as one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the UFWD, the Chinese People’s Political Consultative Conference (CPPCC), the Propaganda Department. Founded in 1951, International (Liaison) Department is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International Liaison Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as a UFWD bureau before being carved out into an independent entity.

You Quan (above), head of the Communust Party of China’s United Front Work Department (UFWD). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance.

The UFWD is also noticeably on the same aforementioned list of four key bodies of the Communist Party of China’s bureaucracy at the central leve that serve to build and exercise political influence outside the Party, and especially beyond China’s borders. Eftimiades does not provide any discussion of the organization, but for readers wholly unfamiliar with it, greatcharlie provides some small treatment here. As discussed in the October 19, 2020 greatcharlie post entitled, “The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department”, within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. Xi has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. United front work is the central element to understanding what the Communist Party of China is doing and why to shape the world outside of itself. In a June 9, 2020 Australian Strategic Policy Institute report, You Quan, the head of the UFWD, is quoted as saying: “The United Front is a political alliance, and united front work is political work. It must maintain the party’s leadership throughout, having the party’s flag as its flag, the party’s direction as its direction, and the party’s will as its will, uniting and gathering members of each part of the United Front around the party.” People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a 1950s CIA paper, united front work was referred to as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the Party.

Perhaps from a publisher’s point of view and with some intimation of what would most interest the monograph’s readers in fields of business and finance, Eftimiades thought it most necessary to place emphasis upon the State Administration for Science, Technology, and Industry for National Defense (SASTIND) over all of the other PRC organizations engaged in espionage. The information presented on SASTIND, for instance, is assuredly not part of regular discourse on Chinese espionage. Eftimiades, in a rather sedate tone but still a quite edifying stream of consciousness, lays out what that government organization’s well-controlled work against the US and other highly industrialized countries worldwide and its stealthy and insidious nature.

It should be expected, and may actually be tacitly accepted by some intelligence analysts in the US and in the services of other highly industrialized countries, that among Chinese government organizations and commercial entities on the ground in the US engaged in espionage, there are understood defined areas of responsibility and much as the clear boundaries already set, and well-known, between PLA HUMINT targets and activities and those of its civilian counterpart, MSS, similar arrangements have been made to avoid unwittingly conducting redundant operations, accidental collision of officers and operatives in the field, and potential interservice competition and quarrels in pursuit of available sources for US secrets. A similar delineation between the MSS and Zhōnghuá Rénmín Gònghéguó Gōng’ānbùthe Ministry of Public Security of the People’s Republic of China (MPS), both a law enforcement and an intelligence and counterintelligence service. Harmony among organizations is doubtlessly desired and required in order for them to succeed and to avoid being caught.

Yet, with so many Chinese government organizations and commercial entities on the ground in the US engaged in espionage, theft, overt collection, hiring operatives, surveilling and studying the opposition, as a reality, on more than one instance an effort to collect a particular type of information might lead more than one organization, for example, one governmental and one commercial, to the same target. One might imagine how chaos could reign without some communication. Officers and operators, perhaps not even immediately aware of each others presence, might literally run into each other, occasionally tread on each other’s work, and might even step on each other’s toes now and then creating some disruption. Some general agreement between organizations and entities in the field would need to exist in order to ensure possible fruitful operations would not face “friendly” challenges and obstacles albeit unintentionally, and to ensure they are enabled to adhere to clearly delineated lanes of action for each organization. On the matter of security, one might imagine how much easier it would be to detect and intercept Chinese espionage operators from the different organizations if they all kept showing up at the same institution trying to contact, recruit, smooze, cajole the same people in them, or one institution were simply bombarded by attempts by individuals to inveigle their way into it with a similar focus on its research and development. Obviously Chinese espionage efforts have been far quieter, smoother, and more sophisticated in nature.

Perhaps the best way to what is discussed here is simply to state that there are likely furtive bridges across organizational lines and areas of responsibilities that allow managers on the ground and officers, old hands in the business who have mastered the job, engaged in intricate operations against similar targets to directly communicate, provide assistance, modest resources, and advice all designed to facilitate security and activities and promote success. It would be a form of unofficial, collegial, furtive modus vivendi established with the requirements for operational security firmly in mind and every imaginable precaution taken. In this section, Eftimiades briefly mentions that in at least two cases, there were actually joint MSS and PLA operations in which individuals inside an aerospace company were recruited as operatives to assist in targeting the company for cyber-attacks. The MSS is so segmented with its many state department’s and provincial bureaus, that the most effective aspect of any effort by the two organizations to work jointly must have occurred between managers in the field. Given the success each espionage element, government or otherwise, has found in the US, the Communist Party of China, which would indubitably be aware of such interorganizational contacts, would likely stay mum about it all but monitor it all the same. After all, Communist Party of China intelligence organs operating sub rosa in diplomatic missions and commercial entities or incognito wherever else, would conceivably benefit too from being tied into the clandestine communications among managers in the field imagined here.

Concerning another point that flows from this discussion, rather than lacking actual knowledge or even a good sense of where everyone was relative to each other among Chinese government organizations and commercial entities engaged in espionage in the US and not having an full account of who was on the ground and stand bereft of paths for the most senior network managers of each organization to liaise, potentially in some extraordinary emergency, in the abstract, surely one could conceive that there would be a least some tacit coordination among their senior leaders, perhaps back in China. Such information would at least be in PLA, MSS, and–as often ordinary Chinese citizens will usually be involved–MPS hands. MPS surely has the most complete, up-to-date records–are perhaps often pulled into the mix of overseas espionage activities to some small degree for that reason. That information would also most likely be in the hands of the Communist Party of China via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that it helps the Party maintain its tight grip on the population.

For the edification of greatcharlie’s readers who may be not so familiar PLA intelligence, as explained in the  January 31, 2021 greatcharlie post entitled Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)”, the PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission. Thereby, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), something similar to the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare are now aggregated into the Strategic Support Force. As with its sister civilian service, the MSS, and intelligence services worldwide, the PLA makes regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. It aggressively uses Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection.

Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Eftimiades reports that SASTIND has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. On that list is Northwestern Polytechnical University of Xian, China, It is ranked number 1 in the discipline Aeronautical and Astronautical Science and Technology, known for producing some of the best brains in China’s defense industry.

Section 7: “Intelligence Collection Objectives”

As promised, greatcharlie has condensed the sections of Eftimiades monograph, providing important details, but it has not revealed everything. Yet, with such a relatively short text, there would naturally arise occasions when little option would appear available than present wholly what is provided in a particularly diminutive section, in order to provide the reader with a full understanding of the author’s thinking. That is the case with the “Intelligence Collection Objectives” section of the monograph. Under what has been whimsically dubbed as “spookspeak” by members of the intelligence industry some time ago, Collection Objectives, also known as Information Objectives or Requirements, identify the specific information or technology that is tasked to intelligence services for collection. Eftimiades stated that requirements can number in the tens-of-thousands, and explains that one can infer from requirements a country’s knowledge and technology gaps for they are a reflection of them. He provides as an example a country that has been continually pursuing information on specific components of turbine engines. The implications and indications for taking that course, says Eftimiades, are that the country most likely lacks the required information or technology on turbine engines for its planned purposes and espionage presents the only immediate way of acquiring it. Non solum eventus hoc docet, iste est magister stultorum, sed etiam ratio. (Not only does the outcome teach (us) this, that is the teacher of fools, but (so) too does reason.)

Regarding China, Eftimiades explains that its strategic collection objectives can be identified through a number of national level strategic planning documents. Listed earlier in the “Key Findings” section in the monograph, they are: Made in China 2025; Space Science and Technology in China; and, A Road Map to 2050, the National Key Technologies R&D Program, and the 13th Five Year Plan. Those national level strategic planning documents can be subdivided into specific technology development programs, are the following: the National Basic Research Program (973 Program); the National High-Tech Research and Development Program (863 Program); the National Key Technologies R&D Program; and, The National S&T Major Projects. Eftimiades offers a subset of those National S&T Major Projects which includes: Advanced Digital Control Machines and Fundamental Manufacturing Equipment; Breeding of New Variety of Transgenic Biology; Core Electronic Devices, High-end General Chips and Fundamental Software; Key New Drug Innovation; Large Scale Development of Oil and Gas Fields and Coal-bed Gas; Megascale Integrated Circuit Manufacturing Technologies; Next Generation of Broad Wireless Mobile Networks; Wastewater Control and  S&T Achievement Industrialization; National New Products Program; and, the National Soft Sciences Research Program. 

Eftimiades says that as one further breaks down the strategic technology objectives, a strong correlation to China’s espionage activity emerges. The Director of National Intelligence report, Foreign Economic Espionage in Cyberspace (2018) identified industries and private technologies that are frequent targets of foreign espionage. Eftimiades’ informs that an even closer correlation between China’s espionage efforts and national requirements can be made when comparing the 595 cases with the 19 key Technologies identified in the Communust Party of China strategic industrial planning documents Made in China 2025. These technology requirements were the primary objectives in the 435 cases. The fact that such a high proportion of espionage activities are correlated in Made in China 2025 Key technology list indicates the Communist Party of China’s role in guiding China’s global espionage effort.

Laying out points on this matter from his case analysis for all readers to understand, avec brio, Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks. Such collection efforts support PLA military aerospace programs and China’s commercial aviation sector. Going further, he states that a review of the 116 cases targeted at aerospace companies identified over 200 specific military and civilian technologies and trade secrets (stolen and attempted stolen). Among the many “Key Technologies” sought, were: Cryogenic pumps for space vehicles, valves, transfer lines, refrigeration equipment, space qualified radiation hardened circuits, components for the storage and use of liquid hydrogen, cryogenic coolers, Ka-band space communications, satellite/missile insulation blankets–germanium coated polyimide film, and multi octave traveling wave tubes used as amplifiers in satellite transponders. Major systems include: the Space Shuttle, Delta IV Rocket, F-15 Fighter, C-17 transport, F-22 Fighter, F-35 Fighter, B-1 Bomber, Ch46/47 Chinook, C-130 training equipment.

China’s Mars rover, the Zhurong (above) rolls off its lander, to begin a mission of seeking out geological discoveries. Was its development the result of espionage? Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks.

Another high priority collection target of Chinese espionage is information technology. Statistically speaking, China’s collection of information technology (113 cases) is second in numbers only to aerospace technology. China has placed strong emphasis on collecting information technology to include semiconductors and manufacturing technology. Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did. The Chinese company Huawei has been under similar export restrictions for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Key information technology related to China’s collection requirements include: microelectronics, microwave integrated circuits, microprocessors, circuit boards, crypto key devices, data and voice transmission systems, semiconductors, and trade secrets such as laser manufacturing techniques. Semiconductor manufacturing is a priority target for Chinese espionage as the US and several other nations still maintain a sizable lead over China in production capabilities. Additional priority targets for collection include biopharma and medical devices, automated machine tools and robotics, energy saving/new energy vehicles, and new materials development. Eftimiades informs that these are often distinct patterns of intelligence activity that correspond to each category of technology. For example, excluding China’s  cyber espionage campaigns, collection on biopharma and medical devices is limited to exploiting research programs (e.g., Thousand Talents Program) or economic espionage using company insiders. The three targets for this category are universities, research institutes, and pharmaceutical companies. Lastly, In the category of energy saving/new energy vehicles, Eftimiades states that most of the collection activity has been economic espionage employing insiders. The two targets for this collection effort have been companies and research laboratories. Eftimiades reveals that the majority of thefts of this technology have occurred through insider threats with cyber espionage as a secondary method.

To be succinct, in many fields, subject areas for analysis, facts are often misused and abused, but on intelligence, it can lead to great failures, and potential national disaster. Facts cannot be nailed down and used to support only what one wishes. To the contrary, facts should take the analysis toward what is authentic. From that judgments and plans must be based. Doing anything otherwise, especially while in pursuit of an opponent, is simply to procrastinate by entertaining oneself with errant deliberations. The opponent, no matter what one might choose to believe, does not procrastinate. As Eftimiades, himself, notes in the “Intelligence Collection Objectives” section of his own text, the Chinese know what they want and go after it at the time, in the way, and with the means they desire. Operatives complete their tasks and off secrets go–and oftentimes actual technologies as well–to China. That is one of the simple and more apparent keys to the opponent’s success.

China has shown little compunction over putting in full view at home, marketing, technologies, and making geopolitical moves that would be suggestive of the fact the information that allowed for those developments and actions was stolen from the US. It is almost as if the Communist Party of China encourages such actions to flaunt their country’s considerable bag of intelligence victories. Of course, government officials in Beijing will normally assert that there have been thefts and declare any evidence presented of such as circumstantial or outright lies.

Given just how much China has poached from the US has been revealed, even paraded in Beijing, one could reasonably conclude–and it is absolutely true–that China has run off with far more than a bale of information and data on classified defense and intelligence related projects, innovative commercial products, trade secrets, intellectual property, and classified foreign and defense policy documents. It is safe to say that an enormous amount is being collected. It might leave some to reasonably accept that a stratospheric level of espionage is being conducted by far greater numbers of intelligence officers and operatives and it has been ongoing.

Eftimiades provides a brilliant account of Chinese intelligence collection requirements. He supports his claims with superb charts. Some are practically signposts pointing to where the adversary is likely to show up next. Some are strong enough to serve as figurative beckoning fingers enticing along with whispered words, “Here they are.”

Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE, now defunct. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did.

Section 8: “Analysis of Espionage Cases”

The dominant activities for China’s overseas espionage are espionage, economic espionage, and export administration regulation (dual use) violations, together comprising 60 percent of all activities. Taken as a whole, statistically speaking, illegal exports (theft of dual use and military technology) make up approximately 47 percent of China’s espionage activities abroad. Eftimiades divides the 595 espionage cases that he analyzed into the following categories: espionage; economic espionage as defined by ITAR, EAR, IEEPA; covert action; and, research violations. China’s illegal export of military and dual use technology, to include IEEPA, EAR, and ITAR violations and other export related violations in the US, comprise 43.7 percent (260) of all cases worldwide. Eftimiades says more than 80 percent of these cases occurred in the US. Reportedly, economic espionage which is mainly conducted by private companies or individuals, account for 25.98 percent (119 total) of cases). The category of “traditional espionage” stands at 22 percent (108 total) of worldwide activities. Eftimiades notes the figure of traditional espionage cases sits at 55 if Taiwan is separated out as a Chinese intelligence target. Of known cases, Taiwan is the single highest priority target for individual espionage.

On a chart provided by Eftimiades, one can observe the distribution of cases to the many venues of Chinese espionage in the US. The distribution pattern reveals concentrations occurring in tech sectors, manufacturing hubs and business centers. In California, “Silicon Valley” is shown to be the number one spot in the US for China’s illegal technology collection efforts. Apparently, more than half of the 140 cases that occurred in California targeted technology firms in that venue. Other cases centered around San Diego and then Los Angeles in the state. Further, collection activity in California was mainly economic espionage (51) cases), EAR violations (30 cases), ITAR violations (25 cases), and IEEPA violations (13 cases). In the economic espionage cases, the predominant form of tradecraft was using insiders (employees) to access restricted technology and trade secrets. Priority collection objectives in California were information technology (46 cases), aerospace and aeronautical equipment (27 cases), and automated machine tools and robotics (20 cases). Nationwide, China’s collection activities cluster around the major educational, research, and manufacturing centers in several states to include Massachusetts, Michigan, New York, Pennsylvania, Florida, New Jersey, and Texas. Victims of China’s espionage efforts in the US include major defense and aerospace companies, pharmaceutical firms, technology research companies, and manufacturers. In cases in Virginia and Florida, Chinese diplomats and citizens were caught trespassing on military facilities to conduct ground photo reconnaissance. Those facilities were associated with US Naval forces and special operations capabilities.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) Eftimiades notes that research universities are clearly primary targets for collection efforts, achieved most often through talent programs such as China’s Thousand Talents Program, Hundreds Talents Program. Eftimiades reports that most estimates suggest there are “at least 200 Chinese talent programs designed to employ academic and professional expertise from the West into serving China’s national development.” He continues further to explain: “This expertise ranges from scientific and engineering fields to business, finance, and social Sciences. These programs are serviced by 600 overseas stations that gather information on foreign scientists and then attempt to recruit them. In numerous cases, professors, graduate students, and PLA researchers have also been arrested for stealing research from overseas universities for use in China.”

Chinese intelligence services apparently studied the situation, and recognized just how open the US was for theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. Surely, the Communist Party of China saw no need to halt commercial entities engaged in their own espionage activities, much as Eftimiades remarks earlier in the section entitled “PRC Organizations Conducting Espionage”. It appears they have seen nothing but opportunities to do a lot of open field running for them with little real risk. To date, it appears that they have all found no reason to pare down their operations, and certainly no reason to retreat. From Eftimiades own data, one can infer their espionage activities have steadily increased. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Though Eftimiades explains in his Preface that “cyber espionage is only addressed in select cases which were enabled by humans providing insider access. However, in discussing how exactly the FBI and DHS have thwarted Chinese espionage efforts later in his “Analysis of Cases” section, the discussion meanders into cases in which they discovered sources within China of cyberattacks into sensitive computer files of the US government, defense related businesses, financial institutions, high-tech and medical research facilities, academia, and anywhere else the hackers apparently believed there was a good opportunity to break-in and seize data. While Eftimiades expressed the intent to focus on HUMINT operations and tactics of Chinese government organizations and commercial entities engaged in espionage in the US, it would seem that he had little choice but to present it if he sought to put some positive face on what US counterintelligence services are doing to thwart China’s efforts. It is the brightest rift which can at present be seen in the clouds,

Readers may recall in Act 1, scene 3 of William Shakespeare’s play, The Life and Death of Julius Caesar, Cassius utters these apposite words to his co-conspirator Brutus: “The fault, dear Brutus, is not in our stars / But in ourselves, . . . .” With the intention of being frank, but by no means beastly, greatcharlie proffers that the fault for China’s success may lie with the US counterintelligence services themselves. It may be less a matter of tactics, techniques, procedures and methods, and rather a problem among US counterintelligence service personnel that the Chinese have recognized that they can exploit. As a matter of professional development, some effort might be made to ensure their cognitive abilities regularly honed through weekly, even daily, exercises and tests to strengthen their thinking skills, their prowess at uncovering all relevant facts, even from trifles, and developing solid insights from those facts, and their effective and correct use of a reliable intuition and intimation. Though this is stated in the abstract, one can almost be certain that the Chinese intelligence services to some degree are doing like-minded things to strengthen their intelligence officers competences. It could be something as simple as the private performance of Tai chi chuan or likely Martial Qigong every morning. (imaginably, both techniques would be performed respectively with a dynamic and free-flowing form and stances that would cause any instructor to weep with delight while observing ) Along with exercise, stretching, and breathing, it would allow their intelligence officers to mediate and attain deep focus and a relaxed state. Such activity would be helpful in any struggles with dépaysement.The Chinese intelligence services surely are quite determined to maintain an edge over their adversaries. So far, they have proved themselves to be competent and accomplished services in the field.

The Chinese company Huawei has been placed under similar export restrictions as ZTE had been, for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Section 9: “Analysis of Espionage Tradecraft”

As stated earlier, a condensed review of Section 9 “Analysis of Espionage Tradecraft” is not included here. The section is left to each reader to enjoy at first blush and perceive and decipher all they can from it. Recall that in November 1922, when excavating the tomb of Tutankamen, the English archeologist and Egyptologist, Howard Carter, pierced a hole enabling him to see inside the actual chamber. He was asked by colleagues if he could see anything, and he simply replied: “Yes! Wonderful things!” Readers will say the same when they read this section.

Having stated that, greatcharlie nevertheless includes some commentary on section, compelled by Eftimiades to mention that among those committing acts of espionage for China are commercial entities, SOEs and private companies, academic institutions, and independent individuals, particularly entrepreneurs. Eftimiades explains that SOEs and commercial entities have been determined to engage in espionage in the US and elsewhere outside of China. Having dubbed them as entities engaged in espionage, they are examined as such and ascribe all of the qualities of an intelligence service. Thereby, one would expect to observe certain traits of an intelligence service such as tradecraft to be performed by their representatives while operating in the field. Yet, unless there is some information collected by US Intelligence Community–and that would unbeknownst to greatcharlie–stating those entities as well as individual business engaged in similar acts, view themselves to be intelligence services or espionage organizations, one may not see them regularly act as such.If they display any tactics, techniques, or methods that resemble tradecraft it should be viewed as exceptional and not an expectation. Imaginably, they, themselves, might be quite surprised anyone might refer to them as espionage organizations. They simply may view themselves as a “collective” Chinese citizens working in the US availing their home companies and country of technologies, hardware, documents or whatever else they might grab from US institutions that may employ them as the opportunities present themselves. To that extent, they may really be nothing more than somewhat organized rings of thieves, nothing more. As for these individuals showing such willingness to respond to the requests and demands of the Chinese intelligence services or other State Council bureaucracies as SASTIND, too much might be made of the fact that they are obedient to the commands and demands of their authoritarian and very often punitive, government. After all, in addition to their own lives, everything that they hold dear, their families, are in the hands and under the awful power of an authoritarian–some might say totalitarian–Communist government in Beijing.

Of course, one must be open-minded. Thus, the door should not be shut completely on the possibility of some deliberate design in the practices of such commercial entities and individuals with regard to their espionage. Note that overall, their practices are not chaotic or haphazard, but rather they are grounded and for the most part accomplished. Aliquis latet error. (Some trickery lies hidden.)

In the abstract, one could imagine their movements and interactions of individuals operating for commercial entities may be intentionally stochastic. Indeed, if the activity is genuine espionage and not simply criminal behavior what greatcharlie supposes should really draw the attention of US counterintelligence is not as much whether it meets a certain expected standard of tactics, techniques, procedures and methods. What should draw that attention is the appearance of control, orchestration, and forceful activity, and that something intense is happening. Something is intended and is being achieved. The fact that there is a professional side to all of that activity must also be considered. The focus, greatcharlie humbly suggests, perhaps should be placed first on the purposefulness of the activities displayed by Chinese commercial entities and individual businesspeople, not its randomness. 

Acting as described, they allow themselves some degree of security without the need to set up resources, set up sites, train in tactics, techniques, procedures and methods to communicate and pass information physically. Keeping their movements randomly determined might leave their efforts open to analysis statistically. One could discern some random probability distribution or pattern. However, it might still be impossible for those movements and interactions to be predicted in a useful way. One might imagine that to rise to a certain level in their companies or institutions, the individuals involved are well-educated or clever enough to consciously plan their activities in a seemingly random way. Surely, anyone in a commercial entity or institution selected for such work will be tested and screened before being sent off. In some welcome back, job well-done session or maybe a torturous debriefing, the employees surely inform their manager what practices worked well in the field and which at the time were determined to be too risky.

What would seem as important, or perhaps even more vital for Chinese commercial entities, would be properly casting each “espionage operative” or “thief.” The absolute right man or woman must be assigned for the right job. Surely, human resources would bring in and spotlight the right people and managers would make selections for such work and overseas deployment. One would hardly find such individuals to be hot-blooded, and wreckless, incompetent in any fashion. They would exude equanimity, sangfroid, graciousness, and professionalism. They apparently work with a mindset that nothing is unattainable. Loosely, one might posit, taking such an attitude and approach to their efforts, might be said to be at the foundation of any “ostensible tradecraft.” Everything they do, choices they make, flows from that line of thinking.

Looking at Eftimiades discussion a tad more it would seem that he gives Chinese commercial entities and individuals engaged in espionage too much and too little credit at the same time. He perhaps gives them too much credit by identifying them as intelligence gathering organizations and thereby assessing their use of tradecraft. He gives them too little credit in that if he believes his presumption as to their status as spies and their “spy-like practices,” correct, then he dismisses the possibility that their actions are disguised, deliberately performed in a way distant from tradecraft as a technique. If their intention was to cause confusion among possible observers by taking that tack, Eftimiades’ expression of some puzzlement over the absence of traditional tradecraft in their practices serves as evidence that to a degree they may have succeeded in that. At the same time, certainly nothing they might do, would be intended to stand out, such as, perhaps in extreme, appearing gargoyle or something of the type, and drawing attention daily.

Some foundational information and thought on Chinese espionage activities in the US has to be established if study and understanding on the subject is to be advanced. The establishment of such a baseline of information, however, should not result conversely in some uncompromising stance toward it. New facts must be collected and an openness must exist to consider alternative analyses of those facts, which may lead to new possibilities and potential successes against such activities. There are likely many unexplored possibilities that perhaps should be considered about all matters concerning the subject. From what has been publicly reported, often in the US national security bureaucracies, perspectives on adversaries have reportedly become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, perhaps most akin to an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with regard to Chinese foreign intelligence activity in the US.

It seems high time that US counterintelligence services ceased looking at Chinese intelligence operations and tactics with a focus on their deficiencies and flaws in practice. Equally or even more important is to consider precisely what they are doing right in order to be successful. A starting point would be an assessment of how Chinese intelligence services and all the other government organizations and commercial entities engaged in espionage in the US view US counterintelligence services and how they are responding to US defenses set up against them. It would seem from Eftimiades text that a burgeoning notion in defense of the current situation in which China is achieving a degree of success is that their numbers in the US are so high that it would naturally be difficult to struggle with them head-to-head. Hopefully, this is not the case. To be frank, the ability of Chinese intelligence services to position so many of their personnel in the US is just a symptom of the conundrum of not being able to stem their activities. Focusing upon that will not yield a cure. There are surely considerable deficiencies and flaws in the way in which US counterintelligence operates that have given Chinese government organizations and commercial entities the confidence to act without much fear. Res ipsa locquitor. (The thing speaks for itself.)

Of the seven universities that have been dubbed the Seven Sons of National Defense, some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. On that list is the Nanjing University Aeronautics and Astronautics (above). Nanjing is also known for providing the MSS with recruits for its corps of intelligence officers.

Section 11: “Summary”

Since what is found in Eftimiades “Summary” section is drawn from his discussion of his analysis of the 595 espionage cases since 2000, it would stand to reason they would serve well as a figurative subset of eight ample bullet points for his “Key Findings” which themselves extracted directly from the facts of those many cases. Of that seeming “subset of findings” in Eftimiades “Summary” section, the “top 5” selected by greatcharlie are the following.

First, Eftimiades explains that the US Intelligence Community is not well-organized to protect the secrets of US industries. It is far better at protecting its own secrets. He says the same holds true for most other technologically advanced [highly industrialized] countries. A problem he points to, calling it obvious, is that commercial industry and scientific research programs, the primary targets for Chinese intelligence collection, are the most vulnerable.

Second, as aforementioned in the discussion of the monograph’s Preface, Eftimiades says the DHS and the FBI are leading the effort in the US “to combat China’s massive intelligence collection campaign.” He again states that both organizations “have done excellent work in reducing Beijing’s relentless efforts,” noting the FBI has made advances since 2018 to assist US industry and academia, and DHS is also working aggressively to curtail illegal exports of advanced technology and those who steal scientific research. However, he declares “there is still much more to be done.” He explains that the work of other government agencies as well as a bipartisan effort in Congress will also be necessary to ensure national and economic security.

Third, Eftimiades proffers that success in thwarting China’s aggressive collection efforts will ultimately rest upon three factors: 1) the ability of US law enforcement and intelligence apparatus to shift organizational culture and support private industry and academia; 2) developing a strategic campaign in the US integrating all the elements of the government and its allies; and, 3) having Congress pass laws to raise the costs of economic espionage to the Communist Party of China. Chinese companies and individuals via visa restrictions, sanctions, investment restrictions, and otherwise. 

Fourth, Eftimiades explains, as he has surely illustrated throughout his monograph by reporting his case analysis, yet does not declare in any vehement way, that China’s “whole of society” approach to espionage has been quite successful thus far in defeating government and private industry organizations. He focuses more on what has been positive about US counterintelligence efforts,

Fifth, Eftimiades reveals that efforts by some countries within the EU, India, and Japan to restrain China’s intelligence activities have been comparatively less apparent in public sources. Although espionage arrests in India, Germany, France, Belgium, and Poland have been low in number, he sees such developments as an indication that those countries now seek to more vigorously counter China’s collection efforts. In addition, Eftimiades asserts that “China’s public image is suffering worldwide as the French and German governments have made statements on China’s aggressive espionage on social media, human rights issues, COVID-19 response, and Beijing’s threats over trade.”

In determining the percentage of Chinese espionage efforts thwarted, it must again be noted that the percentage would need to be calculated based on the entirety of the Chinese espionage effort. If one accepts Eftimiades does not know that number, and there is no reason not to do so, knowing the percentage of thwarted espionage efforts seems impossible and his claim is only a presumption or at best the result of “secret knowledge.”

When writing about the success of the FBI and DHS in thwarting espionage efforts of Chinese government organizations and commercial entities, there was less of an appearance by Eftimiades of reporting facts, and a more apparent effort by him to convince readers on a position tenuously supported in the text that he wants them to accept. To that extent, he actually presents more than anything else, as there is no supportable alternative story to present given the realities of the situation, is a well-supported outline of concerted, energetic, and endless activity to steal US secrets by China.

It would seem that the nature of the situation has already been firmed in the minds of the public based on reports in the newsmedia. It is unlikely that readers of his monograph would be inclined to Eftimiades perspective, despite his remarkable background. It is unlikely that anyone in the US counterintelligence services, particularly among senior executives and managers, is on Cloud 9 over results versus Chinese government organizations and commercial entities engaged in espionage in the US. Somewhere deep inside, some may feel a bit stuck and stagnating, clutching at straws, and listening to the wind, but conceal such concerns from their colleagues. One might imagine their feelings: “Je suis las de toujours faire la même chose.” That would be a multifaceted problem for US counterintelligence services in itself. Perchance in trumpeting FBI and DHS success was an effort to boost morale or at least comfort those from each service who may have had their fill of Chinese success in their country. Eftimiades may have viewed optimism as the best and most available elixir for defeatism, and employed it liberally. Perhaps this line of thinking that drove Eftimiades, who leaves no doubt that he is unwavering in his support and confidence of the FBI and DHS, consciously drifts a tad away from his encomium of their respective work against Chinese espionage moves in the US. As also mentioned in the discussion of the monograph’s Preface, in the “Summary” section, Eftimiades does say “there is still much more to be done.”

Noticeably, in the “Summary” section, as noted in the discussion of the Preface, Eftimiades also relents so to speak from his “declaration of nescience” to say there are very likely thousands of Chinese espionage operators in the US. However, although there is clear evidence that their purpose is to steal US secrets and technologies, one might consider in the abstract whether there may be other interests of the utmost importance to the Chinese intelligence services that require such a labor-intensive effort. That should beat the brain. Going back to the suggested figure of 25,000 intelligence officers, professionals, albeit discrepantly trained and experienced, on the ground–a force one and half times the current size of a US Army armored division, it may be worth considering whether they may be engaged in a bold, cunning reconnaissance and surveillance mission of far greater conception than ever seen in the past or might normally be imagined in the present. Itt might be a mission that could not be performed in any other way than with a large force of professional intelligence officers. To be direct, yet admittedly still a bit Delphic, there must be a clear reason why officers of Chinese Intelligence services operating in the US, in particular, are so successful at not being wherever, whenever US counterintelligence services are looking for them. 

There is a thin line that separates reality from illusion. It must be kept firmly in mind that if one denies or unconsciously suppresses reality, what is left is only an illusion, false reality. Once one begins planning and operating within that, all is lost. If that is or ever would be the case concerning the Chinese conundrum, the situation will become far worse than ever imagined. Further, the more one deals in truths and reality, the more one develops reliable intuition and intimations. The more one entertains fallacies and what is artificial, the farther one moves away from having any real intuition or developing any intimations at all. These skills in the end will prove to be absolutely imperative if endsieg, a final victory against all of the odds stacked against them, is to be achieved by US counterintelligence services in their struggle against Chinese espionage efforts. As the celebrated Spanish novelist, translator, and columnist, Javier Marías remarked during an interview for the Winter 2006 issue of the Paris Review: “One must have courage to see what one does see and not to deny it for convenience.”

Regarding China’s concern about having the image of being a country of thieves and copycats, stealing the best ideas of other countries to support and propel its conspicuous advancements in nearly all sectors, the Communist Party of China absolutely has an interest in global public opinion of China and perceptions of its actions on the world stage. Still, it is unlikely that the Communist Party of China has too much concern about that in that vein. One must remember, the Party insists that at the foundation of all advancements of the Western industrial powers are the years those countries overwhelmed peoples who were defenseless and through a colonial system violently oppressed them and allowed business enterprises of their respective countries to exploit the conquered peoples’ lands for raw materials and mineral wealth for centuries. They will use the experience of China to support that argument. Within their own countries, the Party says down-trodden workers were essentially enslaved by the same business enterprises now called multinational corporations. (Note that greatcharlie asserts in the abstract that this is the Communist Party of China’s perspective; it is by no means greatcharlie’s perspective.)

Still, more salient based on the Party’s mindset would be the overall judgment of the world on the robust energy China displays as it pushes onward and upward into the future and, albeit mistakenly believing, eventually reaching the position at the top as the world’s dominant power. From that perspective, the Communist Party of China would see their country as having a very positive, lasting impact on global perceptions of it everyday. To that extent, the Party leaders and propagandists likely weigh that global perception on “energy” and Western measures of global public opinion ratings, particularly if those ratings are based on reactions to independent events and not the bigger picture. While one might agree that there are some universal truths about our world, still not everyone thinks the same on all issues. China’s view of its future is quite at variance with that held by most in the US best familiar with the issues involved. Fere libenter homines id quod volunt credunt. (In most cases men willingly believe what they wish.)

There will naturally be more that US counterintelligence services would want from the US Congress to appropriate for them in order to pursue adversarial countries’ intelligence services operating without pause, on the ground, in the US. However, the matter must be examined from the lens of Congressional leadership. From their view, US counterintelligence services  presently possess considerable resources to pursue Chinese intelligence officers and operatives. There are no indications Chinese espionage networks are being regularly taken down. Harsh critics and skeptical observers might begin to believe that, unbeknownst to the public, US counterintelligence services are actually being restrained from doing their utmost to defeat opponents here in the US. However, there would hardly be any logic to that. Surely, US counterintelligence services are not flâneurs, in the field simply playing chase games. Even the slightest act in that direction would betray the trust and reliance the US public has in their fidelity and  their belief that they are protecting the country’s sovereignty, its property, its interests and especially its people. As expressed in the February 26, 2021 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, by 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. Sardonically, from a paranormal perspective, one might suggest that although Chinese intelligence officers may be operating in the same spaces in which US counterintelligence services are looking hard, they do so in some other plane existence, undetectable by mortal eye. Sous une surface calme tout se passe.

There has been more than enough talk about how bad the problem with China is. C’est la Bérézina. As it has been discussed so often that, in a way, such talk haa become by the by to some degree for the US public. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and destroy all of its networks. As greatcharlie has mentioned in proceeding posts on the Chinese espionage crisis, It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Eftimiades clearly understands that much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. Fundamental changes may be needed in efforts to halt Chinese espionage operations. There is the possibility that certain apparent aspects of Chinese intelligence operations are not being focused on sufficiently or appropriately. Making the right improvements requires being persistent in one’s search for answers. To continue the pursuit successfully will require a certain boldness in thinking. Although he literally lost his head by guillotine two years later, George Jacques Danton, the 18th century French revolutionary leader, addressed the Legislative Committee of General Defence, September 2, 1792 with words concerning the situation in France which are apposite for counterintelligence organizations dedication protecting their countries against any harm by Chinese intelligence services: “De l’audace, et encore de l’audace, et toujours de l’audace, et la France est sauvee.” (Boldness, more boldness, and always boldness, and France is saved.)

What Eftimiades presents on Chinese espionage operations and tactics represents a stage of those activities existent at the time he wrote the monograph. However, Chinese intelligence operations and tactics appear to be constantly and rapidly evolving, becoming something more effective, more efficient everyday. As their capabilities improve, the possibilities for action also increase. It is difficult to accept but very likely a reality that success has given Chinese intelligence services so far good reason to approach the future with confidence. To that extent, the worst may be yet to come. However, on the other side of the coin, while it may seem counterintuitive to some ears, the success of Chinese government organizations and commercial entities engaged in espionage in the US should not frustrate US counterintelligence officers. Rather, it should embolden officers of US counterintelligence services to struggle even harder to succeed. Hope must still exist in the situation for that. Surely, establishing a pattern of success would go a much longer way in building self-confidence among officers in US counterintelligence services struggling on their own home ground with the Chinese.

What one finds in Chinese Espionage Operations and Tactics is of considerable quality. The book remains a steady flow of information, data, and expressions that well-demonstrates the author’s command of the subject matter, from beginning to end. Without pretension, greatcharlie states that what is presented here represents less than twenty percent of the insights birthed in greatcharlie by Eftimiades monograph. Readers should imagine what insights might be brewed up from within themselves after they have had a chance to read through it. 

It is assured that after the first reading Chinese Espionage Operations and Tactics, one would most likely go back to the book and engage in that stimulating process again and again. The monograph will very likely be regularly consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. Surely, the monograph would be quite useful to an Intelligence Studies instructor who, as a primary part of an assignment, might decide to have students read the monograph, observe the manner in which Eftimiades report is formatted, how information is presented in its sections, and develop insights from its discussion.

Perhaps it is eedless to say at this point, but it is nonetheless stated with absolute conviction and true relish, greatcharlie unequivocally recommends Eftimiades Chinese Espionage Operations and Tactics to its readers.

By Mark Edmond Clark

A Russian Threat on Two Fronts: A New Understanding of Putin, Not Inadequate Old Ones, Will Allow the Best Response

Russian Federation President Vladimir Putin (above). Putin, himself, appears to be the cause for difficulties that  the Trump administration has encountered in improve relations between the US and Russia. One might accuse Putin of playing a cat and mouse game with Trump. Why Putin would act in this manner is uncertain. An assay of Putin from outside the box may provide a framework from which the Russian President’s complexities can be better understood.

According to a March 3, 2018 New York Times article entitled, “A Russian Threat on Two Fronts Meets an American Strategic Void”, US President Donald Trump has remained silent about his vision to contain Russian power, and has not expressed hope of luring Moscow into new rounds of negotiations to prevent a recurrent arms race. Indeed, the article, largely critical of the Trump administration, explains that “most talk of restraint has been cast to the wind” over the past few months. What purportedly envelopes Washington now is a strategic vacuum captured by “Russian muscle-flexing and US hand-wringing.” A cyberchallenge has enhanced the degree of tension between the two countries. The article reports that top US intelligence officials have conceded that Trump has yet to discuss strategies with them to prevent the Russians from interfering in the midterm elections in 2018. In striking testimony on February 27, 2018 on Capitol Hill, the director of both the US National Security Agency and the US Cyber Command, US Navy Admiral Michael Rogers explained that when he took command of his agencies, one of his goals was to assure that US adversaries would “pay a price” for their cyberactions against the US that would “far outweigh the benefit” derived from hacking. Rogers conceded in his testimony that his goal had not been met. He dismissed sanctions that the US Congress approved last year and those that Trump had not imposed as planned would not have been enough to change “the calculus or the behavior” of Russian Federation President Vladimir Putin.

What was reported by the March 3rd New York Times article presaged a shaky future for US-Russian relations. At the start of the Trump administration, Putin convincingly projected an interest in working toward better relations through diplomacy. Areas of agreement and a degree of mutual respect between Trump and Putin have been found. Yet, agreements reached should have served to unlock the diplomatic process on big issues. Putin appears to be the causality for a figurative draw on the scorecard one year into the Trump administration’s exceptionally pellucid, well-meaning effort. Putin seems to be playing a cat and mouse game with Trump–constant pursuit, near capture, and repeated escapes. It appears to have been a distraction, allowing him to engage in other actions. While engaged in diplomacy, the Trump administration has observed hostile Russian moves such as continued interference n US elections, as well as other countries, and efforts to support Syrian President Bashar al-Assad and to tighten Moscow’s grip Crimea and the Donbass. Those actions greatly diverge with US policies on Syria and Ukraine. Putin and his officials have shown their hand too completely over time for anyone in Washington to allow themselves to be seduced by Putin’s guise of wanting to improve ties. In the recent greatcharlie post, it was explained that Trump and foreign and national security policy officials in his administration, who were good-naturedly referred to as “stone hearts”, were well-aware from the get-go that Putin and his government could more often than not be disingenuous.  If Putin truly does not want positive to change in relations, the Trump administration’s diplomatic project with Russia is likely moribund. If there were some touch that Trump could put on the situation right now that would knock the project in the right direction, he certainly would. At the moment, however, the environment is not right even for his type of creativity and impressive skills as a negotiator. For now, there may very well be no power in the tongue of man to alter Putin. Since no changes in relations are likely in the near future, it would be ideal if Putin would avoid exacerbating the situation between the US and Russia by suddenly halting any ongoing election meddling. The whole matter should have been tied-off and left inert in files in the Kremlin and offices in the Russian Federation intelligence and security services. However, Putin seems to going in the opposite direction. The threat exists that Putin, seeing opportunity where there is none, will engage in more aggressive election meddling, and will also rush to accomplish things in its near abroad, via hybrid attacks at a level short of all out war, with the idea that there is time left on the clock before the US responds with a severe move and relations with the Trump administration turn thoroughly sour. That possibility becomes greater if the Kremlin is extrapolating information to assess Trump’s will to respond from the US newsmedia.

Putin’s desire, will, and ability to act in an aggressive manner against the US, EU, and their interests must be regularly assessed in the light of new events, recent declarations,  and attitudes and behaviors most recently observed by Western leaders and other officials during face to face meetings with him. Undoubtedly, Trump is thoroughly examining Putin, trying to understand him better, mulling through the capabilities and capacity of the US and its allies to respond to both new moves and things he has already done. Since Trump is among the few Western leaders who have recently met with Putin–in fact he has met with him a number of times, there might be little unction for him to be concerned himself with meditations on the Russian President made in the abstract. Nevertheless, an assay of Putin from outside the box may provide a framework from which the Russian President’s complexities can be better understood. Parsing out elements such as Putin’s interests and instincts, habits and idiosyncrasies, and the values that might guide his conscious and unconscious judgments would be the best approavh.to take. A psychological work up of that type on Putin is beyond greatcharlie’s remit. However, what can be offered is a limited presentation, with some delicacy, of a few ruminations on Putin’s interior-self, by looking at his faith, pride, ego; countenance, and other shadows of his soul. What is presented is hardly as precise as Euclid’s Elements, but hopefully, it might be useful to those examining Putin and contribute to the policy debate on Russia as well. Credula vitam spes fovet et melius cras fore semper dicit. (Credulous hope supports our life, and always says that tomorrow will be better.)

Putin has publicly declared his faith and has been an observant member of the Russian Orthodox Church. By discussing his faith, Putin has developed considerable political capital among certain segments of the Russian public. Putin’s political opponents and other critics at home, however, would question where faith has its influence on him given some of his policy and political decision, particularly concerning territorial grabs, overseas election meddling, and reported human and civil rights violations in his own country.

Faith

The Oxford English Dictionary (OED) defines faith as complete trust or confidence; a strong belief in a religion, based on spiritual conviction rather than proof. Faith guides the mind. It helps the mind conclude things. Simple faith, involves trusting in people and things. Communists mocked faith in the church, but still had faith in Marx. In that vein, faith allows for the acceptance of the word of another, trusting that one knows what one is saying and that one is telling the truth. The authority being trusted must have real knowledge of what he or she is talking about, and no intention to deceive. Faith is referred to as divine faith when the one believed is God. In discussing Putin’s divine faith, greatcharlie recognizes that to convey a sense of religiousness makes oneself spooky to some. Writing publicly, one of course opens oneself up to constructive criticism at best and obloquy at worst. Still, a discussion tied to faith might be feared by readers on its face as being one more expression of neurotic religiosity, an absurdity. That presents a real challenge. Nonetheless, the effort is made here.

Putin has publicly declared his faith on many occasions. He has been an observant member of the Russian Orthodox Church. Putin was introduced, to religion, faiith, and the church early in his life. In Part 1 of Putin’s 2000 memoir, First Person: An Astonishingly Frank Self-Portrait by Russia’s President (Public Affairs, 2000), Putin explains that his mother, Mariya Ivanovna Shelomova, attended church and had him baptized when he was born. She kept his baptism a secret from his father, who was Communist Party member and secretary of a party organization in his factory shop. Putin relates a story concerning her faith as well as his own in Part 1’s final paragraph. He explains: “In 1993, when I worked on the Leningrad City Council, I went to Israel as part of an official delegation. Mama gave me my baptismal cross to get it blessed at the Lord’s Tomb. I did as she said and then put the cross around my neck. I have never taken it off since.” Religious formation must start at childhood discussing ideas as being kind, obedient, and loving. They must be told of the world visible and invisible. Children are buffeted by many aggressive, strange, harmful ideas, and must able to surmount them by knowing what is right and doing what is right. Children tend to gravitate toward prayer, which strengthens their faith and helps their devotion grow. One tends to resemble those in which one is in regular conversation, and prayer helps bring children closer to God. The very brief life God bestows to one on Earth is lived more fully with faith. On his death bed, the renowned French philosopher, playwright, novelist, and political activist, Jean Paul Sartre, stated: ”I do not feel that I am the product of chance, a speck of dust in the universe, but someone who was expected, prepared, prefigured. In short, a being whom only a Creator could put here, and this idea of a creating hand refers to God.” Est autem fides credere quod nondum vides; cuius fidei merces est videoed quod credis. (Faith is to believe what you do not see the reward of this faith is to see what you believe.)

Faith does not replace the intellect, it guides the mind. Whether Putin’s faith has shaped his views or his Ideology is unclear. By discussing his faith, Putin has developed considerable political capital among certain segments of the Russian public. It has allowed Putin to cloak him in something very positive, very healthy, and would provide citizens with a good reason to doubt and dismiss negative rumors and reports about his actions. Many Russian citizens have responded to Putin’s introduction of faith to the dialogue about his presidency by coming home to the Orthodox Church. Perhaps that is a positive aspect that can be found in it all. Members of Russia’s opposition movement and other critics at home, however, would question where faith has its influence on him given some of his policy and political decision, particularly concerning territorial grabs, overseas election meddling, and reported human and civil rights violations in his own country. They would claim that rather than shaping his policy decisions in office, his faith is shaped by politics. They would doubt that he would ever leverage influence resulting from his revelations about his faith in a beneficial way for the Russian people or any positive way in general. They could only view Putin’s declaration of divine worship as false, and that he is only encouraging the superficial worship of himself among the intellectually inmature who may be impressed or obsessed with his power, wealth, lifestyle, and celebrity.

Putin commemorates baptism of Jesus Christ in blessed water (above). On June 10, 2015, Putin was asked by the editor in chief of the Italian daily Corriere della Sera, “Is there any action that you most regret in your life, something that you consider a mistake and wouldn’t want to repeat ever again.” Putin stated, “I’ll be totally frank with you. I cannot recollect anything of the kind. It appears that the Lord built my life in a way that I have nothing to regret.”

Putin is certain that his faith has provided a moral backing for his decisions and actions as Russian President. On June 10, 2015, Putin was asked by the editor in chief of the Italian daily Corriere della Sera, “Is there any action that you most regret in your life, something that you consider a mistake and wouldn’t want to repeat ever again.” Putin stated, “I’ll be totally frank with you. I cannot recollect anything of the kind. It appears that the Lord built my life in a way that I have nothing to regret.”

Having humility means to be honest about ones gifts and defects. The true source, the real hand in ones accomplishments, is God. Once one recognizes this, one can be honest about the need for God’s assistance. Putin’s, to a degree, seems to indicate that he has humility and appears assured that he has been placed in his current circumstances, and has given him the ability to do all that he has done, as the result of God’s will. However, Putin should keep in mind that evil can quiet all suspicions, making everything appear normal and natural to those with the best intentions. To that extent, his decision and actions could truly be the augur of his soul, but perhaps not in a positive way. Evil can go into the souls without faith, into souls that are empty. Once evil insinuates itself in one’s life, there is chaos, one becomes bewildered, confused about life, about who one is. Due to the threat of evil influence one must be willing to look deeper at oneself to discern flaws, to see what is lacking. Having a sense of balance in this world necessitates having an authentic knowledge of oneself, the acceptance of daily humiliations, avoidance of even the least self-complacency, and humble acknowledgement of ones faults. The virtue of temperance allows one to give oneself a good look. Once one gets oneself right, then one can get God right. Vitiis nemo sine nascitur. (No one is born without faults.)

Putin seemingly surmises that he is satisfying God through his religious observance and by obeying religious obligations. Yet, one cannot approach God simply on the basis of one’s “good deeds.” Indeed, simply doing the right things, for example, following the law does, not grant you salvation. It does not give you guidance. Approval, recognition, obligation, and guilt are also reasons for doing good. The motive behind your actions is more important than your actions. To simply believe also does not put one in a position to receive. Your heart must be right.

Putin celebrating Christmas in St Petersburg (above). Wrong is wrong even if everyone else is doing it. Right is right even if nobody is doing it. Putin’s conscience should be able to distinguish between what is morally right and wrong. It should urge him to do that which he recognizes to be right. It should restrain him from what he recognizes to be wrong. Ones conscience passes judgment on our actions and executes that judgment on the soul.

All those who have worked for Putin, and those who have come up against him, would likely agree that he has a wonderful brain, and his intellect must be respected. His talents were first dedicated to his initial career as an officer in the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) known better as the KGB—the agency responsible for intelligence, counterintelligence, and internal security. The job took root in him. As a skilled KGB officer, he was proficient at lying, manipulation and deception. It was perhaps his métier.  Putin would likely say he engaged in such behavior for all the right reasons, as a loyal foot soldier. Subsequently, he would serve in a succession of political positions in the intelligence industry that were thrust upon him. In 1997, he served as head of the Main Control Directorate. In 1998, he was ordered to serve as director of the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB. Later that same year, he was named Secretary of the Security Council. Through those positions, he was educated thoroughly on the insecurity of the world. It was a world in which things in life were transient. He discovered the width of the spectrum of human behavior. Putin applies that knowledge of humankind, sizing-up, and very often intimidating interlocutors, both allies and adversaries alike. The 16th century English statesman and philosopher, Sir Francis Bacon said that “knowledge itself is power,” but Intellect without wisdom is powerless. One matures intellectually when one moves from seeking to understand the how of things to understanding the why of things. Through the conquest of pride can one move from the how to the why. One can only pray for the wisdom to do so. In The New Testament, Saint Paul explains: “Do not be conformed to this world, but be transformed by the renewal of your mind, that by testing you may discern what is the will of God, what is good and acceptable and perfect. For by the grace given to me I say to everyone among you not to think of himself more highly than he ought to think, but to think with sober judgment, each according to the measure of faith that God has assigned. Beatus attempt esse sine virtute nemo potest. (No one can be happy without virtue.).”

The Catechism of the Catholic Church explains that the inclination toward sin and evil is called “concupiscence”. Baptism erases original sin and turns a man back towards God. However, the inclination toward sin and evil persists, and the man must continue to struggle against concupiscence. Sin leads to sin. Acts of sin tend to perpetuate themselves and result in additional acts of sin. Sin can become a way of life if it goes unchecked. When Putin approaches the altar of the Russian Orthodox Church, his purpose should be to expiate sin.

Wrong is wrong even if everyone else is doing it. Right is right even if nobody is doing it. Putin’s conscience should be able to distinguish between what is morally right and wrong. It should urge him to do that which he recognizes to be right. It should restrain him from what he recognizes to be wrong. For the spiritual, conscience is formed by God’s truth. God’s truth creates order. In addition to knowing God’s truth, one must embody His truth which is inspired by love. The truth is a great treasure, a satisfactory explanation of the world and heaven that should speak to the individual. One should love God, love one’s neighbor, and remain virtuous by choice because it is the right thing to do. The reason for ones existence is best understood once one connects with the Creator of life. One can be happy with what makes God happy. Sub specie aeternitatis. (Under the aspect of eternity.)

Ones conscience passes judgment on our actions and executes that judgment on the soul. One should not do things that do not fit one. Conscience will send warning signals ahead of time. One should not ignore ones conscience. One should not violate it. The conscience should serve as Putin’s protection. Despite everything, it could very well be that Putin has a seared conscience. A less sensitive conscience will often fail an individual. Perhaps his conscience is dead. In following, his ability to know what is right may be dead. Putin declared his faith. He did not declare that he was a moral paragon. Quodsi ea mihi maxime inpenderet tamen hoc animo fui semper, ut invidiam virtute partam gloriam, non invidiam putarem. (I have always been of the opinion that infamy earned by doing what is right is not infamy at all, but glory.).

Putin at the 2015 Moscow Victory Day Parade (above). Putin would likely be delighted to know there was a general understanding that his pride and patriotism go hand in hand. To that extent, all of his moves are ostensibly made in the name of restoring Russia’s greatness, to save it from outsiders who have done great harm to the country and would do more without his efforts. Some Russian citizens actually see Putin as ‘the Savior of Russia.”

Pride

Si fractus illabatur orbis, impavidum ferient ruinae. (If the world should break and fall on him, it would strike him fearless.) The OED defines pride as a feeling of deep pleasure or satisfaction derived from achievements, qualities or possessions that do one credit, or something which causes this; consciousness of one’s own dignity or the quality of having an excessively high opinion of oneself. Pride has been classified as a self-conscious emotion revolving around self and as social emotion concerning ones relationship to others. It can be self-inflating and distance one from others.

In terms of being conscious of the qualities, the positive nature of one’s country, surely national leaders must have a cognitive pride, an attitude of pride in their countries, their administrations, and missions. They will express their pride with dignity, regardles of how big or small, powerful or weak, that their countries are. Putin insists that all Russian have pride in their country. Putin wants all Russian citizens to be part of their country’s rise to greatness. Divisions based on race, ethnicity, religion and origin hinder that. It is worth repeating from the greatcharlie post, “Russia Is Creating Three New Divisions to Counter NATO’s Planned Expansion: Does Shoigu’s Involvement Assure Success for Putin?”, that much as the orator, poet, and statesman, Marcus Tullius Cicero, concluded about his Ancient Rome, Putin believes that loyalty to the Russian Federation must take precedence over any other collectivity: social, cultural, political, or otherwise. As noted by Clifford Ando in Imperial Ideology and Provincial Loyalty in the Roman Empire (University of California Press, 2013), in the hierarchy of allegiances outlined by Cicero, “loyalty toward Rome occupied a superordinate position: her laws and her culture provided the normative fabric that would, to borrow a phrase of Rutilius Namatianus [Poet, Imperial Rome, 5th Century], ‘create from distinct and separate nations a single fatherland’.” Likewise, Russia’s laws and culture provide the normative fabric from which a united country is created from diverse peoples. Possession of citizenship should be the basis to cause individuals to identify with the concerns of others in widely disparate populations among Russia’s republics. Putin wants Russians to be in a “Russian state of mind,” a mental state created when diversity, creativity, and optimism coalesce. A citizen’s attitude, perspective, outlook, approach, mood, disposition, and mindset should stand positively Russian.

From a theological perspective, the prideful individual acts as if their talents, possessions, or achievements are not the result of God’s goodness and grace but their own efforts. When pride is carried to the extent that one is unwilling to acknowledge dependence on God and refuses to submit ones will to God or lawful authority, it is a grave sin. While not all sins source from pride, it can lead to all sorts of sins, notably presumption, ambition, vainglory, boasting, hypocrisy, strife, and disobedience. In that vein, pride is really striving for a type of perverse excellence. That type of pride can be embedded deeply in ones being. 

1. Patriotism

Putin’s emotional pride is also expressed in the form of profound patriotism. Patriotism is defined as having or expressing devotion to and vigorous support for ones country. In reading Part 1 of Putin’s First Person, one can begin to understand why patriotism permeates everything Putin does. Given the rich history of his family’s service to the homeland gleaned from his parents and grandparents, it is hard to imagine how he would think any other way. It was gleaned because according to Putin, much of what he learned about his family was caught by him and not taught directly to him. Indeed, he explains: “My parents didn’t talk much about the past, either. People generally didn’t, back then. But when relatives would come to visit them in Leningrad (now St. Petersburg), there would be long chats around the table, and I would catch some snatches, so many fragments of the conversation.” Putin’s grandfather, Spiridon Ivanovich Putin, was a cook. However, after World War I he was offered a job in The Hills district on the outskirts of Moscow, where Vladimir Lenin and the whole Ulynov family lived. When Lenin died, his grandfather was transferred to one of Josef Stalin’s dachas. He worked there for a long period. It is assumed by many that due to his close proximity to Stalin, he was a member of the infamous state security apparatus, the Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat of Internal Affairs) or NKVD. Putin notes that his grandfather came through the purges unscathed unlike most who spent much time around Stalin. Putin also notes that his grandfather outlived Stalin, and in his later, retirement years, he was a cook at the Moscow City Party Committee sanatorium in Ilinskoye. As for Putin’s mother, she refused to leave Leningrad as the Germans were blockading it. When it became impossible for her to remain, her brother, under gunfire and bombs, took her out along with her baby, Albert, Putin’s brother, to Smolny.  Afterward, she put the baby in a shelter for children, which is where he came down with diphtheria and died. (Note that in the 1930s, Putin’s mother lost another son, Viktor, a few months after birth.) Putin’s mother nearly died from starvation. In fact, when she fainted from hunger, people thought she had died, and laid her out with the corpses. With God’s grace, she awoke and began moaning. She managed to live through the entire blockade of Leningrad.

Putin at the War Panorama Museum in St. Petersburg (above). Patriotism is defined as having or expressing devotion to and vigorous support for ones country. Patriotism permeates everything Putin does. Given the rich history of his family’s service to the homeland gleaned from his parents and grandparents, it is hard to imagine how he would think any other way.

As for Putin’s father, Vladimir Spiridonovich Putin, he was on the battlefield, serving in a NKVD demolitions battalion, engaged in sabotage behind the German lines. There were 28 members in his group. Recounting a couple of experiences during the war that his father shared with him, Putin explains that on one occasion after being dropped into Kingisepp, engaging in reconnaissance, and blowing up a munitions depot, the unit was surrounded by Germans. According to Putin, a small group that included his father, managed to break out. The Germans pursued the fighters and more men were lost. The remaining men decided to split up. When the Germans neared Putin’s father, he jumped into a swamp over his head and breathed through a hollow reed until the dogs had passed by. Only 4 of the 28 men in his NKVD unit returned home. Upon his return, Putin’s father was ordered right back into combat. He was sent to the Neva Nickel. Putin says the mall, circular area can be seen, “If you stand with your back to Lake Ladroga, it’s on the left bank of the Neva River.” In his account of the fight, Putin said German forces had seized everything except for this small plot of land, and Russian forces had managed to hold on to that plot of land during the long blockade. He suggests the Russians believed it would play a role in the final breakthrough. As the Germans kept trying to capture it, a fantastic number of bombs were dropped on nearly every part of Neva Nickel, resulting in a “monstrous massacre.” That considered, Putin explains that the Neva Nickel played an important role in the end.

That sense of pride and spirit Putin seeks to instill in all Russians echoes the powerful lyrics of Sergei Mikhalkov in the National Anthem of the Russian Federation. They are not just words to Putin, they are his reality. As if the vision in Verse 3 could have been written by Putin, himself, it reads: “Ot yuzhykh morei do poliarnogo kraia Raskinulis nashi lesa i polia. Odna ty na svete! Odna ty takaia – Khranimaia Bogom rodnaia zemlia! (Wide expanse for dreams and for living Are opened for us by the coming years Our loyalty to the Fatherland gives us strength. So it was, so it is, and so it always will be!) Putin would likely be delighted to know that there was a general understanding that his pride and patriotism go hand in hand. To that extent, all of his moves are ostensibly made in the name of restoring Russia’s greatness, to save it from outsiders who have done great harm to the country and would do more without his efforts. Some Russian citizens actually see Putin as “the Savior of Russia.”

2. Self-esteem

Pride can cause an individual to possess an inordinate level of self-esteem. They may hold themselves superior to others or disdain them because they lack equal capabilities or possessions. They often seek to magnify the defects of others or dwell on them. The Western country that has been the focus of Putin’s disdain, far more than others, is the US. An manifestation of that prideful attitude was Putin’s response to the idea of “American Exceptionalism” as expressed by US President Barack Obama. In his September 11, 2013 New York Times op-ed, Putin expressed his umbrage over the idea. So important was his need to rebuff the notion of “American exceptionalism”, that he sabotaged his own overt effort to sway the US public with his negative comments about it. The op-ed was made even less effective by his discouraging words concerning US operations in Iraq and Afghanistan. This would not be his last effort to sway the US public on important matters, nor the last one to backfire. Putin is not thrilled by the Trump’s slogan “Make America Great Again,” or the concept “America First.” He has expressed his umbrage in speeches and in public discussions. Subordinates such as Russian Federation Foreign Minister Sergei Lavrov and Russian Federation Presidential Spokesperson Dimitry Peskov, using florid rhetoric, have amplified Putin’s views on the matter.

As an officer in the KGB, the main adversary of Western intelligence and security services during the Cold War, Putin would naturally harbor negative sentiment toward his past, now present, opponents. Perhaps if there were some peace dividend at the end of the Cold War that Russia might have appreciated, and his ears were filled by Donna Nobis Pacem (Give US Peace), his attitude may have been different. In fact, the world might never have known Putin, or would known a different one. However, that was not the case. Putin did not inherit an ideal situation in Russia when he became president. While on his way to the top of the political heap, Putin saw how mesmerising “reforms” recommended to Yeltsin’s government by Western experts drastically impacted Russia’s economy in a way referred to somewhat euphemistically by those experts as “shock treatment.” Yeltsin was unaware that Western experts were essentially “experimenting” with approaches to Russia’s economic problems. His rationale for opening Russia up to the resulting painful consequences was not only to fix Russia’s problems but ostensibly to establish comity with the West. The deleterious effects of reforms recommended by Western experts’ could be seen not only economically, but socially. In the West, alarming statistics were reported for example on the rise of alcoholism, drug addiction, birth defects, HIV/AIDS, a decreased birth rate, and citizens living below the poverty line. Russia’s second war in Chechnya which was brutal, and at times seemed unwinnable, had its own negative impact on the Russian psyche. As Russia’s hardships were publicized internationally, perceptions of Russia changed for the worst worldwide. However, Putin saw no need for Russia to lose any pride or surrender its dignity as a result of its large step backward. Putin believed Russia would rise again, and that some acceptable substitute for the Soviet Union might be created, and never lacked faith about that. Putin was loyal and obedient while he served Yeltsin, but saw him tarry too long as Russia strained in a state of collapse.

US President Donald Trump (left) and Putin (right). Intelligence professionals might say that the correct and expected move in response to a covert operation that has failed very publicly, so miserably, would be to “tie it off”. Instead, as reported by US Intelligence agencies and the White House, Russia’s effort to meddle in the US elections has become recursive. Putin declined to be upfront with Trump about the matter. Russia must exit any roads that could lead to disaster.

Putin has not hesitated to use force when he believed there would be some benefit in doing so. Still, he has shown that he would prefer to outthink his rivals in the West rather than fight them. That notion may in part have influenced his responses in contentious situations. It may also account for the sustained peace with the US that Russia has enjoyed under his stewardship. However, it may be possible that this line of thinking was born out of necessity rather than by choice. Except for its long-held, unquestioned ability to engage in a nuclear war with the US, Russia has lacked the capability and capacity to do other big, superpower-type things successfully for nearly three decades. True, Moscow’s Crimea-grab and moves in Eastern Ukraine were swiftly accomplished and significant. Russian Federation military operations in Georgia’s South Ossetia and Abkhazia garnered the full attention of the West. However, both moves, though important, actually caused more disappointment than create a sense of threat to the interests of the US and EU. To that extent, the US, EU, and NATO were not convinced that there was a need for direct military moves in Ukraine to confront Russia, no positioning of NATO troops in Crimea or Eastern Ukraine to counter Russia’s moves, to make things harder for Moscow. To go a step further, there is no apparent balance between Russia’s self-declared role as a superpower and the somewhat moderate military, diplomatic, economic, political, and communication tools available to it. The more territory Moscow acquires through conquest, the less capable it is to care for territory already under its control as well as tend to Russia’s own needs. In particular, greater economic pressures will be placed on Russia’s already fragile economy. Despite his efforts to make things right in Russia, Putin must spend an inordinate amount of time mitigating existing hardships and the effects of malfunctions across the board in Russia’s government system and its society.

3. Chasing the Unattainable

Perhaps the type of success Putin really wants for Russia is unattainable, not by some fault of his own, but rather because its problems are too great, run too deep. He may have run out of answers to put Russia on real upward trajectory given the capabilities and possibilities of the country. Not being remiss, he has used all tools available to him, yet big improvements have not been seen. Putin’s pride may have been a bit marred by this reality. He, better than anyone, knows what Russia is and what it is not. For all that he has done, he has not led Russia, to use a phrase from John Le Carré, “out of the darkness into an age reason.” In a significant endeavor, there is always the potential to become lost. It would seem, consciously or unconsciously, Putin may simply be moving at a deliberate speed or even procrastinating a bit. When he cannot swim forward, he would prefer to tread water than sink. By continually displaying the strength, and the will, to keep his head above water in tough situations, Putin has become an inspiration to those around him. Most senior Russian officials are unwilling or are unable to take a complete look at the situation. Rather, they seem enamored with Putin, and would likely follow him no matter what. Knowing that has perhaps fed into his sense of accomplishment and confidence

Putin once said that the greatest danger to Russia comes from the West. He believes Western governments are driven to create disorder in Russia and seek to make it dependent of Western technologies. Theories propagated by Moscow that the struggle between East and West is ongoing have been energized by the whirlwind of anger and aggressive verbiage concerning the 2016 US Election meddling issue. The story of the meddling, confirmed and revealed by US intelligence community and political leaders on the national level, has been propelled by a strong, steady drum beat of reports in the US news media. Perhaps the election meddling, a black operation, should have been considered an unsurprising move by Putin. Perhaps due to his experience in the the intelligence industry, hseems to lead him to turn to comfortable tactics, technique, procedures, and methods from it when confronting his adversaries. The Kremlin vehemently denies any interference in the US elections. That may simply be protocal. Russian officials, such as Lavrov and Peskov, have gone as far as to say that insistence of various US sources that the meddling took place is a manifestation of some mild form of hysteria or paranoia. Yet, the Kremlin must be aware that such denials are implausible, and in fact, unreasonable. To respond in such a brazenly disingenuous manner in itself raises questions not just about the conduct Russia’s foreign and national security policy, but the true motives and intent behind Moscow’s moves. It appears that Putin’s personality and feelings influence policy as much as well-considered judgments.

Putin, better than anyone, knows what Russia is and what it is not. Perhaps the type of success Putin really wants for Russia is out of reach, unattainable, not by some fault of his own, but rather because it’s problems are too great, run too deep. He may have run out of answers to put Russia on a true upward trajectory. His pride may have been a bit marred by this reality. Despite his aptitude as a leader, he has failed to lead Russia, as a whole, “out of the darkness into an age reason.”

4. Tying-off the Election Meddling

Intelligence professionals might say that the correct and expected move in response to a covert operation that has failed very publicly, so miserably, would be to “tie it off”. Instead, as reported by US Intelligence agencies and the White House, Russia’s effort to meddle in the US elections has become recursive. This would mean that Putin, himself, wants it to continue. Although the meddling operation has been almost completely exposed, and one would expect that those responsible for it would feel some embarrassment over it, Moscow seems gratified about how that matter has served as a dazzling display of Russian boldness and capabilities. To that extent, the carnival-like approach of some US news media houses to the issue well-serves Moscow. Perhaps Putin has assessed that successive meddling efforts will last only for so long until US cyber countermeasures, awareness programs, retaliatory actions, and other steps eventually blunt their impact or render such efforts completely ineffective. Thus, he may feel that he has no need to stop the operation, as the US will most likely do it for him. Still, continued efforts to interfere in US elections may not end well. Russia must exit any roads that could lead to disaster.

Putin at 2018 campaign rally (above). Putin can be proud of his many accomplishments, of his rise to the most senior levels of power in Russia, eventually reaching the presidency, and of being able to make full use of his capabilities as Russia’s President. Yet, having an excessively high opinion of oneself or ones importance, is not conducive to authentic introspection for a busy leader. Putin’s unwillingness or inability to look deeply into himself has likely had some impact upon his decisions on matters such as Russia’s meddling in US elections.

Ego

The OED defines ego as a person’s sense of self-esteem or self-importance; in psychoanalysis, it is the part of the mind that mediates between the conscious and the unconscious mind, and is responsible for reality testing and a sense of personal identity. Ego, as first defined in the OED, can be useful in calibrated doses. A bit of an ego is needed in order for one to believe that new or far-reaching objectives can reached and tough, difficult things can be achieved. When it gets beyond that, problems tend to ensue. The ego is the voice inside an individual that really serves one purpose, and that is to make one feel better about whom one is, to lift oneself up. It will do whatever it needs to do to make that happen. The ego is also the voice inside of an individual that may drive one to kick another when he or she is down, causing them to feel bad about themselves. An example of Putin’s ego pushing beyond what some experts might call the normal parameters was the October 7, 2015 celebration of his 63rd birthday. Putin participated in a gala hockey game in Sochi, Russia, alongside former NHL stars and state officials. Putin’s team reportedly included several world-renowned players, such as Pavel Bure, formerly a member of the National Hockey League’s Vancouver Canucks. Putin’s team won the match 15-10. Putin scored 7 of his team’s 15 goals!

From a theological  perspective, ego, much as pride, separates one from God. s the work of the devil, it is his tool that is used to separate us from God. The ego (Edging-God-Out) is considered the most powerful tool the devil has. It is deceiving in its ways, and makes one feel that one is serving others, when in reality one is serving oneself. Ego has no home is God’s creation. It is a distractive, impure thought, that leads to the destruction of self and others.

Putin can  proud, in the ordinary sense, of his many accomplishments, of his rise to the most senior levels of power in Russia eventually reaching the presidency, and of being able to make full use of his capabilities as Russia’s President. With no intention of expressing sentimentality, it can be said that Putin went from a working class to middle class background in the Soviet Union to very top of Russia’s elite. As he recounts in First Person, and as his critics in the West remind without fail, Putin spent his spare time as a child hunting rats in the hallways of the apartment building where his family lived. To a degree, he was an upstart who alone, with the legacy of honorable and valorous service of his father and grandfather in the intelligence industry only available to inspire him, struggled to the highest level of the newly established Russian society. The arc of his story is that the professional and personal transformation of his life came with the fall of the Soviet Union. That event created the circumstances for his life to be that put him on the path to his true destiny. All of that being stated, humility would require that Putin recognize that his achievements are the result of God’s goodness and grace, not simply his own efforts. Ego would urge him not to think that way.

Perhaps Putin would be better able to understand the source of all good things in his life if he engaged in true introspection, a look within from the context of his faith. It appears that Putin’s unwillingness or inability to look deeply in himself has allowed him to develop an excessively high opinion of himself, a potent confidence that he alone is responsible for all positive outcomes. Holding a distorted sense of self-importance certainly would not facilitate introspection by a busy leader. His attitude of pride has also likely influenced his responses in contentious situations. All of this should not be used to conclude that Putin’s declarations about his faith have been counterfeit. Rather, there appears to be an imbalance between the influence of faith, particularly the restraining virtue of humility and the influence of a willful pride, an seemingly unruly desire for personal greatness. In time, a through his faith, he may find his value in God alone. God can work in mysterious ways.

Often, moves by Putin against the West resemble responses in a sport where there are challenges made and the challenger gains points when able to stand fast against his opponent’s counter moves and gains points based on the ability to knock the challenger back. In that vein, Russia’s move into Ukraine appeared to represent a dramatic victory. There was no military effort to push back against his move. There was no available capability among Western countries to defeat Russia’s challenge in Ukraine short of starting a war. Putin remains adamant about the correctness of that action. His position was amply expressed in his March 14, 2014 speech, declaring Russia’s annexation of Crimea. He noted that Russia’s economic collapse was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple his country.  However, Putin’s moves in Ukraine likely brought him only limited satisfaction. He still has been unable to shape circumstances to his liking. He would particularly like to  knock back moves by the West that he thinks were designed to demean Russia such as: the Magnitsky law, NATO Expansion (NATO Encroachment as dubbed by Moscow), the impact of years of uncongenial relations with Obama, and US and EU economic sanctions. His inability to change those things, and some others, has most likely left his ego a bit wounded.

An example of Putin’s ego pushing beyond what some experts might call the normal parameters was the October 7, 2015 celebration of his 63rd birthday. Putin participated in a gala hockey game in Sochi, Russia, alongside former NHL stars and state officials. Putin’s team reportedly included several world-renowned players. Putin’s team won the match 15-10. Putin scored 7 of his team’s 15 goals.

1. Magnitsky

In the West, particularly the US, there is a belief that in recent years, Putin has simply been reactive to the Magnitsky Act. It was not only a punitive measure aimed at Russia’s economy and business community, but struck at the heart of Putin’s ego. Through Magnitsky law, the West was interfering in Russia’s domestic affairs, good or bad, as if it were some second or third tier country, not as a global superpower with a nuclear arsenal. In retaliation, he would do the best he could to harm Western interests, even those of the US, not just over Magnitsky but a lot of other things. Counter sanctions would be the first step. Suffice it to say, election meddling took that retaliation to a new level. The Magnitsky Act, the official title of which is the Russia and Moldova Jackson-Vanik Repeal and Sergei Magnitsky Rule of Law Accountability Act of 2012, is named after Sergei Magnitsky, a Russian lawyer and auditor who in 2008 untangled a dense web of tax fraud and graft involving 23 companies and a total of $230 million linked to the Kremlin and individuals close to the government. Due to his efforts, Magnitsky became the target of investigations in Russia. When Magnitsky sued the Russian state for this alleged fraud, he was arrested at home in front of his kids, and kept in prison without charges, in filthy conditions, for nearly a year until he developed pancreatitis and gallstones. In November 2009, Magnitsky, at 37 years old, was found dead in his cell just days before his possible release. The Magnitsky Act was signed into law by Obama in December 2012 in response to the human rights abuses suffered by Magnitsky. The Magnitsky law at first blocked 18 Russian government officials and businessmen from entering the US froze any assets held by US banks, and banned their future use of US banking systems. The Act was expanded in 2016, and now sanctions apply to 44 suspected human rights abusers worldwide. William Browder, a US hedge fund manager, who at one time the largest foreign investor in Russia and hired Magnitsky for the corruption investigation that eventually led to his death, was a central figure in the bill’s passage. Two weeks after Obama signed the Magnitsky Act, Putin signed a bill that blocked adoption of Russian children by parents in the US. Russia then also imposed sanctions on Browder and found Magnitsky posthumously guilty of crimes. Supporters of the bill at the time cited mistreatment of Russian children by adoptive US parents as the reason for its passage. What made Russian officials so mad about the Magnitsky Act is that it was the first time that there was an obstacle to collecting profits from illegal activities home. Money acquired by rogue Russian officials through raids, extortion, forgery, and other illegal means was typically moved out of Russia were it was safe. Magnitsky froze those funds and made it difficult for them to enjoy their ill-gotten gains. The situation was made worse for some officials and businessmen close to Putin who had sanctions placed on them that froze their assets. All news media reports indicate that getting a handle on Magnitsky, killing it, has been an ongoing project of Russian Federation intelligence agencies.

2. NATO

Regarding NATO, in an interview published on January 11, 2016 in Bild, Putin essentially explained that he felt betrayed by the actions taken in Eastern Europe by the US, EU, and NATO at the end of the Cold War. Putin claimed that the former NATO Secretary General Manfred Worner had guaranteed NATO would not expand eastwards after the fall of the Berlin Wall. Putin perceives the US and EU as having acquitted themselves of ties to promises to avoid expanding further eastward, and arrogating for themselves the right to divine what would be in the best interest of all countries. He feels historians have ignored the machinations and struggles of people involved. Putn further stated in the Bild interview: “NATO and the USA wanted a complete victory over the Soviet Union. They wanted to sit on the throne in Europe alone. But they are sitting there, and we are talking about all these crises we would otherwise not have. You can also see this striving for an absolute triumph in the American missile defense plans.” Putin also quoted West German Parliamentarian Egon Bahr who stated in 1990: “If we do not now undertake clear steps to prevent a division of Europe, this will lead to Russia’s isolation.” Putin then quoted what he considered an edifying suggestion from Bahr on how to avert a future problem in Europe. According to Putin, Bahr proffered: “the USA, the then Soviet Union and the concerned states themselves should redefine a zone in Central Europe that would not be accessible to NATO with its military structure.” Putin’s view has not changed much since the interview. However, despite Putin’s certainty on this position, no former-Soviet republic wants to return to Russia or Moscow’s sphere of influence. Putin appears unwilling to accept today’s more complex reality. Pro-Russian movements and political circles in former Soviet republics do not represent the modern day trend.

Putin with binoculars at Zapad 2017 Military Exercises (above). Putin perceives the US and EU as having turned their backs on promises made to avoid expanding further eastward, and arrogating for themselves the right to divine what would be in the best interest of all countries. Despite Putin’s certainty of the West’s intrusive behavior, actually, no former-Soviet republic wants to return to Russia or Moscow’s sphere of influence. Putin appears unwilling to accept today’s more complex reality.

3. The EU

Putin has always viewed the EU as a project of deepening integration based on norms of business, law, and administration at variance from those emerging in Russia. Putin was also concerned that EU enlargement would become a means of excluding Russia from its “zones of traditional influence.” Even today, certain Russian actions indicate Moscow actively seeks to encourage members to withdraw from the EU sphere and discourage countries from joining it. Joint projects with European countries have allowed Russia to exploit their differences on political, economic and commercial issues creating a discordant harmony in the EU. A goal of such efforts has also been to undermine EU unity on sanctions. Even away from the former Soviet republics, Russia has engaged in efforts to undermine democratic processes in European countries. One method, confirmed by security experts, has been meddling in elections in a similar way to that widely reported to have occurred in the US.

4. Obama-Putin

Poor US-Russia relations were exacerbated by the uncongenial relationship between Putin and Obama. Indeed, Putin clashed repeatedly with the US President. Sensing a palpable weakness and timidity from Obama, Putin seemed to act more aggressively. The Russian military move that stood out was the capture of the Crimea and movement of troops into Eastern Ukraine to support pro-Russia separatists. There was nothing to encourage Putin to even try to negotiate beyond Magnitsky after Crimea. There was no room for him to turn back with ease or he would be unable to maintain his sense of dignity in doing so. Crimea would prove to be a useless chip to use in bartering a deal on Magnitsky. The US still views Magnitsky and Crimea as separate issues. Putin recognized from the attitudes and behavior of Obama administration officials that even the extreme measure of using subtle threats with nuclear weapons would not be emphatic enough to elicit a desired response from Washington because Obama administration officials would unlikely accept that such weapons could ever be used by Russia which was a projection of a view, a mental attitude, from their side. The Obama administration insisted that Putin negotiate them in the summer of 2013 and when he refused to do so, the administration cancelled a September 2013 summit meeting in Moscow between Putin and Obama. From that point forward, there was always “blood in water” that seemed to ignite Putin’s drive to make the Obama administration, and de facto the US, as uncomfortable and as unhappy as possible short of military confrontation.

5. US and EU Sanctions

As far as Putin sees it, painful sanctions from the US and EU, on top of the Magnitsky law, have damned relations between Russia and the West. Putin rejects the idea that the Trump administration is pushing for additional sanction against Russia and has explained new sanctions are the result of an ongoing domestic political struggle in the US. He has proffered that if it had not been Crimea or some other issue, they would still have come up with some other way to restrain Russia. Putin has admitted that the restrictions do not produce anything good, and he wants to work towards a global economy that functions without these restrictions. However, repetitive threats of further sanctions from the US and EU will place additional pressure on Putin’s ego and prompt him to consider means to shift the power equation. Feeling his back was against the wall, he has previously acted covertly to harm US and EU interests. A very apparent example of such action was his efforts to meddling in the 2016 US Presidential Election process. The US and EU must be ready to cope with a suite of actions he has planned and is prepared to use.

Convinced his behavior was an expression of ego, some Western experts believe that Putin may have succumbed to the vanity of his metaphoric crown. In effect, to them, Putin has been overwhelmed by his sense of the great power that he wields in Russia, and that he wants to convince other countries that he can wield power over them, too!

6. Succumbing to the Vanity of “His Crown”

Convinced his behavior is an expression of ego, some Western experts believe that Putin may have succumbed to the vanity of his metaphoric crown. To that extent, Putin has been overwhelmed by his sense for the great power that he wields in Russia, and wants to convince other countries that he can wield power over them, too! If Ukraine’s Donetsk and Luhansk provinces were snatched from Kiev and fell firmly under the control of pro-Russian quasi-states of those entities and Russia, perhaps Putin would erect a statue of himself somewhere there or in Crimea much as one was erected of Zeus in Jerusalem by the Greek ruler of Syria, Antiochus IV. As for the people of those territories, and others in Transnistria, South Ossetia, Abkhazia, they may become the 21st century version of the malgré-nous, with many perhaps serving in the military against their will under the control of Russia. These scenarios are viewed by greatcharlie as long shots. It would surely raise Putin’s ire if he ever heard it. Although he is a dominant leader, he would likely prefer that his power was accepted, understood, and feared if need be, than depicted in such a monstrous or preposterous fashion. Yet, Putin may have behaved in a similar way recently when he announced an array of new “invincible” nuclear weapons.

On February 27, 2018  in a Moscow conference hall, with the back drop of a full-stage-sized screen protecting the Russian Federation flag, Putin gave one of his most bellicose, militaristic speeches since his March 14, 2014 regarding Crimea’s annexation. He told an audience of Russia’s elites that among weapons either in development or ready was a new intercontinental ballistic missile “with a practically unlimited range” able to attack via the North and South Poles and bypass any missile defense systems. Putin also spoke of a small nuclear-powered engine that could be fitted to what he said were low-flying, highly maneuverable cruise missiles, giving them a practically unlimited range. The new engine meant Russia was able to make a new type of weapon, nuclear missiles powered by nuclear rather than conventional fuel. Other new super weapons he listed included underwater nuclear drones, a supersonic weapon and a laser weapon. Putin backed his rhetoric by projecting video clips of what he said were some of the new missiles onto the giant screen behind him. Referring to the West, Putin stated, “They have not succeeded in holding Russia back,” which he said had ignored Moscow in the past, but would now have to sit up and listen. He further stated, “Now they need to take account of a new reality and understand that everything I have said today is not a bluff.”

Putin was speaking ahead of the March 18, 2018 Russian Federation Presidential Election. He has often used such harsh rhetoric to mobilize voter support and strengthen his narrative that Russia is under siege from the West. Yet, oddly enough, Putin emphasized that the new weapons systems could evade an Obama-era missile shield, which was designed to protect European allies from attacks by a specific rogue country in the Middle East and possibly terrorist groups, not Russia’s massive nuclear arsenal. He spoke about Moscow being ignored which was really a problem he had with the Obama administration. Indeed, most of what Putin said seemed to evince that lingering pains were still being felt from harsh exchanges with Obama. With Obama off the scene, and apparently developing military responses to cope with a follow on US presidency under former US Secretary of State Hillary Clinton, Putin simply projected all of his anger toward Trump. Metaphorically, Putin seemed to “swinging after the bell.” So hurt was his ego that he has acted by building Russia’s nuclear arsenal up in a way the no US leader could ever deny the threat to US security that Russia poses. Being able to make that statement likely soothed his ego somewhat.

Religious scholars might state that Putin’s strong, perceptible ego contradicts his declaration of faith. The ego does not allow for the presence of God in ones life. Many have self-destructed as a result of their veneration of self. The ego needs to be overcome and removed from ones heart in order to allow God to fill that space.

In the form of Putin’s face can be found much that is telling about the Russian leader. As of late, its countenance has been far from serene and kindly. The countenance of ones face, smiling or frowning, can effortlessly communicate to others how one is feeling, thinking. Photos of Putin’s face more often reveal a deep, piercing, consuming stare, reflecting the strong, self-assured, authoritative, no nonsense personality, of a conscientious, assertive, and aggressive leader.

Putin’s Countenance

Imago animi vultus est, indices occuli. (The countenance is the portrait of the soul, and the eyes mark its intentions.) In the form of Putin face can be found much that is telling about the Russian leader. As of late, its countenance has been far from serene and kindly. The countenance of ones face, smiling or frowning, can effortlessly communicate to others how one is feeling, thinking. The face can also convey essential characteristics that make individuals who they are. In photos of President Putin in 2000, his eyes appear similar to those of the very best students of a fine university, watching and peering, learning and discerning constantly in order to best prepare himself to lead Russia into the future. It was before he had the eyes of an experienced, battle-scarred leader. Now, photos of Putin’s face more often reveal a deep, piercing, consuming stare, reflecting the strong, self-assured, authoritative, no nonsense personality, of a conscientious, assertive, and aggressive leader. Si fractus illabatur orbis, impavidum ferient ruinae. (If the world should break and fall on him, it would strike him fearless.)

1. The Conscientious Leader

The inner voice of individuals meeting with Putin may not sound an alarm immediately. After all, if Putin is anything, he is a conscientious leader and one would expect to see it reflected in Putin’s face. Conscientiousness is the personality trait of being careful, or vigilant. It implies a desire to do a task well, and to take obligations to others seriously. Conscientious people tend to be efficient and organized as opposed to easy-going and disorderly. They exhibit a tendency to show self-discipline, act dutifully, and aim for achievement; they display planned rather than spontaneous behavior; and they are generally dependable. It is manifested in characteristic behaviors such as being neat and systematic; also including such elements as carefulness, thoroughness, and deliberation. The absence of apprehension, even anxiety, among some who meet with Putin is understandable, reasonable given that in social, as well as business situations, one can usually assume interlocutors mean what they say, are also personally invested in their interactions, and will display certain of manners, in some cases by protocol. Wanting to think well of others, wanting to connect with them, appearance, facial expressions, are looked upon benignly. Responding in this way is also a defense mechanism. Given his reputation, earned or not, aggression discerned in Putin’s face likely becomes sensate among his more worldly interlocutors. He might even be perceived through his countenance as being physically threatening without actually using any other part of his body to make gestures that could reasonably be identified as aggressive.

Somewhere in between, Putin can often appear to be what might be casually called “poker faced”, seemingly unresponsive to events swirling around him. During those moments, he is most likely evaluating everything and everyone, but keeping all his thinking and assessments locked inside himself. He may also be looking beyond the moment, considering what his next steps would be. Interlocutors will typically respond with faces of puzzlement and sometimes terror. Having the confidence to “face” foreign leaders in such a manner is a reflection of Putin’s assertiveness. (In the case of Trump, the response was likely disappointment, which masked a cauldron of intense rage. That should concern Putin and will become something to which he will need to find an answer.)

Putin gestures to a reporter at a press conference (above). Given his reputation, earned or not, aggression discerned in Putin’s face likely becomes sensate among his more worldly interlocutors. He might even be perceived as being physically threatening without actually making any aggressive gestures.

2. Putin’s “Assertiveness”

According to Fredric Neuman, Director of the Anxiety and Phobia Center at White Plains Hospital, being assertive means behaving in a way that is most likely to achieve one’s purpose. Under that definition, most successfully assertive individuals will have a suite of ways to act in given circumstances. Neuman explains that there are times when the right thing to do is to be conciliatory, and other times when resistance is appropriate. When one is actually attacked, verbally or otherwise, it may be appropriate to respond by resisting forcibly. Surely, there is a balance in Putin’s behavior in situations, but he has never been a wilting flower before anyone. A KGB colleague would say about Putin: “His hands did not tremble; he remained as cool as a mountain lake. He was no stranger to handling grave matters. He was expert at reading and manipulating people, and unfazed by violence.” Many foreign policy and human rights analysts in the West, and members of Russia’s opposition movement would say that Putin has amply demonstrated that he has no concern over sacrificing the well-being of Russians to further his geopolitical schemes and the avarice of colleagues. They report that he regularly persecutes those who protest. All of this runs contrary to image of Putin as a patriot. Those who study Putin would also point to the deaths of the statesman, politician, journalist, and opposition political leader, Boris Nemtsov; journalist Anna Politkovskaya; and, former KGB officer Alexander Litvinenko.  Attention might also be directed to the deaths of 36 generals and admirals from 2001 to 2016. In the majority of cases, the causes of death listed were listed as suicides, heart attacks, or unknown. Among those who died are former Russian Federation National Security Adviser and Army Major General Vladimir Lebed and the Head of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation Russian Federation Army Colonel-General Igor Sergun.

3. Putin the Predator

Certainly, Putin prepares for his meetings or any other official contacts in advance, by mining available information about his scheduled interlocutors and by considering all possible angles of how they might challenge him and how he would explain himself in a plausible, satisfying way. Such is the nature of politics as well as diplomacy. However, there are reportedly times when Putin, after considering information available, will simply declare his superior position relative to his interlocutor and let them know that they must accept what he says. His success in a meeting relies heavily upon how well he does his homework. Clearly, individuals as Putin can have a different context for learning about people. To explain further, when Putin asks about an interlocutor’s family, home, office, even capabilities, it not small talk or the result of friendly interest. Rather, he may be signalling, warning, that he has already evaluated an interlocutor as a potential target. He may be confirming information or collecting more. He may also be testing ones vulnerability to falsehoods or how one might respond to unpleasant information. He is creating a perceptual frame for his interlocutor. Such tactics, techniques, procedures, and methods truly match those of a predator. Predators use deflection, social miscues, and misinformation to provide cover for themselves. They can use a contrived persona of charm and success to falsely engender trust. They have an exit plan in place, and are confident with regard to the outcome of their actions. Boiled down, they accomplish their deception using three steps: setting a goal; making a plan; and, compartmentalize get. By setting a goal, they know what they want and what it will take to get it or achieve it. They have no inhibitions about causing damage or harm. They stay focused. By making a plan, they not only determine ways to get what they want, but also develop exits if needed. By compartmentalizing, they detach themselves emotionally from attachments that might be embarrassed or be an annoyance if caught. They train themselves to give off no such tells, so they can pivot easily into a different persona. While some might acquire this skill as Putin likely had while working in the intelligence industry, others may not have any natural sense of remorse.

When immobilized or in a controlled “silence,” Putin’s face can also manifest a type of ambush predation in his thinking. He may be attempting to conceal his preparation to strike against a “troublesome or even threatening” party, if not at that moment, eventually. Ambush predators are carnivorous animals or other organisms, that capture or trap prey by stealth or by strategy, rather than by speed or by strength.

When immobilized or in a controlled “silence,” Putin’s face can also manifest a type of ambush predation in his thinking. He may be attempting to conceal his preparation to strike against a “troublesome or even threatening” party. Ambush predators or sit-and-wait predators are carnivorous animals or other organisms, that capture or trap prey by stealth or by strategy, rather than by speed or by strength. In animals and humans, ambush predation is characterized by an animal scanning the environment from a concealed position and then rapidly executing a surprise attack. Animal ambush predators usually remain motionless,  sometimes concealed, and wait for prey to come within ambush distance before pouncing. Ambush predators are often camouflaged, and may be solitary animals. This mode of predation may be less risky for the predator because lying-in-wait reduces exposure to its own predators. If the prey can move faster than the predator, it has a bit of an advantage over the ambush predator; however, if the active predator’s velocity increases, its advantage increases sharply.

There is a Christian religious allegory warning of the inner spiritual decay manifested by an outer physical decay presented in a historical framework that includes Leonardo da Vinci. As told, when Leonardo da Vinci was painting “The Last Supper”, he selected a young man, Pietri Bandinelli by name as the person to sit for the character of the Christ. Bandinelli was connected with the Milan Cathedral as chorister. Several years passed before Da Vinci’s masterpiece painting was complete. When he discovered that the character of Judas Iscariot was wanting, Da Vinci noticed a man in the streets of Rome who would serve as a perfect model. With shoulders far bent toward the ground, having an expression of cold, hardened, evil, saturnine, the man’s countenance was true to Da Vinci’s conception of Judas. In Da Vinci’s studio, the model began to look around, as if recalling incidents of years gone by. He then turned and with a look half-sad, yet one which told how hard it was to realize the change which had taken place, he stated, “Maestro, I was in this studio twenty-five years ago. I, then, sat for Christ.”

Perhaps Putin is simply making the most of what is. Putin may just be living life and doing the most he can for his country and the Russian people, no matter how limited. Satisfaction might come in the fact that he firmly believes things in Russia are better than they would be under the control of anyone else.

Other Shadows of Putin’s Interior

Nam libero tempore, cum soluta nobis est eligendi optio, cumque nihil impedit, quo minus id quo maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Temporibus autem quibusdam et aut officiis debitis aut rerum necessitatibus saepe eveniet, ut et voluptates repudiandae sint et molestiae non recusandae. Itaque earum rerum hic. Tenetur a sapiente delectus, ut aut reciendis voluptatibus maiores alias consequator aut preferendis dolorbus asperiores repellat. (In a free hour, when our power of choice is untrammelled and when nothing prevents our being able to do what we like best, every pleasure is to be welcomed and every pain avoided. But in certain circumstances and owing to the claims of duty or the obligations of business it will frequently occur that pleasures have to be repudiated and annoyances accepted. The wise man therefore always holds in these matters to this principle of selection: he rejects pleasures to secure other greater pleasures, or else he endures pains to avoid worse pains.) Although thngs may go wrong, Putin knows that disappointments in life are inevitable. Putin does not become discouraged or depressed nor does he withdraw from the action. Putin knows he must remain in control of himself as one of his duties as president, and as a duty to himself.

1. Risky Moves

As mentioned earlier, Putin may very well be simpy making the most of what is. Putin may just be living life and doing the most he can for his country and the Russian people, no matter how limited. Some satisfaction might come with the fact that he firmly believes things in Russia are better than they would be under the control of anyone else. Despite his optimism and confidence in his abilities, Putin must be careful of risky moves, creating new situations that may lead to discord, disharmony. For example, interfering in Ukraine was a move that felt he could keep a handle on. Regardless of how positive, professional, and genuine Trump administration efforts have been to build better relations between the US and Russia, it would seem Putin has decided that entering into a new relationship with US would have too many unknowns and possible pitfalls. Putin knows that the consequences of missteps can be severe. He has the memory of what former Russian President Boris Yeltsin experienced in the 1990s to guide him. 

Although he holds power, Putin must always labor with the loneliness of leadership, the anxiety of decision making, and an awareness of threats to his well-being. Indeed, it is difficult to imagine that there can be any real happiness for one who is under threat, in a country riddle with corrupt officials and a somewhat fragile system of law and order.

Dionysius and Damocles

Although he holds power, Putin must always labor with the loneliness of leadership, the anxiety of decision making, and an awareness of threats to his well-being. Indeed, it is difficult to imagine that there can be any real happiness for one who is under constant threat, in a country riddle with corrupt officials and a somewhat fragile system of law and order. The ancient parable of Dionysius and Damocles, later known in Medieval literature, and the phrase “Sword of Damocles”, responds to this issue of leaders living under such apprehension. The parable was popularized by Cicero in his 45 B.C. book Tusculan Disputations. Cicero’s version of the tale centers on Dionysius II, a tyrannical king who once ruled over the Sicilian city of Syracuse during the 4th and 5th centuries B.C. Though wealthy and powerful, Dionysius was supremely unhappy. As a result of his iron-fisted rule, he had created many enemies. He was tormented by fears of assassination—so much so that he slept in a bedchamber surrounded by a moat and only trusted his daughters to shave his beard with a razor. Dionysius’ dissatisfaction came to a head one day after a court flatterer named Damocles showered him with compliments and remarked how blissful his life must be. “Since this life delights you,” an annoyed Dionysius replied, “do you wish to taste it yourself and make a trial of my good fortune?” When Damocles agreed, Dionysius seated him on a golden couch and ordered a host of servants wait on him. He was treated to succulent cuts of meat and lavished with scented perfumes and ointments. Damocles could not believe his luck, but just as he was starting to enjoy the life of a king, he noticed that Dionysius had also hung a razor-sharp sword from the ceiling. It was positioned over Damocles’ head, suspended only by a single strand of horsehair. From then on, the courtier’s fear for his life made it impossible for him to savor the opulence of the feast or enjoy the servants. After casting several nervous glances at the blade dangling above him, he asked to be excused, saying he no longer wished to be so fortunate.

Having so much hanging over his head, Putin has no time or desire to tolerate distractions. He does not suffer fools lightly. Putin’s ability to confound insincerity has been key to his ability to remain power. Early on as president, Putin effectively dealt with challenges posed by ultra-nationalists who were unable to temper their bigoted zeal, such as Vladimir Zhirinovsky of the extreme right Liberal Democratic Party of Russia, and Gennady Zyuganov of the Communist Party of Russia. The challenges posed by them lessened every year afterward. To the extent that such elements, and those far worse in Russia, could potentially react more aggressively to Putin’s efforts to maintain order, he most remain ever vigilant. Putin has also become skilled in implementing what critics have called “charm offensives,” explaining his ideas and actions in a manner that is easy, comfortable, assuring, and logical. Still, such moves are sometimes not enough. Indeed, during significant crises, it is very important for Putin to have advisers who fully understand his needs. For an overburdened, embattled leader, the encouragement of another, a paraclete, may often prove comforting.

Putin undoubtedly strives for a gesamtkunstwerk: a harmonious work environment. At the present, Putin is probably working with the best cabinet he has ever crafted both in terms of the quality of their work and chemistry. They may occasionally antagonize the overworked leader with a report not crafted to Putin’s liking, or worse, report on a setback. On such occasions, in contrast to his usual equanimity, Putin allegedly has become spectacularly incandescent.

Putin has sought to take on qualified ministers, directors, and other officials to handle specialties. That effort was hampered to an extent during Putin’s early years in power given the need to respond to the wishes of certain patrons. Yet, Putin never hesitated to fire those foisted upon him or his handpicked hires, whether former KGB or not, when they failed to perform. Putin has known what advice, prognostication, and proposals to accept in order to promote his efforts at home and internationally and develop a coherent set of policies. Since he brings his “A-game” to his office everyday, striving for perfection and hungering for improvement, and he expects the same from his cabinet. There are never any spectators, passengers along for the ride. All must be able to answer the who, what, when, where, why, and how of issues they cover, because that is what Putin will demand. Among his advisers, Putin undoubtedly strives for a gesamtkunstwerk: a harmonious work environment. At the present, Putin is probably working with the best cabinet he has ever crafted both in terms of the quality of their work and chemistry. They may occasionally antagonize the overworked leader with a report not crafted to Putin’s liking, or worse, report on a setback. On such occasions, in contrast to his usual equanimity, Putin allegedly has become spectacularly incandescent with them.

When speaking about what is important to him, Putin does not use throw away lines. He is straightforward and to the point. When he was declared the winner of the 2012 Russian Federation Presidential Election, Putin publicly wept. It is impossible to know what was happening inside Putin to bring that on, but his emotional expression was clearly genuine. To that extent, Putin is not a man without emotion or innermost feelings.

3. Breathing Space

Every now and then Putin stops to take a rest to regroup, and probably to take inventory of his life, determine what he wants, and consider where things are headed. Speculation over Putin’s whereabouts for 10 days in March 2015 became a major news story worldwide. Some sources argued Putin was likely the subject of a coup. Others claimed that his girlfriend had given birth in Switzerland. There were even reports suggesting he had health problems. Putin good-naturedly dismissed it all. Putin’s main outlet for relaxation is sports of all kinds, particular judo and ice hockey. Since the days of his youth, Putin’s involvement in the martial arts, sports in general, had a strong influence on him, impacting his lifestyle. Sports provided Putin with a chance “to prove himself.”However, when he wants, Putin can also display an enjoyment of life and good times, and be quite gregarious, outwardly happy, full of smiles.

Putin, an experienced judoka, displays an element of his nage-waza (throwing technique) with a sparring partner (above). Since the days of his youth, Putin has been involved in the martial arts. Sports of all kinds have been Putin’s main outlet for relaxation. Sports have also provided Putin with a chance “to prove himself.”

When he wants, Putin can also display an enjoyment of life and good times, and be quite gregarious, outwardly happy, full of smiles. Putin undoubtedly understands the importance of having a sense of humor despite any difficulties he may face. Humor is beneficial for ones physical and emotional health. It reinforces ones relationships with family, friends, and colleagues. Physically, laughter can improve resistance to diseases by declining the stress hormones and increasing infection-fighting antibodies in the human body according to some research. Laughter can ease physical tension­ and help muscles relax. Emotionally, humor helps you to release stress and to keep an optimistic attitude. When one feels anxious or sad, a good laugh can lighten ones mood. The positive feelings emitted when one laughs will increase energy for the brain and body. That allows for greater focus and will allow one to look at the problems from less frightening perspectives. Humor helps one remain optimistic and humor communication boosts the emotional connection that will bring people closer together and increases happiness as well. Sharing a good-hearted laugh may serve in part to smooth out rough times. Putin’s sense of humor is evinced when he tells jokes. Putin told the following joke publicly in response to a question about the economic crisis in Russia.: Two friends meet up, and one, Person A, asks the other, Person B: “How are things?” Person B says, “Well, things right now are like stripes, you see, black and white.” Person A asks, “Well, how are things right now?” Person B says, “Black!” Half a year passes before they meet again. Person a asks Person B, “Well, how are you – wait, I remember, like stripes, how are things right now?” Person B says, “Right now, they’re black.” Person A says, “But back then it was also black!” Person B says, “Nope, it turns out it was white back then.” Putin has also often told a joke from the Soviet-era that humorously depicts the KGB’s bureaucracy. The goes as follows: “A spy goes to Lubyanka, KGB Headquarters, and says: “I’m a spy, I want to turn myself in.” He is asked, “Who do you work for?” The spy says, “America.” He is told, “OK, go to room 5.” He goes to room 5 and says: “I’m an American spy. I want to turn myself in.” He is asked, “Are you armed?” The spy says, “Yes, I’m armed.” He is told, “Go to room 7, please.” He goes to room 7 and says: “I am an American spy, I’m armed, I want to turn myself in.” He is told, “Go to room 10.” He goes to room 10 and says: “I’m a spy, I want to turn myself in!” He is asked, “Do you have any communication with the Americans?” The spy says, “Yes!” He is told, “Go to room 20.” He goes to room 20 and says: “I’m a spy, I’m armed, I’m in communication with America and I want to turn myself in.” He is asked, “Have you been sent on a mission?” The spy says, “Yes!” He is then told, “Well, get out and go do it! Stop bothering people while they’re working!”

Putin undoubtedly understands the importance of having a sense of humor despite any difficulties he may face. Humor is beneficial for ones physical and emotional health. It reinforces ones relationships with family, friends, and colleagues. Putin’s sense of humor is evinced when he tells jokes. When he wants, Putin can also display an enjoyment of life and good times, and be quite gregarious, outwardly happy, full of smiles.

The Way Forward

In Act II, scene i, of William Shakespeare’s play, A Comedy of Errors, Adriana, the wife of Antipholus of Ephesus, and, Luciana, her sister, wait at home for him to return for dinner. Antipholus of Ephesus, a prosperous Ephesus citizen, is lost the twin brother of Antipholus of Syracuse who coincidentally has been searching worldwide for him and his mother, is in Ephesus. Even more of a coincidence, the father of both men, Egeon, a merchant of Syracuse, is condemned to death in Ephesus for violating the ban against travel between the two rival cities. He avoids execution after telling the Ephesian Duke that he came to Syracuse in search of his wife and one of his twin sons, both lost 25 years ago. While waiting, Adriana and Luciana have an exchange. Luciana proffers that men are freer than women because their work and responsibilities take them out of the home, and she thinks Adriana should just wait patiently for her husband to return and understand that she cannot control him. Adriana, chastising Luciana for preaching patience and servitude when she has not experienced marriage, declares: “A wretched soul, bruised with adversity, We bid be quiet when we hear it cry; But were we burdened with like weight of pain, As much or more would we ourselves complain:.” If Trump could have unwound the labyrinthian Putin and found success in improving relations with Russia, it would have been sublime. As a complex leader himself, self-reflection would naturally lead him to consider that the key to working with Putin would be to get to know him from the inside. It has been a bold effort, given failed attempts of previous US administrations, and brave, considering the degree in which the effort would open himself up to further attacks by critics. The benefits of improved relations with Russia would have been enormous. It would also be a magnificent diplomatic achievement by the Trump administration. It was Jean-Paul Sartre who said, “Only the guy who isn’t rowing has time to rock the boat.” For the most part, Trump’s critics find nothing desirable and everything loathsome about Putin, and impute upon him a lust for power and the intent to acquire greater territory and control in Russia’s near abroad. They consequently claim that Trump has a somnolent conscience when it comes to Putin. It is a segment of an ugly picture critics have painted of Trump fumbling on Russia and issues concerning the rest of the world. Their view of Trump is a far cry from reality. As it was explained in the recent greatcharlie post, Trump and his experienced foreign and national security policy officials had reservations about the whole matter. Faster than a canary in a coal mine, they were able to detect what was wrong and disingenuous about Putin’s approach. Putin’s lack of desire for that change is perhaps best evinced by Russia’s persistent efforts to meddle in US elections. If that unconstructive behavior continues, there will be little reason left than to recognize and deal with him not just as an adversary, but as an anathema. There is always hope. After all, along with all the bad, hope was also an element released from Pandora’s Box. However, US foreign policy cannot be simply based on hope and the unverifiable. It must be based on pragmatic choices with the expectation of certain outcomes. At this juncture, only an exceptional optimist among Trump’s most ardent supporters would hope with aplomb that he might be able to pull a rabbit out of a hat by having a few more ideas that might create real prospects for success.

Putin may feel some degree of temporary satisfaction over the arguable accomplishment of ensnaring previous US administrations in artificial diplomatic efforts by feigning interest in improving relations, by offering little steps that are nothing more than bromides. (Perhaps the Obama administration was an exception. Putin displayed little interest in working with it to achieve anything.) Taking that course has required a delicate balance of actions, and so far Putin has managed to avoid creating a greater danger for civilization. (In a way, meddling in US elections has brought things to the edge of the envelope of safety.) Putin unlikely vehemently desires to build up Russia’s nuclear arsenal especially considering costs involved and the likely impact on Russia’s economy. The new weapons announced systems reflected highly of the efforts of his country’s advanced defense research, but even more, provided notice to world that  Russia still has “deterrent” power. Further, it appears that through that announcement, Putin has denied any interest in, and signal his rejection of, genuine efforts to rebuild US-Russia relations. Looking at Putin from the inside, as was attempted here, it would appear that pride had much to do with that choice as he has tied the entire matter to Russia’s dignity, as much as his own. By placing himself in a position of control, being able to reject US diplomatic efforts, he undoubtedly temporarily satisfied his ego, building himself up a bit. Putin would unlikely be interested in the ministrations of greatcharlie on what Putin should be doing with his presidency. However, it would certainly be serendipitous if Putin would move beyond derivative thinking on US-Russian relations. For anyone settled in certain ways, that would require an epiphany of a sort, a degree of  personal growth: from insecurity to complete confidence over Russia’s place in the world. With future generations of Russians in mind, it is hard to image how keeping it separate from the rest of the world would be to their benefit. Much as the conservative US President Richard Nixon opened relations with Communist China, only under Putin will ties with the US reality take shape, could it be made sustainable. Russia would certainly remain strong, competitive, and self-sufficient. Looking at the hypothetical decision holistically, nothing would be lost. To use a sports metaphor, the ball is really in Putin’s court. For now, Trump appears to be available for talks. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Trump Backtracks on Cyber Unit With Russia: His Proposal Was Flawed, But His Thinking Is on Target

US President Donald Trump (above). Trump has engaged in negotiations for decades. In his face to face bilateral meeting with Russian Federation President Vladimir Putin, Trump was allowed the chance to adjust to circumstances, become more fluid in his thinking, more creative in his approach. His proposal for a joint cyber security unit, while scoffed at, and albeit, not viable under US law, appeared to be a product of his willingness to consider the full range of options. Moreover, as a confidence building measure, it may have had a positive impact on Putin.

According to a July 10, 2017 New York Times article entitled, “Trump Backtracks on Cyber Unit With Russia After Harsh Criticism”, US President Donald Trump, on July 10, 2017, backtracked on his push for a cyber security unit with Russia, tweeting that he did not think it could happen, hours after his proposal was harshly criticized by Republicans who said Moscow could not be trusted. The New York Times article explained the idea was a political non-starter. It was immediately scorned by several of Trump’s fellow Republicans, who questioned why the US would work with Russia after Moscow’s reported meddling in the 2016 US Presidential Election. The episode over the proposal unfolded on July 9, 2017 after his bilateral meeting with Putin in Hamburg, Germany during the G-20 Economic Summit. Trump emphasised that he raised allegations of Russian interference in the 2016 US Presidential Election with Putin. Reuters reported on July 9, 2017 that Trump stated: “I strongly pressed President Putin twice about Russian meddling in our election. He vehemently denied it. I’ve already given my opinion…..” As an immediate response to Putin’s denials on the matter, Trump then proposed forming a cyber security unit. According to Reuters on July 9, 2017, Trump wrote in the actual tweet about the cyber security unit: “Putin & I discussed forming an impenetrable Cyber Security unit so that election hacking, & many other negative things, will be guarded and safe.”

When Trump broached the the issue of the Russia’s hacking of the 2016 Presidential Election and his discussion with Putin apparently became a bit scratchy. Putin’s denial of the facts presented most likely signalled to Trump that he would be engaged in a argument without end on the hacking. Trump had to either move away from the issue or move laterally on it in some way.  Surely, Trump did not want to abandon the matter. The proposal for a joint cyber security unit apparently stemmed from an intense discussion between Trump and Putin on how to remit Russian cyber warfare programs directed at the US and perhaps similar US programs aimed at Russia. It may have been the product of brainstorming by the two leaders. Trump’s proposal was never supposed to serve as a form retribution against Russia for its intrusions into the US democratic process. Surely, it was not created to be a final solution to the threat of hacking US election. Immediately after the bilateral meeting in Germany, it was revealed that forming such a joint cyber security unit with Russia was prohibited under US law. Yet, although creating an actual cyber security unit was out of bounds, the concept of bringing US and Russian cyber experts together in some way to talk about some cyber matters was not. Trump’s likely aim with the proposal was to create a situation in which US and Russian officials were talking about hacking. Ostensibly, those conversations would create goodwill, perhaps stimulate a more open discussion about the issue, and promote more fulsome, honest talks about the issue among senior officials. In that way, the proposal certainly would have served as an effective confidence building measure.

The Oxford English Dictionary (OED) defines an apologist as a person who offers an argument in defense of something controversial. That is not the intent here. The OED defines an analyst as someone who conducts analyses. Foreign policy analysts scrutinize facts and data and interpret them, often in different ways. Given what is publicly known about Trump’s proposal for a joint US-Russian cyber security unit, the analysis here explains that although flawed, it is the sort of unconventional product that can result from intense negotiations aimed at coping with a seemingly intractable issue. The troublesome issue in this case is Russia’s intrusions into the 2016 US Presidential Election with all of its considerable security and political implications. It is also explained here that Trump’s proposal reveals a bit about his negotiating style. Trump clearly becomes target-oriented in his talks, and will make smaller agreements to build his interlocutor’s trust in him. From congruences Trump discerns in his interlocutor’s thinking and his own, he will try to craft a mutually satisfying agreement that, of course, ensures he will get what he wants. At this stage, Trump is still trying to get answers from Russia about the election issue and mollify the anxieties of various constituencies in the US over the negotiations, while hard at work trying to improve relations with Russia. Using his skills and experience, he seems to be swimming in the right direction. Audacibus annue coeptis. (Look with favor upon a bold beginning.)

Over the past decade, Russia has mounted more than a dozen significant cyber attacks against foreign countries, sometimes to help or harm a specific political candidate, sometimes to sow chaos, but always to project Russian power. From June 2015 to November 2016, Russian hackers penetrated Democratic Party computers in the US, and gained access to the personal emails of Democratic Party officials. Russian officials deny engaging in such operations.  Russian officials almost never open up their covert intelligence efforts.

Russian Cyber Attacks during the 2016 US Presidential Election

As it was discussed in the July 6, 2017 greatcharlie post entitled “Trump to Meet with Putin at G-20 Gathering: Trump Seeks an Authentic Relationship with Russia”, over the past decade, Russia has mounted more than a dozen significant cyber attacks against foreign countries, sometimes to help or harm a specific political candidate, sometimes to sow chaos, but always to project Russian power. The Russian strategy is typically to pair cyber attacks with online propaganda. That approach has been refined and expanded by Russian intelligence. From June 2015 to November 2016, Russian hackers penetrated Democratic Party computers in the US, and gained access to the personal emails of Democratic officials, which in turn were distributed to the global media by WikiLeaks. Both the CIA and the FBI report the intrusions were intended to undermine the US election. Cyber gives Russia a usable strategic capability. If benefits from its use appear great enough, Moscow may want to risk additional attacks. Russian officials will normally vehemently deny launching cyber attacks. Russian officials almost never open up their covert intelligence operations. Putin has never publicly discussed them.

The report of the January 16, 2017 US Office of the Director of National Intelligence entitled, “Assessing Russian Activities and Intentions in Recent US Election” presents the best publicized assessment by the US Intelligence Community of the Russian cyber attack during the 2016 US Presidential Election. The Russian operation to influence the 2016 US Presidential Election demonstrated a marked escalation in directness, level of activity, and scope of  Moscow’s longstanding desire and effort to undermine the US-led liberal democratic order. US Intelligence Community assesses that Putin, himself, ordered the influence campaign in 2016 aimed at the US presidential election. Russia’s objectives were: to undermine public faith in the US democratic process; to denigrate former US Secretary of State Hillary Clinton; and, to harm her electability and potential presidency.  The US Intelligence Community further assessed that Putin and the Russian Government developed a clear preference for then President-elect Trump. In following, it also assessed Putin and the Russian Government aspired to aid President-elect Trump’s election chances when possible by discrediting Clinton and publicly contrasting her unfavorably to him. The approach the Russia took to operation reportedly evolved over the course of the campaign given its understanding of the US electoral prospects of the two main candidates. The Intelligence Community concluded that once it appeared to Moscow that Clinton would likely win the election, the Russian operation began to focus more on undermining her future presidency. It was uncovered by Intelligence Community that the influence campaign followed a Russian messaging strategy that blended covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls.”

The Intelligence Community has declared that much as its Soviet predecessor, Russia has a history of conducting covert influence campaigns focused on US presidential elections, using Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR intelligence officers and agents and press placements to disparage candidates perceived as hostile to the Kremlin. Russia’s intelligence services conducted cyber operations against targets associated with the 2016 US were Presidential Election, including targets associated with both major US political parties, were conducted by Russian intelligence services. The Intelligence Community assessed with high confidence that the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU used the Guccifer 2.0 persona and DCLeaks.com to release US victim data collected in cyber operations publicly, in exclusives to media outlets, and transmitted material to WikiLeaks. Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards. US Department of Homeland Security assessments in the report explain that the types of systems Russian actors targeted or compromised were not involved in vote tallying. The Russia’s state-run propaganda machine Russia Today contributed to the influence campaign by serving as a platform for Kremlin messaging to Russian and international audiences.  The US Intelligence Community concluded that Moscow will apply lessons learned from its “Putin-ordered campaign” directed at the 2016 US Presidential Election to future influence efforts worldwide, including against US allies and their election processes.

Testifying before the US Senate Intelligence Committee on June21, 2017, Jeanette Manfra, the US Department of Homeland Security’s acting deputy Undersecretary of Cyber Security revealed that 21 US state election systems were targeted as part of Russia’s wide-ranging operation to influence the 2016 elections. She explained that a small number state election systems were also breached but there was no evidence any votes were manipulated. Manfra noted that the elections are resilient to hacking in part because they are decentralized and largely operated on the state and local level. Nevertheless, the hacking of state and local election databases in 2016 was more extensive than previously reported. According to Time, there was at least one successful attempt to alter voter information. Reportedly in Illinois, more than 90% of the nearly 90,000 records stolen by Russian state actors contained driver’s’ license numbers, and a quarter contained the last four digits of voters’ Social Security numbers.

According to the US Intelligence Community, 21 US state election systems were targeted as part of Russia’s wide-ranging operation to influence the 2016 elections. A small number state election systems were also breached but there was no evidence any votes were manipulated. However, there was at least one successful attempt to alter voter information.  In Illinois, more than 90% of the nearly 90,000 records stolen by Russian state actors contained driver’s license numbers, and a quarter contained the last four digits of voters’ Social Security numbers.

Reaching Agreements: Easier Said than Done

Before the Trump-Putin bilateral meeting, what had been observed in diplomatic exchanges between the US and Russia is a type of modus vivendi, a way of living, working together, between leaders and chief diplomats. After Putin granted US Secretary of State Rex Tillerson a meeting in Moscow after his talks with Russian Federation Foreign Minister Sergei Lavrov, Trump granted Lavrov a meeting in Washington during a visit to meeting with Tillerson. It also indicated a willingness to establish a balance in negotiations or quid pro quo on issues when possible. US State Department and Russian Foreign Ministry officials are also working together to resolve nagging issues that could serve to harm efforts to foster good relations. Such seemingly small steps helped to build confidence in both Washington and Moscow that the prospect for change was real, and it lead to the arrangement of a meeting between presidents. Those small steps also supported an open line of communication between chief diplomats which is all importance as US and Russian military forces work in close proximity in Syria, fighting continues in Ukraine, and aerial and naval intrusions remain constant in skies and waters in NATO, Canadian and US territory. If all went well, there will certainly be more to follow.

All of that being stated, the successful formulation and execution of such small steps is a daunting in public. When Putin initially took power on January 1, 2000, the West expected him to give it nothing less than his unequivocal cooperation in a manner similar to his predecessor, Russian Federation President Boris Yeltsin. Western capitals also expected Putin to be a bit wobbly taking on so much responsibility at a relatively early age. Yet, Putin knew his shoulders could bear the burden. He had no desire to be just a man of the moment in Russia. Much as Yeltsin, Putin, too, showed patience toward the West for a while, but he did not procrastinate. He took on the mission of breathing fresh breath into a country that was dying. He pushed ahead with plans “to save” Russia from disintegration and frustrate what he sensed were Western efforts to weaken it. Indeed, Putin did not believe congenial relations with the West were authentic given the many years of geopolitical struggle. Putin believed then, and believes now, that the greatest danger to Russia comes from the West. He believes Western governments are driven to create disorder in Russia and make it dependent of Western technologies. Still, Putin has shown that would prefer to outthink his rivals in the West rather than fight them. That notion has influenced his responses in contentious situations. After the period of a term away from the presidency during which he served as his country’s prime minister, Putin was reelected for a third term on March 4, 2012. He clased repeatedly with US President Barack Obama and seemed to act more aggressively. The Russian military move that stood out was the annexation of the Crimea.

The US and EU took Putin to task for that bold military operation. Harsh sanctions were levied and Russia was cast out of the Group of 8 industrialized democracies. Putin has held on to the territory and has continued to do so in the face of even tougher sanctions against Russian interests. He levied his own sanctions against US and EU products and even began heavily supporting separatist movements in Eastern Ukraine. In a March 18, 2014 speech declaring Russia’s annexation of Crimea, Putin vented his anger at the US and EU, enumerating some Western actions that fostered contempt in Moscow. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he refers to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Ulterius ne tende odiis. (Go no further down the road of hatred.)

Given the many years of geopolitical struggle, Putin was unconvinced congenial relations between Russia and the West could exist authentically. He believed the greatest danger to Russia comes from the West. After Putin was reelected for a third term, he clashed repeatedly with US President Barack Obama. Putin became more aggressive; took more military action. After traveling a bumpy road with the Obama administration, Moscow hoped Trump’s approach to Russia in any direction would reflect the desire not just for new deals, but a new US-Russia relationship.

Trump’s Negotiating Style: It’s Similar to the “Harvard Way”

Parva scintilla saepe magnam flamam excitat. (The sparkle often initiates a large flame.) Given Trump’s gift for agile maneuver against opposite parties in negotiations and his ability to mask his approach, if he chooses to do so, his decisions cannot be forecasted with exactitude. Trump, a self-admitted master of the art of the deal.  His negotiating “tactics, techniques, procedures and methods” Trump appears to have used that were likely developed a tad via his graduate business education at the Wharton School of Business at the University of Pennsylvania along with heavy dose of experience gained after nearly five decades of business negotiations. His concepts appear similar to those promoted by Harvard University’s Program on Negotiation. Such concepts ostensibly guided him in his first “business meeting” with Putin. They include the following: promoting creativity by breaking problems into smaller components; by doing so, you can build a multi-issue business negotiation out of what might appear to be a single-issue deal; using multiple issues to make valuable tradeoffs and facilitate a good-faith negotiation; collecting important information by asking lots of questions and listening carefully to the answers; impressing the other side with your flexibility by putting forth several different proposals at the same time; contemplate unconventional deal-structuring arrangements to bridge the gap between what the seller wants and what the buyer can afford; exploring a contingent contract to help overcome differences in beliefs about future events and outcomes; creating even more value in business negotiations by adding conditions to your deal such as “I’ll do X if you do Y”; and, engaging in “mind games” like brainstorming to facilitate creative problem solving and unexpected solutions.

Trump surely had high hopes before and during his meeting with Putin. He likely would argue then, and would argue now, that bold action, when appropriate, would be the very thing to turn situations around. Ideally, if big agreements were reached, they could help modify Russian behavior, and get relations moving forward. Yet, Trump is also pragmatic and recognizes that plans must fit circumstances and circumstances cannot be created or imagined to fit plans. Trump understood that there would likely need to be initial, relatively small steps perhaps to unlock the diplomatic process on big issues. He would also seek to gauge actions and reactions of his interlocutor, Putin. If he discerned a positive way forward, his sense of possibility would broaden and he would open his mind up to more options. When Trump broached the issue of Russian cyber attacks and eventually presented his proposal, his goal was not to mollify Putin, but rather provide an opportunity for all sides to “clear the air” on the issue of Russia’s hacking of 2016 US Presidential Election but he was unable to receive anything other than denials. Trump is not happy about Russia’s interference with the 2016 Presidential Election both as a patriotic citizen and as a candidate in that election. He may not completely agree that Russia’s action greatly impacted his election victory, but he recognizes that the aesthetics of the intrusion over time could diminish his accomplishment in some minds, particularly among his supporters. Trump understood Putin would likely deny Russia had any connection to the election intrusion, but he undoubtedly believed it was worth a try to have him confirm what most in the US believe.

As Trump and Putin did not have a relationship established prior to the meeting, they did not possess the requisite degree of trust that would allow them to relax and explore the territory outside their formal negotiating positions. They could not talk about their assumptions, strategies, and even fears. They had to work in the abstract from reports of others’ observations and analyses about their respective interlocutors.

The ability of Trump in his negotiations with Putin, to restrain the expression of emotion, in this case anger, perhaps even rage, and not to publish to the world by changes of countenance those thoughts and feelings, was critical if relations were to move forward. To exist is to change, to change is to mature, to mature is to recreate oneself endlessly. Admitting errors, missteps, is a sign of maturity and wisdom. One evolves as a result of recognizing ones mistakes. The mature one has moved from the passive voice to the active voice–that is when one stops saying, “It got lost” and begins saying, “I lost it.” The bilateral meeting between Trump and Putin was a promising moment in relations between the US and Russia. In an advanced, mature way of thinking, a presidential way of thinking in 2017, Trump sought some temporary step on the issue of Russia’s intrusion into the 2016 US Presidential Election by taking into consideration the relative strengths of the positions and capabilities of all sides. Trump understands the peace that can be achieved must be the focus. The focus must not be how much each side can destroy the other through cyber warfare but rather how to end cyber as a mutual threat. One cannot solve a problem with the same thinking one used when one created the problem. Mens sibi conscia recti. (A mind conscious of its own rectitude.)

The Flawed Cyber Proposal: A Telling Product of the Negotiation Process

Six building blocks for diplomatic negotiations were superbly outlined by the renowned US statesman, former US Secretary of State James Baker over a decade ago. Baker explained that the building blocks worked well when properly applied through solid preparation and hard work. The building blocks included: 1) Understanding an opponent’s position; 2) Gaining trust through personal relationships; 3) Reciprocal confidence building; 4) Taking a pragmatic approach that does not sacrifice principles; 5) Being aware of timing; and 6) Maintaining a deep respect for the politics of the situation.

As Trump and Putin did not have a relationship established prior to the meeting, they did not possess the requisite degree of trust that would allow them to relax and explore the territory outside their formal negotiating positions. They could not talk about their assumptions, strategies, and even fears. They had to work in the abstract from reports that presented observations and analyses of others about their respective interlocutors. With specific regard to reciprocal confidence building, both leaders demonstrated that they could negotiate. Baker suggested that at the earliest stage, one could arrange a series small negotiations on issues that could be resolved quickly, reasonably, and amicably to assist in developing a dialogue. Baker explained that finding even a minor, common point of agreement, for example on the shape of the negotiating table, can serve to set the tone of the relationship. It also helps develop a dialogue, which is one of the most important aspects of negotiations.

Former US Secretary of State James Baker (above). Six excellent building blocks for diplomatic negotiations were outlined by former US Secretary of State James Baker over a decade ago. Baker explained that they worked well when properly applied through solid preparation and hard work. Included among them were: 1) Understanding an opponent’s position; 2) Gaining trust through personal relationships; 3) Reciprocal confidence building; 4) Taking a pragmatic approach that does not sacrifice principles; 5) Being aware of timing; and 6) Maintaining a deep respect for the politics of the situation.

Confidence Building Measures: In Brief

Perhaps the best definition for confidence building measures was provided by Simon Mason and Siegfried Matthias, in their seminal article, “Confidence Building Measures (CBMS) in Peace Processes” published in Managing Peace Processes: Process Related Questions. A Handbook for AU Practitioners, Volume 1 (African Union and the Center for Humanitarian Dialogue, 2013). They define confidence building measures as series of actions that are negotiated, agreed, and implemented by parties in a dispute in order to build confidence without specifically focusing on the root causes of the dispute.

Confidence building measures are designed to build confidence. Confidence is a psychological state, whereby actors make themselves vulnerable and ready to take risks based on the expectation of goodwill and positive behavior from a counterpart. Confidence building measures can prevent a dispute or larger problem from escalating even if the negotiating process is to be started in the short term. Preventing escalation has value in itself and may also allow the negotiation process to begin again later on. Mason and Matthias intriguingly note that confidence building measures can prevent parties from escalating even when there is a denial of any problems or tensions that could escalate. Successful negotiations require risk taking by the parties. That is why a minimum degree of confidence is needed for negotiations to even start. For negotiating parties, confidence building measures are attractive because they are seen as a low-cost and low-risk activities, since they can be implemented with limited resources and calculated risks. The negotiating parties, themselves, must craft confidence building measures to fit their specific case. If not, what is agreed to will not be owned by the parties, and will not serve to build trust. Confidence building measures must also be reciprocal in nature. One party should not feel that it is going out on a limb without the other also doing so. To assist in ensuring confidence is sustained and agreements are appropriately implemented, confidence building measures concerning communication should be put in place.

In an incremental approach to confidence building measures, a series of agreements are used to slowly tackle the more difficult core issues later on. Under this approach, confidence building measures become stepping stones or a pathway to greater agreements. Indeed, agreements on confidence building measures early on generally build trust and interest in negotiating more complex agreements at a later stage. In this sense, confidence building measures create opportunities for parties to collaborate on something that is not strategically important to them and, in so doing, build the trust needed to subsequently discuss important strategic issues. Confidence building measures pull parties away from the obstacle they are blocked on. Once confidence exists, it is then easier to address the obstacles. Mason and Matthias use the metaphor of steps of a ladder also highlights the incremental nature of building trust which takes time and an accumulation of small steps. That is referred to by some as the confidence building process.

Mason and Matthias caution parties negotiating confidence building measures that wider constituencies may view a negotiation process with suspicion before, during, and after negotiations, and may not be willing to accept deals made. Individuals from those constituencies typically will not be present at the negotiation or understand how agreements were arrived at. Plans for responding to the wider constituencies’ concerns must be considered. A mutual understanding that one party made need to break away from a confidence building measure must exist. An agreement could be negotiated that allows the parties an amount of time in which they could communicate to one another about the need to break away from a confidence building measure. Working together on such a matter in itself could build confidence, create some degree of trust.

US military personnel in Cyber Command (above). There is no doubt with regard to the legal barriers to Trump’s proposal for a joint US-Russian cyber security unit. The 2017 National Defense Authorization Act prohibits the US Department of Defense, which is the parent organization of the US National Security Agency and the US Cyber Command, from using any funds for bilateral military cooperation with Russia. However, the mere fact that Trump offered to work jointly with Russia to sort out a cyber matter, and thought of creating an organization for that, seems to have had a positive impact on Putin.

Even though Trump’s proposal for a joint US-Russian cyber security unit was flawed, the dialogue among US and Russian cyber experts that might have resulted from it could have helped to develop a mutual understanding about the harmful effects of cyber activities and potential consequences, to include proportional asymmetric responses. Experts from the US side in any hypothetical liaison team would have likely been very experienced, highly qualified US personnel from the US National Security Agency and Cyber Command, and perhaps the Department of Homeland Security and the Department of State, the primary US agency most major cyber negotiations. They might have caused Russia to halt its cyber operations against the US by helping to establish a modus vivendi, or way both countries could live together while possessing this significant strategic capability. One could speculate even further that talks may have even resulted in the very near-term suspension of any cyber attacks underway, or a reduction in the intensity or tempo of such attacks that have been sourced to Russia and perhaps some that have not as yet been identified as such. Trump’s proposal, encouraging talks, although flawed legally, ideally could have inspired both countries to move forward toward a greater agreement.

A Bad Reaction

As it was explained earlier, wider constituencies represented by negotiating parties may view the process with suspicion. In that vein, political allies and adversaries alike in the US rejected Trump’s proposal for a joint cyber security unit. There was an immediate rebuff from several Republicans, who questioned why the US would work at all with Russia after Moscow’s alleged meddling in the 2016 U.S. election. US Senator Lindsey Graham of South Carolina, a Republican, stated on the US Sunday morning news program “Meet the Press”: “It’s not the dumbest idea I have ever heard but it’s pretty close.” On Twitter, US Senator Marco Rubio of Florida, a Republican, immediately criticized Trump’s cyber proposal. Rubio wrote: “While reality and pragmatism requires that we engage Vladimir Putin, he will never be ally or reliable constructive partner.” He further stated: “Partnering with Putin on a ‘Cyber Security Unit’ is akin to partnering with [Syrian Arab Republic President Bashar al-] Assad on a “Chemical Weapons Unit.” US Senator John McCain of Arizona, a Republican who chairs the Senate Armed Services Committee, recognized Trump’s desire to move forward with Russia. However , McCain further explained on the US Sunday morning talk show “Face the Nation”: “There has to be a price to pay.” McCain went on to state: “Vladimir Putin … got away with literally trying to change the outcome … of our election.” He also added: “There has been no penalty.” US Representative Adam Schiff, the top Democrat on the House Intelligence Committee, told CNN’s Sunday morning program, “State of the Union”, that Russia could not be a credible partner in a cyber security unit. Schiff stated: “If that’s our best election defense, we might as well just mail our ballot boxes to Moscow,” Schiff added. A former US Secretary of Defense in the administration of US President Barack Obama, Ashton Carter, told CNN: “This is like the guy who robbed your house proposing a working group on burglary.”

There is no doubt with regard to the legal barriers to Trump’s proposal for a joint US-Russian cyber security unit. The 2017 National Defense Authorization Act prohibits the US Department of Defense, which is the parent organization of the US National Security Agency and the US Cyber Command, from using any funds for bilateral military cooperation with Russia. The purpose of the law is avoid providing Moscow with insight into US cyber capabilities. In the US, it has been long-believed that Moscow is averse to revealing any of its cyber capabilities.

Multiple proposals will be presented in the process of improving US-Russian relations. Trump’s cyber proposal was one of many tabled by him during his bilateral meeting with Putin. As Trump tweeted, success was achieved in other areas. For example, Trump and Putin agreed over a ceasefire for southwest Syria that was set to begin on midday, July 9, 2017. US Secretary of State Rex Tillerson said it showed the US and Russia were able to work together in Syria and that they would continue to do so.

Dumping the Cyber Security Unit Proposal

It was only hours after Trump’s proposal for the joint US-Russian cyber security unit was harshly criticized by Republicans who said Moscow could not be trusted that he backtracked on it. He tweeted: “The fact that President Putin and I discussed a Cyber Security unit doesn’t mean I think it can happen. It can’t.”

Even without being implemented, the fact that Trump offered to work jointly with Russia to sort out a cyber matter, and thought of creating an organization to do so, may have had a positive impact on Putin’s thinking. Putin can choose cautious cooperation or subterfuge, which many in foreign policy circles would call his penchant. In his dealings with Trump, it seems to some degree Putin has chosen cooperation. Indeed, it must be noted that Putin discussed Trump’s proposal and was apparently open to some type of interaction between cyber experts of both countries. Recall also that Trump initially tweeted that Putin entertained the proposal. As Putin has the final say on all foreign policy matters in Russia, he established that Russia at the moment has an interest in reaching an understanding on cyber. Trump’s July 7, 2017 cyber proposal is dead. However, as the process of building relations between the US and Russia, there is a real chance that a new, better crafted proposal on cyber, within bounds legally, may surface, perhaps even from Moscow. Only time will tell.

Multiple proposals will be presented in the process of improving US-Russian relations. Trump’s cyber proposal was one of many tabled by him during his bilateral meeting with Putin. As Trump tweeted, success was achieved in other areas  For example, Trump and Putin agreed over a ceasefire for southwest Syria that started on midday, July 9, 2017. Tillerson said it showed the US and Russia were able to work together in Syria and that they would continue to do so. Tillerson announced some key understandings brokered in the meeting amounted to success. He explained: “We had a very lengthy discussion regarding other areas in Syria that we can continue to work together on to de-escalate the areas and the violence, once we defeat ISIS.” Tillerson also said the US and Russia would “work together towards a political process that will secure the future of the Syrian people.”

The Way Forward

In William Shakespeare’s play, The Third Part of King Henry the Sixth, while King Henry away from the throne, the Duke of York, urged by Warwick, sat on it. Just then, Henry arrives with followers. Henry tells York to step away, but York announces an alleged claim to the crown against the King’s hereditary possession. Henry convinces York to wait to be crowned after he dies. Henry’s nobles are astonished that he disinherited his own son. Queen Margaret arrives and is struck by the news. York, at home, is convinced by Richard’s sons Edward and Richard, and his follower Montague to take the throne right away. A war for succession ensues. After several horrific battles, the opposing sides massed for a final engagement. In Act V, Scene iv of the play, Margaret leading Henry’s supporters gives a final stirring speech, summoning courage and the fighting spirit. On the plains near Teaksbury she states: “Great lords, wise men ne’er sit and wail their loss, but cheerly seek how to redress their harms. What though the mast be now blown overboard, the cable broke, the holding-anchor lost and half our sailors swallow’d in the flood? Yet lives our pilot still. Is’t meet that he should leave the helm and like a fearful lad with tearful eyes add water to the sea and give more strength to that which hath too much, whiles, in his moan, the ship splits on the rock, which industry and courage might have saved? Ah, what a shame! Ah, what a fault were this!” As Trump engages in efforts to improve relations with Putin and Russia, his opponents and a few fellow Republicans seem to feel the US is staring into a dangerous, dark abyss. They place little faith in Trump, and no trust or hope in Putin. Conversely, Trump, in thinking about the potential for improving relations, likely conjures panoramic views of endless vistas. While Trump’s critics would associate the disturbing sound of a dissonant flute with Trump’s effort to rebuild relations with Russia, Trump seeks to create a harmony between the US and Russia that even Johann Sebastian Bach would find sublime. The entire matter seems to enthral him. He remains optimistic and is pushing ahead in the face of considerable obstacles, the majority of which are actually unrelated to his efforts with Putin.

Trump has engaged in negotiations for decades. In his face to face bilateral meeting with Putin, Trump was allowed the chance to adjust to circumstances, become more fluid in his thinking, and more creative in his approach. Trump’s sense of possibilities was broadened. His proposal for a joint cyber security unit, while scoffed at, and, albeit, not viable under US law, undoubtedly resulted from his willingness to consider the full range of options. As a confidence building measure, it may very well have had a positive impact on Putin’s thinking without even being implemented.  Reports about the actual Trump-Putin meeting indicate both leaders had a good sense of one another’s positions but they also sought find out more about one another’s approaches. By doing so, both provided themselves with a better chance of reaching a successful conclusion. Both were attentive to how the other perceived issues, no matter alien that view may have been to their own. They noticed patterns of behavior, some perhaps influenced by history and culture, and recognized political constraints the other faced. Both Trump and Putin tried to crawl into one another’s shoes. As time moves on, that effort may very well assist the two leaders in building a relations that will facilitate the building of ties between the US and Russia. Durate, et vosmet rebus servate secundis. (Endure, and keep yourselves for days of happiness.)

Negotiators Put Final Touches on Interim Iran Accord, But Ayatollah Khamenei Is Expressing Concern over Perceptions Created by Talks

Iran’s Supreme Leader, Ayatollah Ali Khamenei, is frustrated by the popular perception that Iran was forced to make a deal on its nuclear program as a result of Western economic sanctions.

According to a January 13, 2013, New York Times article entitled, “Negotiators Put Final Touches On Iran Accord,” Iran and the P5+1 (US, Britain, France, Russia China, and Germany) completed a deal on January 12th that would temporarily suspend much of Iran’s nuclear program as of January 20th.  That would be done in exchange for limited relief from Western economic sanctions.  The interim agreement had already been announced in November 2013, however, its implementation was delayed until after negotiators and experts worked out technical details.  Reportedly, Iran will suspend its nuclear program to the extent that enrichment of uranium would be halted beyond 5 percent, a level deemed sufficient for energy production but not for developing a nuclear device.  Iran’s stockpile of uranium enriched to 20 percent, a step toward weapons grade fuel, would be diluted or converted to oxide, preventing it from standing prepared for military purposes.  Iran also agreed not to install any new centrifuges, start up any that had were not already operating, or build new enrichment facilities.

While Western officials touted the degree to which Iran’s nuclear program had be temporarily curtailed, as reported in the January 13thNew York Times article, Iranian officials indicated that their program had not been curtailed at all. They claimed that Iran by its own volition, reached an interim agreement with the P5+1, but did not give up the right to enrich or the ability to return to enriching at any time.  To them, the interim agreement did not prevent Iran from enriching uranium above 3.5 percent or to dismantle any existing centrifuges.  Iranian deputy foreign minister for legal and international affairs as well as lead negotiator, Abbas Araqchi, made it clear that while Iran would separate connections between centrifuges that have been used to enrich uranium to 20 percent, the interconnections could be reconnected in a day.

For Iran’s Supreme Leader, Ayatollah Ali Khamenei, maintaining the nuclear program and the right to enrich was the main requirement that he gave to Iranian President Hassan Rouhani when he released him to engage in a dialogue with the US and Western powers on economic sanctions, and consequently, Iran’s nuclear program.  Khamenei viewed the Geneva process primarily as an opportunity to counter economic sanctions while progressing in the area of nuclear technology.  However, as the process advanced, Khamenei began to publicly express concerns and some disappointment over its results.  Despite an initial sense inside Iran’s leadership that the negotiations would rapidly bring forth favorable results, it instead has been a complicated and deliberate process, the outcome of which remains uncertain.  Moreover, Iranian authorities became concerned by the fact that following their decision to engage in the negotiations with Western powers, a perception took hold that Iran was forced to make a deal on its nuclear program to stave off economic ruin.

In Iran, Khamenei is known as the leader of the Islamic Ummah and Oppressed People and the person in which the spiritual guidance and functional power Islamic republic resides.  For him, the notion that Iran was submitting to Western pressure is absolutely abhorrent.  Khamenei accused the US of engaging in strenuous efforts to promote this view of Iranian weakness.  He stated:  “The nuclear talks showed the enmity of America against Iran, Iranians, Islam, and Muslims.”  Nevertheless, the view that Iran was forced to negotiate in reaction to economic sanctions is not only accepted among most experts in the US.  It is the prevailing view worldwide.  Khamenei has held out hope that, through the Geneva process, Iran would reach an agreement that fits within the ideals of Islamic Revolution as well as achieve success over what he has referred to often as “the economic pressures and propaganda campaigns of the West.”  However, perceptions of Iran’s standing in the talks could very well impact Khamenei’s final decision regarding Geneva.  At this juncture, it is not necessary for Khamenei to decide whether to proceed to halt negotiations as a final agreement has not even been outlined.  In the interim, perhaps Khamenei and Iranian foreign and defense policymakers might consider how Iran’s own efforts to influence the global policy debate on the Geneva process in its favor, how in reality, it did more to propagate perceptions on why it entered into negotiations.  Interestingly, a few changes in Iran’s approach may ameliorate the situation and may very well make the situation tolerable enough to allow reaching an agreement to become the main focus of all parties.

Image of Iran’s Power to Khamenei

Khamenei’s frustration over worldwide perceptions that Iran was forced into the Geneva process is almost palpable.  Khamenei saw Iran’s decision to enter the Geneva process purely from a position of strength as a regional power.  Such power was the basis of equality.  Viewing its entry into the Geneva process from a perceived position of strength Khamenei has made statements such as: “We had announced previously that on certain issues, if we feel it is expedient, we would negotiate with the Satan [US] to deter its evil.”  When it began the talks, Khamenei and Iranian policymakers believed an agreement favorable to Iran’s interests would be rapidly constructed.  Among experts and advisers on foreign and defense policy in Tehran, the accepted view was that US had become disinterested in the Middle East as events and issues in the region do not align with US President Barack Obama’s new vision of its national interest.  The failure of the US to respond militarily to Syrian President Bashar al-Assad’s use of chemical weapons, despite red-lines, is a reaction to the trauma of its interventions in Iraq and Afghanistan.  Moreover, they viewed US President Barack Obama as analytical and frail, lacking the will to fight.  They asserted that Obama would unlikely be predisposed toward declaring war on Iran regardless of how they might proceed appears to have become dogma among political and religious hardliners and in the Iranian Revolutionary Guards Corps (IRGC).  It has compelled many Iranian officials, IRGC commanders in particular, to publicly deride the US government as being indecisive and predict it would be pliant to Iran’s demands at Geneva.

Khamenei and Iranian officials saw Iran moving in the opposite direction of the US, gaining power and becoming the driving force in the Middle East.  Khamenei stated:  “a regional power [Iran] has emerged which has not been brought to its knees despite various political, economic, security, and propaganda pressures.”  He further stated that “this major power [Iran] has influenced regional nations.”  Iran’s recent record indeed includes a number of bold and decisive actions in the region.  According to the January 13th, New York Times article, Iran has been sought to influence events just about everywhere in the region.  In Syria, Iran has deployed significant numbers of IRGC, Quds Force and regular Army forces.  It has sent an estimated 330 truckloads of arms and equipment to Syrian through Iraq to support the armed forces of Syrian President Bashar al-Assad’s regime.  An air corridor over Iraq has also emerged as a major supply route for Iran to send weapons, including rockets, anti-tank missiles, mortars, and rocket propelled grenades to Assad.  Iran armed, equipped, and enabled Hezbollah to join the fight in Syria.  Iran has also facilitated the deployment of Iraqi Shiite militiamen trained by the Quds Force to Damascus.  To further supplement the Syrian Armed Forces hundreds of Shiites in Yemen and Afghanistan have been recruited for combat duty in Syria.  In Yemen, the New York Times reports Iran’s Quds Force has supplied arms to Houthi rebels fighting government forces in the northern part of the country.  Iran smuggles weapons into Yemen on small boats which are difficult for Yemeni authority to track.  It is estimated that only 1 out of 10 Iranian boats that illegally come into Yemen among the thousands of commercial and fishing boats in the Persian Gulf.  In Bahrain, Iran has capitalized on ties established with Shiite groups back in the 1990s, including some that have carried out small-scale attacks on police.  Bahraini operatives are typically trained in Iran and operationally controlled by Bahraini opposition leaders there.

Understanding US Power in Tehran

Despite Khamenei’s own perceptions of Iran’s power relative to that of the US and its Western partners, the US has proved not to be as relaxed on matters as his foreign and defense policy experts and advisers led him to believe.  Advice coming as a result of the “group-think” displayed in Tehran on the capabilities and possibilities of the US did not serve Khamenei well.  As a nation, the US is certainly not a push over.  It remains a nuclear armed superpower, regardless of any perceptions about its leadership.  It has become very apparent that for Iran, acquiring significant sanctions relief through the talks would be difficult, if not impossible to realize, without significant change regarding Iran’s nuclear program.  Additionally, the focus of the US and its Western partners in the Geneva process was not what Iran was doing away from its nuclear program regionally.  That has been put aside.  The focus of Geneva is specifically Iran’s nuclear program and potential for developing nuclear weapons.  The talks are aimed at preventing nuclear war.  For that reason, the talks to a great degree concern the very survival of Iran in the face of US military power.

Distress caused by coming to this understanding of the situation has increased Khamenei’s frustration over hearing economic causation theories on Iran’s decision to negotiation in the global media.  Clear and convincing evidence has been presented that Iran’s oil revenue has been reduced and its other trade has been disrupted.  Nevertheless, Khamenei still publicly rejects this perception of weakness.  He recently declared, “Our enemies do not know the great Iranian nation.  They think that their imposed sanctions forced Iran to enter negotiations.  No, it is a wrong.”

Iran has made an effort promote its own positions and arguments on the Geneva negotiations as part of the worldwide policy debate on its nuclear program and the Geneva talks.  This activity has been especially noticeable online, in the social media.  (See greatcharlie.com September 3, 2013 post entitled, “Iran’s President Tweets Condemnation of Syria Chemical Attacks: Is Twitter Part of Rouhani’s Approach to the West?”)  Indeed, just as many other nations, Iran has sought to adapt to emerging trends on the social media with the hope they can way global opinion and improve the nation’s public image as well.  However, perhaps its was not fully understood at the time the decision to engage in such activity was made that use of this type of eDiplomacy (via Twitter, Facebook, YouTube, the blogishere, and other means) can create difficulties.  The real threat to national governments with an online presence or even in print, radio, and television media is the foreign and defense policy pundit.  Iran fell prey to endless numbers of pundits worldwide.

Iran’s Lost Cause Against the Pundits

The Oxford English Dictionary defines pundit as an expert in a particular subject or field who is frequently called on to give views about it to the public.  In the US, they are typically former government officials, political leaders and political operatives, think tank scholars, and academics allegedly with official access, particularly in Washington, DC.  Pundits respond to issues as they arise.  The serious foreign and defense policy observers among them will typically focusing on their areas of expertise.  Ideally, pundits will fill in information gaps to help an audience better understand an issue, policies, decisions, and actions taking place.  They may provide constructive criticism, “reality therapy,” and perhaps thinking that is outside of the box based on good judgment.  In this manner, pundits can make very valuable contributions to the foreign and defense policy debate.  (It is hoped visitors feel greatcharlie.com falls into that honorable category of punditry.)  However, there are also those pundits whose responses come in the form of trenchant criticisms of policies and decisions, pointing more to what is wrong than explaining how things could be improved.  Pundits are not journalists.  While they operate in the same sphere, they do so using different “standards.”  Some paraphrase and misquote to the extent that they occasionally create false impressions within the media of what was stated by an official.  This is made easier by use of sound bites and clips of official presentations.

Pundits respond to official statements on all issues that may arise.  Pundits, great and small, popular and unknown, are commenting on official statements and reports on such a rapid and immeasurable scale that even when corrections and misquotes are acknowledged such efforts to repair mistakes are obviated by new urgent and important issues.  Moreover, whenever official provide statements or attempts are made at leaking information through “trial balloons” and unofficial statements, in the end they are made in the pundits’ court: the media.  How those presentations eventually reach the public will be shaped by pundits responses, which some pundits often allege are gleaned from their own official sources.  The media is the pundits’ court, and within it, they cannot be defeated.  Whenever officials attempt to set the record straight by offering rebuttals or rebuffing such commentaries by pundits, their statements may drown among the thousands of commentaries on the blogisphere or may be met by an additional roundla of harsh remarks.  Interestingly, an effort by officials to engage a pundit in a debate in the media over a commentary, the pundit’s visibility and standing is elevated.

Grabbing the attention of an audience is most important in all media.  As a blog, greatcharlie.com, itself, is very interested in the number of visitors and views it receives on a given day, week, or month on its site.  While it would be better if blogs were sought out for their veracity and insights they present, attention is generally given to the ones that are more interesting or intriguing.  More often, those commentaries lack depth, and will more likely be unfriendly.  The more acceptable a negative view might be regarding a particular issue, the more likely this will be the case.  This has been one of Iran’s problems.  While Iran sought to promote its positions and arguments in the media, attempting to cope with popular pundits, who feel they should be hostile to its official statements, has proven to be a failed exercise.  Khamenei once expressed the hope that what he perceived to be an anti-Iran publicity campaign by the US would backfire and lead to its own global isolation.  However, that will unlikely be the case.  Among those people interested in foreign and defense policy worldwide, very few would ever take the position that Iran was equal or stronger than the US and its Western partners.  Far more people worldwide might accept more negative perspectives of Iran, due to security and economic concerns or ethno-religious and nationalist reasons.  The fact that the Geneva process is primarily referred to worldwide as the Geneva nuclear talks, which is how the US and its Western partners view the process, and not the Geneva talks on economic sanctions, as Khamenei and Iranian officials might view it, is an indicator of the perspective from which the global media has viewed the situation.

Assessment

As the supreme leader, it is understandable that worldwide perceptions of Iran would matter greatly to Khamenei.  Further, he was correct when he stated an enmity exists between Iran and the US.  Until the talks began, relations were uncongenial.  Yet, what is most important regarding the Geneva nuclear talks is what is said at the negotiation table and not what is stated in the media.  Boasts and declarations, the strong suit of the pundit, are of no value in the process.  Pragmatic thinking is required of all parties to the negotiation on this matter.

The quality of the agreement reached naturally should far outweigh concerns over what pundits far away from the negotiating table might argue.  An agreement, negotiated with the idea of equality among the parties at the table, that is respectful of the interests of all parties, that all feel is sustainable, and will preclude all from considering military solutions to the matters in discussion, will ensure peace.  This is the concept that should drive forward the Geneva process among all parties.