Infrequently Raised Issues Concerning Taiwan Likely Influencing Decisions of Communist Party of China Leaders and PLA Commanders

Map of Taiwan (above). Note on the map that part of Taiwanese population lives on islands in the Taiwan Strait and the East China Sea, perilously close to the shore of Mainland China. Despite being a tacit ally, and over the years occasionally directly declared one by some hardline US politicans, Taiwan is understood internationally to be part of China, and Beijing refers to it as a province. China says it has held claim over the island since 239 AD. There could be no greater insult to Beijing than to hear Washington come close in words to declaring Taiwan to be an ally and within its sphere of influence and that maintaining its independence falls within US interests. It is uncertain how much longer People’s Republic of China President Xi Jinping and other Communist Party of China leaders will be able to stomach what they likely perceive as the shameful global image of their new China, after literally centuries of subservience to Western powers, still unable to claim its own sovereign territory from them. Examined here is how this sentiment and others infrequently broached likely influence Party and People’s Liberation Army decisionmaking on Taiwan.

It is uncertain whether the US and its allies through their words and actions have successfully mitigated the People’s Republic of China’s plans to take control of Taiwan or Beijing is simply approaching the task very methodically, on its own schedule, leaving no appearance of feeling rushed to act militarily. What is clear however, under both circumstances, it is clear that perceptions in Beijing on either will ultimately determine how China will act. What those perceptions may prove to be is of concern among the US public. An April 3, 2021 Pew research study found that 89 percent of adults in the US “consider China a competitor or enemy rather than a partner.” The percentage of those who harbored “cold” feelings toward China increased from 46 percent in 2018 to 67 percent in 2021. During the same interval, poll participants in the US who held “very cold” feelings toward China more than doubled, from 23 percent to 47 percent. More than a few foreign and national security policy officials in the US and its allies, likely hope the status quo will hold fast. Imaginably, enough simple facts could be aggregated that might go some way to explain and support that position, which might be reasonably recognized as charitable. A temper of the soul wants to live in illusion. However, it must be accepted that convincing Beijing to surrender what it declares to be its sovereignty over Taiwan, may be akin to convincing a devoted mother to surrender her child. The Communist Party of China may even say its lead by an even deeper sense of a rightful custody. This is a very dangerous business and it appears less than likely that some peaceful resolution will be found to satisfy Beijing regarding Taiwan given how both sides have staked their respective interests. Peior est bello timor ipse belli. (Worse than war is the very fear of war.)

In attempting to inspire thinking beyond the typically raised geostrategic issues concerning US dominance in the Indo-Pacific and China’s challenge to that and the stature it has acquired as it continues to grow as a regional hegemon, and get beyond the geopolitical dynamics of East versus West, Chinese Communism versus capitalism, the eventual victory of the Communist Revolution worldwide, and so on, one might successfully discover that there are other aspects to consider in looking at key elements that drive the thinking of the Communist Party of China on Taiwan. Further thinking on matters is always possible.

The intent of greatcharlie with this essay is to offer a few new ideas that may stimulate others to peer more deeply into Beijing’s ongoing actions and intentions. Most were inspired following it’s reread of Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), on which greatcharlie posted a book review on November 30, 2021. It is unlikely that all readers will find what greatcharlie presents as agreeable, this is most likely possible in the portions of the discussion that concerns how China may approach Taiwan militarily and the discussion on the possible influence of race and history upon thinking on the US by Communist Party of China leaders. However, sometimes making the effort to stimulate new ideas requires stepping a bit onto what might be deemed shaky ground. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above). There could be no greater standing insult to a more audacious and assertive China than to stand by while Washington declares Taiwan, China’s own province, to be an ally and within its sphere of influence and that maintaining its independence is in US interests. According to the facts as one knows them, the US and China since 1971 have had an implicit understanding that Washington would not recognize Taiwan as a sovereign country, and China would take control of Taiwan by force. As the US since then has done as much as possible, short of recognition of Taiwan as an independent country, to provide support for the government in Taipei, one might reasonably sense that in the eyes of the Communist Party of China, the US, through its policy approaches toward the island, exercises its power over China. There is an art in the way Xi moves. If there is a way he can take control of Taiwan with acceptable loss by his calculus, he will very likely act.

Immediate Thoughts on US Regarding Taiwan That Likely Beat the Brains of Leaders in Beijing

Assessing the aggregate of sentiment expressed by the leadership of the Communist Party of China, one might posit that they believe their country’s stand, one-on-one with the US, which at one time for most of them appeared to be an indomitable power, is nothing less than heroic. At the same time, however, there is very likely some quiet recognition that Taiwan is a manifestation, a very apparent sign, of US dominance in the Asia-Pacific region. Despite being an tacit ally of the US, Taiwan is understood internationally to be part of China, and Beijing refers to it as a province. China says it has held claim over the island since 239 AD. There could be no greater insult to a more audacious and assertive China than to stand by while Washington comes close in words to declaring Taiwan to be an ally and within its sphere of influence and that maintaining its independence falls within US interests. The US approach on Taiwan has been conspicuously at variance to that taken toward China for decades on the economic front.

According to the facts as one knows them, the US and China have had an implicit understanding that Washington would not recognize Taiwan as a sovereign country, and China would take control of Taiwan by force. It is an agreement that resulted from US Secretary of State Henry Kissinger’s secret visit to Beijing in 1971. As the authorized version of the story goes, during talks with the People’s Republic of China First Premier Zhou Enlai, Kissinger agreed the US would “recognize the government in Beijing, not Taipei, as the only legitimate China.” During a November 15, 2021 virtual meeting between US President Joe Biden and Communist Party of China under People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, the issues of Taiwan’s status and security were broached. Reportedly, Biden underscored that the US was still committed to the “one China” policy, guided by the Taiwan Relations Act, the three Joint Communiques, and the Six Assurances. However, he also explained that the US was strongly opposed to any unilateral efforts to change the status quo or undermine peace and stability across the Taiwan Strait.

Given that the US for quite some time has been doing as much as possible, short of recognizing Taiwan as an independent country, to provide support for the government in Taipei, one might reasonably sense that in the eyes of the Communist Party of China, the US, through its policy approaches toward the island, exercises power over China. There may also be a belief within the Party that the US enjoys exercising that power. It is uncertain how much longer Xi and other Communist Party of China leaders will be able to stomach what they may likely perceive as the shameful image presented throughout the world of their new China, a supposed power, after literally centuries of subservience to Western powers, still unable to claim what is, by its own declarations, its own sovereign territory. All of China’s taunts of becoming the dominant power in the world appear to amount to nothing more than whistling in the wind. Certainly, regarding Taiwan, China does not display itself as the rising world power that it pretends to be. 

Surely, some foreign capitals have begun to believe Its military power and capabilities have been subject to hyperbole. Indeed, many in the world, watching it all transpire might be left with the impression that there is not a thing China can do about except lie back and take it, as unpleasurable as it may feel. An October 12, 2021 Newsweek article indicated that such feelings about the unlikelihood of China doing anything about Taiwan were recorded in a poll on the island. According to a public opinion survey released on September 29, 2021 by Taiwan’s opposition-run think tank, Intelligentsia Taipei, it was revealed that despite the apparent gathering shadows, 50.2 percent of respondents were little concerned about the prospect of war with China compared to 42.5 percent who were. Moreover, 58.8 percent believed a war with China was unlikely to happen in the next 10 years, compared to 17.6 percent who thought it was probable. A slender 2.2 percent were certain war was coming within this decade.

“Peace in Our Time”

Admirably discussed in Spalding’s Stealth War, are the matters of past US administrations’ blindness towards China’s actions and intentions and the importance of how Beijing assesses how Washington would respond to a move to retake Taiwan. In his search for a reason, a rationale, a purpose, for the current state of relations with China, Spalding, led by the data available to him explains it was the “errant” policy positions of former US administrations. At the core of those policies pursued, according to Spalding, was the misguided belief that economic development would lead the way to China’s transformation to a more democratic form of government and away from Communism. As he explains it, one is left to contemplate how such a horrifying blunder could continue on for so long. Attractive lies can worm their way into the intellect.

Regarding Beijing’s assessments on Washington’s most likely response to its taking control of Taiwan, pertinent is Spalding’s focus on how preceding US administrations perceived, constructed policies, and acted on China. It would appear that in current times, the way in which the US and its allies will respond to a move against Taiwan is how it will perceive China’s action toward its overall interests in the region. Despite what most might imagine, war may not be the obvious choice. Parsing out such concerning the US must be an ongoing process, an obsession, in Beijing at the moment. It would be part of the effort to determine how the US might react when presented with a situation as an assault on Taiwan.

Quod bellum oderunt, pro pace cum fide laborabant. (Because they hated war, they were working for peace with fidelity.) Presently from Washington’s perspective, the door must be left open to type of contrition in diplomacy. Within time perceived to be available as conflict appears to draw, there must exist an opportunity to amend a position. Hypothetically, there may be an epiphany within logic and reason that leads one side to align itself with a view closely matching the other. The expectation is for senior policymakers to master the situation through their management of it. When this is the case, they can often be more precise, to an extent exact, in policy planning, formulation, and implementation. On the other hand, policymakers can sometimes be out of touch with the real situation and act on mere perceptions and perhaps faulty inferences. Errant consilia nostra, quia non habent quo derigantur; ignoranti quem portum petat nullus suus ventus est. (Our plans miscarry because they have no aim. When a man does not know what harbor he is making for, no wind is the right wind.)

There remains the real possibility that a train of atrocious, unimaginable, grave events may come to such a head that it might be impossible to wait even an hour before taking the correct action. Fighting the type of war that the US might be required to prosecute, defeat China, thwart China’s ambitions, drive it off and forever away from Taiwan might not be characteristic of certain leaders. In taking that course, there would be the potential for millions to die in China, unacceptable losses on the side of the US and its allies. Additionally, as grotesque as the thought may be, China could potentially level an unexpected, crippling blow to US naval and air forces could also result. Indeed, what might be hoped in Beijing to be a limited lighting war attack launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. (Note that there is no intention by greatcharlie to put into question the personal qualities of the men and women who have honorably chosen to dutifully serve the people to the best of their abilities.) As noted in greatcharlie’s November 30, 2021 review of Stealth War, perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. If no such protocols exist, in the end, it will boil down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction. 

During the Cold War, US assessments of a possible conflict initiated by the Soviet Union and its Warsaw Pact satellites was a surprise attack across the Iron Curtain initiated with conventional weapons. As discussed in greatcharlie’s March 16, 2014 post entitled, “Obama Urges Putin to Pursue Diplomacy; After Crimea Is Firmly Under Russian Control, Perhaps He Will”, Bernard Brodie explained in his renowned work on military affairs and statecraft, War and Politics (Macmillan, 1973): “The attack might be general along the line, intended to wipe out NATO and take over Western Europe to the Pyrenees.” However, Brodie also suggested that “there might be some variation in diminished form, like what became known as the ‘Hamburg grab.’  In the latter instance, the Soviet forces would slice around the important city of Hamburg and then leave it up to us to try to take it back—which without large conventional forces we obviously could not do unless we were prepared for a nuclear holocaust.” In contemporary times, the question of how the US and its NATO allies might respond when Russian Federation forces marched in Crimea which was the sovereign territory of a NATO partner–not a Member State–in 2014. The manner in which the US responded on the Crimean matter could possibly have enormous implications concerning Beijing’s thinking on Taiwan.

Lex talionis. (The law of retaliation.) As far as one knows, central to arguments made in Beijing to take military action to gain and retain control of Taiwan, may very well be what was central to the argument on taking all available steps to subtly exploit the US investment in China’s possible development into a more democratic society; the character of the US political leadership. Indeed, as consideration of the character of US political leaders did much to place the US in the current challenging position with Beijing, it may influence a decision by Beijing to go to war. To that extent, the nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference.

People’s Liberation Army Ground Force General Li Zuocheng, Chief of the Joint Staff Department of the Central Military Commission (above). As far as one knows, central to arguments made in Beijing to take military action to gain and retain control of Taiwan, may very well be what was central to the argument on taking all available steps to subtly exploit the US investment in China’s possible development into a more democratic society; the character of the US political leadership. Indeed, as consideration of the character of US political leaders did much to place the US in the current challenging position with Beijing, it may influence a decision by Beijing to go to war. To that extent, the nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference.

Begrudging Acceptance of a New Paradigm?

Tacit and explicit threats of a military response to an assault by China on Taiwan may with difficulty be recognized as a failed effort at deterrence. Domino theories and arguments based on the like predicting China’s systematic conquest of one US ally in the Indo-Pacific region after another may fail to gain traction among the most senior decision makers in Washington. That case would be made that all along it was recognized that Taiwan’s case was quite different from that of sovereign countries in the region. If anything, in the face of Taiwan being grabbed by a People’s Liberation Army (PLA) blitzkrieg, regional allies will need to strengthen their military partnerships and coordination with the US more than ever. In the capitals in which wisdom is exalted, leaders will immediately recognize that reality.

Though very aggressive statements may be made and every coercive tool other than war, particularly economic, would surely be used, military action that may lead to devastating attacks on regional allies, increasing the loss of life, may not be seen as the best way to establish a new dynamic with a relative world power. China in control of Taiwan might be albeit reluctantly accepted as a new paradigm.

Possible War with China over Taiwan

Forecasts of all types have been made on how a conflict between China and US and its allies will ignite. Perchance there may be points in each of some value. Perhaps some are worthy of great consideration. Still, in the end, they may prove to be in the aggregate, a mass of mistaken theories, indicating that there is no certitude or uniform position established on how the PLA will come at Taiwan. For long-time China watchers and the newly interested, the near deluge of newspapers, magazine, and broadcast and online reports up to journal articles and scholarly studies on Taiwan has left available a mass of diverse assessments, making the possibility of twinkling out the most likely scenario from the pack far more difficult. Ficta voluptatis causa sint proxima veris. (Fictions should approximate the truth in order to please.)

Reuters’ Predictions

Warplanners of the armed forces of the US and its allies surely without fail have established in their professional judgment what they believe to be the most viable. There is a fairly popular theory discussed in the US newsmedia that the PLA is waging so-called gray-zone warfare against Taiwan, lending support to the theory that China’s effort to retake the self-governed territory is already underway. Gray-zone warfare reportedly includes: an almost daily campaign of threatening military exercises, aerial and naval patrols, and all manner of surveillance. China has also used sand dredgers to swarm Taiwan’s outlying islands. In response, the US and its allies have accelerated, weapons sales to Taiwan, Taiwanese regular and reserve forces have improved readiness, stockpiled munitions, organize for asymmetric warfare: It disperses and conceals hundreds of lethal, long-range missiles capable of striking at the PLA’s superior force of warships, aircraft and targets inside Chinese have been dispersed. Further reports indicate that military planners in China, the US, Taiwan, Japan and Australia are expectedly gaming out scenarios for how an attack should launch, how the island’s defenders should act, and what the likely outcome will be. As the attacker, experts recognize that China has a range of options. Options suggested include seizing Taiwan’s outlying islands such as Quemoy and Matsu and the remote Pratas Islands, military and economic blockades, or least likely, invasion. 

An intriguing November 5, 2021 Reuters online report entitled, “Reuters Investigates T-Day: The Battle for Taiwan,” examined some of the conflict scenarios. It is based on interviews with close to a dozen military strategists and 15 current and former military officers from Taiwan, the US, Australia and Japan and drawing from articles in US, Chinese, and Taiwanese military and professional journals and official publications.

It is assessed by many of Reuters‘ military experts that top PLA commanders would likely convince Xi that an invasion, even under the most volatile circumstances, would be the biggest and most complex amphibious landing ever attempted, and is beyond the PLA’s capabilities. The alternative they foresee is an effort by China to launch a devastating air and missile attack on the island’s defenses. The military objective would be to destroy Taiwan’s military, demoralize the population and force Taipei to the negotiating table before the US and its allies can intervene.

Four PLA Dong Feng-26 (DF-26) ballistic missiles (above). The DF-46 missile is feet long, 44,000 pounds, and built to carry both conventional and nuclear warheads–was designed to obliterate aircraft carriers. It has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. In order to deploy a carrier’s bombers on a mission in the South China Sea, a US aircraft carrier would have to come within the range of DF-26 and other missiles that would destroy it. The sheer amount of smaller, long-range ballistic missiles at China’s disposal and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to US warships.

What Must Be Remembered from Stealth War

In Stealth War, Spalding tosses into the debate on the defense of Taiwan the reality that China has thousands of precision warheads tied to a sophisticated command and control system. He expounds on this by pointing out that the Dong Feng-26 (DF-26) ballistic missile–46 feet long, 44,000 pounds, and built to carry both conventional and nuclear warheads–was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. He gets across the idea that in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. Though noting that the US Navy has SM-6 interceptor missiles, thought to be capable of destroying the DF-26, Spalding leaves no doubt that the sheer amount of smaller, long-range ballistic missiles at China’s disposal and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to US warships. To that extent, he writes: “It is conceivable that an undetected conflict might end in thirty seconds. Game over.” That is a hard saying.

Gnawing on the subject a little bit more, Spalding explains that when assessed from an economIc standpoint, the PLA constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, in plain English he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, the wrong message may have been repeatedly sent at an exorbitant cost. Again, introspectively, the value of the option for the US and its allies is the opportunity to rehearse cooperation, display joint power, and appreciate benefits of US leadership. Other than that and attendant technical accomplishments, in deterring China the move is valueless. In fact, no matter how necessary some action, some display would be in the face of challenges presented by Beijing to Taiwan, no greater support could be provided to the cluster of expressive hawks within the leadership in the Communist Party of China under Xi, mustering for a national war with the US.

The Digital Battlefield: A Decisive Factor?

Information and the technology used to generate, transmit, process, store, and manipulate it, has well become the primary means of obtaining an offensive or defensive advantage. Perhaps readers can cast their minds back to the era when strategists, tacticians, and military analysts were exploring the many possibilities resulting from its use in warfare. One article that greatcharlie recalls was entitled “Information Warfare: Good News and Bad News,” published in 1997 by then US Army Major Keith D. Anthony in Military Intelligence. In the 25-year-old article–which greatcharlie fortuitously discovered online, posted by the Federation of American Scientists, the author explained that military history is replete with examples of how information has been used in conflicts. He stated, “It has always been sought; sometimes it has even been used effectively, and sometimes it has been vital. The common thread, though, has been that physical engagements were still necessary to impose one’s will upon the enemy. Information warfare changes the rules.”

In the 1997 Military Intelligence article included the discussion of a translated “Military Forum” column by Zhang Feng and Li Bingyan, “Historical Mission of Soldiers Straddling 21st Century Roundup of ‘Forum for Experts on Meeting Challenge of the World Military Revolution’,” in Beijing Jiefangjunm, 2 January 1996. It reveals that over 25 years ago, the two authors recognized that this significant change had occurred in the nature of warfare, even calling it a military revolution. To that extent, one author explained, information technology is the nucleus and foundation of this revolution, for it is information and knowledge that bring change to the old practice that the military strength of an army was measured simply by the number of its armored divisions, air force wings, and aircraft carrier groups. He further stated that today, a number of invisible forces need to be taken into consideration, which include the calculation capacity, the telecommunications volume, and the reliability and real-time reconnaissance ability of relevant systems.

In the aforementioned 1996 conference paper on the burgeoning role of information technology in warfare, the notion of a digital wing of the PLA or intelligence services was nominal, only conceptualized. However, it soon became a reality. As Spalding explains in Chapter 5: “The Digital Battlefield”, in Stealth War, in making it so, it was determined that the PLA, an official security wing of the Communist Party of China, would become more than a national army, in the traditional sense of the term. Spalding goes on to explain that an organization, designated Unit 6139, became the PLA’s massive cyber warfare division. He deems it a politically sanctioned hostile military force built to prey on the West day in and day out. To that end, the PLA engages in digital assaults to access data that are both destructive–entrapping and disrupting the West by setting off digital landmines, raids, and intelligence operations–and constructive. The results of these operations–covertly harvested data–have allowed China to amass influence and power. In a political warfare mode, the goal of such work is to obtain and use influence to force other countries to cede to its way of looking at the world–how to organize society, what rights citizens should have, and encourage economic decisions that will benefit China

Spalding writes that by 2008, several published reports indicated that the Chinese government was paying tens of thousands of citizens 50 Chinese cents–the equivalent of 7 US cents–each to write an independent post promoting Party policy. By 2013, China’s state-run media reported that the propaganda wing of the Communist Party of China had hired 2 million “public opinion analysts.” Spalding assesses that number has climbed since, aided by an estimated 10 million student volunteers, who also engage in monitoring and disinformation work, both at home and on foreign websites. Meanwhile, the PLA’s force of hackers, continued to wander with near impunity, hidden, putting US counterintelligence in their shade, and continues to bombard US companies, government agencies, and political parties today

Perhaps it is bitter thIs, but an assault on Taiwan will be the occasion that among the near countless pieces of secret information, intellectual property, and actual technologies collected by China’s intelligence services, there was everything needed to thwart a successful defense of Taiwan. For the those wretched citizens and legal permanent residents of the US, who were accepted and ascended to positions of importance enough in their government, corporate, high-tech, or academic institutions to be sought out by Chinese intelligence officers and due to venal, self-interest, ideology, conspiracy, or dispaysment and love of homeland, chose to betray their country, as well as their organizations, colleagues and fellow citizens, perhaps there will be satisfaction knowing their villainy led to a prospective tragedy. For those whose responsibility was to halt the capture of key information and technologies that may have led to some tragic outcome and intercept Chinese intelligence officers who encouraged betrayal, there would surely be, among those really interested, a great burden of failure and loss, guilt and regret, to bear which could potentially take a lifetime to heal, if ever

Xi (above) during an inspection of the command center of PLA’s Joint Battle Command. The battle-dress camouflage uniform indicates that he is Commander-in-Chief of the PLA’s supreme Joint Battle Command. Xi is the long-time Chairman of the Central Military Commission. How China manages to pull Taiwan back in its fold permanently may not be as important to Xi as just getting hold of the island. Securing the island quickly with as few losses in personnel and material as possible, may require something a far cry from using the operational art, and acting with combined arms decisively to conquer territory. That may require both the complete destruction of the military capacity of Taiwan, and the complete and total destruction of property and eradication of those living there. A strategy of this type is known in military terms as a “battle of annihilation.” PLA commanders and warplanners would surely be prepared to execute such.

Pertinent Concerning Thinking of Communist Party of China Leadership and PLA Commanders about Taiwan

How China manages “to pull Taiwan back in its fold permanently” may not be as important to Xi as just getting hold of the island, again, as it is what the Communist Party of China “knows” to be China’s sovereign territory. There are military options available for reclaiming Taiwan that take a turn toward the sinister. Securing the island quickly with as few losses in personnel and material as possible, may require something a far cry from using the operational art, and acting with combined arms decisively to conquer territory. Achieving that military objective may require both the complete destruction of the military capacity of Taiwan, and the complete and total destruction of property and eradication of those living there. A strategy of this type is known in military terms as a “battle of annihilation.” PLA commanders and warplanners would surely be prepared to execute such.

Such thinking should not be deemed too fanciful or alien. To keep the discussion of the postulation brief, a model to ponder in order to better understand such an approach could be measured against how China’s military partner, the Democratic People’s Republic of Korea (North Korea), has made the complete destruction of the capital of the Republic of Korea (South Korea), its most likely adversary, central to its defense. Indeed, it is well-accepted that North Korea has had an estimated 200,000 artillery pieces aimed at Seoul for quite some time. Ostensibly, the threat of the destruction of Seoul from the North Korean perspective was established as a deterrent to any thoughts the South Korea’s most powerful ally, the US, might have of invading and reuniting the island by force. Yet, from another perspective, the destruction of Seoul would avoid the need to capture it by ground assault. The decisionmakers and warplanners in Pyongyang have never been under any illusion that the government in Seoul would allow the North’s control of its capital and an urban battle similar to those witnessed during World War II in places such as Stalingrad (1942), Caen (1944), Manila (1945), Berlin (1945), to name only a few would delay offensive action and drain resources for initial attacks on other critical points as well as likely plans for decisive engagements in depth. With this in mind, it may not be as difficult to consider that thinking in Beijing concerning a PLA assault against Taiwan, mutatis mutandis, may be similar in concept to that of Pyongyang for Seoul. The destructive effort, of course, would be on a far larger scale. The defense of Taiwan will be ferocious. Its struggles against China’s opening attacks, however, would appear self-destructive and self-defeating. Ostensibly, the sheer weight and power of the PLA juggernaut as organized would overcome whatever defense Taiwan might have in place. On Taiwan, the scene would be nothing less than apocalyptic.

With regard to a likely decision to attack essentially all structures on Taiwan, it must be considered that the independently minded Taiwanese government falls into one of the categories of what the Communist Party of China declared to be the “five poisons.” Those five include: Uyghur advocates of the East Turkestan Independence Movement; Tibetan advocates of the Tibetan independence movement; believers of the Falun Gong; followers of China’s democracy movement; and, adherents of the Taiwan independence Movement. Looking at the matter from that angle, one might imagine leaders of the Communist Party of China long ago recognized that even if China captured the island and gained control of what remained of its civilian population, surely the work of re-education could far surpass the level of exertion put into the Uyghurs, Tibetans, and people of Hong Kong combined. Re-education indeed may have been assessed to be so difficult that it may not at all be a part of reconstruction and rejuvenation planning for the island. The sinister solution would be to mitigate the problem during the military assault. Those Taiwanese who might remain, the survivors, would most likely be relocated, probably dispersed. Far worse acts against the people–for instance the Great Leap Forward and the Cultural Revolution–blaze on the pages of Communist China’s history. The Communist Party of China’s leaders would likely be concerned that spectacle of re-education camps on the island, following a destructive assault, would hinder any post-assault diplomatic efforts to create normalcy and do much to put China’s claim to a world in jeopardy, especially given the world’s reaction to camps in Xinjiang.. Imaginably, Xi would want to avoid that after the military assault

Among those in the world rightly concerned with the circumstances of ethnic and religious minorities in China, the moral fiber of Xi has certainly been looked upon darkly by. As aforementioned, the Uyghurs, Tibetans, as well as Falun Gong and Christians are roughly handled, pressured to uncouple from their culture and traditions, philosophies, and religious tenants and assimilate into culture and beliefs of Chinese Communism. If Xi can be viewed as contorted morally on those issues and just for being able to direct state security organs to act monstrously against his own citizens on mainland China in the name of preserving the integrity of the Communist Movement and the country, and putting counterrevolutionaries and reactionaries, and organized and individual criminals, there should little doubt that Xi would do whatever he thought was necessary to gain and retain control of Taiwan.

Ethnic Uyghurs standing in formation in a secured facility (above). China’s Xinjiang region is home to around 10 million Uyghurs, Turkic Muslim people by identity. In a report released on April 19, 2021, Human Rights Watch accused the Chinese government of engaging in a systematic campaign of human rights violations against Uighur Muslims in northwestern Xinjiang, an autonomous region in the country. Up to 1 million people, or about 7 percent of the Muslim population in Xinjiang, have been incarcerated in an expanding network of “political re-education” camps, according to US officials and UN experts. One might imagine leaders of the Communist Party of China long ago recognized that even if China captured Taiwan and gained control of what remained of its civilian population, surely the work of re-education could far surpass the level of exertion put into the Uyghurs, Tibetans, and people of Hong Kong combined. Re-education indeed may have been assessed to be so difficult that it may not at all be a part of reconstruction and rejuvenation planning for the island when captured. The sinister solution would be to mitigate the problem during the military assault. Far worse acts against the people–for instance the Great Leap Forward and the Cultural Revolution–blaze on the pages of Communist China’s history.

Taiwan Pummeled?

The prospective unending aerial and naval bombardments and a long range missile onslaught from mainland China would not resemble what may already be expected and planned for. As aforementioned, there is the belief that attacks with firepower will be used not only to weaken Taiwanese forces, but destroy morale on the island and force the Taipei government to the negotiating table. However, that would take a considerable amount of time to achieve. There is a line of thinking characteristic of analyses of what is likely to happen in the event of a Chinese assault on Taiwan that leaves time available for friendly action. Sentiment should never serve as a substitute for true feeling and fact. One could be assured that the lapse of time between a prospective Chinese assault on Taiwan and the movements of the US and its allies in response has been factored into any strategy developed by PLA commanders and warplanners. Within that interval, whatever calculation of that time and distance has been predicted by PLA warplanners for the movements of their opposition, would likely be the time frame set for successful action. It would be that anticipated time frame the Communist Party of China will expect Taiwan to fall into its hands.

The bombardment of Taiwan hypothesized here would be of a size that would exponentially surpass even those witnessed during the earliest days of Operation Enduring Freedom in Afghanistan in 2001. More structures would likely be destroyed on Taiwan in the initial hours of the attack than had been built in its first 50 years. The number of lives lost on the island after a pummeling as foreseen might possibly be qualified as Biblical. 

The situation that Taiwanese military and security forces face brings to mind the French song and military march, “Le Régiment de Sambre et Meuse” by Robert Planquette and Paul Cezano. The lyrics concern a regiment that battled the Austrians in 1794 to defend the emerging French Republic. The march was composed in 1870 in an effort to raise patriotic feelings within the French public following their country’s defeat during the Franco-Prussian War. “Sambre et Meuse” is the name of a former French province that is now part of Belgium. In the fourth verse, the lyrics state: “Le nombre eut raison du courage / Un soldat restait – le dernier! / Il se défendit avec rage / Mais bientôt fut fait prisonnier. / En voyant ce héros farouche / L’ennemi pleura sur son sort / Le héros prit une cartouche / Jura, puis se donna la mort.” (Numbers prevailed over bravery. / A soldier was left standing. The last one! / He defended himself furiously, / but soon was taken prisoner. / Seeing this fierce hero, / the enemy took pity of his fate. / The hero loaded a cartridge, / cursed, then took his own life.) There is ample reason to believe China would do its worst in an effort to take control of Taiwan. If it takes untrimmed, the drastic, destructive course described here, it is likely that much as the “Régiment de Sambre et Meuse,” Taiwan as it exists today, after its capture by China, would attain immortality in memory, and perhaps also go on living only in verse. C’est une situation extrêmement désagréable.

Taiwanese soldiers in training (above). The bombardment of Taiwan hypothesized here would be of a size that would exponentially surpass even those witnessed during the earliest days of Operation Enduring Freedom in Afghanistan in 2001. More structures would likely be destroyed on Taiwan in the initial hours of the attack than had been built in its first 50 years. The number of lives lost on the island after it was pummeled might possibly be qualified as Biblical. Both pleas and demands for China to halt its action as well as fierce protests and condemnation from capitals world-wide and international and regional bodies would surely be expected and most likely be disregarded. Beijing doubtlessly would have some plan formulated well in advance to deal with such matters after Taiwan was firmly in China’s hands.

Assessing Beijing’s Likely Thinking Correctly

In greatcharlie’s February 26, 2021 post entitled, “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts,” included was an excerpt from an intriguing story by Clarice Lispector published in the Winter 2011 edition of the Paris Review, entitled, “A Story of Great Love.” Lispector writes a sentence that is conceptually germane as well to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.” The leaders of the Communist Party of China and PLA Joint Military Staff are certainly not hens. Still, the notion that deeper look into their respective thinking to include emotional concerns and reactions is surely valid, even if it requires giving room to intimations and “informed speculation” in the abstract. Here are a few thoughts on other ways in which Beijing may view the Taiwan matter through its lens.

Political and Economic Competition

Most often in US newsmedia commentary on China’s arguments on the difference between the US and itself, centrality is given to the difference in political systems. In a November 8, 2021 article in the Economist, it was explained that if all goes to plan for the Communist Party of China in 2022, political events in the US will ostensibly offer a study in contrasts that humiliates the US. The article suggests that China’s leaders, reading opinion polls, expect the Democratic Party to suffer a considerable set-back in the mid-term Congressional elections in November. Beijing hopes a divided government with all of its uncertainties, including gridlock, would be the possible result. If all of this transpired, supposedly China’s propaganda machine would be presented with a new chance to declare that “China enjoys order and prosperity thanks to one-party rule,” while US-style democracy “brings only chaos, dysfunction and decline.” Interestingly, if such is indeed their strategy, then the Communist Party of China’s propaganda wizards will likely find themselves moving down a blind alley. The outcome of this premeditated ideological collision would be nothing to signify.

If economics were the determining factor of a choice by the Communist Party of China to move on Taiwan, on its face there would be little chance of military action. Capitals world-wide and international and regional bodies would react harshly and the impact on China’s economy would be catastrophic. Recognizing that and hope Beijing could be brought back to reality, on the onset of an assault, both fiery demands for China to halt its action, some even accompanied by threats of military action. However, such would surely be expected and most likely be disregarded. Beijing doubtlessly would have formed a picture of what that period would look like and some plan formulated well in advance to deal with such matters after Taiwan was in China’s control. 

The Communist Party of China may calculate that China through its products and the production of those for others is sewn into the lives of nearly everyone in the world. Although foreign capitals, particularly those of highly industrialized countries, would strenuously condemn and do the maximum to isolate China, ensure its status as a pariah, they would not really want to do so. While they would take every measure possible to inflict pain and bring China to its knees, they would very unlikely cut themselves off from it for the long-term. Beijing would likely assess that political leaders in capitals world over would need to calculate what cutting their countries off from China would mean for their own economies, businesses, and institutions, as well as their own citizens’ pocketbooks. An improvement in relations sooner than later would be expected. Finely detailed plans for rejuvenating China’s economy have likely been formed and continuously updated and upgraded in case events move in the direction of war. However, until a positive change in relations got underway, the people of China would need to make do, but do so knowing that the Taiwan province was firmly in their hands.

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi (center), and People’s Republic of China Foreign Minister Wang Yi (left), in Anchorage, Alaska in March 2021. Communist Party of China leaders–though not being absolutely certain, greatcharlie will nevertheless go out on a slender thread here to ascribe the trait to Xi himself–appear to hold considerable animus toward the US. Of course, there have been waves of what has been dubbed anti-foreigner sentiment propagated by Communist Party of China leaders before. The primary case was China under Mao in the 1950s and 1960s. However, the issue of race as posited here is something different as the sentiment is not some political tool or mechanism for social control. It goes to self-esteem. self-worth, self-image. Indeed, an inner awareness, sentiment intérieur, of the racial dimension of China’s history with the US may attend Communist Party of China thoughts, beliefs, sensations, and passions, albeit very negative, toward it. To that extent, the impact on individual leaders, their attitudes and policies could possibly be strong.

Race and History

What is rarely broached is the Communist Party of China leadership’s thinking on the somewhat inviolable issue of race and history. Indeed, though seldom in the forefront of discussion and analyses, it may have a greater importance in thinking on China’s side than one might imagine. To that extent, it might influence decisionmaking on Taiwan as it concerns the US response. Further, it may influence the Party’s perceptions and actions in the face of rebuke and “punitive actions” from the US in the aftermath of Taiwan’s capture.

Communist Party of China leaders–though not being absolutely certain, greatcharlie will nevertheless go out on a slender thread here to ascribe the trait to Xi himself–appear to hold considerable animus toward the US. Of course, there have been waves of what has been dubbed anti-foreigner sentiment propagated by Communist Party of China leaders before. The primary case was China under Mao in the 1950s and 1960s. Things foreign were purged. The foreigner was the enemy. However, the issue of race as posited here is something different as the sentiment is not some political tool or mechanism for social control. It goes to self-esteem. self-worth, self-image. Indeed, an inner awareness, sentiment intérieur, of the racial dimension of China’s history with the US may attend Communist Party of China thoughts, beliefs, sensations, and passions, albeit very negative, toward it. To that extent, the impact on individual leaders could possibly be strong.

Perchance, on some far deeper level, the leadership of the Party may want to leave no doubt that the men calling shots today in China are not little coolies who came to the old West to labor on the railroads sporting shaved heads and queues–ponytail first worn by the Jurchen and Manchu peoples of Manchuria, and later was required to be worn by male subjects of Qing Chinai–an indication of submission, who unfortunately suffered incalculable indignities at the hands of their exploiting hosts.

Party leaders likely want to leave no doubt that China’s military is not the same lesser-skilled and equipped, albeit courageous force, that suffered atrocious losses nearly a century later during the Korean War. China, then under Mao Zedong chose to go into North Korea to support the Communist Movement led by Kim Il-sung, providing far more than their partners in the Soviet Union. Apocalyptic size casualty lists resulted from frontal assaults, human wave attacks, on hilltops dubbed by US forces with names such as the Ice Cream Cone, Punchbowl, Heartbreak Ridge, Hill Triangle, Hill Eerie, Jane Russell, Old Baldy, T-Bone, and Pork Chop. Although these battles are long forgotten to the great majority in the US, are doubtlessly firm in the minds of Communist Party of China leaders and one might imagine stories of relatives lost are likely still told within a sizable number of families in China, too!

Party leaders likely want to leave no doubt that they are aware of, what they may believe are, prevailing images and impressions of the Asian male, particularly the Chinese male, are in the West. Statistics may show that some change has occurred and more positive, politically acceptable images of Asians in the US and the West in general are now the norm. According to a new Pew Research Center survey produced in this era of COVID-19, the vast majority of Asian adults (81%) also say violence against them is increasing, far surpassing the share of all US adults (56%) who say the same. To go further, it appears to be the case empirically that negative impressions of the Asian male, and most relevant here, the Chinese male, have seemed to stick. Suffice it to say they are still often portrayed appallingly in Western entertainment media as amusing little men, most often comedic, socially inept, even pathetic, stubborn and suspicious, brash and insufferable, and exuding scattered energy.

An awareness of Western impressions of the Asian male as noted here appears to factor into thinking, planning, and action at many levels in international affairs. As reported in greatcharlie’s May 24, 2021 post entitled, “Food for Thought for US Companies Maintaining Robust Operations in China despite Beijing’s Strained Relations with Washington”, during a bilateral meeting in Anchorage, Alaska in March 2021 between a US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan, and a People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi, there was a heated diplomatic exchange. As the story goes, Blinken started the meeting off by telling the delegation from China that the US intended to address “deep concerns” over the treatment of the Chinese citizens in Xinjiang and Hong Kong and the situation with Taiwan. However, Yang responded boldly, taking a bit of time to express sharp criticism of the US over what he described as its struggling democracy, poor treatment of minorities, and over its foreign and trade policies. Yang, as well as Wang when he spoke immediately after him, comported themselves with a certain astringency. Their words were unkind and ungenerous, ostensibly designed to embarrass the new administration in Washington.

A large part of communication comes down to tonality, how one sounds. The choice by Chinese officials to respond angrily was at the time explained by and large in the US newsmedia and foreign policy circles mainly to be a matter of expediency. Perhaps instead, the words of the Chinese officials reflect more what greatcharlie has previously described as the Communist Party of China’s unsheathed antipathy toward the US. One might not be going too far to state the words spoken by Yang, a senior member of the Communist Party of China. smacked of something more personal.

Sensibilities on race and history may also account in part for the popularity and acceptance of the Communist Party of China and the population in general of the recent compensating and repairing image of “Wolf Warrior” in the Chinese film industry. Released in 2015, “Wolf Warrior” presents the adventures of Leng Feng, a PLA special operations sniper who is as tough as nails, smart, and near invincible. He is also popular with females, including his special operations commander, the beautiful Long Xiaoyun. Its sequel, “Wolf Warrior 2,” released in 2017, was the highest grossing film of all time in China.

Stirring poster for the film “Wolf Warrior” (above). Sensibilities on race and history may also account in part for the popularity and acceptance of the Communist Party of China and the population in general of the recent compensating and repairing image of “Wolf Warrior” in the Chinese film industry. Released in 2015, “Wolf Warrior” presents the adventures of Leng Feng, a PLA special operations sniper who is as tough as nails, smart, and near invincible. He is also popular with females, including his special operations commander, the beautiful Long Xiaoyun. Its sequel, “Wolf Warrior 2,” released in 2017, was the highest grossing film of all time in China.

Perhaps the mere thought of these indignities, as well as others, super charges the desire among leaders of the Communist Party of China, at the far end of the spectrum of possibilities, to obliterate both the memory and the progenitors of the offenders, generally. As such, it might also be an attendant element of Xi thinking, it may not be too fanciful to believe that he would enthusiastically take on the West via an assault on Taiwan to do his part to forever wipe away the image of the little people of China who are available to be bullied and a country, despite its achievements is merely tolerated as a player on the international stage, and spoken of in foreign capitals as an annoyance or nuisance as much as anything else. Lessons of China’s Communist Movement perhaps suggest to him that the habit of a lifetime for many in the world of viewing the Chinese people in such a condescending way cannot be altered by anything except an appropriate display of force. Etiam sapientibus cupido gloriae novissima exuitur. (The desire for glory is the last infirmity to be cast off even by the wise.)

While one could imagine that thoughts of issues concerning race and history might often inflame even Xi’s sense with ardor to lash out with China’s newly minted military might. Yet, to the knowledge of greatcharlie, Xi is not at all known for being hotheaded or indiscreet when discussing national security issues or  foreign relations, at least not publicly. Surely, if such moments of madding fever have at all occurred, doubtlessly sangfroid and equanimity have prevailed over them. Any strong feelings are harnessed and redirected in calibrated ways in actions against the interests of what might be deemed in Beijing as the main opponent. From what has been presented publicly, it seems that national leaders who have talked with Xi have not encountered or have failed to discern any thinking or attitude of this kind. If he has been able to hold such within, perhaps it could be said that Xi, a complex man, perhaps has mastered the art of being all things to all people, but never at last to be a particular thing to anyone. What is also known publicly is that national leaders leave talks with Xi feeling they understand him and have handle on matters concerning China. Alas, they very seldom do. 

While the issue of race and history may be looked upon as a supposable issue and among those belonging to the far side of analyses on Communist Party of China thinking concerning a possible military assault on Taiwan or worse viewed to be of no-account. Some internationally may perceive this discussion as a projection of the dysfunction on race and ethnicity that has long-plagued the US. Nevertheless, race and history may indeed be a very impactful factor if the US hopes to negotiate an agreement with China that will help sustain the relative peace, slow the marshaling of forces and other requisite preparations on the mainland for an assault on Taiwan. The influence of thoughts about race and history, as partially outlined here, is surely within the bounds of possibility. Issues of race would not be some element alien to the consciousness and the decisionmaking of the leaders of the Communist Party of China. If one were only remotely aware of how the Communist Party of China has responded to the Tibetan, Uyghur, and other Muslims, as well as people of Christian faith and others, issues aforementioned in this essay, the claim could hardly be made that race would unlikely be an issue of concern to the Party’s leadership.

A fuller discussion or argument on these points will certainly not be presented here. Imaginably, there may be the urge among some reading what little has been discussed here to dismiss the matter as a possible peripheral issue, however, for all one knows the matter may very well factor into the thinking of the Communist Party of China leaders specifically on the Taiwan issue. That makes it worthy of consideration. All doors inside the thinking within the Communist Party of China leadership must be opened and the interiors that they open to must be fully examined.

A rare public expression of disapproval in Xi’s countenance (above). While one could imagine that thoughts of issues concerning race and history might often inflame even Xi’s sense with ardor to lash out with China’s newly minted military might. Yet, to the knowledge of greatcharlie, Xi is not at all known for being hotheaded or indiscreet when discussing national security issues or  foreign relations, at least not publicly. Surely, if such moments of madding fever have at all occurred, doubtlessly sangfroid and equanimity have prevailed during them. Any strong feelings are harnessed and redirected in calibrated ways in actions against the interests of what might be deemed in Beijing as the main opponent.

The Way Forward

Est tempus quando nihil, est tempus quando aliquid, nullum tamen est tempus in quo dicenda sunt omnia. (There is a time when nothing may be said, a time when something may be said, but no time when all things may be said.) While recognizing in current analyses that major challenges exist, it may be worth giving consideration to the idea that too much of what is intrinsic to the thinking of US policymakers and warplanners–at least on the surface for that cadre–is being projected on Xi, the Communist Party of China leadership, and the Chinese military command and warplanners. Perchance in Beijing, they would gladly accept that outcome as there would be nothing better than to have decision makers of their main opponent blind as beetles. They would relish discovering that those decision makers have been clouding and obscuring their own thinking and negating what may be a deeper awareness when the pieces of what is known are out together in the subconscious, absent thoughts of political leaders’ expectations. Of course, they indubitably hold themselves to the duty of speaking truth to power as Spalding has in Stealth War and throughout his military career, but they may be ignoring and obviating what may twinkle in their intuition and intimations, and as a result, some analyses perhaps are being driven in the wrong direction. There may be the chance that greatcharlie is ruminating on something here that some US warplanners may feel unable to say themselves under current circumstances. The odds are not enormously against this theory being a reality. Yet, entertaining a discussion of these issues would doubtlessly disrupt routine examinations and responses. That is a hard saying. Hopefully, there is currently no place for intransigence. Certainly, discernment is always required, but with regard to China, no precaution should be neglected.

In previous posts on Chinese intelligence operations in the US, greatcharlie has suggested that if firm understandings of how the Chinese operate in the US and lessons learned regularly are aggregated with thinking from outside he national security bureaucracies, new lines of sight may be opened into difficult problems by which old hands in the US counterintelligence services would surely find advantage by including in their analyses. Ostensibly, the thinking of those fromm the outside would not be biased by any existing theories and prescriptions. Perhaps a similar recommendation could be made on the matter of how China may move against Taiwan. Based on how things appear and continued lack of real success, it would seem greatcharlie’s cautious appeals for US counterintelligence services to seek assistance from certain recherché thinking individuals from outside the national security bureaucracies, who could possibly help to resolve the conundrum of the Chinese espionage storm, amounted to watering dead plants. One might reasonably get the impression the matter is just not a real emergency, not that important. Alas, with that track record as a measure, it seems unlikely there would be a belief that any step in the direction of seeking assistance from external sources on the Taiwan matter would accomplish anything greater. Somehow, left to their own devices, they may move from where they are to where they ought to be. Fata volentem ducunt, nolentem trahunt. (Fate leads the willing, and drags the unwilling.)

China’s Operation Fox Hunt: Facts and Theories on How Missions Succeed and Flaws and Delinquencies Ripe for Exploitation (Part 1)

An Air China jet (above) soars upward after take-off on its flight home. On a number of similar flights from the US, a considerable number of For nearly a decade, undercover Chinese identification and repatriation teams, as greatcharlie has dubbed them, at the direct request and under the authority of the Chinese government, have entered the US under false pretenses, enlisted US-based accomplices, stalked hundreds of people, including US citizens and permanent residents, and coerced and cajoled them to return to China to face charges for economic crimes they allegedly committed. This effort is called Operation Fox Hunt. It went on near unhindered by US authorities until a bungled mission to capture a target in New Jersey led to arrests and allowed for the first prosecution involving Operation Fox Hunt in the US. Through an examination of flaws in the development, planning, and execution of that New Jersey mission based on available facts, greatcharlie provides some insights on additional ways to defeat ongoing and future missions by Chinese identification and repatriation teams.

On the intelligence front, the crisis of Chinese espionage in the US and the rest of the West has all of the hallmarks of a sort of ordeal. Chinese intelligence services have unfortunately managed to do their job successfully, collecting mountains of secret and information from the government bureaucracies and research and development sites, private businesses, high-tech firms particularly, academia, and think tanks. It would seem safe to say that Chinese espionage operations are ubiquitous. It is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. The primary conductors of China’s successful espionage operations orchestrated in the US, and globally are the Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, China’s preeminent civilian intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad, and the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology. 

But alas, there are other efforts at penetration and clandestine action undertaken by Chinese operatives in the US as well as other countries that are as insidious and perhaps worse. For nearly a decade, Chinese identification and repatriation teams, as greatcharlie has dubbed them, have absconded not with precious, secret information or property, but rather with people. (Identifying targets was actually one of the most challenging aspects of the teams’ activities. Without the ability to investigate and identify targets, any repatriation effort would be hopeless. In a worst case scenario, the wrong individual might embarrassingly be brought back to China.) Targets have not only been non-residents, but residents and naturalized US citizens. Indeed, incontrovertible proof exists that shows undercover identification and repatriation teams at the direct request and under the authority of the Chinese government have entered the US under false pretenses, stalked hundreds of people, including US citizens and permanent residents, and enlisted US-based accomplices–private investigators and self-styled bounty hunters–and relentlessly hound their targets. Ostensibly, the Chinese operatives have sought out fugitives from justice in China as part of an anti-corruption campaign. 

In a number of operations, Chinese identification and repatriation teams were completely successful in capturing their targets and bringing them back to China to face what the Communist Party of China deemed as justice. Yet, that has not always been the case. There is a great difference between grabbing intellectual property, trade secrets, computer files as well as actual technologies and grabbing people. There is a human element which, particularly under conditions that the Chinese government creates for its “volunteers,” leaves a degree of uncertainty and unpredictability that cannot be assessed until one sees actual results. In identification and repatriation operations, that same uncertainty can exist in the way that the targets may behave, too! That was the case with Chinese identification and repatriation operatives acting in New Jersey beginning in 2016. It was a bungled mission that has allowed for the first prosecution involving Operation Fox Hunt in the US. 

From the New Jersey case, a few insights are drawn by greatcharlie on this particular case of Operation Fox Hunt that may provide a better understanding on what Chinese operatives are doing via the operation and how they are doing what they are doing. With the color and life of the investigative reports greatcharlie found most informative aggregated with the facts laid out plainly in the federal court document, a somewhat definitive account of the event can be constructed. By highlighting flaws in the development, planning, and execution based on available facts of that case, greatcharlie seeks to provide insight on additional ways to defeat ongoing and future Chinese identification and repatriation activities under Operation Fox Hunt or under some new operation launched by Beijing. Just knowing what is wrong is not as great as knowing how to fix the problem. This commentary does not look at the situation only in the end to say everyone appears to be doing their best to halt China’s malign activities and all is peaches-and-cream. Comments and suggestions are offered, leaving it up to readers, think tank scholars, academics, policy analysts, and military and diplomatic officials, journalists, and students, but particularly practitioners who may serve in US counterintelligence, to observe, reflect, and act as they may. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. It would be satisfying enough to know that some of what is presented here might resonate with a few of them. By shedding light on some flaws in the development of plans and the organization of operators for action, as well as delinquencies in the execution of the plan, greatcharlie hopes it can offer something of use to the US, its allies, and friends to combat and to defeat similar malign clandestine and covert operations by China worldwide. If the matter of the identification and repatriation and repatriation operations is not put right, surely it will have an unfortunate effect on US national security now and into the future. Nihil tam difficile est ut non possit studio investigari. (Nothing is so difficult that it is not able to be tracked down by study.)

After People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above) assumed power in 2013, he initiated a sweeping anti-corruption campaign. Xi vowed to hunt down powerful “tigers” as well as lowly “flies” in the campaign to eradicate corruption. The slogan of the campaign became “fight tigers, swat flies and hunt foxes.” Xi warned corruption was so bad that it could threaten the Communist Party of China’s grip on power. That campaign has netted thousands of party leaders and rank-and-file government officials domestically. Indeed, Operations Fox Hunt and Operation Sky Net were part of the effort internationally in that regard. In June 2014, authorities established the International Office of Pursuing Fugitives and Recovering Embezzled Assets–staffed with a composite of personnel seconded from eight government agencies. In the first alone, 3,587 fugitives from over 90 countries had been returned to China.

Overview of Operation Fox Hunt and Operation Sky Net

As alleged in a July 22, 2021 criminal complaint filed in the Eastern District of New York, Criminal Division, defendants participated in an international campaign to threaten, harass, surveil and intimidate John Doe #1 and his family, in order to force John Doe #1 and Jane Doe #1 to return to China as part of “Operation Fox Hunt.” It was revealed in the reports of investigative journalists that John Doe #1 and Jane Doe #2 are Xu Jin and his wife, Liu Fang. The defendants allegedly engaged in clandestine, unsanctioned and illegal conduct within the US and facilitated the travel of Chinese government officials to the US in order to further carry out these illegal acts.  Between 2016 and 2019, multiple Chinese officials directed the defendants, and several others, to engage in efforts to coerce the victims to return to China.

The US Department of Justice has identified Operation Fox Hunt as an initiative by the People’s Republic of China’s Ministry of Public Security to locate and repatriate alleged Chinese “fugitives” who had fled to foreign countries that have committed crimes under Chinese law.  The Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS is an internal and political security and domestic intelligence service. Once back in China, those individuals typically face stiff charges. After  People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping  assumed power in 2013, he initiated a sweeping anti-corruption campaign. Xi vowed to hunt down powerful “tigers” as well as lowly “flies” in the campaign to eradicate corruption. The slogan of the campaign became “fight tigers, swat flies and hunt foxes.” Xi warned corruption was so bad that it could threaten the Communist Party of China’s grip on power. According to Human Rights Watch, that campaign has netted thousands of party leaders and rank-and-file government officials domestically. Operations Fox Hunt and Skynet were part of the effort internationally. In June 2014, authorities established the International Office of Pursuing Fugitives and Recovering Embezzled Assets–staffed with a composite of personnel seconded from eight government agencies. Just three years afterward, 3,587 fugitives from over 90 countries had been returned to China. 

Absent an extradition treaty between the US and China, one might look upon the problem as Chinese authorities taking it upon themselves to bring criminals to justice. However, it is of great concern for US officials that Operation Fox Hunt operatives, rather than working in the US with the approval and coordination of the federal government, instead regularly enter the US without notifying any bureaucracy in Washington relevant to their planned actions and engage in violations of US criminal law. To that extent, the activity has been described not only as “an end-run around the Department of State and the Department of Justice,” but “an end-run around US law.” Even more, it is alleged by US national security officials that despite Beijing’s claims to the contrary, identification and repatriation teams are pursuing certain individuals not due to a business dispute in China or violation of Chinese criminal law. Rather, there is a political purpose to the activity. In addition to tracking down those accused of economic crimes, Chinese identification and repatriation teams travel the world in pursuit of those afoul of the Communist Party of China, to include: Tibetans, Uyghurs, Hong Kongers, and followers of the Falun Gong religious movement. To force them into returning, authorities subject their relatives in China to harassment, jail, torture and other mistreatment, sometimes recording hostage-like videos to send to the US. Somewhat less concerning is Operation Sky Net which is a program that runs concurrently alongside Operation Fox Hunt and augment it by cutting-off the financial flows of citizens who have fled overseas and working to recover any proceeds gained through corruption.

Operation Fox Hunt: A MPS Mission

Although the Chinese citizens sought under Operation Fox Hunt are located overseas, identification and repatriation would be a task intrinsic to the mission of MPS. MPS surely has the most complete, up-to-date records on Chinese citizens and tracking down and identifying citizens its officers have honed and polished over decades. For that reason, MPS may very well be pulled into the mix of overseas espionage activities more often than may be presently conceived in the US and among its allies and partners. That same information about Chinese citizens is certainly of great interest to the Communist Party of China and in its hands via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that its present raison d’être and primary responsibility is to help the Party maintain its tight grip on the population.

To cloak their pursuit of individuals in apparent legality, Beijing has had the International Criminal Police Organization (Interpol), an inter-governmental law enforcement organization, to issue “Red Notices,” enumerating hosts of business crimes allegedly committed by their targets. In April 2015, China published a most-wanted list, called “100 Red Notices” that held the names of 100 officials and business executives accused in major corruption cases. According to government statistics, by December 2017, 51 out of “100 Red Notices” had returned to China. Among them, 10 were reportedly repatriated by foreign governments, while 35 returned “voluntarily” after being “persuaded.”

To cloak its pursuit of individuals in apparent legality, Beijing has had the International Criminal Police Organization (Interpol), an inter-governmental law enforcement organization, to issue “Red Notices,” enumerating hosts of business crimes allegedly committed by their targets. In April 2015, China published a most-wanted list, called “100 Red Notices” that held the names of 100 officials and business executives accused in major corruption cases. According to government statistics, by December 2017, 51 out of “100 Red Notices” had returned to China. Among them, 10 were reportedly repatriated by foreign governments, while 35 returned “voluntarily” after being “persuaded.”

Interestingly, Beijing’s acquisition of Red Notices on the innocent is surely a sinister practice. It has been a human rights concern of considerable importance in US-China relations. Reportedly, there are ongoing efforts by the US and other countries to snuff out Beijing’s Red Notice acquisition activity. One might say that any effort to do that would be near akin to shutting off the lights in the library reading room before closing. The list of “100 Red Notices” and every Red Notice acquired since that list  was posted, long ago should have served as figurative beckoning fingers for those seeking to defeat Operation Fox Hunt as to where the identification and repatriation teams would eventually show up. Countless traps and other tricks should have brought the whole cabaret down. With a proper strategy, officers directly from US counterintelligence services and perhaps truly well-equipped and well-experienced state, county, and municipal law enforcement organizations around the US should have used for good, stealthy, professional reconnaissance and surveillance. That reconnaissance and surveillance would have needed to have been performed unobtrusively and for the sake of those under Beijing’s requested Red Notices, unintrusively. Patience would also have been a main ingredient for success. The 17th century French traveller and jeweller, Jean Baptiste Chardin, (1643 – 1713) in “Voyages en Perse et autres lieux de l’Orient” (1711), wrote: “La patience est amère, mais son fruit est doux.” (Patience is bitter, but its fruit is sweet.) Further, to succeed, no assistance from contractors in the activity should have been allowed. Contractors for the most part can only offer what the young people refer to as “gangstalking,” “Keystone Cop” type choreography, and school-boy pranks. In one way or another they would have ruined anything they touched as they typically do.

Federal Court Documents Versus Investigative Reports as Sources

In an interview with George Plimpton in the Fall 1990 edition of the Paris Review, Maya Angelou said: “The facts can obscure the truth, what it really felt like.” Many might imagine the rudiments of tactics, techniques and procedures, and methods of China’s efforts as presented in the federal court document might serve as a source for guidance. They would be mistaken. Reading through the indictment, the facts of the case on first impression may appear laid out in the federal court document in a somewhat Daedalian manner to the nonlegal scholar, the layman. Not even the sequence of events was not made clear. From what is presented in the federal court indictment, one might believe the case leading to the indictment of Operation Fox Hunt operatives was rather featureless. The ways in which Chinese identification and repatriation teams acted as laid out appear almost predictable, given the nature of their mission and their desire to satisfy the authorities who commissioned the enterprise. There is nothing in the document that would strike a reader as something new, intriguing, or recherché. Much of what is within could hardly serve as a foundation upon which US law enforcement and counterintelligence service might be better enabled to construct new approaches to mitigate them. The whole matter actually took on new meaning for greatcharlie after reading a July 22, 2021 ProPublica article which conveyed the facts of the case in an interesting way stirred greatcharlie’s interest and resulted in a decision to dive deeper into the facts of the case.

 In the reports of investigative journalists of ProPublica and other publications, there is general acceptance of the facts as presented in the federal criminal complaint. Yet, even more important, the investigative reports provide color to the story of the identification and repatriation team’s activities. The investigative journalists’ stories offer assessments of principal actors involved, ascribing traits to them, painting pictures of them as well as locations where specific acts occurred, and aiding readers in understanding how it likely felt to be victimized by such an enterprise. Investigative journalists also present moments of life in a way that allows readers to enter an experience. Indeed, there is much to learn from several impressive articles by investigative journalists. By including that information with facts, the story of the episode provides a structure that allows a sufficient parsing of everything involved. 

Xu Jin (above), a legal permanent resident in the US, formerly directed the development commission of Wuhan, China before he left for the US in 2010. In both 2012 and 2014, the Chinese government caused the International Criminal Police Organization (Interpol) to issue “Red Notices” for Xu and Liu. According to those Red Notices, Xu was wanted by the Chinese government for “embezzlement,” abuse of power, [and] acceptance of bribes,” pursuant to Chinese Criminal Law Articles 383, 385, and 397, which carried a maximum possible penalty of life imprisonment. In 2015, the Chinese government put the couple on its list of 100 most wanted fugitives in Operation Fox Hunt. Chinese authorities have said they made three formal requests for US assistance about the couple, providing evidence about alleged money laundering and immigration crimes that could be prosecuted in the US.

Targets of the New Jersey Mission

As reported in the Wall Street Journal, Xu had directed Wuhan’s development commission before he left for the US in 2010 with his wife, Liu, who is a former insurance company executive. Xu and Liu, both 57 at the time of this writing, had obtained US green cards through a program that grants residency to foreigners who invest more than $500,000 in the US. In the interest of full-disclosure, a California consultant who helped them apply for the green cards later pleaded guilty to immigration fraud, and investigators in that case alleged that the wife’s petition for residency contained false information. But they remain legal residents. Using its standard artifice to tie everything up neatly with a legal bow, in and around 2012 and 2014, the Chinese government caused the International Criminal Police Organization (Interpol), an inter-governmental law enforcement organization to issue “Red Notices” for Xu and Liu. According to those Red Notices, Xu was wanted by the Chinese government for “embezzlement” abuse of power [and] acceptance of bribes,” pursuant to Chinese Criminal Law Articles 383, 385, and 397, which carried a maximum possible penalty of life imprisonment. In 2015, the Chinese government put the couple on its list of 100 most wanted fugitives in Operation Fox Hunt. Chinese authorities have said they made three formal requests for US assistance about the wanted couple, providing evidence about alleged money laundering and immigration crimes that could be prosecuted here. A spokesperson for the US Department of Justice declined to comment on that assertion.

In April 2018, the Chinese privately owned company, Xinba Construction Group Company, filed a lawsuit against the couple in New Jersey state court, accusing Xu of holding up projects to extort money from companies, and due to his actions, those companies still owe Xinba more than $10 million for contracts performed. In court filings, the couple denied Xu extorted or looted any company, calling the litigation an artifice designed to coerce the couple “to return to China and, if not, to harass and attempt to bankrupt” them. Their countersuit also alleged an extensive harassment campaign was being waged against them by Chinese operatives. They also claimed those same operatives had kidnapped Xu’s father living in China and that they had posed as special agents of the US Federal Bureau of Investigation (FBI) to stalk an immediate relative of Xu’s living in the US. Although the endangered couple’s attorney had accurately and clearly laid out the Chinese government’s villany, a judge in September 2019, out of ignorance, rejected their claims, saying they failed to provide sufficient evidence that Xinba was working with the Chinese government. A preceding judge overseeing the case, completely failing to understand the absolute gravity of matter with regard to US national security, remarked: “It’s not your ordinary case you see in the Superior Court in Essex County, but we’re open for all business I guess . . . No herniated discs. No slip and fall in this case.”

Perchance, back in Beijing, dismissive responses as such  from jurists of the US court system were predicted. US judges, unsure when they wanted to be sure, would reject what they did not understand or thought unimaginable. Predicting such behavior would presumably be one among a set of assumptions and predictions made in Beijing on the actions and reactions of those elements in the US whose responsibility and capability would be to present obstacles or prevent Operation Fox Hunt from succeeding. Those elements in the US were apparently no more threatening to senior executives, managers, and planners in MPS than the Maginot Line was to the Oberkommando der Wehrmacht in 1940.

Liu Feng (above), is the wife of Xu Jin. A former insurance company executive, she came to the US with Xu in 2010. According to a Red Notice issued by Interpol, Liu is equally sought for arrest as Xu. In April 2018, the Chinese privately owned company, Xinba Construction Group Company, filed a lawsuit against Xu and Liu in New Jersey state court, accusing Xu of holding up projects to extort money from companies, and due to his actions, those companies still owe Xinba more than $10 million for contracts performed. In court filings, the couple denied Xu extorted or looted any company, calling the litigation an artifice designed to coerce the couple “to return to China and, if not, to harass and attempt to bankrupt” them. Their countersuit also alleged an extensive harassment campaign was being waged against them by Chinese operatives. They also claimed those same operatives had kidnapped Xu’s father living in China and had posed as federal agents to stalk an immediate relative of Liu living in the US.

Preparation for the Mission: What Was likely Raised in Feasibility Studies Done in Advance?

One should never expect China to come charging in with reckless abandon. If it had happened in the past, it surely will happen any more. The efforts of those operating in the US on all levels, espionage, identification and repatriation, and perchance, covert operations, will typically be calibrated, with supposedly every precaution taken into consideration. Vouloir c’est pouvoir. Operation Fox Hunt has been marked by concerted, energetic, and endless activity by China. For the most part, Chinese efforts in the US have been quiet, smooth, and quite sophisticated in nature. Albeit moving into the realm of conjecture, one can imagine how a feasibility study for the rendition operation was constructed and the assessments that led to the project being green-lit. 

MPS in coordination with China’s foreign intelligence services likely studied the situation, and recognized just how open the US was for the theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. To date, there is no indication that they have decided to pare down any aspect of their clandestine and covert operations in the US, and evidently they have encountered nothing to even suggest that they should retreat. Ventis secundis, tene/tenete cursum. (The winds being favorable, hold the course.)

Surely, there were several feasibility studies produced on the possibility of successfully conducting identification and repatriation operations with concern at minimum focused on how under current circumstances, with espionage activities drawing so much attention in the US, the situation has not been made less secure for all teams operating there,  and the pitfalls of conducting such identification and repatriation operations with relations between the two countries at a relative low point. Such studies would likely be put before those assigned to manage the identification and repatriation operations in the US ostensibly  along with the volumes of studies done that provided confidence fhst China’s “espionage tsunami” would meet with considerable success.

Imaginably, information gathered for such feasibility studies would be up-to-date, and perhaps would be thorough enough to include manifests of law enforcement officers and counterintelligence officers within the planned area of operation of the identification and repatriation team, with notes on their working hours, usual movements and daily habits. If that might even remotely be the case, it would also mean China has engaged, and is likely continually engaged, in covert surveillance of many law enforcement and counterintelligence officers in the US who they may have discovered were handling Chinese espionage and identification and repatriation cases. They may have discovered that those investigators often display varied levels of diligence, are often inattentive when visiting site, are rarely thorough and at time outrightly remiss when interviewing individuals of interest, display their insecurities in conversation, prone to bullying their own citizens without any apparent cause, and are unprofessional often in dealing with existing contacts. Despite this perception based on analyses in the abstract or empirical evidence, US counterintelligence and law enforcement organizations around the US are not without count, and it would prove to be a mistake to minimize the threat of their presence altogether.

It is possible that feasibility studies such as those suggested had some influence on the decision on the location, the timing of the operations, and which émigré to pursue from a list of those sought. To this extent, Chinese investigators, as those participating in the identification and repatriation scheme, would be armed and enabled with an abundance of information. They enter the US, clearly equipped, able, and expecting to overcome difficulties foreseen and unforeseen from federal, state, or even municipal law enforcement or US counterintelligence services they may encounter. They have managed to establish, in the venues in which they have operated, freedom of movement so to speak. Of course, certain levels of information deemed “ultra-secret” or however it might be described by Chinese intelligence, would unlikely be shared by intelligence services with the identification and repatriation teams. Perhaps overall, the exchange of information by some organizations would be on a “need to know” basis.

In the abstract, conceivably lessons learned are internalized, studies and observations of law enforcement as much as counterintelligence surely are constantly underway in all the countries by every organization operating in respectively. In turn those studies and observations are doubtlessly shared to mutually support the success of one another. What may be recognized as too risky, ineffective, expected by the adversary through recent experience, would be cut away. What seemed to be a more available path to ends, is given consideration, and will likely find its way in efforts to prepare those going on the next missions. Malum est consilium quod mutari non potest. (Bad (ill-considered) is the plan that cannot be changed.)

Most important to note is that whether the matter is espionage or other malign clandestine and covert activities overseas, there can be no doubt that all are constantly moving through a process of evolution. It appears to be a manifestation of an idea, reflective of what has been dubbed “Xi thought,” that Chinese activities performed by government, Communist Party of China, or irregulars must be driven by an energy to push the country onward and upward into the position of the dominant power of the world and one might imagine perhaps even beyond that stature, whatever designs the Communist Party of China leadership might have in mind for that to be. At first blush, these comments may strike a few readers as being a bit lightweight, but some reasoning behind risking such audacious action in the US should be parsed out and laid out for readers to possibly accept and provide a basis for greatcharlie’s suggestions as to what may have been organized and had transpired beneath the surface.

The Main Operation Fox Hunt Players in This Drama

Once fully operational, the identification and repatriation team for the New Jersey mission grew to at least 19 US and Chinese operatives. Nine of the operatives among the identification and repatriation team members of the Operation Fox Hunt New Jersey operation are part of the case filed in the Eastern District of New York, Criminal Division.

Included in the criminal complaint were the following. Hu Ji was the lead investigator and identification and repatriation team leader.  Hu was at the time of the indictment a 46 year old officer serving in the Wuhan Public Security Bureau, a municipal bureau of MPS. To be a bit more specific, he was a veteran officer of the bureau’s foreign affairs unit. Hu is a man of the world with a natural turn for clandestine action and placing others in trying positions. Hu gained notice after joining an Operation Fox Hunt task force. Reportedly, in early 2016, the Wuhan newsmedia had published glowing profiles about him, describing his imposing height, his travels to 29 countries, and his arrests of eight fugitives.  In the view of the Wuhan newsmedia, Hu est a un autre niveau! In an interview, Hu told the Hubei Daily: “Out of the country does not mean out of the legal system.” He added: “Show your sword and punish even those in faraway lands.” 

Though in photographs Hu looks careworn, they typically present him as a professional, intelligent, well-minded, well-built–about 6-foot-1, well-dressed, well-groomed, handsome, smooth, and confident-looking, Chinese male. Hu is a compound of cunning and audacity, girded with steady nerves. His gift as a cool observer of mankind and an understanding of complicated interpersonal relationships allowed him to successfully carry off the job of team leader. That understanding of people surely aided him in manipulating and exploiting others. Hu’s cases had led from Fiji to France to Mexico, making headlines back home. The work was riskier here; in fact, it was illegal. He acquired dominant knowledge of the territory in which he operated. Hu was not even afraid to be at the elbow of law enforcement personnel to explain his purpose using some tall story, some artifice. Hu would identify himself as a Chinese police officer on his tourist visa. US officials hardly gave him a second glance. Sometimes, it was best to hide in plain sight. Perhaps the best way to express what is discussed here is to state that in his work, Hu could be dashing and audacious, but also honorable and discreet, using wits and memory, acting gradually. He could display a certain gentleness but certainly had the capability to be quite cruel. He had no qualms about exploiting individual weakness. Surely, individuals as Hu often seem far too well-equipped for the world in comparison to people most readers might know, or to themselves. In attempting to ascribe certain traits to Hu given his role as a normal Operation Fox Hunt lead investigator and identification and repatriation team leader, those considered by greatcharlie may appear to be mere abstractions. However, as far as one can tell, these are precisely the traits that assisted Hu in becoming a master at his work.

 At the time the complaint was filed, Zhu Feng, also known as “Johnny Zhu,” was a 34 year old PRC citizen and US lawful permanent resident, and until approximately April 2017, was a resident of Flushing, Queens, in New York City. Zhu had studied in Guam before moving to Flushing, which holds one of largest enclaves of Chinese immigrants in the US. His extended family became legal US residents and appreciated life in their new home. Zhu’s older brother served in the US military and then worked for the Social Security Administration and Customs and Border Protection, according to court documents and public records. Zhu reportedly performed odd jobs: tour guide, selling used cars. On social media, he sported a Yankees cap and a boyish smile and called himself “Endless Johnny.” He was torn from that life to serve as an involuntary clandestine operative for the Chinese government. Zhu Yong, also known as Jason Zhu,” was a 64 year old Chinese citizen and a legal permanent resident in the US. Zhu Yong was the father of co-defendant Zhu Feng. The older Zhu, is divorced and suffers from diabetes and high blood pressure. He did not have a steady job, and divided his time between a home in Connecticut and his older son’s place in Queens. He traveled frequently to China which very likely caught the attention of MPS.

This conscription of families of captured targets is a ruthless and effective tactic. Yet, Chinese authorities find great value in it reportedly because they believe it ensures loyalty and obedience. They also apparently believe that allowing identification and repatriation teams to use local intermediaries enable them to shield Chinese officers from scrutiny by US counterintelligence services and state, county, and municipal law enforcement organizations around the US. The teams are often organized in what has been described as silos to keep operatives unaware of who other team members are or the full details of their mission.

Michael McMahon, a 53 year old US citizen, was a licensed private detective in New Jersey. McMahon came from an Irish-American family of police officers and firefighters. During his 14 years at the New York City Police Department, he worked in narcotics and an elite street crime unit, rising to detective sergeant. He received the Police Combat Cross, the department’s second-highest honor, for his role in a gunfight in the Bronx. In 2003, he retired on partial disability related to ailments caused by his time at Ground Zero after the September 11, 2001 terrorist attacks. His wife, an actress, once had a long-running part on “As the World Turns,” a daytime soap opera. Zheng Congying, a 25 year old Chinese citizen and legal permanent resident, resided in Brooklyn, New York. Investigators believe he was hired muscle. Li Minjun, a 65 year old citizen and resident of China, was a physician formerly of the Hubei Xiangyang Center Hospital in Xiangyang, China. Li had also worked for the MPS. Brought aboard the team as a specialist, her assignment was to escort Xu’s father from China to the US against his will with the hope that he would cause his son to surrender to the identification and repatriation team.

Hu Ji was the lead investigator and identification and repatriation team leader.  Hu was at the time of his indictment was an officer serving in the Wuhan Public Security Bureau, a municipal bureau of MPS. To be a bit more specific, he was a veteran officer of the bureau’s foreign affairs unit. Hu is a man of the world with a natural turn for clandestine action and placing others in trying positions. Hu gained notice after joining an Operation Fox Hunt task force. Reportedly, in early 2016, the Wuhan newsmedia had published glowing profiles about him, describing his imposing height, his travels to 29 countries, and his arrests of eight fugitives. In an interview, Hu told the Hubei Daily: “Out of the country does not mean out of the legal system.” He added: “Show your sword and punish even those in faraway lands.”

PRC Official-2 was at one time an individual whose identity was known only to the Grand Jury. However, PRC Official-2 has since been revealed to be Tu Lan, a 50 year old citizen and resident of China, was employed as a prosecutor with the Hanyang People’s Procuratorate and a leader of a Wuhan Fox Hunt task force. She would eventually direct day-to-day activities of the identification and repatriation team. However, as she did not speak English, Johnny would stick close and be her intermediary between her and Michael McMahon, the US private investigator, who was referred to by the identification and repatriation team members simply as “Mike.” 

Zhai Yongqiang, a 46 year old Chinese citizen, resided in China and California. According to court documents, Tu Lan and Zhai Yongqiang, age 46, were the last of the nine charged in the superseding complaint. The identity of a ninth defendant, named Anonymous by US prosecutors, remains under seal.

Among those also included in the federal court documents but not indicted were PRC Official-1 is an individual whose identity remains known only to the Grand Jury.  PRC Official-1 is said to be a Chinese citizen and a director of the Wuhan prosecution office’s anti-corruption bureau. Note that US prosecutors did not charge or identify PRC Official-1 or PRC Official-2 which frequently occurs for strategic and diplomatic reasons with regard to counterintelligence cases. Rong Jing, a 39 year old permanent resident in the US, was Hu’s point man in California. He was a married businessman, living in Rancho Cucamonga, about 35 miles east of Los Angeles. Court documents state Rong described himself as a bounty hunter for the Chinese government. He apparently enjoyed his “Motherland” and was quite talkative about it. Rong’s discussion of his work as identification and repatriation team member provided investigators with a wealth of information on the insidious nature and ubiquitous presence of the Operation Fox Hunt networks. Co-conspirator #3 was an operative who on or about and between May 15, 2017 and May17, 2017, contacted and hired a private investigator in California–dubbed P1 in the federal court document–for the purpose of surveilling Jane Doe #2. Co-conspirator #3 provided P1 with a picture of a document from the defendant Zhai Yongqiang containing the name and personal identification information belonging to Xu.

Communist Party of China Expectations of the Identification and Repatriation Team 

In 2015, Liu Dong, then deputy director of MPS’s economic crimes division, headed Operation Fox Hunt for the organization. He used interviews with China’s newsmedia to supposedly provide citizens with a rare look into the Operation Fox Hunt teams. He told Xinhua news agency that the work required a young team because members needed the strength to withstand long hours and frequent long-distance travel. Liu also told Xinhua that his team was highly intelligent, tough and nimble, with backgrounds in economics, law, foreign languages and business management. He further stated that team members were selected in part for their “emotional quotient” for dealing with overseas law enforcement, and for their ability to handle adversity.

For those team members indoctrinated in Communist Chinese thought doubtlessly recognizes his or her solemn responsibility to ensure China achieved its maximum potential everyday. Chinese intelligence officers in the various services likely feel that they can outperform their opponents and overcome their efforts to defend targets from espionage and efforts to intercept them. One might postulate in the abstract that Chinese intelligence officers may very well have closely observed, or may have read reports on how the behavior, performance and professionalism of officers of organizations in adversarial countries responsible for investigating and halting China’s espionage and any other activities in them was so negative, self-defeating, and self-destructive that confidence in their own abilities was uplifted. Perhaps this impression or belief grows in certitude with every review of certain adversaries. While there may not exactly be a wide open door there likely appeared to be seemingly endless potential for action and perhaps limitless possibilities.

Imaginably, those operatives from China already associated with the Chinese government who were selected for the identification and repatriation team had no bad habits–such as indulging in alcohol, narcotics, pornograpby, misogyny, and prostitution–that could potentially become amplified in a Western environment. To go a bit further using Chinese intelligence officers as a model, identification and repatriation team members, while deployed in service of their country, would not be expected to take any aspect of their duties lightly. They expectedly would never display any desire to involve themselves with banal amusements to fill time when not active in the field–one could hardly call any time while deployed “outside working hours.”–or entertain themselves on mobile phones while performing work tasks. One might presume that whatever they may most enjoy, they contented themselves with least. In effect, the team was expected to figuratively display the “company culture” of the Communist Party of China and live and act by “company principles.” By engaging in heavy handed actions against family members of the targets, team members certainly could be said to have displayed the “best practices” of the company.

Despite all of the safeguards in place, team members were well-aware that danger in the form of lurking US counterintelligence services. While perhaps highly motivated, on the ground, the hyperbole of China’s domination of the field in the US uttered by senior executives and Communist Party of China leaders is likely obviate in the minds of many operatives due to the very strong desire not to be captured. Presumably, no Chinese intelligence officer or clandestine or covert operative of any kind wants to be caught due to his or her own delinquency, carelessness, or outright stupidity. There is also the matter of punishment they might face back home for their failure. In recent memory, few to none among have been caught and put on trial in a US court. This is surely the standard and the expectation for all of those deployed at the Chinese government’s bidding. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

In 2015, Liu Dong, then deputy director of MPS’s economic crimes division, headed Operation Fox Hunt for the organization. He used interviews with China’s newsmedia to supposedly provide citizens with a rare look into the Operation Fox Hunt teams. He told Xinhua news agency that the work required a young team because members needed the strength to withstand long hours and frequent long-distance travel. Liu also told Xinhua that his team was highly intelligent, tough and nimble, with backgrounds in economics, law, foreign languages and business management. He further stated that team members were selected in part for their “emotional quotient” for dealing with overseas law enforcement, and for their ability to handle adversity.

Stalking and Attempted Repatriation of Xu Ji and Liu Feng

As the story goes, in September 2016, Hu flew to New York to launch the operation. Among his first moves, he went into New Jersey to reconnoiter the house in Short Hills and other locations. Then at Hu’s direction, his bevy of clandestine operatives began building a network. First, they needed a local private investigator, preferably a former police officer with contacts and the skills to track people down. Zhu Yong, together with co-conspirator whose identity is known only to the Grand Jury as “Co-conspirator #1,” hired Michael McMahon to investigate and surveil Xu. McMahon came from a family of police officers and firefighters. As an officer in the New York City Police Department (NYPD) for 14 years, he had served in a narcotics unit and an elite street crime unit. He rose to the rank of detective sergeant. He received the Police Combat Cross for his role in a gunfight in the Bronx. McMahon retired in 2003 on partial disability related to ailments caused by his time at Ground Zero after the September 11, 2001 World Trade Center attack. Reportedly, his wife, an actress, had a long-running part on “As the World Turns,” a daytime soap opera. Imaginably as a security precaution, Hu’s operatives enlisted a woman who presented herself as the New York-based employee of a translation company to contact McMahon. The woman explained to him that she discovered him through a Google search. She then introduced him to Zhu Feng and Zhu Yong, describing them as representatives of a private Chinese company that was trying to recover assets from a former employee who had stolen money.  Zhu Feng identified himself as the nephew of the owner of the Chinese firm, which he allegedly described as a construction company. The following month, Hu traveled to the US to meet with McMahon at a Panera Bread restaurant in Paramus, New Jersey, a suburb about 20 miles from New York City. Reportedly, the MPS officer presented himself as Eric Yan, an executive of the private company, during that meeting and other interactions. Zhu Feng and Zhu Yong also participated in Hu’s meetings with McMahon. Hu provided McMahon with a retainer of $5000 at that first meeting.  The two Zhu’s were reportedly involved with his succeeding payments. McMahon’s attorney claims his client “believed he was meeting company personnel” and never learned the identification and repatriation team’s true mission. “Nothing seemed suspicious at meetings” according to McMahon’s attorney. He also indicates that the identification and repatriation team members that his client met at no point mentioned the Chinese government or that anybody worked in law enforcement in China. He claims the focus of discussions was asset recovery, and they convincingly portrayed themselves as company employees with a vested interest in locating the money. 

Soon after he was hired, McMahon began to investigate Xu and his family, a process which included conducting surveillance on Xu and obtaining his banking information. ProPublica reports that McMahon brought in two more investigators to help stake out a suspected location of Xu and Liu, a house in New Jersey. He took the precaution of alerting local police to the surveillance presumably to prevent any misunderstandings if detected or reported by passers-by. (At that point, McMahon demonstrated the willingness to cooperate with law enforcement. Thereby, ample opportunity existed  for US counterintelligence services and law enforcement to enlist his assistance as an informant or operative. For reasons unknown, the opportunity was passed up.) As indicated by the federal document, McMahon’s activities were initially directed by the defendant Zhu Yong and later directly by Hu and Zhu Feng. McMahon was diligent in providing reports on his progress to Hu. In the Fall of 2016, McMahon sent Hu information regarding Xu and his family. In or about November 2016, McMahon emailed information about Liu’s international travel. Later, around December 2016, McMahon emailed Hu information concerning Liu’s date of birth, Social Security Number, and banking information. In November, Hu, still using the nom de guerre Yang, emailed McMahon to say he had “reported all we found” to his superiors in China

In December 2016, Hu visited New York again. On that occasion, he traveled with his manager. US authorities only identified Hu’s superior only as PRC Official-1, the director of the Wuhan prosecution office’s anti-corruption bureau and a leader of a Wuhan Fox Hunt task force that includes prosecutors and investigators in the Communist Party’s anti-corruption unit. After that visit, Hu and Zhu Feng returned to China. Oddly enough, in a meeting in Wuhan, Hu confided to Zhu that next time they did not plan to come back from the US without the targets.

Following months of investigative work by McMahon, the identification and repatriation team planned a specific operation to stalk and grab Xu via psychological coercion. It was then that the team moved to bring Xu’s elderly father from China to the US in order to communicate a threat on behalf of the Chinese government directly to Xu. As part of the plan, Xu’s father was directed to tell him to the effect that if he did not return to China, his family there would suffer serious harm, including imprisonment. In furtherance of this criminal scheme, team members, Zhu, Tu Lan, and Li Minjun traveled to the US.

Malgré-nous Among the Team’s Members

It has been said that in zealousness, one can usually find some weakness, some hidden doubts. In China, the world is limited to what is seen through the lens of the Communist Party of China and “Xi thought.” For some Chinese citizens, that line of thinking and a will of iron act as blinders, preventing other perspectives from seeping in. From the view of the Communist Party of China, in the New Jersey operation, a team was being sent in under Hu’s leadership whose members’ minds were turned wholly toward bringing John Doe #1 back to China. In no small part, therein lies the causality for the ultimate breakdown of the New Jersey identification and repatriation operation. 

Interestingly, not all team members were members of the Communist Party of China or aspired to be such. One would think Party membership would be sine qua non for a mission of this type as it was actually commissioned by the Party and given that certain exigent circumstances could arise, requiring almost anything of team members, including literal self-sacrifice. Those called upon were indeed not the most dedicated. The teams and their superiors in Beijing erred in presuming without any reliable ability to predict or confirm the fidelity of those non-Party members would gladly follow orders in every circumstance.

With the New Jersey enterprise, it is clear two team members, Zhu Feng and Zhu Yong were called upon presumptively because their loyalty was guaranteed with dangled threats to cause misfortune for their relatives, some of whom had already suffered by the government’s hand. It was certainly an odd type of fidelity. In Zhu Feng’s particular case, in the summer of 2016, he received news from relatives in Wuhan that MPS had brought his uncle, a former accountant, back to China from Houston. Zhu’s relatives also contacted him to say: “The cop who caught your uncle is named Hu Ji. They further explained: “He will contact you about another case. Do what he says.” Team Members of identification and repatriation teams such as Zhu Feng and Zhu Yong are ostensibly China’s version of the French malgré-nous. Malgré-nous were those men of the Alsace-Moselle region who were conscripted against their will into the German Wehrmacht or the Waffen SS during World War II. Chinese citizens were torn from their normal daily lives and pressed into service not simply as a matter of being under the authority and thumb of hostile power that controlled the territory in which they lived, but coping with the threat of harm, even death, of loved ones also living under the regime.

The Initial Effort and the First “Emotional Bomb”

In the spring of 2017, the plan was ready and all team elements were assembled in the US. Hu remained in Wuhan, managing activities, but he sent in a specialist, Tu Lan, a prosecutor for the Hanyang District of Wuhan. She would lead the repatriation team on the ground, but because she did not speak English, Zhu Feng (hereinafter referred to as Zhu as the role of his father, Zhu Yong, was not discussed beyond this point in any sources) would stick close and be her intermediary with McMahon. The other specialist sent into the US, Li Minjun, as aforementioned, was a doctor who had worked for MPS, US officials allege her assignment was to escort an elderly man across the world against his will in order to ambush his son, Xu. Reportedly, Hu hoped the shock would cause the wanted man, Xu Jin, to surrender on the spot. The true age of Xu’s father has not been disclosed, but presumably Hu felt he was frail enough to put Li at his side for the more than 15-hour flight. Interestingly, Zhu Yong, who at the mission’s outset was entrusted to find and establish links with a US-based private investigator with specific characteristics, Tu, Li, and McMahon were ages 64, 50, 65, and 53 respectively. It seems that for MPS managers, age has importance, imaginably equating to experience, capability, reliability, solid judgment, and wisdom among other positive qualities.

Hu told McMahon in an email in March that the plan was to bring the father unannounced to the house in New Jersey and lure him out. Hu also gave him the following instructions: “We just want to recomm[e]nd you trace him to find [his son’s] address.” According to the federal court document, Hu offered to pay McMahon in cash for his assistance. McMahon accepted the offer. Hu later emailed McMahon two photographs, one of which depicted Xu and Liu while the other depicted Xu’s parents. Before returning to the US, Zhu was given the task of overseeing operatives he had hired in the Chinese community in New York. He sent a text message ordering one operative to join Mahon’s  surveillance in New Jersey with instructions to “conduct surveillance there for 5 days. 12 hours on the first day, 10 hours on the second day, and 8 hours on the last three days . . . The compensation is 1800USD.” 

To all appearances, Zhu had Hu’s complete confidence. On first impression, an interesting historical parallel comes to mind with regard to the developing relationship between Zhu as a conscript with his superiors, or more accurately, his captors Hu and Tu. Despite being torn from his former carefree existence and forced to become a player in Operation Fox Hunt, he was nevertheless given key tasks, considerable responsibility, and treated in a rather avuncular manner particularly by Hu. In Ancient Rome, occasionally certain masters would depend upon slaves to perform important duties and provide them with opportunities for growth within the society. A couple of famous examples of that are the relationship that grew between the master Terentius Lucanus and Publius Terentius and that between Carpophorus and Callixtus. Born between 195/185 BC, Roman senator Terentius Lucanus brought Publius Terentius to Rome as a slave. He educated him, and freed him after being impressed by his abilities. Publius Terentius would become a playwright known better today as Terence. Terence’s 6 plays have survived through the centuries. He died young around 159 BC. Callixtus was a young slave from Rome. His master Carpophorus, gave him the responsibility of collecting funds given as alms by other Christians. Callixtus would become a Christian himself. According to Sextus Julius Africanus, Callixtus would become the Bishop of Rome from c. 218 AD, and is known both as Callistus I and Pope Callixtus. He was martyred for his Christian faith in c. 223 AD and is venerated as a saint by the Catholic Church. Perchance Hu was grooming Zhu as a protégé and foresaw a future for him as a full-fledged officer in MPS or some other security service.

Exploitation of Émigré Communities

Clever choices have been made by the identification and repatriation teams based on studies on the practices of law enforcement organizations around the US where Chinese investigators must operate. Aware of the Chinese government’s hostile activities within their own community, it would seem to be grave error to believe law enforcement around the US could possibly know what the Chinese government is doing in the US against émigrés or what it is capable of doing to please or make a good impression with the Communist Party of China. It is not always the case but to an extent, the émigrés, thinking ostensibly in survival mode, will typically see no other way to get by but to remain obedient to Chinese authorities. Unfortunately, there is of course the other reality that not everyone can be or wants to be a noble soul. 

As discussed in the December 13, 2020 greatcharlie post entitled  “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” under Article 9 of the National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress, maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MPS and MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MPS, MSS, or PLA, does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security.

Unable to keep pace with the identification and repatriation teams from the start, naturally the initial hope would be given the gravity of the intrusion on US soil, that while moving about within Chinese émigré communities, the teams would at least act with some measure and would not exceed what is decent. That has not been the case regarding their behavior. Operation Fox Hunt teams have created great fear among the émigré communities. One might toss on top of that an apparent impunity with which hunters from China act against them. True, on paper, members of the Chinese émigré communities have nothing to fear in the US and are welcome to enjoy the benefits of living in a free society. Yet, as the MPS was able to accomplish more than imaginable in the US, displaying its power and capabilities, there remains uneasiness, fear, terror among Chinese émigré communities from something they are thousands of miles from. Chinese émigré communities are for the most part convinced of the ubiquitous nature of the Communist Party of China and China’s security services.

Chineee Émigré Communities and Unshakable Grip of Beijing

Unable to keep pace with the identification and repatriation teams from the start, the initial hope would be given the gravity of the intrusion on US soil, that within Chinese émigré communities, the teams would act with some measure and would not exceed what is decent. Surely, that has not been the case regarding their behavior. Operation Fox Hunt teams have created great fear among the émigré communities. One might toss on top of that an apparent impunity with which hunters from China act against them. True, on paper, members of the Chinese émigré communities have nothing to fear in the US and are welcome to enjoy the benefits of living in a free society. Yet, as the MPS was able to accomplish more than imaginable in the US, displaying its power and capabilities, there remains uneasiness, fear, terror among Chinese émigré communities from something they are thousands of miles from. Chinese émigré communities are for the most part convinced of the ubiquitous nature of the Communist Party of China and China’s security services. Indeed, within the émigré communities, there is an expectation, especially among more recent arrivals that always close by are recruited informants of MPS, Party Members, planted United Front Work Department operatives and informants, planted MSS intelligence officers, operatives, recruited informants. Memories and ways of living to survive in an authoritarian China are not easily shaken off. Quando libertas ceciderit, nemo libere dicere audebit. (When liberty will have fallen (falls/is lost), no one will dare to speak freely.) 

The learning curve for law enforcement organizations around the US may remain steep for some time as the ways and means with which the Chinese government uses to approach Chinese émigré communities on matters such as returning citizens and former citizens to China “to face justice,” is ever evolving. Use of lessons learned by the Operation Fox Hunt identification and repatriation teams will mean for the future more effective use of artifice, more effective collection of information within émigré communities, more effective counter-surveillance, more effective sharing information and data useful for operations among organizations engaged in clandestine and covert operations in the US.

To get Xu’s father into the US without incident, Zhu coached the captive elderly man on responses to standard questions asked by border inspectors at Newark Liberty International Airport. In advance of Xu’s father’s arrival in the US, the defendants Zhu and Tu flew to  Newark Liberty International Airport on or about April 3, 2017. Xu’s father and Li, the doctor, arrived at Newark Liberty International Airport on a flight from Shanghai on April 5, 2017. While in the US, the Tu met with Zhu and an individual known to US prosecutors as Co-conspirator #2 at a hotel in New Jersey. At that meeting, Tu directed Zhu and Co-conspirator #2 to surveil a residence belonging to a relative of Xu and Liu using night vision goggles in advance of bringing Xu’s father to the home. Tu also subsequently communicated with Zhu with regard to the logistics of the operation. On the evening of April 5, 2017, identification and repatriation team members brought Xu’s father to a house in New Jersey that belonged to his wife’s relatives. As that transpired, McMahon performed surveillance in the vicinity of the house belonging to Liu’s relatives to determine the present locations of members of Xu’s family, including Hu himself, which at that time remained unknown to the team.

On April 6, 2017, Xu met his father at a public location before they returned together to his residence. McMahon and other team members monitored the meeting of Xu and his father. That same day, Zhu requested that McMahon run a database check for a license plate number and address associated with Xu. McMahon provided that info. Xu’s father remained with his son for several days. During that time, he explained to Xu that his family in China would be harmed if he did not return to China. Hu’s hopes for a lightning-bolt triumph evaporated. Instead of acquiescence, the family stood fast and contacted law enforcement. The FBI got involved, a move the Operation Hunt team was almost immediately made aware of. According to the federal court document, on April 7, 2017, Zhu sent a text to Tu saying Hu wanted her “and the doctor to come back as soon as possible” to “evade actions by US law enforcement.”  That same day, Tu departed from John F. Kennedy International Airport in Queens, New York on a flight to Beijing. The next day, Li departed from Newark Liberty International Airport on a flight to Beijing.

Identification and Repatriation Team Receives Intriguing Alert

Although executed piecemeal, the departure of key members and leaders of the identification and repatriation team after the alert was sounded may have followed a prearranged course. As it was always possible that such a need to move fast would arise. Nevertheless, a flaw became apparent in that process. it would have made a bit more sense if team lead investigators and their superiors, when selecting team members, had only selected individuals who possessed certain talents, perhaps demonstrated on previous operations maybe in other areas, who would expectedly contribute to the operation’s success. In this particular situation, some identification and repatriation team members who remained in the field as Zhu appeared unsure of how to proceed, were unfamiliar with steps to take, and required supervision. Those next steps that needed to be taken should have been standard operating procedures deeply ingrained through training. In an exigent situation, the team leader also appeared not certain as to how team members might perform. Tu, for instance, appeared to feel the need to be emphatic when issuing instructions. Zhu communicated in a similar way to the operatives that he supervised. This “crack” in the team selection process was to a degree a self-inflicted handicap and vulnerability that could have proved costly if US counterintelligence services and law enforcement organizations around the US were aware of the situation and positioned themselves to take advantage of it. Knowing that this is how the identification and repatriation teams operate, it could allow them to be better prepared and steal a March on their prey on another occasion when they are in their sights. However, this may have been a lesson learned by Operation Fox Hunt managers and it is unlikely that they would not make the necessary changes to avoid dealing with this issue in the future. Surely, there remains a chance the situation will be the same next time, too! Some Operation Fox Hunt managers may feel on ne change pas une équipe qui gagne!

Chinese Countersurveillance Operations in the US

The fact that the identification and repatriation team received an alert that the FBI was fully aware of the effort to coerce Xu by using his father was reported almost as a trifle in the federal court document. Yet, in reality, it was small much in the way that the small movement of a needle on a seismograph can report a giant earthquake. Upon first reading about this particular moment of identification and repatriation operation, there grew an interest in greatcharlie in how Chinese operators engaged in all sorts of activities in the US are seemingly forewarned whenever law enforcement and counterintelligence services draw near them. Of course, one of the counterintelligence organizations might just be a leaky ship. There could be rotten apples in their midst. However, it certainly would not be too fanciful to conceive that Chinese operatives on government sanctioned missions receive more support from unknown entities nestled in the US than may be recognized officially or publicly.

One might postulate that with so many Chinese intelligence officers–there were reports of as many as 25,000 “in country” back in 2017–and their operatives and informants moving furtively throughout the US, there may very well be specialized counterintelligence elements, covert surveillance teams, positioned in numbers deemed sufficient by the powers that be in the PLA CMC Joint Military Staff Intelligence Bureau and MSS counterintelligence that provide overwatch for espionage operations. The PLA teams, rather than come from intelligence units, might instead be formed from PLA Army special operations units primed in the reconnaissance and surveillance operations and to engage in a special reconnaissance mission. Teams from MSS would likely be secounded from the provincial departments and municipal bureaus, Chinese intelligence elements operating in the US would surely appreciate a resource that would allow their officers, operatives, and informants to repeatedly evade intercept. Similar covert surveillance teams may be operating in other countries. It is just a theory.

One might postulate that with so many Chinese intelligence officers–there were reports of as many as 25,000 “in country” a few short years ago–and their operatives and informants moving furtively throughout the US, there may very well be specialized counterintelligence elements, covert surveillance teams, positioned in numbers deemed sufficient by the powers that be in the PLA CMC Joint Military Staff Intelligence Bureau and MSS counterintelligence secounded from the provincial departments and municipal bureaus, that provide overwatch for espionage operations. If providing assistance to them would actually be feasible, it would be counterintuitive not allow identification and repatriation teams to enjoy the overwatch of any theorized covert countersurveillance teams of MSS and PLA operating in close proximity to them. 

If providing assistance to them would actually be feasible, it would be counterintuitive not allow covert countersurveillance teams of MSS and PLA to provide overwatch for other operations ostensibly underway in close proximity to them, perhaps of a variety and number far in excess of espionage. Such would be to the great benefit of the Operation Fox Hunt identification and repatriation teams.

As part of their mission, the theorized covert surveillance teams would very likely shadow any law enforcement or US counterintelligence organizations for the purpose of countersurveillance and early warning. No law enforcement or US counterintelligence organizations would be allowed to surprisingly appear at the site of a meeting between team members and a target ol contracted operative. No law enforcement or US counterintelligence organizations would be allowed to place surveillance teams on any of Chinese operatives without the knowledge of the covert surveillance teams. Any alerts about threatening moves by law enforcement or US counterintelligence organizations would unlikely be relayed through channels from the intelligence element’s headquarters down to those managing the teams as the circumstances would invariably be exigent, and time would be of essence. Communication between intelligence elements and the team would ostensively be confined at the level of the intelligence field managers and the lead investigator of the team. Imaginably, MSS and PLA managers would establish some incognito for their contacts as a security measure in case some catastrophe should befall the identification and repatriation team and through interrogation, the team leader reveals anything about their MSS or PLA counterpart that could identity them.

MSS and PLA intelligence network managers would hardly want some incident with the identification and repatriation team to draw unwanted attention to their province. It would be best to help the team get in and get out rapidly and safely. Additionally, having the opportunity to study and make observations of their opposition’s practices in surveilling suspected foreign operatives or the steps they go through and how they perform and behave while in investigation mode imaginably would be invaluable for MSS or PLA intelligence officers operating in the US. On top of everything, as the identification and repatriation operations are apparently the brainchild of the Communist Party of China, it would be essential for them to accomplish their task. Those able to make that a reality would be expected to do their utmost to assist with all possible precautions taken into consideration. All involved would likely be called to account if it failed. A MSS or PLA field manager who has the identification and repatriation teams operating in their area of operation would have to be considerably indifferent to the wishes of the Communist Party of China to have a clear ability to ensure the success of the team’s effort, and do nothing to assist and actually allow it the flounder.

Much as the MPS organized the identification and repatriation teams, it may very well be that any prospective covert surveillance teams organized for purpose suggested, might be well trained officers of MPS–also an intelligence service with what might be deemed a counterintelligence proclivity, doing what they do best for the Communist Party of China, keeping an iron grip on all Chinese citizens. Covert communications between team lead investigators and the covert countersurveillance teams theorized here would likely be uniquely designed by MPS in China for the operation. If the theorized covert surveillance team discussed in this essay were a creature of MPS, having it take their eyes off what members of the identification and repatriation teams were doing surely would not thrill the powers that be at MPS Headquarters.

Omne ignotum pro magnifico est. (We have great notions of everything unknown.) Of course, it is possible that nothing remotely resembling what has been suggested here exists at all. On the other hand, there may actually be surveillance teams operating around the US in a manner of far greater conception than what has been hinted.

Gnawing Bit More on the Theorized Covert Surveillance Teams 

Conceivably, when not engaged in their patient vigil over Chinese operatives of all kinds, the hypothetical covert surveillance teams maintain a low key, traveled existence wherever they are. What may be viewed as most remarkable about the covert surveillance team members if discovered would be the fact they are by appearance so unremarkable. Anything linked to their activities would hardly be found wherever they might reside or frequent. All in all, they would surely keep themselves to themselves. Yet, perhaps the most troubling aspect of the theorized covert surveillance team is that they would likely be gaining experience and honing their skills with everyday that passes during which they have perhaps been out in the field. As their skills increase, their capabilities and willingness to take on greater challenges would also likely increase. Further, for those trying to cope with Chinese operatives of all kinds in the US, the imagined increase in experience and capabilities among the theorized covert surveillance teams would surely be attended by a marked increase in the degree of difficulty in capturing them. Imaginably some financial support would be provided for the additional expenditures on logistical needs for the supportive surveillance work. As the activity would be in direct support of a Communist Party of China directed operation, a large request would unlikely be made to cover personal service expenses. The honor and privilege of serving the Communist Party of China would expectantly be viewed in Beijing as sufficient reward.

Oddly enough, the identification and repatriation team still did not just pull the shutters down and run off just because FBI agents were onto them. With the specialists safe, the identification and repatriation team members rather audaciously continued to watch Xu’s in-laws home and Xu’s home. Tu joined Hu at the command post back in Wuhan where she continued to direct the identification and repatriation operation while in China. On April 9, 2017, Zhu messaged Tu Lan, inquiring: “Prosecutor Tu [Tu Lan] whose order should I take for now while I am here?” Tu replied: “You communicate with me and Hu [Hu Ji]. I will go to the Commission for Discipline Inspection this afternoon. I will contact you afterwards.” The “Commission for Discipline Inspection,” which was a Chinese government agency responsible for investigating members of the Communist Party for corruption. Tu also wrote to Zhu: “[Y]ou need to confirm that Mike [McMahon] can execute according to our requirement.” According to the federal court document,, on April 9, 2017, Tu  sent an electronic message to the Zhu asking: “Did you tell Hu [Hu Ji] that I still want to confirm [John Doe #1’s ] [Xu’s] father’s status?” Zhu responded, “It seemed that he has reported to the [Chinese Official #1] already,” and added that “I arranged to have me [McMahon] stay there Monday morning.” Zhu told Tu Lan that ” the money I have on hand can only have me [McMahon] to stay there for two days.” On April 11, 2017, McMahon and Zhu discussed–in English–additional steps to intimidate Xu into returning to China. The federal court document specifically quotes McMahon as proposing they “harass” Xu, including by “[p]ark[ing] outside his home and let him know we are there.” Zhu replied that they “can’t harass [John Doe #1] [Xu] like that lol.” The efforts to persuade Xu to return to China were unsuccessful. The emotional bomb fizzled.. On April 12, 2017,  Zhu and Xu’s father departed from Newark Liberty International Airport on a flight to Shanghai.

Discussion will be extended in Part 2, to be published later.

Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020)

China is currently engaged in a very aggressive, massive espionage, cyber, and covert action assault on the US with the goal of catching up with it technologically, militarily, and economically as quickly as possible. China hopes to eventually become the world’s dominant power. Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Victories on the intelligence front have likely most satisfied People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, as under his leadership, China’s intelligence capabilities have been greatly enhanced and have evolved. In his monograph, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that will shock its readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined.

Since the era of the People’s Republic of China’s Second Chairman Deng Xiaoping, from 1976 to 1994, the Communist Party of China’s leadership has lived in optimistic expectation of better fortune for the Chinese people in terms of economics and their standard of living. Party leaders covet the position the US holds as the dominant power in the world. In accordance with that thinking, long range plans were formulated. Such really should have been the expected response of Chinese national leaders who were first and foremost dedicated to a very aggressive revolutionary movement. It was determined in Beijing that espionage offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. At that time, many of China’s largest companies were state owned, or had close linkages to the government. From all accounts, China thereby embarked on what has become a very aggressive and massive espionage, cyber, and covert action assault on the US with the ever-fixed goal of catching up with it technologically, militarily, and economically as quickly as possible.

Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Chinese intelligence officers have experienced innumerable satisfactions in the spy war. According to a former chief of Counterintelligence for the Central Intelligence Agency (CIA), James Olson, in his superb book, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), China is presently in a class by itself in terms of its espionage, covert action, and cyber capabilities. (The January 31, 2021 greatcharlie post is a review of Olson’s To Catch a Spy.) The struggle on the intelligence front impacts the whole climate of the relations with China. Even when China is engaged in bilateral or multilateral talks, whether on trade, security, or the environment, Chinese intelligence services never cease engaging in robust espionage. Imaginably, victories on the intelligence front provide a most satisfying opportunity for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, to cock-a-doodle, about how, under his leadership, China’s intelligence capabilities have evolved to the point at which the intelligence services can carry the battle to the home ground of the US itself and win. Senior executives and managers in US counterintelligence services doubtlessly stand exasperated over regular disappointments.

In A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that, although well-known within the US Intelligence Community and within other intelligence services worldwide, will shock nonpracticioners among his monograph’s readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined. As might be expected, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. The revelation will be that Chinese espionage activity is not the exclusive purview of China’s civilian and military intelligence services. In addition to government organizations, commercial entities, academic institutions, and private individuals, entrepreneurs are heavily engaged in espionage against preferred targets in highly industrialized countries. Chinese firms have proved themselves to be quite capable at performing such work. Surely, if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

Eftimiades examination is based on his study on the nature of Chinese espionage worldwide and in-depth understanding developed through decades of experience in the intelligence field. He reviews intelligence processes, setting objectives and tasking, organizations that engage in espionage, looks at their efforts through case studies and analysis of them. He also discusses how China’s espionage activities worldwide has had an impact on US national security, international security, the international political economy, and geopolitics. Eftimiades delves into the practical matters that concern intelligence officers of government organizations and employees of commercial entities and academic institutions as they engage in espionage, and how the Chinese government manages the hybrid government and “independent” civilian intelligence system it has created. While Series on Chinese Espionage, Vol. I: Operations and Tactics is the actual title of Eftimiades’ monograph, the monograph is listed on Amazon.com as Chinese Espionage Operations and Tactics (Vitruvian Press, 2020). The monograph is heretofore referenced in this essay by the latter title. (It might be best for those who may wish to possess a copy to research the text under the latter title. The publication date is September 3, 2020).

A sidelight, as defined by the Oxford English Dictionary, is a piece of information usually given by accident or in connection with another subject, that helps one to understand somebody or something. The goal of sidelights offered in this essay is to present Eftimiades’ monograph in a way that will give our readers a good sense of both what is in it and sort of ideas and insights they might draw from it. In effect, it is a review. For those who may excavate through the monograph and thoroughly and consider points of exposition concerning specific malign activities conducted by China, his work will prove to be substantially edifying. What is most impressive to greatcharlie about the monograph is the manner in which it stimulates thought on a grave issue concerning China. As stated in prior posts, greatcharlie prefers to review texts that can stir a fire inside a reader, and transmit the author’s passion for a subject. Those writings are the most memorable and most enjoyable to sit with. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

The role of reviewer, an unsolicited intermediary between a text’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a work then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil. It is greatcharlie’s preference to provide reviews, sidelights here, that readers of the blog can enjoy and from which they may edify themselves. Nothing greatcharlie states in this essay is intended to give Eftimiades some stick–perish the thought. In greatcharlie’s view, he is brilliant, and works such as his monograph educate nonpracticioners as greatcharlie. They are very much appreciated. This review is not an inquiry into facts presented. All that is being presented here are insights greatcharlie birthed while parsing out the text. Although important details of Eftimiades monograph are discussed here, not everything is revealed. This is greatcharlie’s hard and fast rule on reviews, whether books, or as in this case a monograph. Plenty is left for readers to discover and draw their own insights upon.

Nicholas Eftimiades, the author (above), among other high level positions in the US government, was formerly the Director of Counterintelligence at the Central Intelligence Agency. He is highly regarded for his expertise on China and national security space issues. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. Eftimiades holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University.

The Author

Eftimiades, among other high level positions in the US government, was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. The Intelligence Community awarded Eftimiades with its highest honors to include the National Intelligence Council Achievement Award and DIA Director’s Intelligence Award. As of this writing, Eftimiades holds appointments on the National Intelligence Council as an Intelligence Community Associate, Homeland Security Advisory Council, Economic Security Subcommittee, and the Defense Science Board. Although he has left the CIA, one does not get the impression that Eftimiades has left the fight yet! Eftimiades has testified before several US Congressional and Presidential Commissions concerning National Security issues, future technology development, and the future of the US space program. 

Among several high level positions, Eftimiades was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University. He has lived and studied in Asia. He once served as a senior research fellow at King’s College, War Studies Department in London. During that period, Eftimiades authored books, reports, and a number of articles on China’s intelligence methodology, national security, technology, and space issues. Currently, Eftimiades is a professor at Pennsylvania State University, Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. 

As Eftimiades possesses such formidable credentials, it seems needless to say that readers should approach all matters of fact presented by Eftimiades as true to the best of his knowledge and belief. Eftimiades spoke truth to power within halls of the US national security bureaucracies and in the White House. He presents the monograph’s discussion essentially in that same mode, discussing only what he knows to be the truth on Chinese Intelligence Operations. His proceeding publication, Chinese Intelligence Operations is regarded as the seminal work in the field. In the period surrounding its publication in 1994, greatcharlie’s editor did not have the pleasure to read Nicholas Eftimiades, Chinese Intelligence Operations (CreateSpace Independent Publishing Platform, 1994) and in fact was not even aware of its existence. Having read through it in preparation for this review, the book impressed as being a damnably good breakdown of the organization departments, the missions, guiding concepts and intent of its leaders, and the tactics, techniques, procedures, and methods of each service of the “Chinese Intelligence Community” during what could now be called a bygone era. 

To the extent that it has relevance other than by mere subject matter with regard to Eftimiades Chinese Espionage Operations and Tactics. The preceding enables one, through comparisons of assessments of the work performed in varied operational and functional areas, to observe how far Chinese intelligence services have evolved, among many things, as organizations, within the country’s foreign and national security policy bureaucracy, and as vital tools in the hands of the leadership of the Communist Party of China. Interestingly, by examining both Chinese Espionage Operations and Tactics and Chinese Intelligence Operations, one is also provided the opportunity to examine an evolution in the experience, education, thinking and type of insights developed on Chinese intelligence services.. Perhaps readers will discover, much as greatcharlie did, that Chinese Espionage Operations and Tactics takes the reader to a higher level of understanding of the topics and raises the level of discourse to a seasoned intelligence analyst on China. For China watchers in particular, the monograph provides a loom from which new understandings and fresh insights can be crafted. Of course, for those who have not read or do not plan to read Eftimiades, Chinese Intelligence Operations, the opportunity still exists to prosper intellectually by plotting Chinese Espionage Operations and Tactics as the start point on the figurative charts of their respective learning curves on Chinese Intelligence.

Make no mistake, Eftimiades worked at the sharp end of intelligence work and knows the true value of each bit, even trifles, emphasizing in the text what is important to know in order to get the counterintelligence job done. Indeed, through his monograph, readers get a small taste of the discourse between intelligence officers within the bureaucracies in which Eftimiades served, and the flavor of its tone. One might as far as to say that by reading Eftimiades monograph, one gets a sense of the thinking within key US national security bureaucracies on Chinese intelligence activities in the US in the current climate.

Previous Reviews

Among reviews of Chinese Espionage Operations and Tactics published on Amazon.com are a few from former and current US senior executives and intelligence officers of the US Intelligence Community. Their glowing expressions of satisfaction and appreciation,reviews attest to the value, positive impact the monograph had on their thinking and their work. One such review was by Maryann Fialdini, Former Chief, Counterintelligence Operations of the US Defense Intelligence Agency (DIA). She explained: “Mr Eftimiades has broken new ground on his closely researched series on Chinese Espionage Operations and Tactics. His work on Chinese espionage spans 30 years in the intelligence community. In the 90’s he sounded the alarm on China’s rising espionage activities directed against US corporate and government entities. His current series on Chinese Espionage identifies for the reader China’s massive “whole of Society” approach to espionage activity and offers the exceedingly rare combination of insight and judgement from a professional who has a wealth of firsthand experience. Eftimiades work fills an important gap in US literature as it relates to Chinese intelligence. I highly recommend this book!” Another fine review was from David Tsai, formerly of the Library of Congress. He stated: “Most up-to-date comprehensive and detailed treatment of the subject based on the author’s objective analysis of close to 600 cases! An intelligence practitioner as well as academic scholar Mr. Eftimiades has given his readers a clear picture of Chinese espionage doctrine and tradecraft, based on a combination of his experience and scholarship. This excellent and insightful book is highly recommended for both professionals and novices who are interested in this subject.” A review from Nicholas Kikis, former Director of the DIA’s Defense Clandestine Service and Chief of East Asia Division, that appears on the back of the monograph, proffers: “A must-read for professionals in Counter intelligence, security and government affairs. The author has crafted the most detailed account ever published on China’s espionage operations and tactics . . . The USA is loosing its secrets and technology to China’s “whole of society” approach . . . Our Nation’s need for good counterintelligence has never been greater . . . Mr. Eftimiades is the real deal, a veteran of the Intelligence Community who describes the challenges and provides recommendations on how to do a better job in protecting America.”

Interestingly, Eftimiades does not mention anything about having to submit his monograph to the Publications Review Board of his former employer, CIA, for review. For security reasons, it is a requirement for officials from the US Intelligence Community with backgrounds as his. One might expect his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any of that information could possibly provide some important bit, some nuance on what the US knows about China’s espionage operations and tactics in the US. Surely, the Publications Review Board stopped anything from going into the text if in its view it even approximated classified information. Hypotheses and arguments are a bit more challenging to judge for security reasons. Certain facts, even if left out hypotheses and arguments, can be assessed as being confirmed by some clever sorts in an adversaries camp seeing that those facts might alone be the sole solid basis upon which a particular inference might logically be made.

Sidelights

Eftimiades’ monograph is divided into 12 sections. They are entitled as follows: Section1: “Preface”; Section 2: “Key Findings”; Section 3: “Introduction”; Section 4: “Analytical Methodology”; Section 5: “China’s Legal Framework for Espionage”; Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; Section 9: “Analysis of Espionage Tradecraft”; Section 10: “Impact”; Section 11: “Summary”; and, Section12: “Link to video Analysis of China’s Economic Espionage Tactics.” Since the monograph is only 56 pages in total, it seemed apropos for this review to condense the discussion of 8 of its 12 sections, highlighting from each what might be its most intriguing elements/aspects for our readers. For 9 of the monographs sections, to include one not précised, greatcharlie provides sidelights.

Section 1: “Preface”

From the outset, Eftimiades makes it clear that the focus of his monograph, although there is some emphasis on espionage activities against the US, is on China’s worldwide human intelligence operations. The monograph does not include a discussion of China’s intelligence analysis capabilities, technology collection, not domestic operations against perceived internal threats. He indicates that cyber espionage is only addressed in select cases which were enabled by humans providing insider access. Eftimiades notes that he brings his own experiences and perceptions into his interpretations of those cases.

Eftimiades also gives notice to readers that the monograph only reflects known Chinese intelligence operations. Even with a review of hundreds of espionage cases, he recognizes that certain matters are left open such as the number of individuals engaged in espionage activities worldwide for China, and whether the cases he analyzed represent as much as 90 percent of the total or as little as 10 percent. (The word “worldwide” qualified the former statement of the two. Perchance the number operating in the US is known!) Eftimiades insists that even the Chinese government does not know the precise number of individuals spying on its behalf. He suggests that uncertainty about that total would be due to China’s decentralized “whole of society” approach to intelligence collection. Still, he felt enabled due to the volume of cases and careful–experienced, astute–analysis of operational details, he could draw certain conclusions about China’s espionage operations and tactics.

Eftimiades’ statement about Chinese intelligence operations and tactics practiced in the US is a very bold one to make starting off from scratch in his “Preface”. Writing in that manner, Eftimiades was sure to create more questions than anything else. Reading what was stated by a number of reviewers of the monograph from outside the US national security bureaucracies, this point could perhaps be deemed as the metaphorical low-hanging fruit for criticism. Given the strength of the mind of a man as Eftimiades, it could be the case that he has dangled this statement on the number of Chinese officers and operatives around the world, aware that it would draw a strong reaction among close readers and light the fire that would ignite a lively discourse within and among them. He is a former director of CIA Counterintelligence, which makes him a member of a rather unique caste of singular individuals who would hardly do anything without considerable forethought. To go a bit further, given Eftimiades background one might think perhaps there is some counterintelligence benefit in refusing to confirm publicly, not allowing an adversary to discover what the accepted size and strength of its espionage operations are. Imaginably that information might aid them in planning around US thinking, potentially finding some advantage if the estimated figures are too high, too low, or spot on. 

The likely first impression of readers resulting from Eftimiades’ “declaration of nescience” on the numbers of would be Eftimiades could not have managed to effectively consider the ends, was, and means of Chinese organizations engaged in espionage if an important leg of the three leg “strategy stool”, means, which includes the resources, size and strength of those organizations, was unknown to him. Unaware of that it was harder to see how he could delve into a more elaborate discussion of their operations and tactics. Curiosity over how Eftimiades managed everything would surely compel the many readers to push forward into the text. However, it would very likely be regularly done with some reservation. To the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US, to be both above board and fair, are only proffered in the abstract.   

Readers looking at the matter on their own might wonder what is the average caseload for a Chinese intelligence officer from either the civilian or military service If it is more than one, let one surmise three or four, then one might begin to believe the espionage crisis is much greater in magnitude. One might consider that given likely number of Chinese intelligence officers and operatives in the field, the true number of Chinese personnel involved increases exponentially when the number likely needed to provide logistical support for such a grand number of officers and operatives in the field and their operations which appear to vary in size and scope, are considered. One might not only infer from the number and size of known operations, their intensity and tempo, and apparent effective level of support for each the totality of Chinese intelligence officers and operatives in the field, but a close approximation of their number might be reached by considering just how much has been stolen, usually detected well after the fact. Later, in the “Summary” section, Eftimiades notes that although he may not be certain of the true number of Chinese intelligence officers that are on the ground in the US but himself surmised it must be in the thousands.

There have been claims that the number of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field. The issue of numbers of Chinese spies in the US is not limited to debate within the US Intelligence Community. It has been widely reported by the mainstream newsmedia in the US that China’s intelligence services have established espionage networks throughout the country. Guo Wengui is a billionaire businessman who claimed to have close ties to China’s civilian and military intelligence services and broke with the regime. Guo revealed in his first interview in the US that those espionage networks reportedly include up to 25,000 Chinese intelligence officers and more than 15,000 recruited operatives. Guo explained that he learned about Chinese spy activities from Ma Jian, a former vice minister of the civilian intelligence service and Ji Shengde, a former military intelligence chief. As that figure, 25,000, was put forward nearly 5 years ago, the number of Chinese intelligence officers who have essentially strolled into the US and are now operating clandestinely and successfully on the ground now may be much higher. Surely, there is an officially estimated number of Chinese intelligence officers and operatives in the US Intelligence Community. Whether it will ever be made public remains to be seen, but surely, even without that figure, there is some general acceptance that what is coming toward the US is à la débandade.

People’s Republic of China Minister of State Security, Chen Wenqing (above). Chen studied Law and Political Science at Southwest University in Chongqing, and joined the Ministry of Public Security in 1984, where he worked for a decade. In 1994, Chen was assigned to the Ministry of State Security (MSS), becoming Deputy Director at the Sichuan provincial state security department. In 1998 Chen took over leadership of the State Security Department in Sichuan. He held that position until 2002, when he was appointed Chief Prosecutor at the Sichuan Provincial People’s Procuratorate. In 2006, Chen transferred to Fujian, serving as Deputy Party Secretary and concurrently head of the provincial Commission for Discipline Inspection (CCDI) until 2012. Following the 18th National Congress of the Communist Party China, Chen was brought to Beijing to serve as a Deputy Secretaries of the CCDI. He was appointed Party Secretary of the MSS in October 2016 and Minister in November 2016.

Section 2: “Key Findings”

In the section, “Key Findings”, Eftimiades provides a list of judgments supported by the information and data in his monograph. For readers, especially students, they may provide some guidance on an academic inquiry concerning Chinese intelligence. Right out of the gate, he notes that his “Key Findings” section is the product of his earlier analysis of 595 documented cases of China’s worldwide collection efforts. Thereby, they stand here independent of, but a primary feature of what is discussed in the monograph. In the monograph’s “Preface”, Eftimiades plainly states that “the focus of this work is on [China’s] worldwide human intelligence (HUMINT) operations.” Yet, in his key findings, he seems to indicate that the true focus of the monograph’s discussion, rather than being the aggregate espionage efforts of government organizations and commercial entities, academic institutions, and independent individuals in the US, is Chinese government civilian and military operations. Imaginably for some, Eftimiades may appear to shortshrift readers on any findings developed through the study of the totality of China’s espionage in the US. Perhaps in Eftimiades’ defense, his omission may very well have been more of an issue of editing and oversight.

To the extent that his key findings are limited to government espionage activities, some might readily assert that rather than opening up new territory, his findings were nearly all well-trodden ground. Indeed, at first blush, one might view what Eftimiades presents as his findings as a somewhat prosaic enumeration of highlights from his examination of the 595 cases. However, greatcharlie assures that they are much more as there are some striking elements among them. Eftimiades 10 key findings were a follows: 1) Chinese espionage activity  has greatly expanded in the past 20 years; 2) Chinese entities conducting espionage include government agencies, the People’s Liberation Army, State Owned Enterprises, private companies, individuals, and several universities; 3) Approximately half of China’s worldwide intelligence collection efforts target military and space technologies; 4) Over 90 percent of China’s espionage activities are performed by ethnic Chinese and males perform more than 80 percent of it; 5) The Ministry of State Security, China’s main civilian intelligence service, exploits social media to target foreigners with access to sensitive information. Those recruitment efforts vary in quality considerably; 6) The Ministry of State Security make use of China’s visa and border control system to identify potential recruitment and manage clandestine assets; 7) Ministry of State Security espionage tradecraft has improved over the last four years, due in part to pressure against it from US counterintelligence services; 8) Nearly half of China’s traditional espionage efforts–pursuing political and military secrets–and covert action campaigns are targeted against Taiwan; 9) China’s foreign science and technology collection efforts correlate closely to the priority technologies identified in government strategic planning documents; and, 10) China’s “whole society approach” to espionage has a harmful effect on the US economy, diplomatic influence, and military capabilities. Furthermore, China’s actions threaten European national and economic security through espionage and coercion against government entities and business decision making.

What sparked greatcharlie’s interest considerably was Eftimiades finding concerning non-ethnic-Chinese recruitment, that more ethnic Chinese recruits are used than nonethnic ones by Chinese government organizations and commercial entities engaged in espionage in the US. Multum in parvo. (Much in little. (Small but significant.))

He makes an impressive statement, but regrettably, he does delve deeper into this issue at any point later in the monograph allowing readers to understand how he got there.  His “Analysis of Espionage Tradecraft” section would have been taken to even greater heights. Useful at some point of the monograph’s discussion also would have been some background on the evolution of Chinese intelligence practices to recruit nonethnic Chinese as well as ethnic Chinese as operatives. With regard to greatcharlie’s aforementioned presumption concerning Eftimiades somewhat likely effort to stoke debate on the monograph, perchance once again he is providing more grist for the mill on this score. Perhaps a set plan regarding the monographs page length did not allow him to expound on the matter.

Perhaps it would be enough for some to say in this case that Chinese intelligence services may have recognized they can achieve their respective goals more efficiently and effectively by working mainly with ethnic Chinese recruits. Yet, surely, Chinese espionage in the West has evolved from pursuing ethnic Chinese sources alone. All things considered, such a limited effort by Chinese government organizations and commercial entities would hardly be the case. It stands to reason that the number of nonethnic recruits with which they have been successful is far higher than the few he has enumerated. To an extent, in Eftimiades own examples there is evidence that a number of nonethnic Chinese operatives were targeted and successfully recruited. Chinese intelligence services clearly have the interest and capabilities to bring in such recruits presumably as would Chinese commercial entities engaged in espionage in the US.

As discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” it was once generally understood in the West that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers, businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections, and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use. However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method.

Guo Wengui, aforementioned here as the billionaire businessman who broke with the regime and revealed information from highly placed sources in the Chinese intelligence services that China’s espionage networks reportedly include up to 25,000 officers and 15,000 operatives, also spoke on the matter of non-ethnic-Chinese recruitment. Guo said Ma Jian, who recall was the vice minister for the civilian intelligence service, told him that a major shift by the Chinese was expanding the scope of agent recruitment from Asians to other ethnic groups.

One might argue that if Chinese government organizations and commercial entities engaged in espionage in the US were running only a few nonethnic operatives in the field, an idea Eftimiades’ statistics would apparently support, those few nonethnic operatives were doing a colossal amount of work alone to collect the loads of information from institutions where ethnic Chinese may not necessarily have been well represented or significant at all. In the abstract, and not to cast aspersions on any employees anywhere in which the erstwhile spies worked, but it may have been the case that other nonethnic Chinese employees were involved in espionage in those same institutions who went undetected and whose work was completely unknown to those who were caught.

Imaginably from a counterintelligence standpoint, if Chinese government organizations and commercial entities engaged in espionage in the US were running merely two or a few more nonethnic operatives in the field, trying intercept so few well-concealed individuals from a field of dozens of potential spies would conceivably be rather challenging. Finding them all during the past few years would be nothing less than spectacular accomplishment. C’est chercher une aiguille dans une botte de foin.

Chinese government organizations and commercial entities engaged in espionage in the US go after whomever might be best suited to meet their needs. For the accomplished services in the intelligence industry, espionage is a results focused business, not an ethnocentric one. It was noted earlier that Eftimiades insists that no one really knows how many officers and operatives working for China are on the beat in the US, but later in his “Summary” section suggests that they may very well number in the thousands. Aforementioned, too, were claims that the numbers of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field would be enormous. If those high numbers are accurate, it would likely mean those officers would be going after greater numbers of recruits. Surely, along with increased ethnic Chinese recruiting, nonethnic Chinese recruiting numbers would see far more than a nominal increase as a result.

Incidentally, Eftimiades mention of the balance between ethnic and nonethnic Chinese recruitment by Chinese government organizations and commercial entities engaged in espionage in the US, determined as a product of his analysis of the 595 cases, somewhat flies in the face of what he boldly asserted earlier in the discussion on the general on the unawareness of numbers of officers and operatives working on the ground there for China. As stated earlier, to the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US is in the abstract.   

People’s Republic of China PLA Major General Chen Guangjun (above), Chief of Central Military Commission (CMC) Joint Staff Department Intelligence Bureau. The 54 year-old Chen currently serves as chief of Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau as well as an Assistant to the Chief of the Joint Staff. Chen joined the Rocket Forces of the PLA in 1984. In the mid-2000s, he earned a Ph.D. from Northwestern Polytechnical University. The PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. Chen achieved some notoriety prior to taking over the Joint Staff Department Intelligence Bureau. Through 2007 and 2008, Chen was the focus of several newsmedia reports chronicling his role in improving levels of education in his unit.

Section 3: “Introduction”

Eftimiades begins his Introduction by stating that while espionage is often employed to support foreign policy, a country’s clandestine activities rarely become the subject of foreign policy. However, despite how rare it might be, he says that is the case for the People’s Republic of China with its massive “whole of society” approach to conducting espionage. Eftimiades believes its approach is creating a new paradigm on how intelligence activities are conducted, viewed, and addressed by countries. He notes that a key element in the US-China trade war and downward spiral in relations–a matter the received much attention from the US newsmedia at the time he penned his monograph–is Washington’s demands that Beijing cease stealing US intellectual property and trade secrets. Despite China’s denials, Eftimiades stressed that “hundreds of recently prosecuted espionage cases” prove otherwise. China’s espionage activities are changing the global balance of power, impacting the US and foreign economies, and providing challenges to domestic, national security, and foreign policy formulation.

Not to be an apologist, but rather, to be fair-minded, Eftimiades notes that there are otger governments, companies, and individual entrepreneurs that violate US laws in the drive to possess or sell US technology, government and corporate secrets. He states: “Violating a country’s laws is common practice in the murky world of espionage. According to Eftimiades, almost every time an intelligence service conducts espionage in another country, it violates that country’s laws, and that includes US intelligence operating overseas.” However, he insists that the difference is that the US and other countries engage in espionage to determine and counter hostile or potentially hostile adversaries. The purpose of espionage is not to develop their countries’ own industries or transfer foreign wealth which is a main focus of China’s activities.

There is little doubt that the public affairs departments of nearly every bureaucracy under the State Council, and Propaganda Department and Foreign Affairs section of the Communist Party of China would chomp at the bit to enthusiastically and gloatingly state in response that the US space program was developed through the employment of scientists and engineers from Occupied Germany. The resettlement of the professionals and all of their research and development was facilitated by intelligence elements of the US national security bureaucracies. The Chinese would doubtlessly assert that US activities on that matter essentially established the model for acquiring foreign capabilities through national security bureaucracies to support their technological needs and channel down to large industries mostly related to defense and intelligence to support their advancement. Chinese public affairs spokespersons would surely go on to state, likely with the pretension of lamenting, that as a result of depriving Germany of its own citizens best efforts in aerospace technologies, the country was denied trillions in revenue from potentially providing the world the fruit of their expertise. Indeed, Germany could have become the epicenter of aerospace technology development and research in the world. (Mind readers this is a presumed argument of the Communist Party of China, not at all the position of greatcharlie.) Mayhap, the counterpunch would be that Werner Von Braun and the other German scientists and engineers sought to to the US and if they were left to their devices in Occupied Germany, the Soviet Union would have surely grabbed them up to use for Soviet Premier Joseph Stalin’s sinister purposes. Germany as a whole benefited immensely from postwar reconstruction due to the US Marshall Program. German industries were given an excellent restart as a result of their rebuilding and retooling under that program.

Section 4: “Analytical Methodology”

Eftimiades explains that for purposes of this study, all of the legal definitions of criminal acts in the statutes and administrative regulations found in the export violations–International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), International Emergency Economic Powers Act (IEEPA), as well as covert action, and research violations, are categorized as espionage. Eftimiades again explains that over a period of 10 years, he compiled and analyzed 595 cases of Chinese espionage that have occurred worldwide. He notes that over 450 of those cases occurred after 2000. He states again that through the analysis of these cases, sufficient evidence provided on espionage by the Chinese government, Beijing’s promotion and support of organizations outside of the government responsible for the same, and the information objectives, determines gaps in their knowledge, and operational “tradecraft” techniques of those organizations.

There is perhaps an argument to be made that once Eftimiades decided upon the definition of espionage mentioned in this section, he shaped his discussion of what Chinese non-government entities, institutions, and individuals would be viewed as engaging in espionage. One could hardly find fault with his decision. After all, his choice was not without precedent as certain bureaucracies of the US government involved in the 595 cases he studied made the same decision based on the law. However, from the lens of the accused Chinese non-government entities, institutions, and individuals, it may be the case that they were stealing trade secrets and intellectual property, but they may not have viewed their actions as espionage, rather just theft and just a part of business. One could imagine individuals of elements involved with such thefts saying with acidulous humor that if those, who possess information that they desired to purloin, really wanted to prevent theft, they would do a far better job at securing that information. Those with such larcenous instincts might go on to insist that those possessing the information would need to look deeper within to find the answer as to why they have so often left themselves wide open to theft. This thought, on the perception of thieving Chinese non-government entities, institutions, and individuals on whether their actions are a matter of espionage or “merely” grand larceny, is developed further in this essay in the “Analysis of Espionage Tradecraft” section.

The monograph’s following four sections on Chinese operations and tactics were meat and drink for greatcharlie and will likely be for like-minded souls. They are: Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; and, Section 9: “Analysis of Espionage Tradecraft”. Only three of the four are fully discussed in this review.

Section 6: “PRC Organizations Conducting Espionage”

The espionage effort by Chinese government organizations and commercial entities, as explained by Eftimiades, has features that are entirely its own. From an analysis of his 595 cases, Eftimiades explains espionage activities correlated to their sponsoring organization (the “customer” receiving the information or technology) showed five distinct clusters of organizations engaging in espionage. The governing Communist Party of China uses government, quasi government, academic, and commercial entities as mechanisms to conduct all forms of espionage abroad. Most interesting of these are China’s “non-traditional collectors”, which include State Owned Enterprises, universities, and private companies. He confirms that the employment of such a broad set of entities for intelligence collection evinces China’s “whole of society” approach to espionage. The list of includes: 1) the Ministry of State Security, the Guojia Anquan Bu, China’s preeminent intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad; 2) the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology; 3) State Owned Enterprises (SOE), include the 50,000 aerospace and defense companies, subordinate research institutions, and technology transfer organizations owned by the central government; 4) Private Chinese companies or individuals acting unilaterally for commercial benefit only were engaged in espionage in approximately 22 percent of cases Eftimiades analyzed, and in nearly 30 percent of those cases, there was a clearly identifiable Chinese government, SOE, or university as the ultimate customer for illegal exports or trade secrets; and, 5) Other Chinese government elements that collect intelligence (information) and technology include the PLA Political Department Liaison Office (targeted against Taiwan), the United Front Work Department (UFWD), and many universities under the State Administration for Science, Technology, and Industry for National Defense (SASTIND). 

Most intriguing to greatcharlie was Eftimiades’ discussion of the PLA Political Department Liaison Office, the UFWD, and SASTIND. Beginning in reverse with SASTIND, Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Clearly put by Eftimiades, as the start point of a virtual wheel of information exchange, SASTIND assigns projects to ministries with military production responsibilities. Those ministries pass the work to the research institutes under their auspices. The associated research institutes send their information and technology gaps back to SASTIND. There are two departments within SASTIND,responsible for developing and tasking technologically related intelligence requirements and for collecting intelligence against those requirements.They are the Comprehensive Planning Department and the International Cooperation Department. The Comprehensive Planning Department tasks collection to the MSS and most likely to the PLA Joint Intelligence Bureau. The International Cooperation Department has its own independent collection capability. Members of this department travel with China’s scientists to collect information against specific requirements.

Eftimiades reports that SASTIND also has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. Some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. That list includes: Beijing Institute of Technology; Beijing University of Aeronautics and Astronautics; Beijing Engineering University; Harbin Engineering University; Harbin Institute of Technology; Northwestern Polytechnical Institution [University]; Nanjing University of Aeronautics and Astronautics; and, Nanjing University of Science and Technology. As of the monograph’s writing, over 35 Chinese universities (or professors from those universities) have been identified in US federal court documents as having some role in China’s overseas espionage cases, according to Eftimiades.

Eftimiades explains that the distribution of Chinese espionage cases worldwide illustrates the magnitude of Communist Party of China controlled businesses, research entities and business organizations involved in espionage activities. Providing superb graphs and charts for readers to examine while following along with his discussion, he shows that there is a near equal distribution of espionage activities between the four major organizational clusters (MSS, PLA, SOEs, and Private Companies). Eftimiades explains that the distribution indicates a concerted effort to use all mechanisms of government and the economy to collect foreign information and technology. To date, the Communist Party of China and the Chinese government have not taken steps to impede illegal activities (according to foreign countries laws) of their state corporations, private businesses, universities, and citizens. Eftimiades says China, referring to it once again as a “digital authoritarian state”, is clearly capable of doing so. He suggests that the Communist Party of China sees the appropriation of foreign innovations and technology as part of a policy aimed at developing domestic technology and increasing production.

In addition, his statistical breakdown of the 595 espionage cases illustrates that Chinese private companies have an aggressive posture in conducting espionage, resulting in 136 cases or approximately 23 percent of all activity worldwide. Similarly, SOEs were surreptitiously examining or collecting information or technology in 121 cases or 20 percent of the total. The SOEs are primarily collecting advanced military technology and associated research. Private companies and individuals primarily pursue commercial technologies, intellectual property and military technologies. Espionage activities conducted by the PLA Joint Intelligence Bureau give primacy to defense information, armaments, and military (or dual use) technology. The PLA was involved in 122 instances of espionage or 19 percent of all cases. Eftimiades reports that the MSS was involved in 95 instances of espionage or 16 percent of all cases. Preferred MSS targets included political or defense information, foreign policy, overseas dissidents, military capabilities, too, and foreign intelligence services. The final category of entities conducting espionage on behalf of China were Chinese universities and the UFWD. The universities generally targeted foreign technology to support advanced military weapons systems development and commercial endeavors.

Regarding the PLA Political Department Liaison Office, Eftimiades, in a markedly  unadorned way, explains that it is targeted against Taiwan. However, some confusion may befall those readers who perhaps may think of the Communist Party of China’s International Liaison Department when they come across the title, International Liaison Office. Among the pertinent facts, as part of Xi’s military reforms, in November 2015 the General Political Department of the Central Military Commission was abolished and was replaced with the Political Work Department. In January 2016, the Political Work Department became official. Its primary role as the chief political organ under the Central Military Commission is to integrate the Communist Party of China and its ideology and propaganda into the People’s Liberation Army. In that role, its responsibilities include: preparing political and economic information for the reference of the Political Bureau; conducting ideological and political work on foreign, particularly adversarial armed forces, by promoting China’s policies among their ranks, and disrupting unit cohesion within adversarial forces by withering their morale. It also has the duty to incite descension and rebellions particularly within the Taiwan army and other foreign armed forces. The Political Work Department’s Liaison Department controls a united front organization called the China Association for International Friendly Contact (CAIFC) that is active in overseas intelligence gathering and influence operations. Reportedly, the International Liaison Office has dispatched agents to infiltrate Chinese-funded companies and private institutions in Hong Kong. Their mission is also counter-espionage, monitoring their own agents, and preventing their recruitment of Chinese personnel by foreign intelligence services.

The International (Liaison) Department of the Communist Party of China is a very different organization. It stands as one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the UFWD, the Chinese People’s Political Consultative Conference (CPPCC), the Propaganda Department. Founded in 1951, International (Liaison) Department is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International Liaison Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as a UFWD bureau before being carved out into an independent entity.

You Quan (above), head of the Communust Party of China’s United Front Work Department (UFWD). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance.

Although he mentions the UFWD, Eftimiades does not provide any discussion of the organization. For readers wholly unfamiliar with it, greatcharlie provides some small treatment here. As discussed in the October 19, 2020 greatcharlie post entitled, “The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department”, within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. Xi has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. United front work is the central element to understanding what the Communist Party of China is doing and why to shape the world outside of itself. In a June 9, 2020 Australian Strategic Policy Institute report, You Quan, the head of the UFWD, is quoted as saying: “The United Front is a political alliance, and united front work is political work. It must maintain the party’s leadership throughout, having the party’s flag as its flag, the party’s direction as its direction, and the party’s will as its will, uniting and gathering members of each part of the United Front around the party.” People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a 1950s CIA paper, united front work was referred to as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the Party.

Perhaps from a publisher’s point of view and with some intimation of what would most interest the monograph’s readers in fields of business and finance, Eftimiades thought it most necessary to place emphasis upon the State Administration for Science, Technology, and Industry for National Defense (SASTIND) over all of the other PRC organizations engaged in espionage. The information presented on SASTIND, for instance, is assuredly not part of regular discourse on Chinese espionage. Eftimiades, in a rather sedate tone but still a quite edifying stream of consciousness, lays out what that government organization’s well-controlled work against the US and other highly industrialized countries worldwide and its stealthy and insidious nature.

It should be expected, and may actually be tacitly accepted by some intelligence analysts in the US and in the services of other highly industrialized countries, that among Chinese government organizations and commercial entities on the ground in the US engaged in espionage, there are understood defined areas of responsibility and much as the clear boundaries already set, and well-known, between PLA HUMINT targets and activities and those of its civilian counterpart, MSS, similar arrangements have been made to avoid unwittingly conducting redundant operations, accidental collision of officers and operatives in the field, and potential interservice competition and quarrels in pursuit of available sources for US secrets. A similar delineation between the MSS and Zhōnghuá Rénmín Gònghéguó Gōng’ānbùthe Ministry of Public Security of the People’s Republic of China (MPS), both a law enforcement and an intelligence and counterintelligence service. Harmony among organizations is doubtlessly desired and required in order for them to succeed and to avoid being caught.

Yet, with so many Chinese government organizations and commercial entities on the ground in the US engaged in espionage, theft, overt collection, hiring operatives, surveilling and studying the opposition, as a reality, on more than one instance an effort to collect a particular type of information might lead more than one organization, for example, one governmental and one commercial, to the same target. One might imagine how chaos could reign without some communication. Officers and operators, perhaps not even immediately aware of each others presence, might literally run into each other, occasionally tread on each other’s work, and might even step on each other’s toes now and then creating some disruption. Some general agreement between organizations and entities in the field would need to exist in order to ensure possible fruitful operations would not face “friendly” challenges and obstacles albeit unintentionally, and to ensure they are enabled to adhere to clearly delineated lanes of action for each organization. On the matter of security, one might imagine how much easier it would be to detect and intercept Chinese espionage operators from the different organizations if they all kept showing up at the same institution trying to contact, recruit, smooze, cajole the same people in them, or one institution were simply bombarded by attempts by individuals to inveigle their way into it with a similar focus on its research and development. Obviously Chinese espionage efforts have been far quieter, smoother, and more sophisticated in nature.

Perhaps the best way to what is discussed here is simply to state that there are likely furtive bridges across organizational lines and areas of responsibilities that allow managers on the ground and officers, old hands in the business who have mastered the job, engaged in intricate operations against similar targets to directly communicate, provide assistance, modest resources, and advice all designed to facilitate security and activities and promote success. It would be a form of unofficial, collegial, furtive modus vivendi established with the requirements for operational security firmly in mind and every imaginable precaution taken. In this section, Eftimiades briefly mentions that in at least two cases, there were actually joint MSS and PLA operations in which individuals inside an aerospace company were recruited as operatives to assist in targeting the company for cyber-attacks. The MSS is so segmented with its many state department’s and provincial bureaus, that the most effective aspect of any effort by the two organizations to work jointly must have occurred between managers in the field. Given the success each espionage element, government or otherwise, has found in the US, the Communist Party of China, which would indubitably be aware of such interorganizational contacts, would likely stay mum about it all but monitor it all the same. After all, Communist Party of China intelligence organs operating sub rosa in diplomatic missions and commercial entities or incognito wherever else, would conceivably benefit too from being tied into the clandestine communications among managers in the field imagined here.

Concerning another point that flows from this discussion, rather than lacking actual knowledge or even a good sense of where everyone was relative to each other among Chinese government organizations and commercial entities engaged in espionage in the US and not having an full account of who was on the ground and stand bereft of paths for the most senior network managers of each organization to liaise, potentially in some extraordinary emergency, in the abstract, surely one could conceive that there would be a least some tacit coordination among their senior leaders, perhaps back in China. Such information would at least be in PLA, MSS, and–as often ordinary Chinese citizens will usually be involved–MPS hands. MPS surely has the most complete, up-to-date records–are perhaps often pulled into the mix of overseas espionage activities to some small degree for that reason. That information would also most likely be in the hands of the Communist Party of China via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that it helps the Party maintain its tight grip on the population.

For the edification of greatcharlie’s readers who may be not so familiar PLA intelligence, as explained in the  January 31, 2021 greatcharlie post entitled Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)”, the PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission. Thereby, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), something similar to the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare are now aggregated into the Strategic Support Force. As with its sister civilian service, the MSS, and intelligence services worldwide, the PLA makes regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. It aggressively uses Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection.

Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Eftimiades reports that SASTIND has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. On that list is Northwestern Polytechnical University of Xian, China, It is ranked number 1 in the discipline Aeronautical and Astronautical Science and Technology, known for producing some of the best brains in China’s defense industry.

Section 7: “Intelligence Collection Objectives”

As promised, greatcharlie has condensed the sections of Eftimiades monograph, providing important details, but it has not revealed everything. Yet, with such a relatively short text, there would naturally arise occasions when little option would appear available than present wholly what is provided in a particularly diminutive section, in order to provide the reader with a full understanding of the author’s thinking. That is the case with the “Intelligence Collection Objectives” section of the monograph. Under what has been whimsically dubbed as “spookspeak” by members of the intelligence industry some time ago, Collection Objectives, also known as Information Objectives or Requirements, identify the specific information or technology that is tasked to intelligence services for collection. Eftimiades stated that requirements can number in the tens-of-thousands, and explains that one can infer from requirements a country’s knowledge and technology gaps for they are a reflection of them. He provides as an example a country that has been continually pursuing information on specific components of turbine engines. The implications and indications for taking that course, says Eftimiades, are that the country most likely lacks the required information or technology on turbine engines for its planned purposes and espionage presents the only immediate way of acquiring it. Non solum eventus hoc docet, iste est magister stultorum, sed etiam ratio. (Not only does the outcome teach (us) this, that is the teacher of fools, but (so) too does reason.)

Regarding China, Eftimiades explains that its strategic collection objectives can be identified through a number of national level strategic planning documents. Listed earlier in the “Key Findings” section in the monograph, they are: Made in China 2025; Space Science and Technology in China; and, A Road Map to 2050, the National Key Technologies R&D Program, and the 13th Five Year Plan. Those national level strategic planning documents can be subdivided into specific technology development programs, are the following: the National Basic Research Program (973 Program); the National High-Tech Research and Development Program (863 Program); the National Key Technologies R&D Program; and, The National S&T Major Projects. Eftimiades offers a subset of those National S&T Major Projects which includes: Advanced Digital Control Machines and Fundamental Manufacturing Equipment; Breeding of New Variety of Transgenic Biology; Core Electronic Devices, High-end General Chips and Fundamental Software; Key New Drug Innovation; Large Scale Development of Oil and Gas Fields and Coal-bed Gas; Megascale Integrated Circuit Manufacturing Technologies; Next Generation of Broad Wireless Mobile Networks; Wastewater Control and  S&T Achievement Industrialization; National New Products Program; and, the National Soft Sciences Research Program. 

Eftimiades says that as one further breaks down the strategic technology objectives, a strong correlation to China’s espionage activity emerges. The Director of National Intelligence report, Foreign Economic Espionage in Cyberspace (2018) identified industries and private technologies that are frequent targets of foreign espionage. Eftimiades’ informs that an even closer correlation between China’s espionage efforts and national requirements can be made when comparing the 595 cases with the 19 key Technologies identified in the Communust Party of China strategic industrial planning documents Made in China 2025. These technology requirements were the primary objectives in the 435 cases. The fact that such a high proportion of espionage activities are correlated in Made in China 2025 Key technology list indicates the Communist Party of China’s role in guiding China’s global espionage effort.

Laying out points on this matter from his case analysis for all readers to understand, avec brio, Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks. Such collection efforts support PLA military aerospace programs and China’s commercial aviation sector. Going further, he states that a review of the 116 cases targeted at aerospace companies identified over 200 specific military and civilian technologies and trade secrets (stolen and attempted stolen). Among the many “Key Technologies” sought, were: Cryogenic pumps for space vehicles, valves, transfer lines, refrigeration equipment, space qualified radiation hardened circuits, components for the storage and use of liquid hydrogen, cryogenic coolers, Ka-band space communications, satellite/missile insulation blankets–germanium coated polyimide film, and multi octave traveling wave tubes used as amplifiers in satellite transponders. Major systems include: the Space Shuttle, Delta IV Rocket, F-15 Fighter, C-17 transport, F-22 Fighter, F-35 Fighter, B-1 Bomber, Ch46/47 Chinook, C-130 training equipment.

China’s Mars rover, the Zhurong (above) rolls off its lander, to begin a mission of seeking out geological discoveries. Was its development the result of espionage? Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks.

Another high priority collection target of Chinese espionage is information technology. Statistically speaking, China’s collection of information technology (113 cases) is second in numbers only to aerospace technology. China has placed strong emphasis on collecting information technology to include semiconductors and manufacturing technology. Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did. The Chinese company Huawei has been under similar export restrictions for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Key information technology related to China’s collection requirements include: microelectronics, microwave integrated circuits, microprocessors, circuit boards, crypto key devices, data and voice transmission systems, semiconductors, and trade secrets such as laser manufacturing techniques. Semiconductor manufacturing is a priority target for Chinese espionage as the US and several other nations still maintain a sizable lead over China in production capabilities. Additional priority targets for collection include biopharma and medical devices, automated machine tools and robotics, energy saving/new energy vehicles, and new materials development. Eftimiades informs that these are often distinct patterns of intelligence activity that correspond to each category of technology. For example, excluding China’s  cyber espionage campaigns, collection on biopharma and medical devices is limited to exploiting research programs (e.g., Thousand Talents Program) or economic espionage using company insiders. The three targets for this category are universities, research institutes, and pharmaceutical companies. Lastly, In the category of energy saving/new energy vehicles, Eftimiades states that most of the collection activity has been economic espionage employing insiders. The two targets for this collection effort have been companies and research laboratories. Eftimiades reveals that the majority of thefts of this technology have occurred through insider threats with cyber espionage as a secondary method.

To be succinct, in many fields, subject areas for analysis, facts are often misused and abused, but on intelligence, it can lead to great failures, and potential national disaster. Facts cannot be nailed down and used to support only what one wishes. To the contrary, facts should take the analysis toward what is authentic. From that judgments and plans must be based. Doing anything otherwise, especially while in pursuit of an opponent, is simply to procrastinate by entertaining oneself with errant deliberations. The opponent, no matter what one might choose to believe, does not procrastinate. As Eftimiades, himself, notes in the “Intelligence Collection Objectives” section of his own text, the Chinese know what they want and go after it at the time, in the way, and with the means they desire. Operatives complete their tasks and off secrets go–and oftentimes actual technologies as well–to China. That is one of the simple and more apparent keys to the opponent’s success.

China has shown little compunction over putting in full view at home, marketing, technologies, and making geopolitical moves that would be suggestive of the fact the information that allowed for those developments and actions was stolen from the US. It is almost as if the Communist Party of China encourages such actions to flaunt their country’s considerable bag of intelligence victories. Of course, government officials in Beijing will normally assert that there have been thefts and declare any evidence presented of such as circumstantial or outright lies.

Given just how much China has poached from the US has been revealed, even paraded in Beijing, one could reasonably conclude–and it is absolutely true–that China has run off with far more than a bale of information and data on classified defense and intelligence related projects, innovative commercial products, trade secrets, intellectual property, and classified foreign and defense policy documents. It is safe to say that an enormous amount is being collected. It might leave some to reasonably accept that a stratospheric level of espionage is being conducted by far greater numbers of intelligence officers and operatives and it has been ongoing.

Eftimiades provides a brilliant account of Chinese intelligence collection requirements. He supports his claims with superb charts. Some are practically signposts pointing to where the adversary is likely to show up next. Some are strong enough to serve as figurative beckoning fingers enticing along with whispered words, “Here they are.”

Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE, now defunct. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did.

Section 8: “Analysis of Espionage Cases”

The dominant activities for China’s overseas espionage are espionage, economic espionage, and export administration regulation (dual use) violations, together comprising 60 percent of all activities. Taken as a whole, statistically speaking, illegal exports (theft of dual use and military technology) make up approximately 47 percent of China’s espionage activities abroad. Eftimiades divides the 595 espionage cases that he analyzed into the following categories: espionage; economic espionage as defined by ITAR, EAR, IEEPA; covert action; and, research violations. China’s illegal export of military and dual use technology, to include IEEPA, EAR, and ITAR violations and other export related violations in the US, comprise 43.7 percent (260) of all cases worldwide. Eftimiades says more than 80 percent of these cases occurred in the US. Reportedly, economic espionage which is mainly conducted by private companies or individuals, account for 25.98 percent (119 total) of cases). The category of “traditional espionage” stands at 22 percent (108 total) of worldwide activities. Eftimiades notes the figure of traditional espionage cases sits at 55 if Taiwan is separated out as a Chinese intelligence target. Of known cases, Taiwan is the single highest priority target for individual espionage.

On a chart provided by Eftimiades, one can observe the distribution of cases to the many venues of Chinese espionage in the US. The distribution pattern reveals concentrations occurring in tech sectors, manufacturing hubs and business centers. In California, “Silicon Valley” is shown to be the number one spot in the US for China’s illegal technology collection efforts. Apparently, more than half of the 140 cases that occurred in California targeted technology firms in that venue. Other cases centered around San Diego and then Los Angeles in the state. Further, collection activity in California was mainly economic espionage (51) cases), EAR violations (30 cases), ITAR violations (25 cases), and IEEPA violations (13 cases). In the economic espionage cases, the predominant form of tradecraft was using insiders (employees) to access restricted technology and trade secrets. Priority collection objectives in California were information technology (46 cases), aerospace and aeronautical equipment (27 cases), and automated machine tools and robotics (20 cases). Nationwide, China’s collection activities cluster around the major educational, research, and manufacturing centers in several states to include Massachusetts, Michigan, New York, Pennsylvania, Florida, New Jersey, and Texas. Victims of China’s espionage efforts in the US include major defense and aerospace companies, pharmaceutical firms, technology research companies, and manufacturers. In cases in Virginia and Florida, Chinese diplomats and citizens were caught trespassing on military facilities to conduct ground photo reconnaissance. Those facilities were associated with US Naval forces and special operations capabilities.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) Eftimiades notes that research universities are clearly primary targets for collection efforts, achieved most often through talent programs such as China’s Thousand Talents Program, Hundreds Talents Program. Eftimiades reports that most estimates suggest there are “at least 200 Chinese talent programs designed to employ academic and professional expertise from the West into serving China’s national development.” He continues further to explain: “This expertise ranges from scientific and engineering fields to business, finance, and social Sciences. These programs are serviced by 600 overseas stations that gather information on foreign scientists and then attempt to recruit them. In numerous cases, professors, graduate students, and PLA researchers have also been arrested for stealing research from overseas universities for use in China.”

Chinese intelligence services apparently studied the situation, and recognized just how open the US was for theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. Surely, the Communist Party of China saw no need to halt commercial entities engaged in their own espionage activities, much as Eftimiades remarks earlier in the section entitled “PRC Organizations Conducting Espionage”. It appears they have seen nothing but opportunities to do a lot of open field running for them with little real risk. To date, it appears that they have all found no reason to pare down their operations, and certainly no reason to retreat. From Eftimiades own data, one can infer their espionage activities have steadily increased. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Though Eftimiades explains in his Preface that “cyber espionage is only addressed in select cases which were enabled by humans providing insider access. However, in discussing how exactly the FBI and DHS have thwarted Chinese espionage efforts later in his “Analysis of Cases” section, the discussion meanders into cases in which they discovered sources within China of cyberattacks into sensitive computer files of the US government, defense related businesses, financial institutions, high-tech and medical research facilities, academia, and anywhere else the hackers apparently believed there was a good opportunity to break-in and seize data. While Eftimiades expressed the intent to focus on HUMINT operations and tactics of Chinese government organizations and commercial entities engaged in espionage in the US, it would seem that he had little choice but to present it if he sought to put some positive face on what US counterintelligence services are doing to thwart China’s efforts. It is the brightest rift which can at present be seen in the clouds,

Readers may recall in Act 1, scene 3 of William Shakespeare’s play, The Life and Death of Julius Caesar, Cassius utters these apposite words to his co-conspirator Brutus: “The fault, dear Brutus, is not in our stars / But in ourselves, . . . .” With the intention of being frank, but by no means beastly, greatcharlie proffers that the fault for China’s success may lie with the US counterintelligence services themselves. It may be less a matter of tactics, techniques, procedures and methods, and rather a problem among US counterintelligence service personnel that the Chinese have recognized that they can exploit. As a matter of professional development, some effort might be made to ensure their cognitive abilities regularly honed through weekly, even daily, exercises and tests to strengthen their thinking skills, their prowess at uncovering all relevant facts, even from trifles, and developing solid insights from those facts, and their effective and correct use of a reliable intuition and intimation. Though this is stated in the abstract, one can almost be certain that the Chinese intelligence services to some degree are doing like-minded things to strengthen their intelligence officers competences. It could be something as simple as the private performance of Tai chi chuan or likely Martial Qigong every morning. (imaginably, both techniques would be performed respectively with a dynamic and free-flowing form and stances that would cause any instructor to weep with delight while observing ) Along with exercise, stretching, and breathing, it would allow their intelligence officers to mediate and attain deep focus and a relaxed state. Such activity would be helpful in any struggles with dépaysement.The Chinese intelligence services surely are quite determined to maintain an edge over their adversaries. So far, they have proved themselves to be competent and accomplished services in the field.

The Chinese company Huawei has been placed under similar export restrictions as ZTE had been, for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Section 9: “Analysis of Espionage Tradecraft”

As stated earlier, a condensed review of Section 9 “Analysis of Espionage Tradecraft” is not included here. The section is left to each reader to enjoy at first blush and perceive and decipher all they can from it. Recall that in November 1922, when excavating the tomb of Tutankamen, the English archeologist and Egyptologist, Howard Carter, pierced a hole enabling him to see inside the actual chamber. He was asked by colleagues if he could see anything, and he simply replied: “Yes! Wonderful things!” Readers will say the same when they read this section.

Having stated that, greatcharlie nevertheless includes some commentary on section, compelled by Eftimiades to mention that among those committing acts of espionage for China are commercial entities, SOEs and private companies, academic institutions, and independent individuals, particularly entrepreneurs. Eftimiades explains that SOEs and commercial entities have been determined to engage in espionage in the US and elsewhere outside of China. Having dubbed them as entities engaged in espionage, they are examined as such and ascribe all of the qualities of an intelligence service. Thereby, one would expect to observe certain traits of an intelligence service such as tradecraft to be performed by their representatives while operating in the field. Yet, unless there is some information collected by US Intelligence Community–and that would unbeknownst to greatcharlie–stating those entities as well as individual business engaged in similar acts, view themselves to be intelligence services or espionage organizations, one may not see them regularly act as such.If they display any tactics, techniques, or methods that resemble tradecraft it should be viewed as exceptional and not an expectation. Imaginably, they, themselves, might be quite surprised anyone might refer to them as espionage organizations. They simply may view themselves as a “collective” Chinese citizens working in the US availing their home companies and country of technologies, hardware, documents or whatever else they might grab from US institutions that may employ them as the opportunities present themselves. To that extent, they may really be nothing more than somewhat organized rings of thieves, nothing more. As for these individuals showing such willingness to respond to the requests and demands of the Chinese intelligence services or other State Council bureaucracies as SASTIND, too much might be made of the fact that they are obedient to the commands and demands of their authoritarian and very often punitive, government. After all, in addition to their own lives, everything that they hold dear, their families, are in the hands and under the awful power of an authoritarian–some might say totalitarian–Communist government in Beijing.

Of course, one must be open-minded. Thus, the door should not be shut completely on the possibility of some deliberate design in the practices of such commercial entities and individuals with regard to their espionage. Note that overall, their practices are not chaotic or haphazard, but rather they are grounded and for the most part accomplished. Aliquis latet error. (Some trickery lies hidden.)

In the abstract, one could imagine their movements and interactions of individuals operating for commercial entities may be intentionally stochastic. Indeed, if the activity is genuine espionage and not simply criminal behavior what greatcharlie supposes should really draw the attention of US counterintelligence is not as much whether it meets a certain expected standard of tactics, techniques, procedures and methods. What should draw that attention is the appearance of control, orchestration, and forceful activity, and that something intense is happening. Something is intended and is being achieved. The fact that there is a professional side to all of that activity must also be considered. The focus, greatcharlie humbly suggests, perhaps should be placed first on the purposefulness of the activities displayed by Chinese commercial entities and individual businesspeople, not its randomness. 

Acting as described, they allow themselves some degree of security without the need to set up resources, set up sites, train in tactics, techniques, procedures and methods to communicate and pass information physically. Keeping their movements randomly determined might leave their efforts open to analysis statistically. One could discern some random probability distribution or pattern. However, it might still be impossible for those movements and interactions to be predicted in a useful way. One might imagine that to rise to a certain level in their companies or institutions, the individuals involved are well-educated or clever enough to consciously plan their activities in a seemingly random way. Surely, anyone in a commercial entity or institution selected for such work will be tested and screened before being sent off. In some welcome back, job well-done session or maybe a torturous debriefing, the employees surely inform their manager what practices worked well in the field and which at the time were determined to be too risky.

What would seem as important, or perhaps even more vital for Chinese commercial entities, would be properly casting each “espionage operative” or “thief.” The absolute right man or woman must be assigned for the right job. Surely, human resources would bring in and spotlight the right people and managers would make selections for such work and overseas deployment. One would hardly find such individuals to be hot-blooded, and wreckless, incompetent in any fashion. They would exude equanimity, sangfroid, graciousness, and professionalism. They apparently work with a mindset that nothing is unattainable. Loosely, one might posit, taking such an attitude and approach to their efforts, might be said to be at the foundation of any “ostensible tradecraft.” Everything they do, choices they make, flows from that line of thinking.

Looking at Eftimiades discussion a tad more it would seem that he gives Chinese commercial entities and individuals engaged in espionage too much and too little credit at the same time. He perhaps gives them too much credit by identifying them as intelligence gathering organizations and thereby assessing their use of tradecraft. He gives them too little credit in that if he believes his presumption as to their status as spies and their “spy-like practices,” correct, then he dismisses the possibility that their actions are disguised, deliberately performed in a way distant from tradecraft as a technique. If their intention was to cause confusion among possible observers by taking that tack, Eftimiades’ expression of some puzzlement over the absence of traditional tradecraft in their practices serves as evidence that to a degree they may have succeeded in that. At the same time, certainly nothing they might do, would be intended to stand out, such as, perhaps in extreme, appearing gargoyle or something of the type, and drawing attention daily.

Some foundational information and thought on Chinese espionage activities in the US has to be established if study and understanding on the subject is to be advanced. The establishment of such a baseline of information, however, should not result conversely in some uncompromising stance toward it. New facts must be collected and an openness must exist to consider alternative analyses of those facts, which may lead to new possibilities and potential successes against such activities. There are likely many unexplored possibilities that perhaps should be considered about all matters concerning the subject. From what has been publicly reported, often in the US national security bureaucracies, perspectives on adversaries have reportedly become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, perhaps most akin to an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with regard to Chinese foreign intelligence activity in the US.

It seems high time that US counterintelligence services ceased looking at Chinese intelligence operations and tactics with a focus on their deficiencies and flaws in practice. Equally or even more important is to consider precisely what they are doing right in order to be successful. A starting point would be an assessment of how Chinese intelligence services and all the other government organizations and commercial entities engaged in espionage in the US view US counterintelligence services and how they are responding to US defenses set up against them. It would seem from Eftimiades text that a burgeoning notion in defense of the current situation in which China is achieving a degree of success is that their numbers in the US are so high that it would naturally be difficult to struggle with them head-to-head. Hopefully, this is not the case. To be frank, the ability of Chinese intelligence services to position so many of their personnel in the US is just a symptom of the conundrum of not being able to stem their activities. Focusing upon that will not yield a cure. There are surely considerable deficiencies and flaws in the way in which US counterintelligence operates that have given Chinese government organizations and commercial entities the confidence to act without much fear. Res ipsa locquitor. (The thing speaks for itself.)

Of the seven universities that have been dubbed the Seven Sons of National Defense, some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. On that list is the Nanjing University Aeronautics and Astronautics (above). Nanjing is also known for providing the MSS with recruits for its corps of intelligence officers.

Section 11: “Summary”

Since what is found in Eftimiades “Summary” section is drawn from his discussion of his analysis of the 595 espionage cases since 2000, it would stand to reason they would serve well as a figurative subset of eight ample bullet points for his “Key Findings” which themselves extracted directly from the facts of those many cases. Of that seeming “subset of findings” in Eftimiades “Summary” section, the “top 5” selected by greatcharlie are the following.

First, Eftimiades explains that the US Intelligence Community is not well-organized to protect the secrets of US industries. It is far better at protecting its own secrets. He says the same holds true for most other technologically advanced [highly industrialized] countries. A problem he points to, calling it obvious, is that commercial industry and scientific research programs, the primary targets for Chinese intelligence collection, are the most vulnerable.

Second, as aforementioned in the discussion of the monograph’s Preface, Eftimiades says the DHS and the FBI are leading the effort in the US “to combat China’s massive intelligence collection campaign.” He again states that both organizations “have done excellent work in reducing Beijing’s relentless efforts,” noting the FBI has made advances since 2018 to assist US industry and academia, and DHS is also working aggressively to curtail illegal exports of advanced technology and those who steal scientific research. However, he declares “there is still much more to be done.” He explains that the work of other government agencies as well as a bipartisan effort in Congress will also be necessary to ensure national and economic security.

Third, Eftimiades proffers that success in thwarting China’s aggressive collection efforts will ultimately rest upon three factors: 1) the ability of US law enforcement and intelligence apparatus to shift organizational culture and support private industry and academia; 2) developing a strategic campaign in the US integrating all the elements of the government and its allies; and, 3) having Congress pass laws to raise the costs of economic espionage to the Communist Party of China. Chinese companies and individuals via visa restrictions, sanctions, investment restrictions, and otherwise. 

Fourth, Eftimiades explains, as he has surely illustrated throughout his monograph by reporting his case analysis, yet does not declare in any vehement way, that China’s “whole of society” approach to espionage has been quite successful thus far in defeating government and private industry organizations. He focuses more on what has been positive about US counterintelligence efforts,

Fifth, Eftimiades reveals that efforts by some countries within the EU, India, and Japan to restrain China’s intelligence activities have been comparatively less apparent in public sources. Although espionage arrests in India, Germany, France, Belgium, and Poland have been low in number, he sees such developments as an indication that those countries now seek to more vigorously counter China’s collection efforts. In addition, Eftimiades asserts that “China’s public image is suffering worldwide as the French and German governments have made statements on China’s aggressive espionage on social media, human rights issues, COVID-19 response, and Beijing’s threats over trade.”

In determining the percentage of Chinese espionage efforts thwarted, it must again be noted that the percentage would need to be calculated based on the entirety of the Chinese espionage effort. If one accepts Eftimiades does not know that number, and there is no reason not to do so, knowing the percentage of thwarted espionage efforts seems impossible and his claim is only a presumption or at best the result of “secret knowledge.”

When writing about the success of the FBI and DHS in thwarting espionage efforts of Chinese government organizations and commercial entities, there was less of an appearance by Eftimiades of reporting facts, and a more apparent effort by him to convince readers on a position tenuously supported in the text that he wants them to accept. To that extent, he actually presents more than anything else, as there is no supportable alternative story to present given the realities of the situation, is a well-supported outline of concerted, energetic, and endless activity to steal US secrets by China.

It would seem that the nature of the situation has already been firmed in the minds of the public based on reports in the newsmedia. It is unlikely that readers of his monograph would be inclined to Eftimiades perspective, despite his remarkable background. It is unlikely that anyone in the US counterintelligence services, particularly among senior executives and managers, is on Cloud 9 over results versus Chinese government organizations and commercial entities engaged in espionage in the US. Somewhere deep inside, some may feel a bit stuck and stagnating, clutching at straws, and listening to the wind, but conceal such concerns from their colleagues. One might imagine their feelings: “Je suis las de toujours faire la même chose.” That would be a multifaceted problem for US counterintelligence services in itself. Perchance in trumpeting FBI and DHS success was an effort to boost morale or at least comfort those from each service who may have had their fill of Chinese success in their country. Eftimiades may have viewed optimism as the best and most available elixir for defeatism, and employed it liberally. Perhaps this line of thinking that drove Eftimiades, who leaves no doubt that he is unwavering in his support and confidence of the FBI and DHS, consciously drifts a tad away from his encomium of their respective work against Chinese espionage moves in the US. As also mentioned in the discussion of the monograph’s Preface, in the “Summary” section, Eftimiades does say “there is still much more to be done.”

Noticeably, in the “Summary” section, as noted in the discussion of the Preface, Eftimiades also relents so to speak from his “declaration of nescience” to say there are very likely thousands of Chinese espionage operators in the US. However, although there is clear evidence that their purpose is to steal US secrets and technologies, one might consider in the abstract whether there may be other interests of the utmost importance to the Chinese intelligence services that require such a labor-intensive effort. That should beat the brain. Going back to the suggested figure of 25,000 intelligence officers, professionals, albeit discrepantly trained and experienced, on the ground–a force one and half times the current size of a US Army armored division, it may be worth considering whether they may be engaged in a bold, cunning reconnaissance and surveillance mission of far greater conception than ever seen in the past or might normally be imagined in the present. Itt might be a mission that could not be performed in any other way than with a large force of professional intelligence officers. To be direct, yet admittedly still a bit Delphic, there must be a clear reason why officers of Chinese Intelligence services operating in the US, in particular, are so successful at not being wherever, whenever US counterintelligence services are looking for them. 

There is a thin line that separates reality from illusion. It must be kept firmly in mind that if one denies or unconsciously suppresses reality, what is left is only an illusion, false reality. Once one begins planning and operating within that, all is lost. If that is or ever would be the case concerning the Chinese conundrum, the situation will become far worse than ever imagined. Further, the more one deals in truths and reality, the more one develops reliable intuition and intimations. The more one entertains fallacies and what is artificial, the farther one moves away from having any real intuition or developing any intimations at all. These skills in the end will prove to be absolutely imperative if endsieg, a final victory against all of the odds stacked against them, is to be achieved by US counterintelligence services in their struggle against Chinese espionage efforts. As the celebrated Spanish novelist, translator, and columnist, Javier Marías remarked during an interview for the Winter 2006 issue of the Paris Review: “One must have courage to see what one does see and not to deny it for convenience.”

Regarding China’s concern about having the image of being a country of thieves and copycats, stealing the best ideas of other countries to support and propel its conspicuous advancements in nearly all sectors, the Communist Party of China absolutely has an interest in global public opinion of China and perceptions of its actions on the world stage. Still, it is unlikely that the Communist Party of China has too much concern about that in that vein. One must remember, the Party insists that at the foundation of all advancements of the Western industrial powers are the years those countries overwhelmed peoples who were defenseless and through a colonial system violently oppressed them and allowed business enterprises of their respective countries to exploit the conquered peoples’ lands for raw materials and mineral wealth for centuries. They will use the experience of China to support that argument. Within their own countries, the Party says down-trodden workers were essentially enslaved by the same business enterprises now called multinational corporations. (Note that greatcharlie asserts in the abstract that this is the Communist Party of China’s perspective; it is by no means greatcharlie’s perspective.)

Still, more salient based on the Party’s mindset would be the overall judgment of the world on the robust energy China displays as it pushes onward and upward into the future and, albeit mistakenly believing, eventually reaching the position at the top as the world’s dominant power. From that perspective, the Communist Party of China would see their country as having a very positive, lasting impact on global perceptions of it everyday. To that extent, the Party leaders and propagandists likely weigh that global perception on “energy” and Western measures of global public opinion ratings, particularly if those ratings are based on reactions to independent events and not the bigger picture. While one might agree that there are some universal truths about our world, still not everyone thinks the same on all issues. China’s view of its future is quite at variance with that held by most in the US best familiar with the issues involved. Fere libenter homines id quod volunt credunt. (In most cases men willingly believe what they wish.)

There will naturally be more that US counterintelligence services would want from the US Congress to appropriate for them in order to pursue adversarial countries’ intelligence services operating without pause, on the ground, in the US. However, the matter must be examined from the lens of Congressional leadership. From their view, US counterintelligence services  presently possess considerable resources to pursue Chinese intelligence officers and operatives. There are no indications Chinese espionage networks are being regularly taken down. Harsh critics and skeptical observers might begin to believe that, unbeknownst to the public, US counterintelligence services are actually being restrained from doing their utmost to defeat opponents here in the US. However, there would hardly be any logic to that. Surely, US counterintelligence services are not flâneurs, in the field simply playing chase games. Even the slightest act in that direction would betray the trust and reliance the US public has in their fidelity and  their belief that they are protecting the country’s sovereignty, its property, its interests and especially its people. As expressed in the February 26, 2021 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, by 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. Sardonically, from a paranormal perspective, one might suggest that although Chinese intelligence officers may be operating in the same spaces in which US counterintelligence services are looking hard, they do so in some other plane existence, undetectable by mortal eye. Sous une surface calme tout se passe.

There has been more than enough talk about how bad the problem with China is. C’est la Bérézina. As it has been discussed so often that, in a way, such talk haa become by the by to some degree for the US public. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and destroy all of its networks. As greatcharlie has mentioned in proceeding posts on the Chinese espionage crisis, It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Eftimiades clearly understands that much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. Fundamental changes may be needed in efforts to halt Chinese espionage operations. There is the possibility that certain apparent aspects of Chinese intelligence operations are not being focused on sufficiently or appropriately. Making the right improvements requires being persistent in one’s search for answers. To continue the pursuit successfully will require a certain boldness in thinking. Although he literally lost his head by guillotine two years later, George Jacques Danton, the 18th century French revolutionary leader, addressed the Legislative Committee of General Defence, September 2, 1792 with words concerning the situation in France which are apposite for counterintelligence organizations dedication protecting their countries against any harm by Chinese intelligence services: “De l’audace, et encore de l’audace, et toujours de l’audace, et la France est sauvee.” (Boldness, more boldness, and always boldness, and France is saved.)

What Eftimiades presents on Chinese espionage operations and tactics represents a stage of those activities existent at the time he wrote the monograph. However, Chinese intelligence operations and tactics appear to be constantly and rapidly evolving, becoming something more effective, more efficient everyday. As their capabilities improve, the possibilities for action also increase. It is difficult to accept but very likely a reality that success has given Chinese intelligence services so far good reason to approach the future with confidence. To that extent, the worst may be yet to come. However, on the other side of the coin, while it may seem counterintuitive to some ears, the success of Chinese government organizations and commercial entities engaged in espionage in the US should not frustrate US counterintelligence officers. Rather, it should embolden officers of US counterintelligence services to struggle even harder to succeed. Hope must still exist in the situation for that. Surely, establishing a pattern of success would go a much longer way in building self-confidence among officers in US counterintelligence services struggling on their own home ground with the Chinese.

What one finds in Chinese Espionage Operations and Tactics is of considerable quality. The book remains a steady flow of information, data, and expressions that well-demonstrates the author’s command of the subject matter, from beginning to end. Without pretension, greatcharlie states that what is presented here represents less than twenty percent of the insights birthed in greatcharlie by Eftimiades monograph. Readers should imagine what insights might be brewed up from within themselves after they have had a chance to read through it. 

It is assured that after the first reading Chinese Espionage Operations and Tactics, one would most likely go back to the book and engage in that stimulating process again and again. The monograph will very likely be regularly consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. Surely, the monograph would be quite useful to an Intelligence Studies instructor who, as a primary part of an assignment, might decide to have students read the monograph, observe the manner in which Eftimiades report is formatted, how information is presented in its sections, and develop insights from its discussion.

Perhaps it is eedless to say at this point, but it is nonetheless stated with absolute conviction and true relish, greatcharlie unequivocally recommends Eftimiades Chinese Espionage Operations and Tactics to its readers.

By Mark Edmond Clark

Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)

In a nine-count US Deparment of Justice indictment filed in an Atlanta federal court in 2017, the four members of the People’s Liberation Army (PLA) in the FBI poster above were accused of hacking into the Equifax credit reporting agency’s systems, creating a massive data breach that compromised the personal information, including Social Security numbers and birth dates, of about 145 million people, nearly half of all US citizens. There is little need but for citizens to read reports in the news media to know foreign intelligence services were operating inside and outside the US with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. He explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose.

There is little need but for US citizens to read reports in the news media to know foreign intelligence services were operating inside and outside their country with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. However, more importantly, Olson explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose. As the former chief of Counterintelligence for the Central Intelligence Agency (CIA), Olson is eminently fitted to represent US counterintelligence officers and present their work. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use aggression and force to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so.

From what Olson explains, counterintelligence organizations worldwide must detect necessary attributes of an actor, certain indicia, before initiating a counterintelligence investigation on a suspected “foreign spy” or operative or informant or  foreign intelligence service. The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. That process may not always be easy going. A foreign intelligence officer’s tradecraft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some. Counterintelligence may very well be the greatest manifestation of the paranoia business.

Regarding his career, again, for over thirty-one years, Olson served in the Directorate of Operations of the CIA, mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. At the time he wrote To Catch a Spy, he was retired and working as a Professor of the Practice at the Bush School of Government and Public Service of Texas A&M University. Robert Gates, the former Director of Central Intelligence, 1991-1993 remarked about Olson: “James Olson is a legend in the clandestine service, having served in some of the most difficult, dangerous, and complicated assignments at the height of the Cold War. As director of Central Intelligence, I trusted him without reservation when he was chief of counterintelligence not only because he was enormously capable but also because I knew he thought deeply about the ethical and moral dimensions of what we did every day. Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.” Olson was born and raised in Iowa. He studied mathematics and economics at the University of Iowa. Following college, he took a commission in the US Navy, serving aboard guided missiles destroyers and frigates. After a period, he would return to Iowa to study law at the University of Iowa. Apparently, Olson had every intention of practicing law in a small county seat town in Iowa. However, the CIA approached him and invited me to apply for a position in the clandestine service.That us when the story of his life in counterintelligence began.

This book has immediate historic significance because Olson is recognized as an authority among intelligence circles worldwide. There are not so many that have been written so well by former professionals. While others may have their preferences, three of special note and highly recommended by greatcharlie are: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014); David Martin, Wilderness of Mirrors (HarperCollins, 1980); and, Scott Carmichael’s True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy 1st ed. (Naval Institute Press, 2007) which Olson refers to in To Catch a Spy.

In Hoover’s Secret War Against Axis Spies–reviewed by greatcharlie on April 30, 2014, the historian, Batvinis, a former Federal Bureau of Investigation (FBI) special agent, presents a crucial chapter in the history of World War II during which the FBI really began and refined its counterintelligence mission. He discusses the FBI’s then new reliance on intrusive investigative techniques (wiretaps bugs, access to bank and financial transaction records), and the evolution of the Bureau’s liaison relations with the British, Canadian, and US military intelligence agencies. (In a proceeding book, his acclaimed, Origins of FBI Counterintelligence (University of Kansas, 2007), Batvinis went off from scratch to tell the reader about the situation.) In Wilderness of Mirrors, Martin tells the story of how an ex-FBI agent William “King” Harvey identified the notorious Soviet double agent Kim Philby in conjunction with James Jesus Angleton, the CIA’s chief of counterintelligence responded to the betrayal of family friend Philby’s betrayal and descends into a paranoid wilderness of mirrors. Wilderness of Mirrors set a benchmark for studies, memoirs, and all other written works on US counterintelligence. It was once required reading for some intelligence professionals–and perhaps it still is. The author of True Believer, Carmichael, was a senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. He provides an inside account of how his espionage investigation, with the eventual help of the FBI, progressed over a period of several years to develop a solid case against Montes. She is the only member of the US intelligence community ever convicted of espionage for the Cuban government. Every twist and turn is all the more intriguing as truths become lies and unlikely scenarios are revealed as reality.

To Catch a Spy is not Olson’s first book. He is also the author of Fair Play: The Moral Dilemmas of Spying (Potomac Books, 2006) Fair Play examines ethical challenges facing US intelligence officers as they attempt to operate within a standard of acceptable moral behavior. That examination is couched in an insightful summary of intelligence history through fifty reality-based scenarios.

To Catch a Spy, 248 pages in length, was released by Georgetown University Press on April 11, 2019. Since then, many others have already formed their own opinion of Olson and his work. For those who may excavate through To Catch a Spy to thoroughly consider points of exposition concerning both himself and activities in which he was engaged, the book has doubtlessly been substantially edifying. The reader is provided with an amazing opportunity to see it all through the prism of a master craftsman as he discusses his profession. Indeed, as with Fair Play, everything Olson provides in To Catch a Spy is founded on his experience during a lengthy career in US counterintelligence. Nevertheless, To Catch a Spy is not a memoir of his life or of his career. That has yet to be written, and perhaps may not be. Still, if one were to go off anyway and measure Olson’s book against the memoirs of Cold War Soviet, Eastern Bloc adversaries of the US there is a decided difference. Those memoirs have a tendency to be anecdote laden, picturesque and exciting. While those who have professionally analyzed them judge them as omitting much, their books typically provide enough nuance to allow for extrapolation, inference, and conceptualization of their tactics, techniques, procedures, and methods. They also often point to their bad choices, pitfalls and ways to minimize losses after encountering them, commonplace wrong turns and remedies to them. That is really what the neophyte needs to receive most.

The author of To Catch a Spy, James Olson (above). Olson is eminently fitted to represent US counterintelligence officers and present their work. For over thirty-one years, Olson served in the Directorate of Operations of the Central Intelligence Agency (CIA), mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

Surely for readers thrilled by spy novels, there was enough provided by Olson to allow them to live vicariously through his anecdotes. In the genre of fiction and nonfiction spy stories, there is an artistic milieu in which–often under the demands of publishers who are intensely interested in selling books–writers seek to position themselves amidst. It cannot be denied that human nature instinctively finds entertainment more compelling than edification. Perhaps even among them, there may be some who will decide after reading To Catch a Spy, that there is nothing so outré about counterintelligence. However, often things seem simple once they have been explained.

Among professionals, not only in the US, but worldwide, To Catch a Spy was likely anticipated with baited breath. That stands to reason that this category of reader would be aware that Olson possesses a huge body of thoughts that most US counterintelligence officers on the job today. There was considerable satisfaction among professionals with his first book, Fair Play. They could have only imagined that To Catch a Spy would be another gem. One might perceive while reading To Catch a Spy that Olson subtly takes on the role of instructor, introducing somewhat nuanced details about certain matters in his lecture as if he were trying to impart the full benefit of his experience to prescient, young CIA counterintelligence officers. To that extent that he does all of this, there is a trace of something akin to a pedagogy for developing the reader’s understanding of the world he is moving them through. A quote widely attributed to one of the most influential artists of the 20th century, Pablo Picasso: “Learn the rules like a pro so you can break them like an artist.” To that extent, novice US counterintelligence officers must master the fundamentals, and the foundation will be laid to explore one’s potential with confidence and an assured step with knowledge and experience of those who came before.

One might expect copies of To Catch a Spy, that may be possessed by US counterintelligence officers from the various services, are treasured and well thumbed. Spotted among reviews of the book on Amazon.com are comments from US intelligence officers in which they attest to the value, positive impact To Catch a Spy had on their thinking and their work. Alex J. Vega IV, Joint Counterintelligence Training Activity (JCITA), Defense Intelligence Agency, and Former U.S. Army Attaché, U.S. Embassy, Moscow, Russia wrote: “Jim Olson has shared with us his accumulated wisdom, lessons learned, and roadmap for the future. To Catch a Spy is the new U.S. counterintelligence standard. It is a must read for serious professionals and anyone interested in the spy world. Jim has done a tremendous service, not only to our generation, but also to those of the next who choose to answer the call to join the counterintelligence battle.” Henry A. Crumpton, a twenty-four-year CIA veteran, author of The Art of Intelligence: Lessons from a Life in the CIA’ s Clandestine Service (Penguin Press, 2012), and CEO of Crumpton Group LLC. remarked: “The author, America’s counterintelligence guru, has crafted a remarkable, indispensable book rich in heartbreaking detail and sharp analysis–serving as a clarion call for a stronger response to the unrelenting, sophisticated, and successful foreign espionage assault on our nation.” Robert M. Gates, Director of Central Intelligence, 1991-1993, stated: “Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.”

One could safely state that To Catch a Spy has not been everyone’s cup of tea. Despite such glowing expressions of satisfaction and appreciation, there is a view of the book in which it is asserted that Olson really did not dig down so deep on issues in the text to display his full capabilities as a counterintelligence thinker. He could hardly be so profound, or candid at all. Some professionals worldwide who may have acquired a copy of To Catch a Spy were disappointed when they discovered that the text is not heavy with inferences and insights, and analysis supported by references. In fact, such are rather sparse in the book. In Mark Soares’ review of the book in the scholarly journal Intelligence and National Security, (Mark Soares (2020) To Catch a Spy: The Art of Counterintelligence, Intelligence and National Security, 35:7, 1079-1081, DOI: 10.1080/02684527.2020.1746125), he begins by saying: “James M. Olson has written a deeply personal composition of his extensive career to counterintelligence with the Central Intelligence Agency  (CIA) using a loose and relaxed format not typically seen in intelligence literature.” Explaining Olson’s purpose in writing the book, Soares remarked: “To Catch a Spy serves as Olson’s caution to future US intelligence practitioners and to his country as a whole to pay far more attention to counterintelligence matters rather than focusing all efforts on collection.” However, Soares would eventually judge the book critically, stating: “Though To Catch a Spy is undoubtedly an entertaining read, scholars and academics will be disappointed by the absence of references, with Olson opting instead to use informal notes to add background details to organizations,  individuals, tradecraft terms, or historical events mentioned in the book (pp. 203-217). Many of the events described by Olson could have been referenced more properly given the abundance of information available on such topics.”

For security reasons, Olson admits to having doffed his cap to his former employer so to speak by submitting To Catch a Spy to his former employer, CIA, for review. It is a requirement for officials from the US Intelligence Community with backgrounds as Olson. In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. One can only imagine an individual with his wealth of knowledge is holding back considering how much more he could have potentially ruminated upon in the book. Under such circumstances, it is understandable that Olson’s lack of profundity would disconcert some.

If Olson were writing only for intelligence professionals, he would have a diminutive audience. While some US counterintelligence professionals might nonetheless view it as their book, To Catch a Thief is a book published for the largest audience possible. To that extent, Olson does not take for granted how much the reader can absorb from what he teaches. It is evident that he takes control of that process, apportioning how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Olson increases the quantity and complexity in his anecdotes.

Even after what could be sardonically characterized as Olson’s generous effort to spoon-feed some readers, other concerns about how the book was written were voiced by reviewers from outside of the profession. In the New York Journal of Books, Michael McCann wrote: “To Catch a Spy struggles to the finish line far behind many other, better publications in terms of immediate relevance. Which invites an important question: Who is Olson’s intended audience?” On that point McCann goes on to state: “To Catch a Spy will provide a useful textbook for students taking Olson’s courses at the Bush School. No doubt they will be quizzed on his ten commandments, the three principles of workplace counterintelligence, and other key points. It will also help them write summaries of important counterintelligence cases over the years and the lessons learned from them.” Leaving no doubt that he was disappointed by the book, McCann states: “For the general reading public, however, To Catch a Spy doesn’t really appeal. Those looking for “juicy new disclosures” will be disappointed as they wade through material just as easily accessed at no cost by googling for it online.”

In its review, greatcharlie, using its understanding of the subject as a nonpracticioner, observing from outside the bureaucracy, follows those aspects of the book closely. The last outcome greatcharlie wants is for its review to boil down to discussion of “Olson left this out. He left that out. He did not elaborate enough here or there.” Despite any concerns about what was missing in the text, in its review of To Catch a Spy, greatcharlie explores what one can appreciate and learn about Olson’s thinking process from what he does provide in the text. However, what is most impressive about To Catch a Spy to greatcharlie is the manner in which it stimulates thought on the issues presented. Books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. To that extent, included in the review are greatcharlie’s own thoughts about counterintelligence topics covered by Olson which hopefully will assist some readers in better understanding what Olson is presenting to them. It is also hoped that thoughts shared by greatcharlie will encourage readers to weigh  their own impressions on those topics and develop of their own insights on them whether they may be actual intelligence practitioners or just enthusiasts. Additionally, greatcharlie offers its own thoughts on those topics to assist in giving context to the work of US counterintelligence to the US public, nonprofessional readers, in particular, and, in turn, offer some perspective to the counterintelligence professional on how the ave4age US citizen perceives his or her work. With any luck, what is presented will appropriately resonate among both sets of readers. Rationale enim animal est homo. (Man is a reasoning animal.)

The Headquarters of the Russian Federation SVR in Yasenevo (above). The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Country Reports on the Main Adversaries of the US

The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Suspected spy for the Communist Party of China, Christine Fang (above). It was revealed in 2020 that Fang had established contacts and some relationships with several political officials from mayors and local council members, to Members of the US Congress as part of an effort by China to infiltrate US political circles. Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. Olson says China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson reports that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible.

China

Olson explained that China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson explains that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible. Olson asserts that if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

There were four important disclosures by Olson on Chinese espionage, which, despite claims from some reviewers were well-known, in greatcharlie’s view can at least be said to have been given “proper” additional light in his discussion. They include the restructuring of the Chinese intelligence services, the political work they do in the US, concerns that a possible mole is ensconced in the US Intelligence Community, and again, the enormity of Chinese espionage. Regarding the Chinese intelligence apparatus, he explains that it was restructured in 2015 and 2016. The principal Chinese external intelligence service is the Ministry of State Security (MSS)., which is responsible for overseas espionage operations. The Ministry of Public Security (MPS) concentrates on domestic activities but also occasionally runs agents abroad. The MSS and MPS were relatively unaffected by recent organizational changes in the Chinese intelligence community. The major impact has been on the People’s Liberation Army  (PLA), which since the 1950s has been heavily engaged in intelligence operations. The PLA in theory has concentrated on military intelligence, but it has actually defined its role more broadly. Olson reports that it has competed with the MSS in a wide range of economic, political, and technological intelligence collection operations overseas, in addition to its more traditional military targeting. The PLA is still responsible for the bulk of China’s cyber spying. However, Olson points to indications that the MSS has been assigned an expanded role in this area as well. Concerning how it is all organized, Olson reveals that the PLA’s human intelligence (HUMINT) operations are managed by the Joint Staff Department, and comes under the Central Military Commission. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence like certainly capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission.Thus, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), the rough equivalent of the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare have been rolled into the new Strategic Support Force. Olson explains that much as all intelligence services worldwide, both the MSS and the PLA make regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. They aggressively use Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection. Olson takes the position, disputed by some experts, that Chinese intelligence services take a vacuum cleaner approach and collect literally any kind of data they can get their hands on in the US.

Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. He points to the huge row raised in 1996 when the Washington Post reported that the US Department of Justice was investigating possible illegal Chinese contributions to the Democratic National Committee (DNC) in an effort to influence both the Presidential and Congressional election that year. After getting into a handful of pertinent details about two Chinese businessmen, Johnny Chung and John Huang, Olson explains that the FBI determined that the 1996 illegal funding operation was coordinated from the Chinese Embassy in Washington. Olson says the issues at stake for the Chinese government are not difficult to devine: US support to Taiwan, intellectual property law, trade policies, the environment, human rights, and Asian security. China denied any role in the influence buying. Going a step further, Olson warns that candidates of both political parties have been targeted for influence buying. Chinese hackers have been detected in the campaign websites of both candidates in every presidential election since 2000, another indication that the threat of Chinese election tampering has not gone away. In 2016, Virginia governor Terry McAuliffe was notified by the US Department of Justice that he was the target of investigation for allegedly accepting a questionable campaign contribution of $120,000 from Chinese businessman Wenqing Wang. McAullife was not charged with any crime. There has been considerable controversy lately about alleged Russian tampering in the US presidential Election of 2016. Such allegations, Olson duly notes, should  be investigated thoroughly, of course, but he points out that the Chinese have been engaged in such activities for 20 years.

Olson notes that in a May 20, 2017 New York Times article informed that 18 to 20 of the CIA’s best spies inside China had been imprisoned or executed. The New York Times based its information on “ten current and former American officials” who chose not to be identified. According to Olson, the losses actually occurred between 2010 to 2012 and effectively wiped out the CIA’s excellent stable of assets inside the Chinese government. Olson proffers, “If true, this disaster is eerily reminiscent of the decimation of the CIA’s Soviet agent program in 1985.” The fact that Olson would even discuss the New York Times report in To Catch a Spy, gives the story far greater credence than it would have otherwise. With regard to what occurred from 1975 to 1985, the CIA built up a remarkable inventory of well-placed agents inside the Soviet Union–only to see them disappear, one by one, because of what Olson describes  “the perfidy” of Edward Lee Howard and Aldrich Ames. According to the New York Times report, the CIA’s counterintelligence theories about what went wrong in China have mirrored the same avenues that  it explored after 1985. Olson laid out a few of the questions that were asked by US counterintelligence services: “Could our compromises have been the result of sloppy tradecraft? We’re we being beaten on the street? We’re our secret communications being intercepted? Or did we have a mole?”

Olson says arrests in rapid succession in a compressed period usually point to a mole. In fact, a former CIA case officer, Jerry Chun Shing Lee, was arrested by the FBI in January 2018 and charged with espionage. After Lee left the CIA in 2007, he moved to Asia with his family and was doing business there. In 2010, he was allegedly approached by Chinese intelligence officers. If, as alleged, Lee gave up the identities of CIA spies in China, Olson believes he either took notes with him when he left the agency in 2007 or remembered who they were. Olson reports that the FBI, as part of its investigation, was looking closely at deposits made to Leeds bank account. It took 9 years to catch Ames. Olson states: “I hope it will not take that long to figure out what happened in China and, if the problem is in fact human, to bring the traitor to justice.

Olson submits to the reality that enormity of the Chinese espionage effort is staggering, noting that the FBI announced in 2015 that it had seen a 53 percent increase in economic espionage against US companies over the previous year, and most of it from China. US companies remain extremely vulnerable despite being aware of the Chinese threat. According to Olson, the MSS and PLA primarily play the ethnic card in their recruitment operations. They target a large number of ethnic Chinese–the “overseas Chinese”–who live in the US and virtually every other country in the world. Still, the MSS and PLA would also engage in nonethnic recruitment of US citizens. Those nonethnic recruits, Olson says are few in number, have done serious damage given reports on their activities.

Olson presents the statistic that approximately 4 million ethnic Chinese in the US are only a generation or less from the mainland and great numbers of them still have relatives in Communist China. He says many of them also still feel pride and sympathy for the culture and accomplishments of China, particularly the build up of economic and military strength under Mao and his successors. Olson states that the common tactic is to play on loyalty to Mother China and to exert pressure via relatives still living in China. A Chinese-American working in the US government or in a high-tech firm would usually be approached on that basis, but he notes that venality and greed can also play a large role in any recruitment of a spy. Olson says that all US citizens who visit China are assessed as potential recruitment  targets–and those who he access and show susceptibility are singled out for aggressive development. To emphasize how well Chinese recruitment efforts work, Olson provides a partial listing of Chinese-Americans who have fallen to this trap, the information they were instructed to collect, and where they were located: US Navy Lieutenant Commander Edward Lin, caught providing classified military information; Szuhsiung Ho, caught recruiting six other US engineers to provide nuclear technology to China; Peter Lee, caught providing naval technology and defense information to China; China Mak, caught passing classified information on surface ships and submarines; Fe Yei, caught stealing computer microprocessor technology for China; Walter Lian-Heen Liew, caught providing chlorides-route titanium dioxide production technology to China; and, Greg Chang, caught providing proprietary information on the US space program to China. Olson then devotes a page and a half to the case of Katrina Leung, whose objective was not to steal technology but to infiltrate US counterintelligence. His account provides less about tradecraft, having been errantly recruited by the FBI as a counterespionage agent, she used and told more about the details of her relationship with two FBI counterintelligence officers, James Smith and William Cleveland.

As for nonethnic recruits of the MSS and PLA, Olson presents summaries of the cases of Benjamin Bishop, caught passing classified defense information to his young Chinese girlfriend; Candace Claiborne, having served in Shanghai and Beijing as a State Department employee, she was caught cooperating with Chinese intelligence; and, Glenn Duffie Shriver, recruited by MSS while visiting China as a student was caught delivering stolen military technology to his intelligence handlers. Curiously, even though Olson explains that he has presented only a partial list of ethnic and nonethnic recruits caught by US counterintelligence services, the list appears rather diminutive given his own admission that there is a vast Chinese intelligence collection effort currently underway in the US. There would surely be some reason for US counterintelligence services to be proud of the outcome of investigations into the activities of those captured. However, far more will need to be done before they begin to even stem Chinese espionage in the US. (A discussion of the transition from ethnic to non-ethnic recruitment by can found in greatcharlie’s July 31, 2020 post entitled “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”

Olson touches on two recurring themes in discussions on Chinese intelligence: students and cyber attacks The question of Chinese students in the US, is especially pertinent. According to another statistic that Olson offers, in 2016-2017 there were 350,755 Chinese nationals studying at US colleges and universities, accounting for approximately one third of the total of international students in our foundry. He points to that fact that a large majority of Chinese students are studying science or engineering, fields that have direct relevance to China’s industrial and military aspirations. Olson reveals that many Chinese students are encouraged by Chinese intelligence to remain in the US, to obtain employment, and to acquire lawful permanent resident status. Lawful permanent residents can apply for US citizenship after five years of residence, three years if they are married to a US citizen. Naturalized US citizens are eligible for US government security clearances after five years of citizenship. Olson says these regulations represent a trade off between our need for certain skills–particularly technical skills–and security. Olson notes that the US Intelligence Community feels any intelligence service worthy of the name would jump at the chance to infiltrate its officers and co-optees into government agencies, national laboratories, and high technology firms of a priority target country. While admitting that he had no data to support that position, he says it is inconceivable to him that the MSS and PLA would have overlooked this enticing and easily exploitable path to access.

Regarding cyberattacks from China, Olson notes that they are nothing new. The first major attack was discovered in 2005, but it was quickly determined that infiltrations of US government computer networks had been going on since at least 2003. Olson relates that the 2003 operation, dubbed Titan Rain, was a coordinated attack by Chinese cyber spies to download sensitive Data from networks at the US Departments of Defense, State, Energy, and Homeland Security, as well as a host of US defense contractors. In one day, the hackers stole reams of sensitive aerospace documents with schematics of propulsion systems, solar paneling, and fuel tanks for NASA’s Mars Reconnaissance Orbiter. Other targeted locations included the US Army Information Engineering Command, the Naval Oceans Systems Center, the Missile Defense Agency, and US national laboratories. Olson says cyber attacks such as Titan Rain present a unique challenge in terms of attribution. In the case of Titan Rain, however, Olson explains that it is not credible to conclude that a multifaceted and sophisticated operation of this magnitude could be anything other than a Chinese government-sponsored activity.

In 2010, Google announced that the company had detected a “highly sophisticated and targeted attack on [its] corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.” While China’s involvement in cyber attacks was by no means surprising, Olson supposes Google’s decision to publicize the breach was unusual. Typically, companies are wary of publicizing such leaks for fear that perceptions of insecurity could negatively affect their business. The explanation may lie in the fact that Google executives, who had continually met resistance from the Chinese government regarding censorship since the company had entered the Chinese market in 2006, finally decided enough was enough.

Google first learned of the attack from Chinese human rights activists in the US who had reported that their Gmail accounts had been accessed by unknown users. As details of Operation Aurora, as it was called, surfaced, it became clear that the attack was highly tailored and complex. The cyber spies exploited a flaw in Internet Explorer 6.0 to gain access to targeted computers. Once the vulnerability was identified, the hackers determined which officials at various companies had access to sensitive information. Emails that, once opened, installed malate on the target computers were then sent from servers in Taiwan to the chosen company officials. The hackers from then on had unfettered access to the officials’ computers and could steal any information they deemed valuable. Google was not the only US firm targeted by the Aurora cyber spies. No less than 34 companies, to include Yahoo, Symantec, Adobe, North run Grumman, and Dow Chemical, were victimized. The Washington Times reported, “Each of the companies was targeted differently, using software developed from the attackers’ knowledge of the individual networks and information storage devices, operating systems, the location of targeted data, how it was protected, and who had access to it.” According to federal cybersecurity experts, attacks of Aurora’s precision and sophistication could be achieved only with substantial the government’s support.

Perhaps the most egregious of all the attacks on US computer systems became public in June 2015, when the Office of Personnel Management (OPM) announced that its database had been breached by unknown persons. The personnel records of 21.5 million US government employees, past and present–including Social Security numbers, biographical information, and the results of security background investigations–were stolen. The information, in Olson’s informed view, would be a gold mine for any intelligence service seeking to spot, access, and develop US government employees for future recruitment. The US Intelligence Community placed blame for the attack squarely on China. Beijing denied any official responsibility for the breach and, in fact, announced in December 2015 that it had arrested a small group of nongovernmental hackers for having committed the crime. No information was provided on the hackers’ identities, place of deployment, or sentencing. Skeptics suspected a convenient cover-up to ease tensions with the US before a scheduled visit of People’s Republic of China President Xi Jinping. Olson s that the only Chinese entity, state sponsored or otherwise, that he could think of that would have a motive for stealing all the OPM data is the MSS. The administration of US President Barack Obama signed a bilateral agreement in September 2015 pledging that neither side would use cyber attacks to steal intellectual property for commercial purposes. According to Olson, a US cybersecurity company documented a Chinese cyberattack on a US company the day after the agreement was signed. In the three weeks that followed, there were at least seven more attacks from China against US high-tech companies. 

The current director of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Sergey Naryshkin (above). Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation Following the Soviet Union’s collapse, the monolithic Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Despite the democratic posturing and economic liberalization of the early years, in the end, not to much changed about Russian activity in the US. Many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB.

Russia

Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation (Russia). Despite the democratic posturing and economic  liberalization of the early years following the collapse of the Soviet Union, Russian security services did not change much. Intelligence was reorganized in Russia in 1991. The monolithic Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Unlike the former satellite countries of the Eastern Bloc (e.g., Poland, Bulgaria, Czechoslovakia, East Germany, Romania, Hungary, Latvia, Lithuania, and Estonia), where intelligence services of the new democratic regimes purged old Communist apparatchiks, many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB. The Russians did not consider it professionally disqualifying for someone to have served previously in the repressive and undemocratic KGB.  When Olson mentions that organization, it must be made clear that he viewed it as “a ruthless and vicious organization that oppressed its own people, crushed religion, sent political dissidents to gulags or psychiatric hospitals, and killed its enemies.” Olson describes the FSB as being responsible for Internal security in Russia, specifically counterintelligence, counterterrorism, domestic unrest, state crimes, and border security. Meanwhile, the SVR is responsible for external intelligence collection and covert action. With this structure Russia has aligned itself more closely to the US and United Kingdom models , in that the FSB is the rough equivalent of the FBI or the Security Service (popularly referred to as MI5) and the SVR corresponds to the CIA or the Special Intelligence Service, popularly known as MI6. (An explanation of the United Kingdom’s nomenclature of MI5 and MI6 is provided in some detail in greatcharlie’s December 11, 2020 post.) Russian military intelligence is the responsibility of the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU which has operated under that name since World War II. 

Olson says that there was real optimism, even a belief in some quarters, that the US Intelligence Community could forge a new relationship with the Russian intelligence services on the basis of trust and cooperation, particularly in areas of common concern, transnational interests. They included counterterrorism, narcotics, and organized crime. Olson said that some of the early talks between representatives of the two services were so encouraging that “the US side decided it did not want to jeopardize this potential intelligence détente by getting caught in any kind of provocative spying against our new ‘friends.’” The problem with that line of thinking was illustrated by Olson when pointed to the episode of former KGB archivist Vasil Mitrokhin. Mitrokhin provided MI6 with a gold mine of documentary intelligence on Russian espionage information from the revolution to the 1980s. However, Mitrokhin had initially attempted to provide the information to the CIA, but Olson explained he was rebuffed based on the rationale that the CIA did not want to antagonise the SVR given its aims of establishing a cooperative relationship with that Russian intelligence service. 

Then what Olson describes as an avalanche of bad news came when it was discovered that both the SVR and the GRU intelligence operations against US personnel and installations worldwide had never ceased. They were in fact being conducted aggressively. Olson then points to the cases of CIA officers Aldrich Ames, Edward Lee Howard, Harold James Nicholson, FBI special agents Earl Edwin Pitts and Robert Philip Hanssen, and the US Army’s George Trofimoff.

Another Russia concern to which Olson draws the reader’s attention was the case of a group of illegals–described by Olson as professional intelligence officers living in the US under false identities–intercepted by the FBI in 2010. The case was made very public and news stories on it garnered considerable public interest, with focus placed on a divorce, Anna Chapman, who held dual Russian and United Kingdom citizenship. Olson remarks on the politics of the illegals detainment, trial, and exchange. Olson also gives attention to Russian information warfare, which he explains supplements their human intelligence efforts. 

Cyber spying is widely used by Russia to interfere in the politics of other foundries, to manipulate their populations, to spread disinformation, to conduct unconventional warfare, and to collect intelligence. The Russian objective is to harass, to discredit, to disrupt, to deceive, and to spy on rival states. The last ten years have seen not only a dramatic increase in the frequency of Russian cyber activity, but also, what Olson alarmingly characterizes as a quantum leap in the brazeness, sophistication, and destructiveness of the attacks.

Olson reports that the FSB has taken the lead in launching denial-of-service attacks on foreign governments and sponsoring anonymous “web brigades” that bombard political blogs and other forums with disinformation and pro-Russian propaganda. The GRU’s cyber capabilities are primarily directed at supporting military interventions, but the GRU is suspected of also having carried out cyber attacks on non-military objectives, such as the German Bundesamt and French television station. The lines of responsibility between the FSB and GRU are blurry and overlap, leading to a possible duplication of cyber efforts. The SVR uses cyber operations to support human intelligence operations. Although it is not as directly involved in cyber operations  as the FSB and GRU are, it plays a planning role in overall cyber strategy.

According to Olson, Russian cyberspying first surfaced on the world stage in a big way in Estonia in 2007. Russian-Estonian relations fell to a new low over the removal of a Russian war memorial. At the height of the controversy, Estonia was hit by a massive denial-of-service attack on government offices, political parties, banks, and media outlets. In 2008, as a prelude to the Russian armed forces invasion of the Republic of Georgia, the voluntary was victimised by well-orchestrated cyber attacks creating disarray. Internet services were rerouted and blocked, websites were defaced with pro-Russian propaganda, and news agencies websites were attacked, and in some cases brought down. The Russian annexation of Crimea in 2014 was followed by waves of sophisticated cyber attacks against Ukraine’s central government in Kiev. Separate attacks on energy suppliers, the power grid, the financial sector in Ukraine, as well as the Ministry of Defense in years since.

Olson asserts that unlike Chinese espionage, which he characterized as being based on China’s cold, objective attitude toward the US, an impersonal self-interest, Russian spying is predicated on a certain animus toward the US. Olson concludes that Russian Federation President Vladimir Putin “does not like us,” and says his grudge is personal. Olson believes that in sheltering Edward Snowden, who he describes as a “contemptible US turncoat,” Putin is showing his disdain for the US.

Olson informs that when the US Intelligence Community is interviewing applicants for employment today, it sometimes refers to the “Big Five” foreign languages that are in highest demand: Chinese, Arabic, Farsi, Korean, and Russian. The Russian language is still on the list for good reasons, not the least of which is that the SVR and the GRU are all over us. Olson believes that Russia will remain a major counterintelligence concern for the US for the foreseeable future. He concludes that the US would be naive in the extreme to believe that it could ever expect good faith from Putin.

Ana Montes (above) was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba. According to Olson, the Cuban DGI was the most effective intelligence service the US counterintelligence faced. A noteworthy aspect of Cuban intelligence activity in the US is the quality of the tradecraft. In the case of Montes, for 16 years she passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. It was no small feat for the Cubans to run her case and others as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. (Olson gives the Montes case substantial treatment in Chapter Eight.)

Cuba

Olson’s review of the Cuban threat was perhaps the best written of the three assessments. Olson declares that the Cuban Intelligence service may be the most effective service that US counterintelligence services face. The Cuban Intelligence Directorate, formerly known as General Intelligence Directorate or DGI was established by the First Secretary of the Communist Party of Cuba, one time Cuban Prime Minister, then Cuban President, Fidel Castro, in 1961 to preserve the Revolution; to collect intelligence on Cubans enemies, both foreign and domestic; and, to carry out covert action operations as directed. Castro was aware as early as 1961 that President Kennedy and his brother Robert Kennedy, the US Attorney General, were trying to have him assassinated through a variety of CIA plots that never came anywhere near fruition. The DGI reportedly became Castro’s tool of choice to carry out his vendetta against the CIA and the US.

Olson states the Cuban DGI cannot compete with the Chinese or the Russians in terms of overall damage to US national security, but that is primarily a function of its smaller size, narrower objectives, and limited resources. However, perhaps  it should  have been added, as Olson is surely aware, under furtive cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked or position themselves, to support the intelligence efforts  of other countries when there is a common interest or considerable benefits of all kinds. Reportedly, friendly foreign intelligence services are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.

In their recruitment operations against the US, Olson reveals that the Cubans, much as the Chinese, often benefited from non-monetary inducements, ideological  in the case of the Cubans, ethnic in the case of the Chinese. That sort of recruitment is often facilitated by the fact that many of the US citizens who worked for the DGI and the MSS essentially volunteered their services. Another noteworthy aspect of Cuban intelligence activity in the US that Olson points to is the quality of the tradecraft. The longevity of an espionage operation is largely a result not only of the skill of the handling officer but also the techniques and equipment used to run the operation securely.

Olson reveals that in 1998, the FBI broke up a large Cuban espionage operation in South Florida called the Wasp Network (Red Avispa). This network consisted of fourteen or more Cuban spies who had the mission of penetrating anti-Castro organizations in Florida. Evidence against some of the members was too thin for prosecution, but five ringleaders stood trial and we’re convicted of espionage and other crimes. One of the Cuban-American groups, the Wasp Network, infiltrated was an organization named Brothers to the Rescue. Brothers to the rescue flew aircraft in and around Cuban airspace to assist people fleeing in boats and to drop anti-Communist propaganda leaflets. The organization was clearly a thorn in Castro’s side. As the story goes, a member of the Wasp Network found out the flight plan of Brothers to the Rescue flight to Cuba in February 1996. Cuban fighter aircraft shot down the plane in international airspace, and all four Cuban-American on board were killed. (It stands to reason that the Soviet Union, which in its day essentially armed the Cuban military and security forces, would have provided Cuba with more than a rudimentary capability to monitor nonmilitary flights from the US that did not use electronic countermeasures as well as the weapons systems to shoot down from the ground and fighter-jets that could scramble and intercept Brothers to the Rescue missions. Perhaps there was a greater reason to shoot down the 1996 flight, due to someone in particular being on board or to demonstrate Cubans capability to some operatives or informants that supported the collection of the flight plan, that led to what occurred.)

While Olson gives the case of Ana Montes greater treatment in Chapter 8 “Counterintelligence Case Studies,” notes in this chapter that due was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba for at least 16 years. During that period Montes passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. Olson writes that the tradecraft the Cubans used in handling Montes was fantastic, a credit to the art of espionage. Olson comments that it was no small feat for the Cubans to run cases as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. Montes was sentenced to 25 years in prison. 

Interestingly, Olson notes here that the CIA could penetrate the KGB and sometimes count on it to make tradecraft mistakes, but it was not so fortunate when dealing with the the DGI. Perhaps Olson was a bit exuberant about presenting the DGI as a formidable foe or maybe there was some simple oversight, but the notion that the Cuban intelligence was somehow less able to make mistakes somewhat contradicts what was one of the more remarkable aspects of the Montes case as recounted in the text. As Olson describes in Chapter 8, Montes was coached by DGI on tradecraft to include erasing everything incriminating from her hard drive. He notes that Montes either did not follow instructions or they did not work because the FBI recovered a treasure trove of espionage traffic on her Toshiba laptop.

Olson goes on to discuss the case of a retired State Department official, Kendall Myers, and his wife, Gwendolyn Myers, who were arrested on charges of having been DGI agents for almost 30 years. Myers joined the US Foreign Service with a top secret clearance in 1977. Later he was given even higher clearances when he was assigned to the highly sensitive Bureau of Intelligence and Research  at the State Department. Myers sympathised with the Cuban Revolution and believed that the US was subjecting Cuban government and people to unfair treatment. His response, probably beginning in 1979, was to spy for Cuba. With help from his wife, Gwendolyn, he engaged in a full-fledged espionage relationship with the DGI. Until Myers’ retirement in 2007, he passed top-secret documents and other classified material to the DGI in a sophisticated system of dead drops and brush passes. During their trial, it became known that the Myers had received personal congratulations from Fidel Castro. The damage they did to US national security was incalculable.

As for the CIA’s recruitment of DGI officers, it was more likely that there would be a walk-in, attempting to escape from problems of their own making with the DGI. The case Olson points to is that of Florentino Aspalllaga Lombard. Referred to by Olson as Aspillaga, he was the highest ranking defector from DGI that the US ever had. Olson was directly involved in his case. In 1987, while Olson was posted to the US Embassy in Vienna, he was summoned to his office by an agreed parole indicating that there was a walk-in. That walk-in was Aspillaga, and he was accompanied by a teenaged girl who was his mistress and the daughter of an official of the Cuban Embassy in Prague. Aspillaga, had left his wife and three children and was on the run, hoping to find a new life as a couple in the US. Aspillaga offered their services to the CIA as barter.

In what Olson called a sensational revelation, Aspillaga told the CIA that former CIA officer Philip Agee had cooperated with the DGI and had been paid close to $1 million. Agee’s role as a DGI agent was later confirmed by former KGB officer Oleg Kalugin, citing his memoir, Spymaster: My 32 Years in Intelligence and Espionage against the West (Smith Gryphon, 1994) as his source. Kalugin said Agee had walked into the KGB in 1973, had been turned away as a suspected provocation, and then had gone to the Cubans. Agee, a graduate of the University of Notre Dame, joined the CIA in 1957. He served in a series of undercover assignments in Latin America in the 1960s, supposedly becoming more and more disillusioned by what he considered CIA support of right wing dictatorships. While assigned to Mexico City in 1968, Agee resigned from the agency, moved to Europe, and began his new career of neutralizing the CIA. In 1975, he published a book, Inside the Company: CIA Diary, a detailed description of his career and exposé of CIA activities in Latin America. Most damaging of all, he included the names of 250 CIA undercover officers and foreign agents (operatives and informants). thereby disrupting CIA officers’ clandestine careers and subjecting them to considerable personal risk. The foreign agents he identified were exposed to the even worse fate of possible imprisonment or execution. The CIA chief of station in Athens in December 1975, shortly after he was outed by Agee. Agee’s guilt has never been proven conclusively, but few CIA officers believe that the timing of Welch’s killing was a coincidence.

Olson states that Agee’s US passport was revoked in 1979, but he still traveled widely, mostly in Europe, for the next several years using passports provided by the leftist governments of Grenada and Nicaragua. In subsequent books and magazine articles, Agee continued his denunciations of the CIA and the US government and disclosed the identities of an additional one thousand CIA officers and agents. Olson states here that it was clear at that point that he was not operating on his own but was getting help from a foreign intelligence service. Olson does not explain or support this fact with any data. Hopefully, he is not theorizing on a hunch but is rather presenting an inference that he can support. Whenever one theorizes in such a way without fact, one makes a capital mistake. Olson goes on to explain, unfortunately, under US law at the time, the unauthorized disclosure of the names of undercover US personnel was not a crime, so Agee could not be indicted and extradited to the US. Additionally, he remarks that Agee was operating on behalf of the DGI could not be denied after 1989. Then by Olson to state Agee’s involvement with the KGB was a near certainty  because of the close relationship that existed between the DGI and the KGB. To support this, Olson points to a statement by Kalugin in Spymaster that he read reporting from Agee that the DGI passed to the KGB. Olson claims it is inconceivable to me that the KGB would let its client service run a source of this magnitude without inserting itself into the operation.

Yet, despite what Olson inferred, the data may suggest otherwise. By Olson’s own admission, the KGB rejected Agee for recruitment in 1973. Senior executives and managers at Moscow headquarters would need to reverse a decision. They may not have been that flexible. The DGI apparently rejected the KGB’s original evaluation of Agree. That seemed even more interesting to consider. Olson then reveals that in 1989, Agee played a key role in a DGI operation against the CIA. He posed as a CIA official from the inspector general’s office in a fiendishly clever recruitment operation against a young CIA officer stationed in Mexico City. Mexico City was once Agee’s beat for the CIA, at least until 1968. Still, Agree was completely unrecognizable to US Embassy security as well as Mexican authorities. Mexico City was also being watched closely as it had a well-known role as launch pad for Soviet and Eastern Bloc operations against the US, particularly California, Nevada New Mexico, Arizona, and Texas. Reportedly, Agee contacted the CIA officer and told her that he was conducting a sensitive investigation of alleged wrongdoing by the CIA in Mexico City, possibly involving senior management. He asked for her help in carrying out a discreet investigation that would not alert the targets. Agee ordered her on behalf of the inspector general not to discuss his approach with anyone. He managed to elicit significant information from the young officer.

As far as recruiting DGI officers, Olson did not provide any information on such operations being successful. Rather, from another revelation by the DGI walk-in, Aspillaga, it was discovered that all 38 of the Cubans the CIA thought it had recruited over the previous 26 years were double agents, controlled and running  against the US by the DGI. This was a devastating indictment of CIA counterintelligence, one of the worst and most embarrassing compromises we ever had. Olson laments, “The DGI beat us–and beat us soundly.” According to Olson, the CIA’s damage assessment was long and painful. The intelligence that the CIA disseminated from  the bogus agents had to be recalled since it was all DGI-concocted disinformation. The CIA’s tradecraft handling the controlled agents had been completely exposed to the DGI, which later ridiculed the CIA in a TV special for the agency’s alleged amateurishness and sloppiness. The CIA lost all the clandestine equipment it had provided to the Cuban assets, including a then state-of-the-art burst satellite communications system. Olson also considers that the cash that the CIA paid to the Cuban doubles in salaries and bonuses, ended up in the DGI’s coffers.

In a rare expression of analysis in this segment of To Catch a Spy, Olson looks at how the CIA could have walked so far into the DGI’s counterintelligence trap. Olson pointed to the following factors. First, he explains that the CIA was so eager to have sources in Cuba that looked the other way when none of the agents produced any real intelligence of value. Many of the double agents reported that they were “on the verge” of meaningful access, but they never quite got there. The CIA settled for chicken feed. Second, intelligence officers always want their recruitment service to turn out well. They do not want to admit that they have been duped by a double agent. In their desire to succeed against the Cuban target, the CIA’s handling officers rationalised away the questionable reporting, anomalous behaviors, and ambiguous polygraph results of their agents. Third, the quality of counterintelligence at the CIA during much of this period was undermined by the poor leadership of James Jesus Angleton, whose obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. Fourth, the CIA grossly underestimated the skill and sophistication of the DGI.

A few low key remedies may have mitigated or capitalized on the possibility the CIA’s double agents were still working for the other side. Perhaps one might be added to what Olson offered by noting that there should have been an established practice of constantly interviewing agents, even in debriefings to collect intelligence and discuss requirements. It would put extra pressure on those controlling them to try to alleviate what may be concerns of fidelity, and either improve what is being offered to placate or across to board changes in methods of communicating indicating some central control exists for all that are active. The CIA could have suddenly asked that all active agents from DGI  produce information away from the area of an existing expressed interest and measure the timing it took each to deliver the information, the sources they used to gather the information, and interview the agents to discover what background they agents would use to assure the quality of the source and identify similarities that sounded more like a scripted story. It may not  immediately smoke out and identify who were  the double agents and who was true, and none were true in the Cuban case, but it might have gone a long way to encourage the CIA to consider the possibility of deception and that their double agents were fake. 

Perhaps to go a step further, the CIA needed to ensure that those handling agents were not biased pro or con toward the double agents, and were open minded to consider the possibility of deception in a way that would not color interactions with them. (That would recognizably have been less possible in a less socially conscious agency of the past.) In some cases, CIA officers perhaps could have very steadily, yet gradually sought to convince their double agents that they, themselves, might be open to recruitment by DGI. The task then would be to wait and see if there would be an effort by their double agents to manipulate and push them to some DGI operative or officer to size them up for recruitment or whether a DGI officer would simply step up out of nowhere to size them up for recruitment. That surely establishes the double agent’s loyalties, but may lead to the opening of an entirely new door to penetrate the DGI’s operations in the US. Potential must be seen in all directions when sources are limited as in the Cuban case then, and the China case now.

These three chapters are among those in which complaints arose over Olson’s decision not provide enough answers to, and copious insights on, the many “whys” of adversarial foreign intelligence activities, left gaps in understanding the reasoning behind them. For example, there is no discussion of how within not only the respective bureaucratic system, but also under the political systems in which those adversarial intelligence services work, unwavering parameters for operating are set. From that one might better conceptualize how ongoing and future operations of those services could be sorted and categorized from apples to nuts. From that analysis, antecedents in US counterintelligence would be better enabled to understand and effectively fashion operations to defeat in going and future efforts by those adversaries.

However, it must be reminded that Olson, as he reveals in his introductory Acknowledgements, submitted To Catch a Spy to his former employer, the CIA. The Publications Review Board surely stopped anything from going into the text  before it got too close to classified information. That preliminary screening might explain why some reviewers commented that the book reads at points much as a heavily redacted document

In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. Facts are somewhat easy to judge as they may be classified and one can reasonably determine what their value might be to an adversary. Hypotheses and arguments are a bit more challenging to judge for security reasons as certain facts, even if left out, can be viewed as being confirmed by them, seeing that those facts might alone be the sole solid basis upon which a particular inference could logically be made. Surely those hypotheses and arguments might be helpful to an adversary in developing any Red Team exercise. To that extent, security considerations may be the main reason why Olson avoids drawing too many inferences and presenting too many theories in the text. Olson would hardly be the type to neglect any precaution. However, his former employer likely preferred to be safe, not sorry.

All of that being stated, greatcharlie would to some degree concur that the portraits Olson paints of the Russian, Cuban and Chinese intelligence services are somewhat two dimensional. Drawing a perspective from military science, recall that an opposing force should not be viewed as some inert, non thinking body, waiting to be acted upon. There is an aphorism trained into the minds of mid-level Army officers at the Command and General Staff College that “the enemy has a say.” It falls in line with a teaching of the 19th Century Prussian military thinker, Carl Von Clausewitz, that: one’s opponent (in just about any endeavor, not just war) is “a living force” and military plans must factor in that what is being planned is “the collision of two living forces.” One must have respect for what an opponent thinks to be successful. More specifically, one must objectively gauge what the opponent thinks and what the opponent can do. What greatcharlie would have preferred to read would be an exposition of his presence of mind, inspiring insights, written in a clear and elegant style that would make Marcus Aurelius proud and would fit in beautifully in Meditations or Epictetus’ Discourses. One might have expected that along with an insistence the novice US counterintelligence officers become and remain dedicated to improving themselves. Such will always be a worthy theme and purpose of an offering from the expert veteran to the junior worm.

Olson’s Ten Commandments 

Of interest to greatcharlie was Olson’s discussion of his Ten Commandments of Counterintelligence. Those commandments ostensibly reflect the general sensibilities, perspectives, strategies, and tactics of US counterintelligence services. In his conclusion of this chapter, Olson states: “These are my Ten Commandments of Counterintelligence. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as a counterintelligence community, we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics or the priorities. What we should all agree on, is that strong CI must be a national priority. He then proceeds to set out what he views as the Ten Commandments of Counterintelligence. Previously published in 2001 as an article in the CIA’s periodical, Studies in Intelligence, these commandments include such concepts as playing offense rather than defense, owning the street, paying attention to analysis, and not staying in the profession too long.

The 20th century French Algerian philosopher, author, and journalist. Albert Camus, in his Notebooks, 1935-1942 stated: “You cannot create experience. You must undergo it.” Olson is not attempting to promote such through his efforts at this point in To Catch A Spy. Indeed, at this point in the text, Olson presents future and novice counterintelligence officers a leg up by providing a heads up on what they might expect. Understood is his desire to prevail upon the novice to heed certain realities and precepts that would not be included in their initial training. Two issues are in play in Olson’s discussion of his commandments, competence and commitment. Looking at each issue covered by a commandment, he seeks to instruct and counsel in advance, but he wants officers to focus on being competent in their work and understand the commitment that counterintelligence work requires. This is all very handsome of Olson. Clearly, a fair and decent man of honorable intent. His scruple does him great honor.

A concern for greatcharlie however is that at no point in his discussion of his Ten Commandments does Olson offer a thought about innocent citizens caught in a US counterintelligence web. With so many investigations that can get underway when so many foreign intelligence services are working hard in the US, as indicated in Olson’s first three chapters concerning People’s Republic of China, Russian Federation, and Cuban operations, innocent private US citizens can get caught in the mix erroneously with calamitous results for the citizen through no fault of their own. In a Constitutional republic, that is a grave error and greatcharlie believes such matters if utmost importance must be broached with those moving along in the counterintelligence track. Nil magnum nisi bonum. (Nothing is great unless it is good.)

Unpacking everything about Olson’s commandments here would require dedicating too much of this review’s analysis to it and shift its focus. It may be enough to say that greatcharlie found some disconcerting and a few exceedingly problematic. The information provided by Olson in his discussion of them sets off a kind of warning light that flashes “Beware” to free citizens of a Constitutional Republic. His commandments of particular note are: The Tenth Commandment; the Ninth Commandment; and, the Eighth Commandment. By focusing on these three of his ten commandments, the opportunity to understand and taste what creates concern is provided. They are presented in reverse order here to better illustrate the cascading development of Olson’s perspectives within them on some key matters.

Captured FBI turncoat Robert Hanssen (above). Olson states from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” Still, he calls attention to a misdirected investigation tied to the counterintelligence case against special agent Robert Hanssen that uncovered him as a Soviet spy, He notes that investigation went on longer than it should have because time and energy wasted on chasing an innocent man. Olson does not comment on how much harm and torment, the innocent man suffered as a result of the wrongful investigation of him as a spy. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

In his “Tenth Commandment,” Olson explains that counterintelligence requires tenacity and persistence, and that is a slow, plodding process that rarely rewards its practitioners with instant gratification. He advises that one chooses to pursue a career in counterintelligence, one should know from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He lists what types of information qualifies as such. He then explains how counterintelligence investigations usually start with little and face an uphill fight.” He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” As for a rationale behind what could very well turn out to be a Quixotic search for evidence that is not there against a target who may very well be innocent, Olson states: “If we keep a CI [counterintelligence] investigation alive and stay on it, the next defector, the next penetration, the next tip, the next piece of CI analysis, the next wiretap, the next surveillance report, the next communications intercept, i.e. the next four will break it for us. If US counterintelligence ever had a mascot, it should be the pit bull.” Readers must be reminded that this would all be done at taxpayers’ expense.

Hypotheses and conclusions should be predicated and driven by hard evidence, not appearances, presumptions, and surmisal, supporting a preconception of guilt. A type hubris ensnares and overwhelms the investigator much as the fisherman in Ernest Hemingway’s The Old Man and the Sea (Charles Scribner’s Sons, 1952). When moving into the realm of conjecture, anything becomes a possibility. In that realm, everyone is entitled to a hypothesis. Each one, within reason, is likely equally correct or incorrect. Less elevated reasons may have a familiar ring to some involved in counterintelligence: “Somethings got to be there because I can tell!”; “I know he is bad because I feel it!” To get an investigation of a subject where a counterintelligence officer wants it to be, the focus can shift from The actual matter at hand to a secondary search through extraneous matters–sifting through dust figuratively–for “good” information that is just not there. That will lead those officers to settle for something close enough to the truth that should never pass muster among somber and astute supervisors, but it could for others.

Preconception is abhorrent to the cold and precise mind. The pure objective truth must be the focus. It may be harder to find, but it is the true pathway to success in an investigation. True evidence must be there. Must be predicated only on a reasonable standard, logic, and the law. A thorough review of superiors, auditors is needed not simply to curtail but to provide another voice, extra eyes on the matter. Sometimes an ally looking into a matter to see and call attention to issue an investigator too close to it may overlook. The situation worsens when bent information, which can always be found or sought, may be used to support very wrong ideas. Intuition and hunches can be colored, or better yet poisoned, by extraneous matters. Before placing the full force of the powers of secret intelligence services upon a citizen to impinge on his or her rights, something more than a hunch or feeling must guide the pursuit. Tools available to US counterintelligence services for surveillance and investigation have become far more powerful and intrusive than the US Congress and even the federal courts could have imagined or conceptualized while promulgating laws on their use. A tragic consequence of a lack of strong supervision is that the punishing weight of government power that can potentially be placed on the subject with those tools, who may actually be innocent, can be harmful, damaging, and destructive. There must be constraint on the use of powerful, highly intrusive government tools to pursue a subject of an investigation. Knowing when to say when, especially since a human life is in the balance, is the mark of a true professional in any field. There must be an inner-voice or one from a supervisor that warns that an investigation could be going down a totally wrong path. In his Discourse on the Method of Rightly Conducting One’s Reason and of Seeking Truth in the Sciences, 17th century French-born philosopher, mathematician, and scientist, Rene Descartes, explained: “The first precept was never to accept a thing as true until I knew it as such without a single doubt.”

Conducting a heavy-handed counterintelligence investigation of an individual not yet found guilty of anything in a court of law can ruin that individual’s life permanently. The damage counterintelligence services can do to a subject’s psyche is well understood to be grave and considerable. Use of surveillance methods of all kinds, invasion of privacy, discussing the subject with family, friends, work colleagues in a manner that skirts defamation or fully crosses the line, using informants among neighbors work colleagues, friends, as well as family, eliminating the possibility of normal human contact, and more, all ensures nothing normal with be left in the subject’s personal life. The soul and the spirit of the subject is typically seared. Reversing the damage, is extraordinarily difficult, if not impossible. The psychological capsule in which strong willed subjects will seek refuge in order to hold on to the remainder of themselves, to survive, is never easy to break open in an effort to find them. However, there seems to be little sensitivity with US counterintelligence services to the harm done to the innocent from wrongful investigations. Olson actually calls attention to a misdirected investigation tied to the FBI’s famed counterintelligence case against Special Agent Robert Hanssen that uncovered him as a Russian [Soviet] spy, He notes that investigation went on longer than it should have and essentially glosses over the fact that time and energy was wasted chasing an innocent man. Nowhere does he mention how much harm, how much torment, the innocent man suffered as a result of the wrongful investigation of him as a Soviet spy. That speaks volumes. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

Habet aliquid ex iniquo omne magnum exemplum, quod contra singulos, utilitate publica rependitur. (Every great example of punishment has in it some tincture of injustice, but the wrong to individuals is compensated by the promotion of the public good.) The failure to practice what the US Constitution preaches regarding life and liberty and law is reflective of an individual engaged in an investigation going off the rails. However, that individual’s frustration or any other internal conflicts, must not allow for devaluation of the system, and a devolution that can comfortably lead US counterintelligence services to regularly mimic the tactics, techniques, procedures, and methods of an authoritarian security service as stated earlier. The way of life in the US, the country’s values and interests, are not being defended. Indeed, something very different would be happening. The US and liberal democracies must be different. Government actions are founded under laws that amplify morals, Judeo-Christian values of its founders. If all that Olson declares as essential to a counterintelligence investigation is permissible as a practice in a free society, a liberal democracy as US, it stands to reason the possibilities and capabilities make the potential for harsh behavior in search of enemies far worse in China’s authoritarian–arguably totalitarian–regime.

Olson begins the discussion of his Ninth Commandment in his purest tone with the statement: “Counterintelligence is a hazardous profession. There should be warning signs on the walls of CI [counterintelligence] offices around the intelligence community: ‘A steady diet of CI can be dangerous for your health.'” Following some interesting anecdotes about officers and senior executives in CI who seemed to lose themselves in the work, Olson explains: “I do not believe anyone should make an entire, uninterrupted career out of CI. All of us who have worked in counterintelligence have seen the old CI hand who has gone spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling prey to creeping paranoia, distortion, warping, and overzealousness in one’s thinking. It is precisely these traits that led to some of the worst CI disasters in our history.” In addition, Olson notes that following a lunch with a CIA colleague who had worked for a time in counterintelligence said: “Jim, after doing CI for two years I felt the occupational madness closing in on me. I had to move on and do something else before I lost my bearings.”

Olson argues that differences in sensibilities and approaches among CIA case officers, FBI special agents, and military intelligence officers are great/disparate enough that when working together on a case, insular thinking is mitigated. Thereby, he suggests officers from different US counterintelligence services should rotate among their offices to exploit the benefits cooperation can bring. However, despite some differences among the officers in some lines of thinking, they are all from the same national security bureaucracy and their collective thinking would more likely tend to manifest greater commonalities, more similarities, than differences, having been trained and functioning in the same system. That may not be as discernible from the inside. To be frank, but not impolitic, so far, in the case of Chinese intelligence efforts in the US, no marked positive impact has been evinced from the aggregated efforts of the services.

With all of the pearl clutching being done among senior executives in the US counterintelligence service about Chinese intelligence successes in their country, taking the approaches presented in those “Ten Commandments,” out of sort of desperation, overlooking, or turning a blind eye, to aberrant situations, prolonged investigations, “tabs” being kept on former operatives and informers for no logical reason or constructive reason, obsessive surveillance, use of dirty tricks, services ou les activités pour traquer ou nuire à autrui. They can often end up becoming huge expenditures with no constructive results, only destructive ones. Being able to claim that one is on the trail of some questionable former ally might achieve some meretricious effect in a meeting to review cases–the errant officer may want to create the appearance of being a sleuthhound with a never surrender attitude–but such efforts will typically accomplish nothing to protect the US from its adversaries or enhance the country’s national security. The dreadful consequences for those incorrectly targeted, would be, as has been, the recipe for disaster. US counterintelligence, not a foreign adversary, has, and will always be, harming innocent, private US citizens in those cases. 

Supervisors and those managers of US counterintelligence services close enough to the rank and file and their operations in the field must judge the actions of officers against US citizens based on the seriousness and dignity of the claim. If there are strong concerns, there may be other avenues along which the potential problem could be managed. Suffice it to say that an investigation of a private US citizen using tools designed for trained foreign intelligence officers and networks have no good reason to be used on a citizen in a Constitutional republic. That will always be a dangerous and destructive undertaking in terms of the well-being of the US citizen. (One wonders how inspired those US counterintelligence officers who are often anxious to spend so much time, energy, and especially money on chasing tenuous leads and entertaining the slender appearance of a private US citizen’s guilt or complicity, if money was short and was being appropriated from their personal accounts. Perhaps none!)

As for another pitfall reality that taking such a harsh, seemingly ego driven approach to counterintelligence in the present day, it could lead to self-inflicted walk down a garden path and into the hands of US adversaries. Newly minted MSS counterintelligence officers in “on the job training,” which is how they do it, may very well be actually working in the field, using decoys under their trainers direction as a type of net practice for gaining and retaining the attention of foreign counterintelligence services and luring their resources, energies, and time, into endless, fruitless pursuits. The indications and implications of what is provided in Olson’s, albeit well-meaning, “Ten Commandments” are that US counterintelligence services would be susceptible to such a ploy. MSS counterintelligence could surely offer just the right amount of chicken feed here and there to support a misguided belief that the perfect “kernel” of information will be found to make a case. Such an effort could effectively distract, divert, and disrupt elements of US counterintelligence officers from engaging in more worthier pursuits against what may very well be in many cases, potentially vulnerable networks and operations of Chinese intelligence services in the US. (Interestingly, in public announcements by the US Department of Justice of a Chinese intelligence and counterintelligence operation being cracked or disrupted, there is never mention of any apparent plot to lure US intelligence services into a trap. Perchance, since Chinese intelligence services have been so successful in the US, there is no reason, no impetus to play such games. In the eyes of senior executives and managers of the MSS and senior commanders of the PLA, US intelligence and counterintelligence services may no longer be worth the candle.)

Taking draconian steps against a US citizen for allegedly, presumptively, or imaginably being tied to a foreign intelligence service when that is in reality not the case could very well compound an already difficult situation with regard to recruiting adversarial intelligence officers, operatives, and informants. The rationale for making that representation is if a US counterintelligence service accused a US citizen of providing some assistance to a specific foreign intelligence service, and the assertion is false, no group other than that adversarial service would know for a fact that the accusation is false. Even more, observing the US counterintelligence service initiate some severe, intrusive investigation of the citizen, ostensibly to better understand US practices. Surely such behavior, such practices by some US counterintelligence services would create a decidedly negative impression of the US among members of an adversarial foreign intelligence service.

“Once upon a time” there was a near universal notion of the US being “the good guy,” known for its largesse. That reputation has become a bit tarnished over time quite possibly as result of such aggressive actions by a US counterintelligence service against their own innocent citizens. If a foreign intelligence officer, operative, or informant would ever consider what would befall him or her if they left their service and country and turned to the US, the individual would need to ask himself or herself: “If they treat their own people that way, how would they treat an adversary.” Through Olson’s compendium of US activities by adversaries and his case studies, one could infer that since the end of the Cold War, foreign intelligence officers were more likely to turn to the US only if they ran afoul of their own organizations after making some egregious, irreconcilable misstep on a professional or personal level, either by their own volition or through entrapment. Such individuals would prefer to save their skins in any way possible with an intelligence service willing to accept and protect them, rather than face their superiors. One might speculate on how many occasions the choice was made by a foreign intelligence officer to turn to another country’s intelligence service such as the United Kingdom’s Security Service or Secret Intelligence Service rather than walk-in into a US Embassy or Consulate to prostrate himself or herself. Perchance some venturous officer in a US counterintelligence service might want to apply a bit of the preceding logic to the Chinese intelligence conundrum.

Perhaps one should also consider that adversarial foreign intelligence officers may chalk up actions of US counterintelligence officers performed against them, such as monitoring an opponent’s telephone and electronic communications, surveilling their movements, or striking up clandestine conversations, as a matter of them simply doing their jobs. Such thinking would form the basis of a tacit, or even an explicitly agreed upon, modus vivendi. However, it is another thing altogether for US counterintelligence officers to use “dirty tricks” against adversarial foreign intelligence officers or their families and make their circumstances unviable in the US while deployed under official cover. Boiling it all down, there must be hope, even assurance, that there will be an intelligent connection for the one who defects not a bullying connection with a US counterintelligence officer. The one coming over of course wants help in doing so, needs help in betraying his own. Those individuals are the proverbial “bigger fish to fry.”

Infamous former chief of CIA Counterintelligence, James Jesus Angleton (above). Olson initially mentions Angleton in Chapter 3 when he discusses how his obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. In his Ten Commandments, Olson makes note of the counterintelligence failures and abuses of Angleton, the FBI’s J. Edgar Hoover, and their subordinates, reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, Olson states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

In his explanation of his Eighth Commandment, Olson begins by reminding readers of what was mentioned in his “Second Commandment” that “some people in the intelligence business and elsewhere in the US government do not like counterintelligence officers.” He makes note of the counterintelligence failures and abuses of the CIA’s James Jesus Angleton, the FBI’s J. Edgar Hoover, and their subordinates and reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, and then states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

To explain the reaction within the national security bureaucracy and among government contractors to counterintelligence officers, Olson simply states that case officers, special agents, commanders, and other managers have a natural tendency to resist counterintelligence scrutiny. As a rationale for that, Olson asserts that they believe that they are practicing good counterintelligence themselves and do not welcome being second guessed or told how to run their operations by so-called counterintelligence specialists who are not directly involved in the operation and not in the chain of command. He acknowledges that defense contractors and other civilian bureaucrats running sensitive US government programs have too often minimized counterintelligence threats and resisted professional counterintelligence intervention. As a rationale for that perspective, Olson says they view counterintelligence officers as only stirring up problems and overreacting to them. They perceive counterintelligence officers “success” in preventing problems as being invisible and their damage assessments after compromises as usually being overblown.

In the face of such resistance, Olson proffers that counterintelligence officers must act heroically, stating: “A counterintelligence officer worthy of the name must be prepared to speak unpopular truth to power, even at the potential cost of poor performance appraisals or missed promotions. It is not an exaggeration to say that a good CI [counterintelligence] officer must be a nag–and as we all know, imperious managers do not like persistent and vocal dissent.” Intriguingly, In this discussion, Olson leaves the reader with the impression that all counterintelligence investigators are first class individuals, straight as a dart. Across all of the US counterintelligence services, a majority probably are. However, in his Ninth Commandment, he clearly indicates personal problems among them are known to arise as a consequence of the work, to repeat  included:  creeping paranoia, distortion, warping, and overzealousness in one’s thinking.  To reiterate what he writes even in this “Eighth Commandment,” Olson mentions the “self-righteousness trap” and acknowledges: “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness.” When Olson recalls from his experience how senior executives and managers in CIA shied away from acceptance of counterintelligence officers in their divisions and shops, surely he is fully aware that they could only express that choice through tidy, plausible and professional statements such as those. He also had to know that they were very likely aware of the same problems Olson, himself, indicated could exist among some counterintelligence officers. Not presuming or expecting to learn of a connection between stories of aberrant behavior by counterintelligence officers and concerns that raises among managers of departments and units, the issue may escape the impressions of many readers. To that extent, Olson, perhaps unconsciously, does say enough to invite such concerns to be among reader’s impressions either.

Iniqua raro maximis virtutibus fortuna parcit; nemo se tuto diu periculis offerre tam crebris potest; quem saepe transit casus, aliquando invenit. (Unrighteous fortune seldom spares the highest worth; no one with safety can long front so frequent perils. Whom calamity oft passes by she finds at last.) With such problems among counterintelligence officers in mind, as a “good shepherd,” the goal of any attentive and prudent manager would be to keep a potential source of undue trouble from his flock. Letting counterintelligence officers in has really become a high stakes gamble. The slightest suggestion that a manager might refuse to receive a fellow officer due to unsubstantiated concerns that he or she may be potentially psychologically unfit to carry out his or her duties appropriately or concerns that he is she may be of questionable judgment–again, based on Olson’s own statement about problems that can arise among counterintelligence officers, it could always be a possibility–could lead to sanction from the top. Olson surely must have understood was likely a tad sympathetic to such underlying sensibilities among managers within the CIA and the other national security bureaucracies about counterintelligence. If there is so much concern within the federal bureaucracies over US counterintelligence, certainly the unsuspecting, unprotected citizen has far more to fear from it. Gnawing again at the subject of the “potential” abuse of power by US counterintelligence officers, as long as there is the actuation and potential for transgressions of innocent citizens’ rights exists, there may be less to fear about China expropriation of the US role as the dominant power in the world and its usurping of citizens rights, primarily through infiltration of elite circles and election interference, than the prospect of being torn to pieces as a result of the acts, benign or malicious, of a few trusted men and women in the intelligence services and law enforcement.

Very easily the innocent, with no connection to the hideous business of a spy ring, can be caught in the same net as the guilty. It is among the innocent, carrying on by appearance in the same manner as them, that the foreign intelligence officer, operative, and informant conceals himself or herself. Suppositions based on assumptions can result in an officer initiating a case green-lit with all the necessary approvals from the top. Sentimentality to the concept of beginning, middle, and end should not compel the endless pursuit of one who may upon informed consideration may equally be found innocent. Wrongs already done cannot be righted, but an energetic effort should be made to prevent future wrongs of the same kind. Pause for thought! 

Once the track to find an individual is guilty has been taken, no one among the officers in the shop will aim to prove the individual’s innocence. The individual’s innocence becomes by the by. In these matters, perception errantly means more than reality. That imbalance in thought unfortunately has likely served to allow all formulations based on available evidence, easing in tragic results. Surely adversarial foreign intelligence services would prefer US counterintelligence service would become immersed in an investigation of an innocent party than put their time and energy on any actual part of their networks. As discussed in somewhat greater detail in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” it cannot be overemphasized that misidentifying an innocent citizen as an  agent of an adversarial foreign power engaged in espionage or some other act on its behalf by initiating an investigation against the individual, to include securing warrants for the most intrusive and egregious acts contrary to his or her First and Fourth Amendment Rights under the Constitution is a tragedy of unimaginable proportion and can have enormous consequences upon the life of the one mistakenly, even wrongfully targeted. 

In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by the University of California, Los Angeles (UCLA) on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 passed to China. The normative hope, yet perhaps a bit of an optimistic one given the players involved, would be that once exculpatory information is discovered that could prove one’s innocence, a FBI investigation would have been halted. However, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy.

Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men with authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

Intelligence enthusiasts may find it interestingly that in a September 25, 1977 New York Times interview, John le Carré, the renowned espionage novelist of the United Kingdom who served in both MI5 and MI6, just after publishing The Honourable Schoolboy (Alfred L. Knopf, 1977), was asked about a view implied in his earlier works that no society was worth defending by the kind of methods he had set out to expose in his books. In reply, the author stated in part: “What I suppose I would wish to see is the cleaning of our own stable and the proper organization, as I understand it, and the sanitization, of the things that we stand for. I hope by that means and by those examples perhaps to avoid what I regard as so wrong with the Soviet Union.”

Double-Agent Operations and Managing Double-Agent Operations

Olson follows his commandments with a chapter on preventing counterintelligence incursions through the development of better workplace security. Improvement may be achieved, he explains, by following his “Three Principles of Workplace Counterintelligence”—careful hiring, proper supervision, and responsible promotions. Afterward, comes the chapters of To Catch a Spy that greatcharlie appreciated the most were “Chapter Six: Double-Agent Operations” and “Chapter Seven: Managing Double-Agent Operations.” In these two chapters, Olson finally presents a classical series of demonstrations. Indeed, in both chapters, Olson provides nothing less than a mini manual for precisely what the titles indicate. Readers are favored with many of the logical principles that Olson would practice and expound during training while working in CIA counterintelligence. He provides a list of benefits US counterintelligence seeks to gain from a double agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Nihil est aliud magnum quam multa minuta. (Every great thing is composed of many things that are small.)

The tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination possessed and creative ways in which double-agents were dangled to garner interest from the adversarial intelligence service, the transmission of chicken feed, ostensibly useful yet actually useless information, for the adversary to grab, and management of nuanced communications between the double agent and his handler. Olson does not indicate whether any among the practices discussed was used by him to achieve some crowning glory of his career. Again, for readers such as greatcharlie, what was presented in this chapter was meat and drink. None of the precepts included were beyond the understanding and the abilities of most readers who would be interested in the book. He tells it all in an apposite way.

Case Studies

In “Chapter Eight: Counterintelligence Case Studies,” Olson goes into some greater detail on the principles and methods of counterintelligence. Olson carefully avoids offering what may seem to some as a mere series of tales. However, it seems that Olson’s relaxed writing style, present throughout the text in fact, may distracted some previous reviewers’ attention away from the instructive nature of the discussion. In the 12 case studies he presents, Olson also illustrates the tradecraft of counterintelligence, and where counterintelligence breaks down or succeeds. He presents, to the extent that he could, how US counterintelligence officers became fully engaged on each matter. To some degree, Olson also looks at the other side of things and discusses why people spy against their country.

Each case study is followed by a “lessons learned” section. Lessons learned are the pertinent qualities and deficiencies that Olson ascribes to each case pertinent to the ongoing work of US counterintelligence services. The lessons learned are given greater value for Olson selects only what he deems most pertinent from what he witnessed, experienced, and endured as is not presumed. Again, nothing presented in To Catch a Spy is considered in the abstract. Some might observe that absent again is the severe reasoning from cause to effect that helps to solve the case. Instead, he highlights a few points of interest in each and considerable focus is put into placing color and life into his discussion of them. Two good examples of his case studies are those concerning Ana Montes and Richard Miller.

Scott Carmichael (above) was the senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. Concerning the Montes case, Olson does not deny the fact that the DGI had done the thing very completely. Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraph of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on the counterintelligence radar of DIA investigator Scott Carmichael, who he heaps praise upon. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and put Carmichael back on the scent, Olson says Montes might have stayed in place.

Ana Montes

Concerning the case of Ana Montes, which Olson touched upon in his country report on Cuba in Chapter 3, he leaves no doubt that it was a very complicated and abstruse case. He does not deny the fact that the DGI had done the thing very completely. Olson referred to Ana Montes as a classic spy. Montes worked for Cuban intelligence for sixteen years. She was indeed the embodiment of an ideological belief concerning US policy in Latin America and most of all, a pro-Cuba sentiment, as she carried out her espionage duties for the DGI diligently and effectively. Before the smash of her unmasking, Montes was believed to be a thoroughly trustworthy officer. When colleagues learned of Montes’ betrayal, it was a crushing blow to them.

Olson reports that Montes’ views against the US role in world affairs were hardened while she studied abroad in Spain as a student of the University of Virginia. Nevertheless she would eventually find employment in the US Department of Justice and receive a top secret security clearance required for her position. The espionage problem started outright when Montes, already a federal employee, began attending night courses at the Johns Hopkins School of Advanced International Studies in Washington. Montes, likely spotted by someone working for Cuban intelligence once she was heard voicing her negative views toward US policy in Central America during the administration of US President Ronald Reagan. The Cubans, appreciative of her enthusiasm, Olson believes, Cuban intelligence insisted that she leave her job at the US Department of Justice and move to a national security organization. She secured a job with DIA. Starting as an analyst on El Salvador and Nicaragua, Montes rose to become the senior DIA analyst on Cuba.

As for her espionage work for the Cubans, Montes would memorize contents of documents she saw, summarized it at home, and encrypt the material on diskettes. She received instructions from Havana by shortwave radio broadcasts, which she deciphered on her Toshiba laptop using a special program the Cubans provided her. She would contact her handler by calling from a public phone booth and sending a coded message via her pager. She would have dinner with her handler once or twice a month with her Cuban handler in a Washington restaurant to provide him with the diskettes. Montes was lavished with praise but never accepted payment.

In 1996, an alert DIA employee, practicing good workplace counterintelligence, reported his concerns about Montes to DIA counterintelligence officer Scott Carmichael. The employee noted that Montes appeared sympathetic to the Cuban cause,  and inappropriately aggressive in seeking expanded access to sensitive intelligence on Cuba. Carmichael interviewed Montes and eventually dropped the matter. However, as Olson explained, he filed away his suspicions of her for future action. In 2000, Carmichael became aware that the FBI was looking for a Cuban mole inside the US intelligence community. Only soupçons were known about the identity of the spy, except that he or she was using a Toshiba laptop to communicate with Cuban intelligence. Carmichael immediately thought of Montes, but he had little evidence to support his suspicions against her that he had great difficulty in convincing the FBI to open an investigation.

Carmichael remained persistent in pushing the FBI to open an investigation (never give up), egged on by further aberrant pro-Cuban attitudes displayed by Montes, and his efforts finally succeeded. In May 2001, the FBI threw its notorious full court press at Montes, starting with extensive physical surveillance. It did not take long for the FBI to conclude that she was involved in illegal activity. First, she was obvious and amateurish in her surveillance detection routes, often entering a store by one door and quickly leaving by another. Second, she made a succession of one minute phone calls from public phone booths, even though she owned a car and carried a cellphone. Montes’ behavior was suspicious enough to the FBI that it was able to obtain a warrant for surreptitious entry of her apartment on May 28, 2001. She was away on a weekend trip with her boyfriend. The FBI knew that this entry would be particularly dicey if Montes was a Cuban trained spy, she could have trapped her apartment to determine the intrusion. There was, however, no evidence of trapping and the entry was successful. The FBI found a shortwave radio of the type used by spies to listen to encrypted broadcasts and a telltale Toshiba laptop. On the hard drive, which the FBI drained, were multiple messages from the Cubans to Montes on her intelligence reporting, giving her additional tasking requirements, and coaching her on her tradecraft. Olson says he is certain that the FBI computer experts chuckled when they read the instructions from the Cubans to Montes on how to erase everything incriminating from her hard drive. He further comments that she either did not follow the instructions or they did not work because the FBI recovered a treasure trove of espionage traffic. One message thanked Montes for identifying an undercover US intelligence officer who was being assigned to Cuba. It was later determined that she gave the Cubans the names of other US intelligence personnel in Cuba. She blew their cover and sabotaged their mission.

As the remainder of the story goes, the FBI continued its surveillance of Montes for another four months in hope of identifying her Cuban handler or handlers. That effort was not successful, but the FBI was able to search her purse when she was out of her DIA office to attend a meeting. Inside her purse the FBI found more incriminating material, including the page rhinestone number she used to send short corded messages to the Cubans. Olson said the fear was that if Montes detected the surveillance, she would flee. When Montes was about to gain access to US war planning for Afghanistan in the aftermath of September 11, 2001, the FBI and DIA decided that they could wait no longer. Montes was arrested at DIA Headquarters on September 21, 2001. She pleaded guilty on October 16, 2002  and was sentenced to 25 years in prison. 

Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraphs of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on Carmichael’s counterintelligence radar. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and to put Carmichael back on the scent, Montes might still be in place. DGI’s activities in the US were really a mystery. Olson did well in presenting readers with a sense of the elusive nature of DGI operatives. 

As it turned out, the case did not reach its optimal potential for counterintelligence officers engaged in the investigation were unable to use available information to track down and capture Montes’ handlers or any other elements of the Cuban espionage network of which she was a part. In his investigation, the DIA counterintelligence officer, Carmichael, was able to observe, reflect, and intuit connections based.on facts not conjure a false reality based merely on appearances. Again, it is always a capital mistake to theorize in advance of hard facts. Nevertheless, it is a common errant practice. With hard facts, one is better enabled to grasp the truth.

With regard to Olson’s suggestion that the FBI computer experts likely chuckled over the failure of Montes to eliminate incriminating evidence from her Toshiba laptop, a concern is raised. Perhaps some in US counterintelligence services may feel greatcharlie is making the whole matter seem more urgent and important than it really is, but the proper comportment, displayed and demanded by supervisors and line managers, would instead have been to remain collected and aplomb with noses to the grindstone in the squad, knowing that an unexpected opportunity to exploit a failing on the part of the adversary has shown itself. It may signal that other missteps by the adversary may be present that will allow counterintelligence officers to net an even greater quarry of foreign intelligence prey. Recognizably, stresses can cause attention to shift. (Take charge of your emotions!) However, there is the need to concentrate solely on performing the duty of the moment as best as possible. Once the case is resolved, there would be time then to reflect on its many aspects. The reputation of US counterintelligence services will not suffer shipwreck over this particular matter. Olson surely did not view at all out of order as he freely revealed it in the text.

When Montes’ handlers and the managers of her undiscovered network evaded capture, they took with them all their lessons learned. (Recall her activities were not a small matter in the DGI as the informative walk-in Olson dealt with in Prague, Lombard, was read-in on her fruitful work while he was posted in Vienna.) One could have no doubt that meant it would certainly be decidedly more difficult, after the DGI presumably made necessary corrections, to uncover their activities of officers, operatives, and informants in their networks on later occasions. Surely, they would be back. (Rather than display any good humor about the matter, it should have been handled from start to finish with solemnity, especially given the indications and implications of the case.)

KGB operative Svetlana Ogorodnikov (above). As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Working out of the Los Angeles FBI Office, Miller was tasked to monitor the Russisn émigré community in Los Angeles. In May 1984, a well-known member of the Russisn émigré community called Miller suggesting that they meet. It turned out the caller, Svetlana Ogorodnikov, was a KGB operative dispatched in 1973 to infiltrate the Russian emigre community in Los Angeles. She got her hooks into Miller. Miller, figuratively tied to a tether right in front of the KGB, was exactly the type of FBI Special Sgent that an adversarial foreign intelligence officer would look for.

Richard Miller

As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Miller was a door left open that an adversarial foreign intelligence service, in this instance the KGB, was happy to walk through, and one could expect in similar circumstances that will almost always be the case.

Olson notes that Miller was hired by the FBI in 1964. After having spent time in a number of FBI field offices, Miller landed in the Los Angeles FBI Field Office where he should have found peace. However, as Olson explains, Miller, as a result of his own incompetence did not find a happy home in that office. Olson leaves no doubt that Miller was a disaster as an FBI special agent. He was a laughingstock at the office. His FBI colleagues scratched their heads in disbelief that he had been hired in the first place. In the buttoned down world of the FBI, he was totally out of place. He was poorly dressed and noticeably careless with his grooming. His weight and physical fitness did not meet the FBI’s rigorous standards. At 5’9″ tall and weighing as much as 250 pounds, he never came close to matching the stereotypical profile of the trim and athletic FBI special agent. 

To make matters worse, Miller was hopelessly incompetent. Olson says Miller begged his FBI colleagues to give him assets because he was incapable of developing any on his own. At various times, he lost his FBI credentials, gun, and office keys. His performance reviews were consistently bad, but somehow his career chugged on. In Olson’s own words, Miller was part of the FBI culture that did not turn on its own, even at the cost of carrying dead weight. With eight children, on a special agents salary, Miller was always on the lookout for extra income. Reportedly, he stole money from his uncle in a far fetched invention scam. He pocketed money that was supposed to pay assets. He ran license plates for a private investigator. He sold Amway products out of the trunk of his office FBI vehicle. He even bought an avocado farm to profit from but it went under. Miller would eventually be excommunicated from the Church of Latter Day Saints for adultery and divorced while serving in Los Angeles.

Miller’s initial work in the Los Angeles FBI Field Office was in criminal work but he was unsuccessful at that. He was transferred to goreign counterintelligence where it was ostensibly though he would receive vlossr supervision and mentorship from the Gordian counterintelligence chief. Olson notes that additionally, foreign counterintelligence was considered a dumping ground for under performing employees Counterintelligence was not highly regarded and the best people stayed away.

In foreign counterintelligence, Miller was given the job to monitor the large Russian émigré community in Los Angeles. To do that job he was expected to mingle with the émigrés and develop contacts inside that community who could keep him informed of any indications of Russian espionage. It was not hard to imagine how Miller was perceived by the Russians with whom he came in vintage. There is no indication that Miller did anything significant during that period. His career and personal life was still spiraling downward. He would later tell estimators he sometimes took three hour lunches at a 7-Eleven store reading comic books and eating shoplifter candy bars. Viewing Miller’s behavior was becoming increasingly erratic he was counseled by his supervisor and sent in for a mental health assessment. Although found emotionally unstable, and subsequently suspended for being overweight, Miller was krot pn at foreign counterintelligence. He was allowed to hang on until he reached retirement age of 50.

In May 1984, one of the well-known members of the Russisn émigré community called Miller suggesting that they meet. The caller,, Svetlana Ogorodnikov, immigrated from the Soviet Union in 1973 with her husband Nikolai. She worked as a low level source for the FBI at one point but dropped out. Her husband worked as a meatpacker. It turned out that Svetlana was a KGB operative, dispatched in 1973 to infiltrate the Russisn emigre community in Los Angeles, and if possible, assess and develop US citizens for recruitment. She was known to make trips to the Soviet Consulate in San Francisco which the FBI would later assess were occasions when she met her KGB contact.

Olson assesses due to the timing of Ogorodnikov’s call, she likely was aware from her contact in the community that Miller was in trouble at the FBI and his personal life had become a shambles. Olson also supposes that the KGB green-lit her call after they were satisfied with an assessment of him. After traveling to the Soviet Union, where Olson believes she met with the KGB to discuss Miller, Ogorodnikov returned to the US and continued contact with him in August. She promised him cash for secrets and Miller agreed. He supplied her with secret FBI documents to prove his bona fides. Miller then met with a KGB officer. Olson explained that the KGB was not immediately satisfied with Miller. He gave his FBI credentials to Ogorodnikov who presented them to heathen  contacts in the San Francisco Consulate. The KGB wanted Miller to travel to Vienna with Ogorodnikov to meet with more intelligence officials. However, the FBI never allowed that to happen; other special agents became aware of Miller’s unauthorized relationship with Ogorodnikov. Miller was placed under surveillance by use of wiretaps, bugs, and operatives on the street.

Olson assumes Miller detected the surveillance. On September 27, 1984, he tried to convince the FBI that he was engaged in his own effort to catch Ogorodnikov. However, while being polygraphed he admitted to his malign activities. He gave Ogorodnikov a secret document. He then started keeping several other documents in his home and was prepared to present them to the KGB. Miller and the Ogorodnikovs plead guilty to conspiracy to commit espionage on October 3, 1984.

In his lessons learned, Olson focuses on the decision of Miller’s FBI superiors to keep Miller in place. He does not fault the other special agents in the office for not reporting him because Miller’s situation was well-known in the office. Olson, to some extent in the role of apologist, offers reasons for such behavior among Miller’s colleagues. Misfortune can easily come at the hands of an evil influence such as alcohol. Miller had a weakening nature to which his supervisors should have responded. Perhaps they figured they had to stretch a point in favor of a man who served for so long. However, by keeping Miller on the job, his supervisors and managers, surely inadvertently compounded the problem. They went too far to screen his many disqualifications from their own superiors, presumably to allow him to reach retirement. Miller seemingly marked his zero point when he was approached by the KGB. It stands to reason that an astute counterintelligence officer may often discover weaknesses and blind spots in himself or herself. An effort to correct the deficiency would then be in order. However, Miller was different. By all appearances, he was spent, no longer qualified to serve, but he was kept on.

On reflection, the matter seems almost ridiculous. Miller was exactly the type of FBI special agent that an adversarial foreign intelligence officer would look for. He was not a dangle, nor was he really on the prowl. He was simply a door left open to the achievement of some success by the KGB, figuratively tied to a tether right in front of them. Perhaps at the time their agents presented him as a prospect, in Moscow, they could hardly believe their luck. The opportunity was there, and the KGB operatives among the émigrés supplied the audacity to take advantage of it. 

Through his own insufficient and perhaps sympathetic investigation, he discovered no one and nothing significant among the émigrés. Anyone getting involved with an émigré community as part of a counterintelligence investigation must gird one’s loins, for with some certitude adversarial foreign intelligence services will very.likely be quietly operating among both suspicious and unwitting émigrés. The powers of such officers or operatives may seem far superior to opportunities that may present themselves, but they are deployed among the émigrés nonetheless. The erstwhile KGB and DGI, and current SVR and MSS, each organized special departments for such work. Indeed, an emigre community can very often be a milieu for spies. Perhaps Miller’s FBI superiors thought he would unlikely find trouble in the Russian émigré community, and Miller had effectively been sent to some empty corner of the room. However, they confused the unlikely with the impossible. By their experience and instincts, his supervisors should have been against Miller’s conclusions. Nevertheless, they were satisfied with his totally erroneous conclusions.

Given his history of behavior, it is very likely that during his contacts with the Russian émigré community, Miller betrayed himself with an indiscretion or two. Whatever it may have been, it was clearly significant enough to cause KGB operatives–who he was unable to detect as tasked under his original counterintelligence mission–to seize upon him as their prey. The case highlights the KGB’s–and presumably now the SVR’s–ability to figuratively pick up the scent of blood much as a shark, and recognizing there can be a good soup in an old chicken. Even more relevant to the discussion in proceeding parts of this review, it illustrated the real possibility for errant officers ro exist in plainview within the rank and file of other hardworking, diligent counterintelligence officers. Such license could only lead to some great evil. The KGB Rezident at the time would have been derelict of his duties if he had not recruited Miller, a wayward FBI special agent, who due to that errant choice made by his superiors, was placed in counterintelligence. And, given his deficiencies, it would have been a serious blunder for the KGB not to exploit all possibilities with Miller to the maximum extent.

It is likely that any other KGB comrades, who may have concealed themselves in the same roost among émigrés in which Svetlana and her confederate had set themselves and had perhaps taken to their heels once they learned those two and Miller were captured, is unclear. Further, it is unclear whether any concern was raised that there was any increased concern that other KGB operatives had continued to secrete themselves among Soviet emigre groups throughout the US. For whatever reason, Olson does not go into such details on what would have been legitimate counterintelligence concerns.

No one should imagine that this review, or any other for that matter, fully covers what Olson offers in To Catch a Spy. It presents the essence of the book, but there is so much more to discover. As humbly noted when the review started off, there nothing that greatcharlie appreciates more about such a book than its ability to stir the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that To Catch a Spy is. One can ascribe these positive aspects to it and many others. What one finds in To Catch a Spy is of the considerable quality. The book remains steady from beginning to end. Readers are also enabled to see the world through the lens of a man with years of experience in the world and a thorough understanding of humanity.

Whenever greatcharlie feels so enthusiastic over a book, the concern is raised that its review may be written off as an oleagic encomium. However, that is not the case, and readers will understand once they sit with the book. Despite concerns about what To Catch a Spy is missing, it would be worth reading to see what appears to lie at the base of such positions and take one’s own deeper look into Olson’s discussion. Having engaged in that process itself, greatcharlie found it thoroughly edifying. It is assured that after the first reading To Catch a Spy in this manner, one would most likely go back to the book and engage in that stimulating process again and again.

With To Catch a Spy, Olson confirmed his reputation as an excellent writer in the genre of intelligence studies. The book will also likely serve for years as an inspiration to future author’s on the subject of counterintelligence. As aforementioned, the book will surely be consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. The rudiments of counterintelligence tactics, techniques and procedures, and methods offered by Olson, to some degree, may also serve as a source for guidance Indeed, much of what is within can aptly serve as a foundation upon which they will construct new approaches. 

Further, both by what he includes and ironically by what he omits in the text, became the supplier/purveyor of a foundation upon which an honest discussion can be had among people inside and outside of counterintelligence services in free societies–well-known constitutional republics and liberal democracies in particular–can look at themselves and their organization’s work relative to the rights and interests of the citizens of the respective countries they defend. It is a conversation to which greatcharlie believes To Catch a Spy can lend support. It is a conversation in current times, especially within the US, that many citizens greatly desire to have. Without hesitation, greatcharlie recommends To Catch a Spy to its readers.

By  Mark Edmond Clark

The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department

The People’s Republic Consulate in New York City (above). According to a US Department of Justice criminal complaint, New York City Police Department officer, Baimadajie Angwang, allegedly acted at the direction and control of officials at the People’s Republic Consulate in New York City.  Specifically, the NYPD officer allegedly reported on the activities of Chinese citizens in the New York area, spotted and assessed potential intelligence sources within the Tibetan community in New York and elsewhere, and provided Chinese officials with access to senior NYPD officials through invitations to official events. One of the Consulate staff members at whose direction Angwang allegedly acted, was an official from the “China Association for Preservation and Development of Tibetan Culture,” a division of the People’s Republic of China United Front Work Department.

On September 21, 2020, the US Department of Justice filed a criminal complaint against Baimadajie Angwang, a naturalized American citizen who serves as a member of the New York City Police Department (NYPD) and the US Army Reserve has been charged with acting as an illegal agent of China. The criminal complaint explains that Angwang reportedly acted at the direction and control of officials at the People’s Republic Consulate in New York City.  Specifically, the NYPD officer reported on the activities of Chinese citizens in the New York area, spotted and assessed potential intelligence sources within the Tibetan community in New York and elsewhere, and provided Chinese officials with access to senior NYPD officials through invitations to official events.  One of the Consulate staff members at whose direction Angwang allegedly acted, was an official from the “China Association for Preservation and Development of Tibetan Culture,” a division of the People’s Republic of China United Front Work Department. That department is responsible for, among other things, neutralizing potential opponents of the Chinese government and co-opting ethnic Chinese individuals living outside China. In their criminal complaint, prosecutors explain that Angwang was explicit about his motivations, telling his Chinese contact that he wanted to get promoted within the NYPD so that he could assist China and bring “glory to China.”  Further, Angwang told his contact that his superiors in Beijing “should be happy . . . because you have stretched your reach into the police.” In addition to being charged for acting as an illegal agent of China, Angwang was also charged with committing wire fraud, making material false statements and obstructing an official proceeding.  Reportedly, as part of his employment with the US Army Reserve, Angwang maintained a “SECRET”-level security clearance.  According to court documents, in 2019, Angwang completed and electronically submitted an SF-86C form for a background investigation.  On the form, Angwang lied by denying that he had contacts with a foreign government or its consulate and by denying that he had close and continuing contacts with foreign nationals, including his family members who live in China, some of whom were affiliated with the Communist Party of China and the People’s Liberation Army. In accord with the charges in the criminal complaint against Angwang, if convicted, he could face a maximum of 55 years imprisonment.

It appears that Angwang’s guilt was never in doubt to the US Department of Justice. It was apparently not an astounding challenge to pursue Angwang, based on what is reported in the US Department of Justice criminal complaint against him. Although a confession covering Angwang’s behavior was captured, enough incriminating evidence used against Angwang for the espionage charge was found in recordings of telephone conversations between him and an official of the People’s Republic of China Consulate in New York. Yet, while on the surface, the case, intriguingly, did not reach some great proportions of espionage, with nefarious entanglements with sinister civilian or military Chinese foreign intelligence officers and daredevil thefts of information of the utmost importance, violent plots, or high speed chases, there is far more to it that meets the eye concerning a very dangerous threat to the national security of the US.

In a reappraisal of the espionage aspect of the case outlined in the US Department of Justice criminal complaint, greatcharlie brings to the fore the fact that case involves the seldom discussed activities of one of Communist Party of China’s largely unnoticed  intelligence organizations. In this particular instance, the organization identified was the United Front Work Department. The discussion of the United Front Work Department and its operations in the criminal complaint is limited.. As such, it does not allow for an understanding of how the United Front Work Department, despite its relative obscurity, has a high place within the Communist Party of China’s hierarchy. It fails to create a picture of the nature and scale of the operations of the organization and the Communist Party of China in general inside the US. From a discussion in the abstract, greatcharlie, provides a somewhat more detailed look at the organization, its intelligence role, and the important place it holds within the large-scale systematic plan of the Communist Party of China to become the world’s dominant power. Using the facts of Angwang’s activities in the criminal charge, greatcharlie then postulates on the possible interplay between Communist Party of China intelligence elements and civilian and military Chinese foreign intelligence services with specific regard to Angwang’s contacts with the People’s Republic of China Consulate in New York. In turn greatcharlie hypothesizes, absent any templates or manuals, on how those intelligence services likely interact on cases in diplomatic posts generally. The acts allegedly performed by Angwang on behalf of the United Front Work Department were not monumentous. However, the course of Angwang’s work as an operative for the organization and the actions of the organization’s official posted at the Consulate in New York with whom he was in contact, as reported in the criminal complaint, allow one to draw insights on the organization’s practices on a case with such circumstances. From those reports and insights, greatcharlie postulates, to a small degree, how the tactics, techniques, procedures, and methods of “regular” Chinese intelligence services compare and contrast from those of irregular Communist Party of China intelligence organs. Angwang’s case is made even more intriguing due to the many incongruities and outright oddities apparent in the activities of the parties involved in the matter. A number of them are given brief treatment.

Corruptio optimi pessima. (Corruption of the best is the worst.) In a US Department of Justice September 21, 2020 Press Release on the criminal charges leveled on Angwang, the fact that he was a NYPD officer involved in Chinese foreign intelligence activity was looked upon as a new, frightful phenomenon, which should put municipal police departments across the country on alert. However, what has really been put in the spotlight by the case is the reality that the United Front Work Department, essentially an intelligence organization promoted and well-supported by the very top of the Communist Party of China’s leadership, is very present and may eventually become more active in its unique ways in the US. Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.)

Police Officer Angwang in NYPD uniform (above). In a US Department of Justice September 21, 2020 Press Release on the criminal charges leveled on Angwang, it was noted that because he was a NYPD officer involved in Chinese foreign intelligence activity, his case should was looked upon as a possible  new, frightful phenomenon, that should put municipal police departments across the country on alert. However, what has truly been put in the spotlight by his case is the reality that the United Front Work Department, essentially an intelligence organization promoted and well-supported by the very top of the Communist Party of China’s leadership, is present in the US and may eventually become more active in its unique and nefarious ways in the country.

Developing New Perspectives

For greatcharlie, it is an absolute requirement to be careful before imputing reasons why one might engage in certain behavior on a matter without having all the hard facts about the individuals thinking at hand. Certainly, there was no psychological profile of Angwang included in the criminal complaint, and there very well should not have been. One could present multiple possibilities concerning the intent of Angwang’s behavior, each with certain ambiguities. The well-fashioned theory behind the criminal case of the US Department of Justice would be one among them. While prosecutors appear to have confidence in their case, even included in the US Department of Justice Press Release was a clearly explained caveat that the charges in the complaint are merely allegations and the defendant is presumed innocent unless and until proven guilty. The NYPD officer’s defense attorneys surely intend to have a great say in how his case goes.

Looking at the whole matter simplistically, one might also make the argument that Angwang’s Consulate contact may have genuinely believed initially that his connection with the NYPD officer may have been simply collegial. Perchance he assumed that contact with the People’s Republic of China Consulate in New York had special meaning for Angwang. The may have also thought that for Angwang, interaction with the Consulate stirred a sense of importance or satisfaction within him that was unique to his sensibilities. Further, the Consulate official with whom Angwang had the most contact, may have simply been serving as a member of the Consulate who was engaged in outreach activities in the Tibetan community as part of his duties. For the official, it may have initially seemed a fortuitous wind fall that an NYPD officer,who metaphorically fell into his lap, was willing to use his own time and energy to help them with his outreach efforts. (He  would hardly view his interaction with Angwang a stroke of luck now.)

Stoicius noster, “Vitium,” in quite, “non est in rebus sed in animo.” (Our Stoic philosopher said, “Vice is not merely in one’s actions but in the mind itself.”) It is hard to discern what Angwang really hoped to achieve by working for the People’s Republic of China Consulate in New York while serving as a NYPD officer. Although his antics had escaped detection, at least initially, for the reasonable, there could hardly have been any doubt that he would be caught given the intense scrutiny being placed upon China’s diplomatic stations by US counterintelligence services. As an NYPD officer, working with the Chinese diaspora, one would imagine he would have come across aspects and elements of the federal government’s close watch. One might theorize that for over two years, and during a three year period prior, he may have very well have immaturely believed that he was engaged in an ego-driven battle of wits, leveling his superior intellect upon a loyal servant of China’s Communist regime and his bosses ruling from Beijing. Indeed, Angwang may have believed that by insinuating himself into the Chinese government system, he would put himself in good stead with NYPD officials and top individuals in federal law enforcement and perhaps have value to them as a “counterespionage agent ” Under this scenario, the Angwang presumably would also want to believe that Consulate officials were in the dark about what he might have been cooking up against them. These respective scenarios for both Angwang and the officials of the People’s Republic of China Consulate in New York, with whom he interacted, appear unlikely. Angwang’s legal defense would likely insist that one must not confuse the unlikely with the impossible. In the aggregate, the facts as presented by the US Department of Justice indicate the situation is far more complicated. To examine them, it becomes necessary to better understand the two parties involved in the case:

On Angwang

Laying out what the Federal Bureau of Investigation (FBI) had collected on Angwang, the criminal complaint reveals that at the time he was charged, he was 33 years old. Angwang is a native of Tibet. Tibet is an autonomous region in the PRC. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide, to include the US. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability. Interdum volgus rectum videt, est ubi peccat. (At times the world sees straight, but many times the world goes astray.)

Angwang initially traveled to the US on a cultural exchange visa. He overstayed a second visa, but eventually applied for asylum in the US on the basis that he had allegedly been arrested and tortured in the China due partly to this Tibetan ethnicity. While arguing against bail, prosecutors suggested in a court filing that Angwang secured his US citizenship under false pretenses. Interestingly enough, Angwang’s father is retired from the People’s Liberation Army (PLA) and is a member of the Chinese Communist Party. His mother is a retired government official and also a member of the Communist Party. His brother serves as a PLA reservist. All three live in China.

Employed by the NYPD, Angwang reportedly was assigned to the 111th NYPD Precinct in the borough of Queens and worked there during his most recent period of contacts with the People’s Republic of China Consulate in New York. At the 111th Precinct, Angwang served as a patrol officer and member of the precinct’s crime prevention team. His latest assignment was in the community affairs unit in which his duties included serving as a liaison between the NYPD and the community that his precinct served, among other things. The only plausible reason for Angwang to have any connection with People’s Republic of China Consulate in New York as it relates to his work is that the Tibetan community in New York City which predominantly resides within the confines of the 111th NYPD Precinct in which Angwang worked. Angwang is also a member of the US Army Reserve in which he presently holds the rank of Staff Sergeant. He has been assigned to an Airborne Civil Affairs battalion based at Fort Dix, New Jersey. In his job as a Civil Affairs Specialist his duties and responsibilities include advising the command on the tactical and operational deployment of Civil Affairs teams. He also assisted in planning, training, advising and executing civil-military programs. In connection with his role in the US Army Reserve, as mentioned earlier, Angwang holds a “SECRET” level security clearance. Added to this record should have been information provided by the US Army that Angwang served on active duty in the US Marines from 2009 to 2014, and his deployment to Afghanistan from 2013 through 2014.

Angwang’s Consulate Contacts

According to the criminal complaint against Angwang, he received taskings from, and reported back to, officials at the People’s Republic of China Consulate in New York via telephone conversations which were recorded by the FBI. Those telephone calls enabled the FBI to identify his most recent Consulate contact as an official from the China Association for Preservation and Development of Tibetan Culture. The criminal complaint explains that the China Association for Preservation and Development of Tibetan Culture is a division of China’s United Front Work Department (“UFWD”). Among the UFWD’s tasks is neutralizing sources of potential opposition to the policies and authority of China. To achieve these goals abroad, the UFWD reportedly seeks to co-opt ethnic Chinese individuals and communities living outside China. UFWD officials often meet with local association groups whose purpose is to, among other things, connect Chinese emigrants from common geographic areas and ethnic backgrounds. Ostensibly, their purpose in meeting with these groups is to secure political, moral and financial support for China and to maintain control over Tibetans and other so-called potentially problematic groups, such as religious and ethnic minorities.

From recorded conversations of Angwang and the UFWD official, a portion the transcripts of which were placed in the criminal complaint, the FBI has determined that Angwang received tasks from, and reported back to him. The FBI, in fact, identified the UFWD official as Angwang’s handler. Even more, FBI’s investigation has revealed that Angwang, while acting at the direction and control of PRC officials, had, among other things, (1) reported on the activities of ethnic Tibetans, and others, in the New York metropolitan area to the Consulate, (2) spotted and assessed potential ethnic Tibetan intelligence sources in the New York metropolitan area and beyond, and (3) used his official position in the NYPD to provide Consulate officials access to senior NYPD officials through invitations to official NYPD events. None of these activities fell within the scope of Angwang’s official duties and responsibilities with either the NYPD or the US Army Reserve. Angwang both called and texted a UFWD official’s cellular telephone on at least 55 occasions in or about and  between June 2018 through March 2020. While performing these activities, Angwang failed to provide the Attorney General with any notification that he was acting as an agent of China by registering as such. The US Department of Justice Foreign Agents Registration Unit has no records associated with Angwang.

Curiously, Angwang also had contact with the People’s Republic of China Consulate in New York from August 21, 2014, through August 11, 2017. Those contacts took place apparently without incident and failed to garner any significant interest from US counterintelligence services or the US Army Reserve. It must be reminded that occurred during a period of time prior to his becoming a NYPD officer. To that extent, it intriguingly was not an issue for the NYPD either. Indeed, the NYPD was likely unaware of those contacts, and Angwang apparently did not reveal them. At that time, Angwang reportedly called and texted the cellular telephone of a Consulate official, dubbed PRC [People’s Republic of China] Official-1, on at least 53 occasions. The criminal complaint’s discussion of Angwang’s contacts and activities connected to the Consulate then is limited. The period of his contacts with the Consulate from June 2018 through March 2020 is referred to in the criminal complaint as “the relevant time period.” The latest contacts have been severed from Angwang’s nearly three years of initial contacts with the People’s Republic of China Consulate in New York. That is quite interesting.

A Map of China. Tibet is in the country’s southwest (above).Tibet is an autonomous region in China. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide, to include the US. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans.

The narrative on Angwang in the criminal complaint provides a succinct summary of his background, particularly as it relates to his case. However, the narrative on the officials in People’s Republic of China Consulate in New York with whom Angwang was in contact, while making for an intriguing backstory, surely it does not provide the full picture of the organization in which at least one official supposedly worked, the UFWD. Indeed, the description of the UFWD in the criminal complaint is an underestimation of the organization to  a degree that it stands as a singular departure from the real UFWD. Yet, remarkably, what is provided in the criminal complaint is more than one might usually come across on the UFWD. The UFWD has not received an abundance of treatment in scholarly sources. Even those well-informed on Chinese affairs are not so attentive of the inconspicuous organization and its activities. In I.G. Smith’s and Nigel West’s reliable Historical Dictionary of Chinese Intelligence (Rowman & Littlefield, 2012), the UFWD is only briefly and with frightfully scant detail referenced as a branch of the Communist Party of China’s Central Committee, responsible for links with non-Communist émigré groups and has been identified by the Canadian Security Intelligence Service (CSIS) as an espionage organization active among Chinese émigrés and engaged in psychological warfare in pursuit of policy goals set by the Ministry of Foreign Affairs. What is left of the reference explains: “According CSIS analyst described the UFD’s [UFWD’s] role as ‘one of the compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats.’“ As mentioned in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 1),” central to greatcharlie’s understanding of China’s intelligence services and their activities are the writings of Peter Mattis. Since leaving the Central Intelligence Agency where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant. Primarily using sources published by Mattis, an effort is made here to provide a truer picture of the overlooked UFWD.

The Real UFWD

The UFWD holds a high place within the Communist Party of China’s hierarchy as a working organ of the Communist Party of China’s Central Committee, which is “the central administrative and decision-making body of leading party, state, and military officials.” The UFWD exerts influence inside and outside of China through sub-official contacts. Within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. That has been evinced by Xi’s repeated urging that the Communist Party of China make use of the UFWD as a “magic weapon” to realize the Great Rejuvenation of the Chinese People. A bureaucratic reorganization that he has implemented lends further credence to this judgment that it is a tool of the utmost importance.

Looking at the UFWD a bit deeper, according to Mattis, the central element to understanding what the Communist Party of China is doing and why to shape the world outside the party is united front work. People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a paper in the 1950s, the Central Intelligence Agency (CIA) defined united front work as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the party. To that extent, as Mattis explains, united front work entails shaping those outside the party, and not simply the Chinese people or world outside the People’s Republic of China. United front work must also be a tool of political struggle. It is not confined to activities that we would call propaganda or public diplomacy. It is not limited to covert action. In 1939, Mao wrote: “Our eighteen years of experience show that the united front and armed struggle are the two basic weapons for defeating the enemy. The united front is a united front for carrying on armed struggle. And the Party is the heroic warrior wielding the two weapons, the united front and the armed struggle, to storm and shatter the enemy’s positions. That is how the three are related to each other.” That outline of united front work within the party’s toolbox by Mao stands as the core understanding within the Communist Party of China today. United front activities have aided the Communist Party of China in resolving several dilemmas of the post-Mao era. That was most apparent following the Tiananmen Square Massacre and the death of Chairman Deng Xiaoping.

The UFWD, as the executive and coordinating agency for united front work, operates at all levels of the party system from the center to the grassroots. You Quan, the former Communist Party of China secretary of Fujian Province and a member of the Communist Party of China Central Committee, was appointed UFWD head on November 7, 2017.  He heads the UFWD, assisted by seven deputy directors. The leadership also includes the leader for the Central Commission on Discipline Inspection for United Front Work Group. The UFWD’s specific areas of responsibility both at home and abroad include: Hong Kong, Macao, and Taiwan affairs; ethnic and religious affairs; domestic and external propaganda; entrepreneurs and non-party personages; intellectuals; and people-to-people exchanges. There are UFWD subordinate elements at the provincial and local levels. The department also takes the lead in establishing party committees in Chinese and foreign businesses. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. Bureaus three, six and nine, for example, cover Hong Kong, Taiwan, Overseas Chinese, Tibet and Xinjiang. However, it is unclear how different bureaus manage their consequently overlapping responsibilities. For instance, there is no clear guideline on how the Tibet Bureau, responsible for “harmonizing Tibetan socioeconomic development,” interacts with the Ethnic and Religious Work Bureau, and the Economics Bureau.

The UFWD is actually one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the Chinese People’s Political Consultative Conference (CPPCC), the super secret and malignant International (Liaison) Department, and the Propaganda Department. According to the organization’s website, the CPPCC is “an organization in the patriotic united front of the Chinese people, an important organ for multiparty cooperation and political consultation.” The advisory body mediates between important social groups and the party apparatus. The CPPCC is the place where all the relevant united front actors inside and outside the party come together: party elders, intelligence officers, diplomats, propagandists, military officers and political commissars, united front workers, academics, and businesspeople. They are gathered to receive instruction in the proper propaganda lines and ways to characterize Beijing’s policies to both domestic and foreign audiences. Many of these individuals, particularly if they hold government positions, are known for their people-handling skills and have reputations for being smooth operators. CPPCC membership offers access to political circles, political protection for business, and minor perquisites like expedited immigration. The CPPCC standing committee includes twenty or so vice chair people who have a protocol rank roughly equivalent to a provincial party secretary. At the central level, the CPPCC includes more than 2,200 members, but the provincial and local levels include another 615,000.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above). The UFWD holds a high place within the Communist Party of China’s hierarchy as a working organ of the Communist Party of China’s Central Committee. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. President Xi Jinping has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. That has been evinced by Xi’s repeated urging that the Communist Party of China make use of the UFWD as a “magic weapon” to realize the Great Rejuvenation of the Chinese People. The bureaucratic reorganization that he has implemented lends further credence to this judgment that it is a tool of the utmost importance.

The International (Liaison) Department, founded in 1951, is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International (Liaison) Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as an UFWD bureau before being carved out into an independent entity.

Mundus vult decipi, ergo decipiatur. (The world wants to be deceived so let be deceived.) The Propaganda Department has been a core part of the Communist Party of China since 1924. The official description of its duties includes conducting the party’s theoretical research; guiding public opinion; guiding and coordinating the work of the central news agencies, including Xinhua and the People’s Daily; guiding the propaganda and cultural systems; and administering the Cyberspace Administration of China and the State Administration of Press, Publication, Radio, Film, and Television. Much as the UFWD, the Propaganda Department has subordinate elements at the provincial and local levels. The Propaganda Department cannot be regarded as an entirely internal organization that broadcasts outward to the extent that it is involved in influence-building abroad. For example, China Radio International developed in the 2000s a covert international network of radio stations to hide the Communist Party of China’s direct role in broadcasting Chinese-language propaganda inside target countries. The Propaganda Department presumably also plays a role in the cooptation, intimidation, and purchase of Chinese-language print media outside China.

The State Council ministries and many other organizations with a party committee also conduct united front work. These organizations all offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. Below are a few of the examples of the organizations outside the party that perform united front work or have united front work departments attached to their party committee: Ministry of State Security; Ministry of Foreign Affairs; Ministry of Civil Affairs; Ministry of Education; Ministry of Culture and Tourism; Chinese Academy of Sciences; China Baowu Steel Group; China National Overseas Oil Corporation (CNOOC); and, State-owned Assets Supervision and Administration Commission (SASAC). While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance. United Front organizations abroad often operate in the open, some with names that allude to “peaceful reunification” (which is understood to be code for Taiwan work) or include “friendship association.” Included on that list is likely the name “China Association for Preservation and Development of Tibetan Culture,” the organization in which the UFWD official, with whom Angwang interacted “in the relevant time period,” was employed.

Evaluated on the basis of the united front policy system, the Communist Party of China’s management of political influence operations runs to the very top of the party, involving senior leaders directly. It is in this way that the policy system tangibly extends through the party’s hierarchy and spills over into China’s government ministries as well as other state-owned and state-administered organizations. Indeed, united front work is conducted wherever the party is present. To that extent, as Mattis explains, united front work is not really some “influence operation” or a campaign. It is the day-to-day work of the party. At the leadership level, there is a Politburo Standing Committee Member (PBSC) oversees united front work. The senior-most united front official is the Chinese People’s Political Consultative Conference (CPPCC) chairman, who is the fourth-ranking PBSC member. Leaders who have held the CPPCC chairmanship have included Mao and Deng, as well as Zhou Enlai and Li Xiannian. The State Council Vice Premier has a United Front Portfolio. The vice premier position also serves as the link between the party center and the State Council ministries. The vice premier provides prestige to the united front system as well as a necessary position of authority to direct and coordinate the ministries’ united front activities. The position often looks as though the portfolio covers education and culture, because of the overlap with united front work. At meetings of the united front policy system, this vice premier appears in protocol order between the CPPCC chairman and the United Front Work Department director. Included are two Members of the Central Secretariat who have united front policy roles. The directors of the UFWD and Propaganda Department serve on both the Politburo and the Secretariat of the 19th Central Committee of the Communist Party of China. Since the Politburo does not meet regularly, the secretariat is empowered to make day-to-day decisions related to policy that has already been settled. This group is also responsible for moving paperwork among the central leaders and coordinating the party’s actions.

The Calibrated Interactions between Angwang and His Alleged UFWD “Handler”

Given what is presented here about the UFWD, and given the official account of the UFWD official’s interactions with Angwang provided in the criminal complaint, the UFWD official certainly suppressed far much more about his organization and its activities in their conversations than he exposed. Even in his discussions with Angwang, the UFWD official never offered specifics as to why his organization would be interested in working with him. He never discussed the names or titles of the UFWD officials over which Angwang probed him. Interestingly, the UFWD official assumedly never offered Angwang many specifics about his job with the China Association for Preservation and Development of Tibetan Culture in the Consulate or its link to UFWD. Moreover, the UFWD official never explained that UFWD was his association’s parent organization and what the larger picture and aims of his parent organization were. It is unknown whether the UFWD official asked Angwang directly about his interest in keeping contact with him. Angwang offered the attenuated explanation about love for his homeland, bringing glory to China, and making the official “look good” in Beijing.

Major ignotarum rerum est terror. (Apprehensions are greater in proportion as things are unknown.) Out of abundance of caution, the first impression that the UFWD official had of Angwang might reasonably have been more negative than positive. In the US, it is understood that the majority of the members of the Tibetan diaspora harbor unfavorable, even hostile attitudes toward China. As a native Tibetan who reached a position of relative authority in New York as an NYPD officer, his intentions for reestablishing contact with a Chinese official could not be accepted as benign on face value. (Little is offered in the criminal complaint on his first contact.) Given the harm done to countless Tibetan families in China, it would be fair to assume Angwang could have held some idée fixe against Chinese government and was in some odd way seeking revenge. In fact, according to the criminal complaint, though Angwang first traveled from China to the US on a cultural exchange visa, he would seek, after receiving a second visa, asylum on the basis that he had been arrested and tortured in mainland China because of his Tibetan ethnicity. (That story apparently cannot be confirmed, and the US Department of Justice says it is doubtful.) As a NYPD officer, he surely had sufficient training and access to tools to pose a considerable threat to the UFWD official and other staff at the People’s Republic of China Consulate in New York. After the UFWD official maintained contact with Angwang for a time, possible concerns about him may have slowly relaxed.

Based on his own words, as recorded by the FBI, Angwang fully intended on, and was satisfied with, establishing contact with the UFWD official to support China’s intelligence efforts in the US. He approached the UFWD official under the veneer of being an important, well-placed, and well-connected officer in the NYPD, but it was likely discerned by the UFWD official that Angwang was somewhat isolated. The presumption could plausibly have been made by the UFWD official that Angwang’s conversations and contacts with the officials at the People’s Republic of China Consulate in New York surely transgressed the NYPD’s code of behavior. A NYPD officer under normal circumstances, surely would not have been allowed such a long leash as to be able to negatively influence, harm US relations with China. The fact that his activities escaped the curiosity of onlookers perhaps misled Angwang into believing that he was free and clear of scrutiny. He possibly could not have imagined at the onset the upheaval that would eventually derailed him. Yet, he was under investigation by the FBI and apparently was blissfully unaware that his contacts and conversations with Chinese officials were being monitored. There was a display of flurried ambition and energy in Angwang’s actions, all of which was misdirected. To that extent, on first blush, UFWD official may have considered whether Angwang was excited by his own actions, and thereby he may have made an assessment of whether he was a sensation seeker.

A ruthless disregard of anything but self-interest is a common trait among individuals involved in espionage cases. However, Angwang seemed to strain in his effort to demonstrate that he was not focused on self-interest to gain approval. Apparently, in a further effort to prove that he was focused on the well-being and success of the Consulate officials in which he was in contact, as well as the Consulate and China, Angwang made certain statements seemingly in an effort to prove that he knew all the ends and outs, the inside baseball of the Chinese government. In an account of a telephone conversation on or about October 30, 2018 between Angwang and the UFWD official, again dubbed as “PRC Official-2,” that was only recounted by the FBI in the criminal complaint, the UFWD official reportedly told Angwang that he was busy writing mandatory year-end reports. Angwang replied that UFWD official had done great work and, accordingly, there should be a lot to write in the report. Prying, Angwang also inquired if the reports written by officials within the Consulate were the same type of reports written by China based officials, to which the UFWD official stated that they were. Reportedly, Angwang stated that he was familiar with these reports because his mother used to write similar reports in China.

Perhaps going a bit too far in direction demonstrating what he knew, Angwang was willing to offer a judgment on every aspect of the Consulate staff member’s community outreach work, and he severely judged it at that. Boiled down, it appeared at point that Angwang was communicating: “You do not know your job as well as I do. Let me show you. I can help you do your job so much better that your superiors in Beijing will be impressed and reward you!” Reportedly, on or about November 19, 2018, UFWD official, dubbed “PRC Official-2” in the criminal complaint, called Angwang. (It is unknown whether he was actually returning a call from Angwang.) During the call, as recounted by the FBI, Angwang asked the UFWD official whether he wanted to attend NYPD events “to raise our country’s soft power” and also elevate the official’s position within the People’s Republic of China community. It was additionally recounted and interpreted by the FBI that the UFWD official expressed interest. Angwang then offered: “The Consulate does not know too clearly the workings and operations within the police department. And then because of the sensitivity of a diplomat’s position . . . then this, now, if it’s like this, I’m thinking of how to, how to use this opportunity, to use our er . . . one is to let the consulate to feel like us before . . . the wishes are the same as my wishes.” As interpreted by the FBI, Angwang was informing the UFWD official that he could provide non-public information regarding the internal operations of the NYPD. In the same call, it is reported in the criminal complaint that Angwang indicated that he wanted UFWD official to advance to a position of prominence.

Curiously, from what is available in the transcripts included in the criminal complaint, Angwang would never humble himself. When the Consulate official humbled himself, Angwang seemed to view it as an occasion to seek greater dominance in the conversation and in the relationship. During certain telephone contacts, he appeared to demand that the UFWD official humble himself to him. Angwang did not seem to recognize or respond to the fact that UFWD official was likely making an effort to remain tolerant of his repeated overstep of cultural and professional boundaries. He just seemed to want to have control. On or about October 30, 2018, Angwang called the UFWD official, again, dubbed as PRC Official-2 in the criminal complaint. During that call, as recounted by the FBI, Angwang advised UFWD official about a new Tibetan community center located in Queens. Angwang suggested that he and the UFWD official should visit the community center together. As recounted by the FBI, the UFWD expressed concern, but Angwang stated, “if it’s good or not, you need to know about this for your work’s sake. They are the biggest venue for activities right now. If they are involved with politics, then in the future more than half of the meetings might take place there.”

It is very possible that taking what was an abrupt, energetic approach, was an odd way for Angwang to gain the UFWD official’s approval. He perhaps was attempting to  show them how knowledgeable he was about the inner workings of their system. Moreover, he likely sought to bedazzle the UFWD official. In his mind, he may have believed the UFWD official was a flutter at his every word. Yet, it was rarely the case that anything Angwang said appeared to enlighten the UFWD official in any appreciable way. Veritatis simplex oratio est. (The language of truth is simple.)

Even beyond the issue of his contacts with the People’s Republic of China Consulate in New York, it is generally mistake for one, as an outsider, to try to convince those inside an organization, particularly a tight-knit organization, that one knows more about its inner workings and activities, than one actually does. Those inside will generally become suspicious of the outsider’s intentions which would most likely confound any effort to build confidence and establish trust. For whatever reasons he had, the attitude and behavior displayed by Angwang, in part, may have played a role in the undoing of his efforts. If Angwang authentically wanted to connect with the UFWD official and his superiors in Beijing, then the apparent tact the NYPD officer’s took could surely be judged as a grand blunder.

With specific regard to Angwang’s oft uttered remark that he wanted to make the UFWD official look good before his superiors in Beijing, that faux pax actually betrayed his misunderstanding of how the Chinese system worked. Those selected for deployment to the sort of diplomatic post he held are usually taken from the top of a short list of the most qualified officials in a particular organization. Thus, if the UFWD official had not already proved himself to his superiors, he would not have received the privilege of being posted to the People’s Republic of China Consulate in New York. It is very  likely that Angwang may have appeared to him to be dramatic and theatrical, yet at the same time boorish. With no intent to insult, nothing displayed in the transcripts provided would have left the impression that Angwang was a masterful thinker. It may have very well been the case that the UFWD official’s intellectual powers far surpassed the duties of New York post. His encounters with Angwang might serve as evidence of that. Yet, while he was likely studying and judging Angwang, and surely masquerading as an humble, august representative of the People’s Republic of China, the UFWD official was in reality a functionary of an organization that would certainly be willing to burn down the rest of world if it meant promoting the interests and goals of the Communist Party of China.

You Quan, head of the UFWD (above). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The leadership also includes the leader for the Central Commission on Discipline Inspection for United Front Work Group. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance. United Front organizations abroad often operate in the open, some with names that allude to “peaceful reunification” or include “friendship association.” Surely included on that list is the “China Association for Preservation and Development of Tibetan Culture.”

To the extent that it might concern his UFWD mission in New York, the UFWD official’s opinion of Angwang  may not have been as relevant to his superiors in Beijing as Angwang might have believed. Whether Angwang was vacuous or not, if UFWD officials in Beijing wanted their Consulate official to work with Angwang, that is what he would do. Senior executives and managers of the UFWD in Beijing would collate and validate intelligence, evaluating the reliability of sources and credibility of information, use various analytical techniques to assess and interpret any intelligence data, and liaise and collaborate with colleagues to gather further information, which may help to piece together the whole picture. They would determine whether a target had genuine potential to be an operative. As it so happened, It appears that in Beijing, approval of him was likely lukewarm. To the extent that might be accurate, it might be the reason why the UFWD Consulate official appeared to keep his relationship with Angwang limited in scope. The fact that they spoke on the phone and did not appear to meet in person may have been a very visible demonstration that the UFWD official wanted to  keep Angwang at arms length. After two years, it does seem that Angwang did little more than figuratively tread water. He was never able to cement a solid link to the UFWD official that would lead to additional contacts with UFWD senior executives and managers in Beijing. Angwang’s true value, despite his decent background of accomplishments as a Tibetan émigré, may have been viewed as very low by  UFWD senior officials as everything that he offered to provide could very likely have been collected at far less risk and anxiety from other sources.

Looking at the matter more carefully, the whole notion of Angwang providing access to senior NYPD officials not only failed to make sense or even be plausible, it also seems to be something the UFWD offical would hardly find desirable. It is very difficult to imagine how any senior officials of the NYPD, to whom Angwang claimed to have had the ability to provide access, would be of any use to the UFWD. The Consul General and his top subordinates in the People’s Republic of China Consulate in New York had sufficient ways to communicate with the NYPD in a manner officially approved by Beijing. The UFWD official would surely have been well out of his lane if he had met with such NYPD higher ups from his position, and more than likely disturb the bigger picture of People’s Republic of China Consular affairs in New York. It is hard to image why the UFWD official would want to have contact with senior NYPD officials with far more experience than Angwang, make them very aware of the UFWD official’s presence in the Consulate and the city, and bring to bear the impressions of those senior NYPD officials of himself, the UFWD, Angwang’s odd history of contacts with the Consulate, and Angwang, himself. Indeed, more senior NYPD officials would surely see the UFWD official straight. Unlike Angwang, who jumped in twice to have contact with the People’s Republic of China Consulate in New York, top officials in the NYPD, possessing far more experience and being undoubtedly more mature and savvy than him–Angwang at the time had scarcely marked two years of service in the department–would more than likely have concluded that becoming entangled with the Consulate and especially getting involved with a UFWD official, would neither be wise nor sound. They very likely would have become terribly alarmed by the request. Using good sense, they may have demanded that Angwang, himself, break all contact. Then, they might have thrown a huge spotlight on the UFWD official and informed not only their superiors and the NYPD Intelligence Division, but also US counterintelligence services everything they knew about his presence and the direct attempt via Angwang to contact them. As for Angwang, his NYPD career would very likely have seen dark times. Additionally, no matter what level of relationship and confidence any senior NYPD official might have had in Angwang that might have led the neophyte NYPD officer to reason that he could arrange some one-on-one interaction between that official and his UFWD contact, the reality is that, even for personal reasons, no senior NYPD official would ever put his or her career at risk with any unofficial, unauthorized contacts with officials of the People’s Republic of China Consulate in New York and the UFWD. Senior NYPD officials often retire from the department and acquire very rewarding senior positions in the corporate world. To errantly follow the neophyte Angwang’s recommendation and put themselves in contact with the People’s Republic of China Consulate in New York and the UFWD, could have very likely resulted in their records being blemished, making any future corporate position unattainable. Given their rather neat situations, doing anything Angwang might have suggested would have been a singular act of stupidity.

One might go as far as to theorize that by all appearances, Angwang may have actually been rejected by UFWD. Relative to what the UFWD may have asked of someone they might have been eager to work with, his contacts were rather prosaic. He was a volunteer of his own making, ostensibly possessing no training in tradecraft, no direct instructions. For “the relevant time period,” there was overt expression of Angwang in general through payments of some type. Indeed, there is no word of payments, no mention of recompense in the form of gifts. Apparently, there was nothing asked for in trade. Angwang was not encouraged, yet not discouraged from continuing on with his volunteer work. It is not clear cut that the UFWD official ever insisted that Angwang do anything. If it ever appeared that he was giving him any directions, it took the form of giving a begrudging nod to something Angwang had both suggested and volunteered to do. Nothing that Angwang did was of any momentous consequence in the end. Whatever efforts Angwang made, were activities well-off on the margins, having a diminutive impact on the UFWD mission and the People’s Republic of China Consulate in New York’s overall mission. In fact, his activities actually fell somewhat outside of the primary purpose of UFWD activities.

As explained in greatcharlie’s discussion of UFWD here, unlike Chinese intelligence services as the Ministry of State Security and the Intelligence Bureau of the PLA’s Joint Staff Department, the organization is not as interested in those who can do a little this and a little that for the Communist Party of China. The UFWD is most interested in finding agitators and destroyers, who could open the way for the organization to shape the political picture in the targeted country, and eventually ease the way for the Communist Party of China then level its influence full bore and pull the country in China’s direction. As aforementioned, that is what united front work is all about. In part, through that method, China hopes to become the dominant power in the world. Even pushing out the Communist Party of China-line is not as important for an operative recruited by UFWD as being a disruptive force in his society, or having the ability to facilitate the destructive activities of radicals and anarchists. To that extent, Angwang inherently would not have much value to the organization as a member of the NYPD. It is hard to imagine any radicals or anarchists making the quantum leap to trust a NYPD officer. If Angwang had indeed revealed some oddly arrived at ties to such organizations or suggested ways to support them, he would have been far more valuable to the UFWD. As for being a native Tibetan relating to an Chinese official in an organization ostensibly concerning Tibet, it was de minimus, nearly irrelevant in this situation.

It may have also been the case that Angwang was ignored by the Ministry of State Security, the People’s Liberation Army, or other Communist Party of China intelligence services that potentially could have been lurking about in the Consulate. Perchance the thinking at UFWD and other Chinese intelligence services was in harmony as it pertained to his case. Perhaps all on the Chinese side would have been satisfied to see Angwang simply wear himself out and fall away quietly.

Angwang’s UFWD Linkage May Have Concerned Intelligence, but Was Espionage Actually Involved?

Angwang’s “renewed” contact with the Consulate was indeed a dangerous undertaking from all sides, He eventually discovered that. With the advantage of hindsight, one might make the argument that Angwang foolishly entered into a milieu in which was completely unknown to him, yet he perilously travelled down a path that was his undoing. As mentioned initially, among the charges made against Angwang by the US Department of Justice, he reported on the activity of Chinese citizens located in the New York region, identified and gauged possible intelligence sources in the Tibetan community and made access to NYPD officials via invitations to events available to his UFWD contact at the New York Consulate. Angwang’s attorneys will no doubt argue that charging Angwang with anything close to espionage was somewhat of a liberty. However, they would have some difficulty arguing in defense of Angwang’s actions.

In Henry S. A. Becket, The Dictionary of Espionage: Spookspeak into English (Stein & Day, 1986), “Persons who volunteer themselves to an espionage agency” are defined as “walk-ins.” A quote from a former CIA officer added to the definition that explains: “’It’s the walk-in trade that keeps the shop open’ is one of the first bits of operation wisdom that is impressed on newcomers to the business.” (While the author of The Dictionary of Espionage, published under the pseudonym “Henry S. A. Beckett,” was revealed as Joseph Goulden, and the book was republished in April 2013  by the under the authors true identity name by the Courier Corporation, greatcharlie prefers to use the original text published during the 1980s Cold War and intelligence agencies worldwide struggled to solve the puzzle of the author’s name.)

When Angwang went into the People’s Republic of China Consulate in New York, he reportedly did so, in his own words to help his “motherland achieve glory.” He was a walk-in. Angwang did not say outrightly that he wanted to spy according to the criminal complaint, however, the document indicates that it was Angwang in an October 30, 2018 telephone call who broached the idea in conversation with the the UFWD official at the Consulate that he might have some value, as the FBI interpreted his words, with regard to intelligence.

Added to his legal defense’s problems is the fact that, as mentioned earlier, UFWD is an organization that engages in intelligence work. The UFWD is absolutely one of the tools the Communist Party of China employs to engage in foreign intelligence. The UFWD is distinct from regular civilian and military Chinese foreign intelligence services, given its overt and benign appearance. As was also mentioned earlier, UFWD organizations abroad often operate in the open, using names as the “China Association for Preservation and Development of Tibetan Culture.”

By directing his comments to the UFWD official, the indications and the implications for one line of thinking, particularly that of the FBI, are that Angwang likely believed that he was a foreign intelligence officer or that he could put him in contact with an intelligence officer from the Chinese foreign intelligence services. By offering to provide services in support of the intelligence work of  Chinese intelligence services, as the FBI suggests, Angwang opened himself up to accusations of espionage. Cast one’s mind back to Angwang’s November 19, 2018 telephone conversation with UFWD official during which he suggested to the UFWD official that they should visit a  community center together. The FBI assessed that the purpose of a proposed visit to the community center was twofold: (1) Angwang  was advising UFWD official to visit the community center in order to maintain visibility on the activities of ethnic Tibetans in the New York area; and (2) Angwang was advising the UFWD official that visiting the community center would assist in spotting and assessing potential intelligence recruits or sources within the Tibetan community.

Certainly, in the People’s Republic of China Consulate in New York, it would hardly be the case that the foreign intelligence officers, on one side of the house, if they were in fact there, would be unaware of what diplomats and officials on the other side of the house, were doing, especially when it concerned a contact as unusual as one  with an NYPD official of any rank. The behavior of this particular NYPD officer, Angwang, was so unusual that it could have drawn the attention of officers of any of the civilian and military Chinese intelligence services posted within the Consulate. Officers of those Chinese intelligence services might have been expected to take some interest in Angwang, particularly given his position, alleged capabilities to reach into the Tibetan community, and access to senior NYPD officials. Recall also that he had been in contact with the Consulate before and they likely possessed a dossier on him. Still, in a possible scenario, nothing might have led civilian and military Chinese foreign intelligence service officers assumedly posted in the Consulate to find interest in Angwang for their purposes and on the outset they might have decided not to become involved with him. Beijing, too, may have received reports about Angwang, yet no great urgency may have been generated by what they read. Angwang may have been viewed not as a walk-in with potential, but merely an unsolicited contact, albeit a local police officer and “a son of the motherland” who had a familial connection to Tibet.

While they probably had a good chance to look Angwang over during his first flap of contacts with the People’s Republic of China Consulate in New York, in his second go around with the diplomatic post, Chinese counterintelligence services presumably there would surely be concerned that the unusual contact with the NYPD officer might be an effort to compel the UFWD officer to defect, and even worse, engage in espionage on behalf of US foreign intelligence services.

Additionally, having a member of the Consulate staff fall into a US counterintelligence trap would have spelled disaster for UFWD senior executives and managers in Beijing, the Ministry of Foreign Affairs, and the all of the officials working in the People’s Republic of China Consulate in New York. They would not want anything to transpire that might have embarrassed the Communist Party of China and people of China. They also wanted to avoid anything that might put their situations in jeopardy as well. Once the Communist Party of China leadership in Beijing got wind of the troubles, they would become difficult to console. The UFWD official and others in the Consulate could have been sacked and called home or their records would have been severely damaged at the very least. The decision was most likely made from the start to contain the NYPD officer’s attempts to connect with the UFWD official. To that extent, although he remained in contact with Angwang for two years, the UFWD official, according to the portion of the transcripts of recorded conversations placed in the criminal complaint, appeared to be a methodical individual, taking every precaution with the NYPD officer, measuring every statement and response, not knowing how events might turn.

As of this writing, Angwang, is the one who now faces possible punishment from the US Department of Justice and the NYPD. The names of the People’s Republic of China Consulate in New York officials involved with him, to include the UFWD official, were not mentioned in the criminal complaint, which is the norm in a federal espionage case.

Detained Tibetan Bhuddist monks paraded while wearing demeaning placards (above). Officers of Chinese intelligence services might have been expected to take some interest in Angwang, particularly given his position, alleged capabilities to reach into the Tibetan community, and access to senior officials in the NYPD. Still, in a possible scenario, nothing might have led civilian and military Chinese foreign intelligence service officers assumedly posted in the People’s Republic of China Consulate in New York to find interest in Angwang for their purposes and on the outset they might have decided not to become involved with him. Beijing, too, may have received reports about Angwang, yet no great urgency may have been generated by what they read. Angwang may have been viewed not as a walk-in with potential, but merely an unsolicited contact, albeit a local police officer and “a son of the motherland” who had a familial connection to Tibet.

If Chinese Intelligence Services Had an Interest in Angwang, What Could It Have Been?

Recall from the initial discussion of the UFWD here that some State Council ministries and many other organizations with a party committee also conduct united front work. These organizations all offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. The Ministry of State Security, although outside of the Communist Party of China, is one of those organizations. Attached to its party committee is a united front work department. Its resources and personnel of the Ministry of State Security can be called upon to perform united front work. One can imagine the interplay between UFWD officials and Ministry of State Security foreign intelligence officers in overseas diplomatic posts. However, standard civilian or military Chinese foreign intelligence and counterintelligence officers possibly posted to the People’s Republic of China Consulate in New York, just as those of every country, had the understanding drummed into their heads by trainers and managers was to avoid traps of all kind and to thoroughly evaluate a potential target first with the guidance of Beijing or in the case of the MSS departments and bureau, back to provincial or local from which they were deployed.

Chinese intelligence services, hypothetically characterizing Angwang as a walk-in in this scenario, might have reasoned that he should be allowed to do a little this and little that in the interests of China. However, it would also seem logical that senior executives and managers, much as the UFWD, may have believed that for the most part, Angwang should be kept figuratively on ice to see how events surrounding him would develop.  would be the best tack. If that theory were actually the case, then the US Department of Justice could very well have acted a bit impatiently to indict him. If one could progress in thinking to a follow on theory, one might also be willing to suppose that Angwang, much as Chinese counterintelligence officers were likely to believe, may have actually been serving as a counterespionage operative for US counterintelligence. Theoretically, the objective of that work would have been to insinuate himself within any active foreign intelligence network of China in New York he might come upon.

Alternatively, in following the theory of the US Department of Justice, that Angwang was under the firm control of Chinese intelligence, it is possible that Chinese intelligence services may have actually been considering him for handling by non resident foreign intelligence officers in New York. However, no proof of this has been made public.

Lastly, it is possible that other elements of the Communist Party of China, similar to the UFWD, such as the furtive yet prodiguous International (Liaison) Department and the Propaganda Department, might have been closely monitoring activities of what it would “dangerous influences” abroad concerning Tibet, and thereby may have taken at least a passive interest in the Angwang situation that never materialised into anything.

Radix malorum est cupiditas. (Greed is the root of evil.) There were a number of aspects of Angwangs’ approach to the UFWD official that would have made Chinese foreign intelligence and counterintelligence officers very likely in the Consulate or senior executives and managers in Beijing that would make them highly suspicious of unsolicited contacts in the current environment. First and foremost, quite different from the majority of federal criminal cases against US citizens incepted while engaging in espionage for China, Angwang was apparently driven by the spirit of grab and greed. Angwang certainly never created that impression. As it was already mentioned in the discussion here, according to what was reported in the criminal complaint, the issue of payments for the work done was never broached by the Consulate staff member. Even more unusual, the matter of payments was never broached by Angwang either. Chinese counterintelligence, if involved, would have believed that US counterintelligence services were well aware that no money had been exchanged because if the UFWD officer had raised the matter of payments, it absolutely would have been in the criminal complaint. Interestingly, according to that document, Angwang, in 2016, wired a total of $150,000 to accounts in China controlled by his brother and another individual. It was also emphasized that Angwang had “also received multiple substantial wire transfers from the PRC [People’s Republic of China].” The matter was explained in the criminal complaint using examples in the following manner: “On or about May 23, 2016, a US bank account held in Angwang’s name received $49,985 from an account held in the name of Angwang’s brother in China Moreover, on or about January 29, 2014, a US bank account jointly held in the name of Angwang and Angwang’s wife received separate credits of $50,000 and $20,000 from an account held in the name of an individual at the Bank of China in New York.” None of this banking activity was said to have occurred during “the relevant time period.”

The matter of payments takes on even higher meaning with regard to counterintelligence. Chinese counterintelligence officers, in particular, would recognize that profit gives an act such as espionage purpose. Rarely will one come across an act of espionage that is purposeless. Without an exchange of money, payments, it is hard to see what was the purpose of Angwang’s desire to work for the People’s Republic of China Consulate in New York, and why anyone might insist the UFWD official was directing Angwang without any apparent means to encourage or reward activity. Savvy counterintelligence officers know that clever operatives may attempt to put investigators off the scent by laying out their actions with cunning and plausibility. Counterintelligence officers, as part of their tradecraft, look for consistency. Where there is a want of it, one must suspect deception. If an imaginable “virtual profit” were to be gained on the side of Angwang, in the minds of Chinese foreign intelligence and counterintelligence officers possibly in the Consulate or senior executives and managers in Beijing it would have been to lay the groundwork to potentially initiate a counterintelligence case against the UFWD official and presumably seek to infiltrate his imaginable organization to bag officers and other operatives in the what may have been theorized by US counterintelligence to be an espionage network.

Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.) According to the criminal complaint, on or about February 13, 2019, Angwang called the UFWD official, dubbed as “PRC Official-2,” and greeted him as “Boss.” Using that term “boss,” would indicate to some that the UFWD official was in some capacity had Angwang in his employ, albeit as an intelligence operative in this case. On November 14, 2019, Angwang called the UFWD official, and in addition to referring to the UFWD official as “boss” again, Angwang sought permission from him to participate in an interview with New Tang Dynasty Television. (New Tang Dynasty Television is run by the Falungong, an anti-PRC spiritual group that China banned in 1999 and declared an “evil cult.”)  In almost a protective way, recognizing Angwang’s desire to be connected with China, the UFWD told Angwang during their telephone exchange, “I think you absolutely shouldn’t do it.” Angwang responded: “It’s is better to avoid it, right?” The UFWD official, beginning to explain himself uttered: “This message this . . . the cost is too high.” Angwang seemingly pleased to respond to his inquiry stated, “Yes, yes. However, in further explaining the reason for his opinion, the UFWD, further stated: “Because NTD [New Tang Dynasty Television], China is totally against it. Angwang seemingly urging further comment said: “Yes, yes.” The UFWD beginning to offer more stated: “Their people [unintelligible] on the list.” Angwang then interjects, “Yes, yes,” but the UFWD official continues: “In the future, if you want to go back or something, it will have an enormous impact.” Thus, he was warning Angwang that by going on New Tang Dynasty Television, he would hurt his chances of ever traveling back to China again, but he did not command him not to go forward with the idea from a position of employer to an employee, although some may conclude that was such. Chinese counterintelligence officers, hypothetically observing the contact with Angwang develop, would likely recognize that it was completely possible that US counterintelligence services would portray these interactions as proof that the UFWD official was providing directing Angwang. To the extent that it is at all possible, such Chinese counterintelligence officers would likely be satisfied as the criminal complaint actually evinces, that there was no indication word for word that any instructions for action were issued to Angwang. What Angwang really did on this matter was advertise the limits he had. He should have been able to discern the liabilities of such an action on his own.

Chinese counterintelligence officers, hypothetically observing the contact with Angwang develop, would also likely be satisfied by the fact that throughout his contacts with Angwang, the UFWD official simply collected what he shared with him and accepted services as if they were benign gifts. It may very well be that in missing segments of the transcripts, the UFWD officer could be found explicitly giving instructions to Angwang to act on the Consulate’s behalf. Chinese counterintelligence officers would likely be convinced no espionage charge could possibly be leveled against the UFWD official because Angwang, would be seen in their eyes, as operating under a type of self-management on his own time and at his own expense.

Senior Executives and Managers of UFWD and Chinese Intelligence Services Were Likely Shaken but Not Stirred by Angwang

Interestingly, in one of Angwang’s conversations with the UFWD official about November 19, 2018, Angwang said that he wanted him, as aforementioned dubbed as “PRC Official-2” in the criminal complaint, to advance to a position of prominence “in Beijing” and that he would “wait for your [the UFWD official’s] invitation.” Angwang reiterated: “It’s true. In the future–in the future, after you get a whatever position in Beijing, I will wait for your invitation.” However, the UFWD official demurred stating, “Beijing, that place is too awesome.” Pushing further, Angwang confidently stated: “You, you do well here, gradually, gradually you will move up, when the time comes. The UFWD official responded: “It’s not that easy. Beijing, that place, smart people there indeed.” It must be reiterated here that in selecting diplomats of the Ministry of Foreign Affairs, People’s Liberation Army Military Liaison officers, Ministry of State Security foreign intelligence officers and officials of front organizations for Communist Party of China intelligence groups such as China Association for Preservation and Development of Tibetan Culture, only the very best are selected. China puts its best foot forward. While it appears the UFWD official had some difficulty verbalizing what he wanted to say in English, his intellect would still shine through his words. The indications and implications of that last statement made by the UFWD official may have been that Angwang should not be so confident that anything more than collegial contacts would be permitted. In that Delphic statement, the UFWD official may have possibly been expressing to Angwang that there may be some concerns in Beijing about him that his case was being considered by experienced and cautious senior executives and managers would be able sort out whether he was legitimate or not. Further, in that same statement, UFWD official also seemed to blandly express to Angwang that he was not giving Beijing much credit for its singular faculties of deduction and logical synthesis. At the same time, he may have possibly been having a little fun with Angwang, knowing it was very likely that he could not decipher what was being hinted at.

In an assessment of Angwang for possible recruitment, senior executives and managers in the Chinese intelligence services would surely look for what might be beneficial for them in order to twinkle out what was right. His contact was presumably regularly reviewed and assessed. It may very well be that much about Angwang was found to be questionable early on, and there was little interest afterward to exploit anything he might have had to offer. To work with an operative, there must be some assurance of behavior and desired outcomes of tasking. Given Angwang’s discordant behavior, in the long run, one could only imagine random results from his work. Expectation otherwise from such characters based on optimism typical walk hand in hand with an intelligence officer’s doom.

Seemingly none the wiser to such a possibility, Angwang continued to market himself to UFWD official. According to the criminal complaint, in an October 30, 2018 telephone call, the fact that Angwang was being assessed appeared to have been revealed. In the conversation with Angwang, the UFWD official, dubbed PRC Official-2 in the criminal complaint, complimented him concerning his promotion within the NYPD. Angwang informed UFWD official that he was preparing to take a promotional exam and that he was “taking [the exam] . . . for the people back home.” The UFWD official reportedly agreed and then made a very Dadealian yet telling remark  that “there’s a whole bunch of people looking at you.” Curiously, Angwang simply spoke past that weighty statement and went on to state rather egotistically that his position within the NYPD was valuable to China because from it, he could provide NYPD information to the Consulate.

French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Reading federal indictments, criminal complaints, and judgments of those caught engaging in espionage for MSS over the past decade, one develops a picture of US counterintelligence while having some success intercepting Chinese intelligence officers, operatives and informants, it is usually only after they had for years delivered a considerable amount of classified information concerning US national security equities, projects, strategies, operations, and policies, US tactics, techniques, procedures, and methods and US defenses against foreign intelligence penetration, and of course, cutting-edge technologies had been put in MSS officers’ hands. According to what was reported in the criminal complaint, one could hypothesize that Angwang seemingly sought to fit the mold of individuals spotted and recruited to be Chinese foreign intelligence operatives and informants who had been intercepted by US counterintelligence. The traits and aspects of the individual spotted and recruited to work for Chinese foreign intelligence services were surely better understood from those cases. If Angwang had been operating under the direction of US counterintelligence services as Beijing may have presumed, the information from any cases would likely have been used to assist Angwang in shaping himself to become as attractive a target possible for recruitment. (Not to go too far out on shaky ground, but it appears, intriguingly, that everything Angwang offered, or claimed to have access to, essentially mirrored what the UFWD would supposedly desire in support of its activities and he, himself, ostensibly matched the sort that UFWD would likely have a proclivity to recruit based on the FBI’s description of the organization in the criminal complaint.)

Yet, all in all, it appears that the risks were too high for regular civilian or military Chinese intelligence officers to approach him, especially knowing the priority given to US counterintelligence to score victories against Chinese foreign intelligence services. Chinese spy networks have run roughshod through political, economic, military, diplomatic, intelligence, academic, social, mass communications industries in the US, seemingly stealing information with impunity.

Chinese Intelligence Services Have Been Doing Well Enough That They Could Pass on Angwang

Under the circumstances alleged in the criminal complaint of the US Department of Justice, if there was interest in recruiting Angwang, Beijing was going to reason with the facts, not odd suppositions that might be primed by Angwang’s statements. If there were any doubts about the bona fides or the authenticity of anything Angwang was saying, the matter had to be studied.

Omne ignotum pro magnifico est. (We have great notions of everything unknown.) Senior executives and managers of Chinese intelligence services observing from Beijing when considering the big picture surely took into consideration the predicament in which US counterintelligence services found themselves. They imaginably recognized that US counterintelligence services surely want to accomplish a lot against them, but they have had great difficulty in devising ways to deter, disrupt, and destroy the intelligence efforts of Chinese intelligence services. When they achieve any victories against a Chinese intelligence operative or informant, and the occasional intelligence officer, they come only after massive amounts of secret government information of the utmost importance or intellectual property of private firms and academic institutions that is the product of intense and gifted research and development work has been stolen. US counterintelligence services would prefer that Chinese foreign intelligence recruitment efforts would lead over and over to traps. Information stolen should only that which is cooked and valueless. They would like to regularly penetrate Chinese intelligence networks and roll them up in waves at times and places of their choosing. They would like to infiltrate ongoing and developing Chinese intelligence operations and use them as conduits to push disinformation back to China. Doubtlessly, they wish they had a way to identify all Chinese intelligence officers, operatives, and informants and at least intercept, neutralize, and recruit a few as counterespionage agents.

To the extent any of that is plausible, Chinese foreign intelligence and counterintelligence officers, hypothetically may have looked upon Angwang as a potential counterespionage agent of the US, they would have most likely classified him as a dangle. As defined more specifically in the earlier referenced Dictionary of Espionage, a dangle is “a person who approaches an intelligence agency in such a manner that he is asking to be recruited as an agent to spy against his own country.” It is further explained that in some cases a dangle will engage in efforts to interest an intelligence service in his or her intelligence potential, or actually begin to provide services on his or her own initiative. Accordingly, senior executives and managers of Chinese intelligence services observing from Beijing may have suspected Angwang was being dangled before the UFWD official with the hope that he would in turn be passed on to Chinese foreign intelligence officers in the People’s Republic of China Consulate in New York and consequently gobbled up. With regard to that, Chinese intelligence services are not so desperate at the moment that they would have jumped at the odd native Tibetan NYPD officer dropped at their Consulate door step teeming with the right bona fides, attempting to say all the right words. As aforementioned, senior executives and managers in all of the  Chinese intelligence services know that their opposite numbers in US counterintelligence services are the desperate ones. Attempting to ensnare officers Chinese foreign intelligence services–or a UFWD official in this case–with such an over the top lure may have been presumed to be more of a reflection of the desperation of US counterintelligence services. To that extent, it could be viewed as a projection of their own concerns and anxieties.

With no intention by greatcharlie to be insulting or impolitic, but quite frankly, repeating what was mentioned a bit before, there was truly very little authentically impressive about Angwang as a potential espionage operative for any Chinese foreign intelligence service to consider. Chinese foreign intelligence services have actually been doing well enough so far at spotting their own targets, recruiting their own way, and running their operatives and informants with their tactics, techniques, procedures and methods. It is estimated that their 25,000 officers on the ground in the US show little fear as they steal US technologies and secret information and data of all kinds. Again, with things going so well for Chinese intelligence services in the US so far, that would be a catastrophe.

If a decision had been made to place Angwang under the control of Chinese intelligence services, the last thing China would want would be to see its whole US enterprise come crashing down, much as a wall. Attendantly, Chinese intelligence services would not  want to see a resident intelligence officer or a member of his team hypothetically posted to the People’s Republic of China Consulate in New York caught under the debris or associated in any way with the problem. They could be certain that US counterintelligence services would make a disturbance greater than bedlam if they could make a case against them.

It is highly unlikely that the UFWD official with whom Angwang was in contact, was an foreign intelligence officer from the Ministry of State Security who was simply using the UFWD’s creature, the China Association for Preservation and Development of Tibetan Culture as a cover. He failed to tick enough required boxes to even be considered such. In describing Chinese foreign intelligence officers, the renowned expert on the subject, Mattis, explained in a July 9, 2017 article in the National Interest entitled “Everything We Know about China’s Secretive State Security Bureau And it’s not much,” there are apparent signs that one is dealing with genuine officer of the Ministry of State Security. A Chinese diplomatic official who wears a tailored suit and speaks  with idiomatic English is one sign. A businessman working from a sketchy consulting outfit, with a few faked LinkedIn profiles, that does not own the domain it claims, is another. Reviewing the word-for word conversations, the UFWD official could only converse with Angwang, to use the vernacular, in “broken English.”

Maintaining a low profile means preventing one’s activities from becoming anything passively noticeable, inquired about by the suspicious, reported to authorities by the dutiful, and written about by reporters. As part of their tradecraft, Ministry of State Security officers would prefer hole-in-corner meetings with prospective recruits in small, quiet locations such as cozy, dimly lit establishments, conversing over coffee or tea, perhaps a dash of brandy or even a bite to eat. Such would be a far better site for a furtive discussion than some crowded establishment or a spot nearby some busy thoroughfare. Other sites usually selected are hotel rooms, gardens, and parks. Most of Angwang’s contacts with the UFWD official and another Consulate official were by telephone.

Further with regard to the telephone calls, unless they had worked out some elaborate code for communicating, nothing was hidden. The UFWD official surely had received more than one security briefing about telephone conversations in the US and the likelihood of being monitored by US counterintelligence. Chinese intelligence services have been aware of such capabilities for some time. In public statements, Chinese officials have expressed concerns about US capabilities to intercept telephone conversations of its government personnel. In the end, the telephone conversations were intercepted and declared by the FBI as the means used by the UFWD official to issue instruction to Angwang.

Equally, even if the UFWD officer, in the very unlikely case, was completely free from anything nefarious and not involved at all in any standard united front work, doubtlessly he would still be very aware and concerned that his conversations with Angwang were being monitored and assessed by Chinese foreign intelligence and counterintelligence officers. His career would be put on the line with every word he spoke even though it was his job to speak to contacts in the Tibetan community as Angwang.

Learning by Observation

In his novel, Siddhartha (1922), the German born Swiss poet, novelist, and painter, Hermann Hesse, the words are written: “I have always believed, and I still believe, that whatever good or bad fortune may come our way we can always give it meaning and transform it into something of value.” It is possible that after a period of contact with Angwang, senior executives and managers of the UFWD in Beijing, in akin to the judgment of senior executives and managers of civilian and military Chinese intelligence services, as greatcharlie hypothesized, may have instructed their official in the People’s Republic of China Consulate in New York to observe him for his reactions in response to statements he should make under their direction. Using reports from the UFWD official in the Consulate, they might hypothetically choose to  study Angwang much as a rat in a Skinner box. Whatever might have been of interest in his comments and inquiries was mined potentially to help create a template for how US counterintelligence operatives might respond when placed in certain situations. Most certainly from the get-go, the UFWD official would most likely have been weaponized with questions to ask Angwang and instructions on how to relate to him so that Beijing could be better gauge him for potential recruitment.

Incongruities

Multum in parvo. (Much in little. (Small but significant.)) Closely reviewing the criminal complaint, Angwang’s case is made even more intriguing given the many incongruities and outright oddities apparent in the activities of the parties involved in the matter. Each fact is suggestive of itself. Together, they have a cumulative force.

It is hard to imagine, but not exactly improbable, that in selecting an official of the UFWD, to send to New York as a representative of the China Association for Preservation and Development of Tibetan Culture,  UFWD senior executive and managers would choose someone who lacked proficiency in English. It would be doubly hard to imagine that of all the choices, Beijing would send someone who was also not proficient in Tibetan. After all, it even noted in the criminal complaint, among the department’s tasks is to engage with ethnic Chinese individuals and communities living outside China. Without proficiency in Tibetan, the UFWD official could not possibly have been expected to converse in the native language of the community in which he was ostensibly assigned to engage in outreach. Lacking proficiency in Tibetan would also mean vacuously surrendering the opportunity to establish an immediate basis of commonality with those in the Tibetan diaspora in New York who might have been willing to interact with him. (Perhaps some would say his walk-in NYPD informant defied that reality.) It would be counterintuitive to do so.  Standard Tibetan, along with Mandarin Chinese, is an official language of the Tibet Autonomous Region of the People’s Republic of China. Some schools in Tibet teach all subjects in Chinese, especially in areas where most students are ethnic Chinese. As Standard Tibetan is a widely spoken form of the Tibetic languages that has many commonalities with the speech of Lhasa, an Ü-Tsang (Central Tibetan) dialect. Standard Tibetan is often referred to as Lhasa Tibetan.

According to the criminal complaint, Angwang and both UFWD officials conversed in English, although presumably at least Angwang and the UFWD official could comfortably speak in Tibetan. Tibetan is in fact Angwang’s native language, but he repeatedly spoke with the UFWD official in English. He continued to do so, despite what could be inferred from the transcript segments in the criminal complaint, the difficulty that he was having in verbalizing what he wanted to say. It was, indeed, one more instance in which Angwang failed to humble himself, and actually a moment when he was decidedly rude.

The failure of Angwang to avail himself of the opportunity to speak in Tibetan may have raised eyebrows of UFWD senior executives and managers in Beijing who were very likely monitoring the progress of the contact. To them, the odds would stand against this being a coincidence. Indeed, Angwang who professed a love of his motherland, China, preferred to speak English rather than speak his native language. As a Communist Party of China loyalist might express it, Angwang further “subordinated” himself and their conversation to the language of a foreign land and an adversary. Culturally, Angwang may have been criticized in Beijing for failing to be humble and display respect for before an official, albeit low level, of the People’s Republic of China. It may have very well been viewed in Beijing also as ungracious and shameful. One might speculate that some grumblings might have even been heard in the meetings of UFWD senior executives and managers about Angwang that perhaps it was really a manifestation of his true mental attitude to his homeland.

Angwang’s repeated efforts to speak with the UFWD official in English, hypothetically may have led UFWD senior executives and managers in Beijing monitoring the contact to theorize that if US counterintelligence services were using their would be informant as an clandestine operative against the UFWD official, having Angwang discuss everything in English would serve to ensure that any direct, incriminating statements made by the Consulate staff member would be taken exactly as stated and his statements would not be later declared as part of a legal defense as having been subject to poor translation or completely misconstrued due to misinterpretation.

UFWD senior executives and managers of Chinese intelligence services observing from Beijing may have made the assumption that If US counterintelligence services were operating against the UFWD official posted to the Consulate, they could have potentially insisted that their operative, who they would imaginably could have assumed Angwang was, spoke in English as a manifestation of poor tradecraft. It would be a dreadful missed opportunity to enhance the comfort zone between their operative and the target, in this case the UFWD official, and establish more firmly establish a commonality between them. (To that extent, the criminal complaint does not indicate that the UFWD official had suggested to Angwang that he speak English.

Further, UFWD senior executives and managers in Beijing as well as  Chinese foreign intelligence and counterintelligence officers possibly working out of the New York Consulate who were experienced with the modus operandi of US counterintelligence, might have presumed Angwang’s unwillingness to speak to native language of the motherland that he claimed to have loved so much as possible act of laziness by US counterintelligence service, who might have insisted that their operative spoke English in order to avoid having to later engage in the extra step of translating transcripts of their conversations, as witnessed in previous cases.

Lastly on the language issue, Angwang desire to speak in English with the UFWD official may have also raised concerns among UFWD senior executives and managers in Beijing monitoring the contact because Madarin was also langyage in which both men could converse. Relatedly, in a December 11, 2019 telephone conversation, reported in the criminal complaint, with the UFWD official, dubbed PRC Official-2 within, Angwang asked for advice on the creation of his official NYPD business cards. Angwang stated that the card should indicate that he spoke Chinese. To that end, Angwang asked the UFWD official if his business card should state that he speaks “Chinese,” or more specifically the Mandarin dialect. The UFWD official responded that the card should read “Chinese.” Later in the call, Angwang and the UFWD official mutually decided that the card should reflect his fluency in “Chinese, Tibetan.”

Tibetans detained by Chinese security forces (above). It is possible that after a period of contact with Angwang, senior executives and managers of the UFWD in Beijing may have instructed their official in the People’s Republic of China Consulate in New York to observe him for his reactions in response to statements he should make under their direction. Using reports from the UFWD official in the Consulate, they might hypothetically choose to  study Angwang much as a rat in a Skinner box. Whatever might have been of interest in his comments and inquiries was mined potentially to help create a template for how suspected US counterintelligence operatives might respond when placed in certain situations. Most certainly from the get-go, the UFWD official would most likely have been weaponized with questions to ask Angwang and instructions on how to relate to him so that Beijing could better gauge him for potential recruitment.

Oddities

According to a September 21, 2020 CNBC report, the US Attorney’s Office for the Eastern District of New York, in a detention memo, said that an investigation found that “Angwang has traveled back to the PRC [People’s Republic of China] on numerous occasions since his asylum application was granted.” UFWD senior executives and managers closely following from Beijing Angwang’s moves, may have found it curious that Angwang’s oft professed love of his motherland had not already led him to request help from the UFWD official in securing a visit to China, to meet with the managers and colleagues of the official, to see his family, and “examine conditions in Tibet,” as part of a government sponsored cultural program. True, in a November 19, 2018 telephone conversation, he mentioned that he would wait for an invitation from the UFWD official to presumably go to Beijing once the official attained some position of influence there. However, he otherwise showed no interest in speaking with other officials at the Consulate, with the imprimatur of the UFWD official, who would have the ability to facilitate his travel to China, perhaps even on a state sponsored visit. All Angwang seemed interested concerning Beijing, was urging the UFWD official to verbalize some linkage back to his superiors there or to reveal some business or personal contact with senior executives of his organization, or otherwise, senior members of the Communist Party of China who were associated with it. As mentioned earlier, the criminal complaint clearly indicates that the UFWD official never even creeped in that direction in conversations. Angwang seemed determined to ignite a discussion with the UFWD official on his  impressions of his superiors in Beijing and their hopes of what he might achieve from his post. He repeated his inquiries similar to a skipping compact disc. Angwang also seemed to have a strong interest in what would satisfy the UFWD official’s Beijing superiors in terms of the collection of information and activities in which he, Angwang, might engage.

In a large, populous city as New York City, with so much activity tied to the diverse cultures of its many diaspora communities, contacts by NYPD community liaison officers with diplomatic representatives of the home countries from which one of the diverse communities of citizens and residents originate, would likely be given scarce attention. With regard to the officers actions as an official representative of the NYPD and City of New York, and the decidedly aberrant nature of his behavior, it is hard to understand how NYPD senior executives and managers had not been made aware of the errant behavior of the officer. One might think that his repeated contacts would have roused some suspicion or the curiosity of a single fellow officer. If NYPD senior executives and managers were aware of what he was doing, given how odd it was, he should have been ordered to cease and desist and to break contact with the People’s Republic of China Consulate in New York immediately. Based on the absence of anything to the contrary in the criminal complaint, one must presume this was the case. It appears that no heed was paid by the NYPD to his two year long perilous entanglement with the People’s Republic of China Consulate in New York and the UFWD.

Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.) Being aware of that and the dangers security-wise that interactions with People’s Republic of China Consulate in New York would pose for an officer who might come in contact which such “dark elements” there, one might expect Angwang’s immediate superiors in the Community Liaison Department or at the 111th Precinct  would put some impetus into getting the officer as far away from that place. In the end, he became mixed up with the UFWD, which in many ways might be considered a far worse outcome than running into any in house spies.  have been  especially given the type of exchanges with a Consulate staff member in which he was engaged. If Angwang had been forewarned about being in contact with the Consulate by his superiors, yet then persisted in maintaining contact with officials there, the circumstances would be completely different.

After Angwang was charged, among his fellow police officers, there may very well be some grumblings to the effect that if at higher levels in the NYPD, there was an awareness of the dangerous waters was sailing into not simply by being in contact with the People’s Republic of China Consulate in New York, and worse being contact with an acknowledged official of the UFWD, consideration should have been to perhaps given to providing Angwang with the opportunity to jump to safety. That opportunity could have taken the form of a stern warning or even a reprimand with regard to those contacts as well as his activities from a supervisor. Sometimes one needs to hear the perspective of others to understand how far off course one has traveled. It is unimaginable that anyone kindly mentoring the NYPD officer was encouraging his interactions with the People’s Republic of China Consulate in New York. Imaginably, the NYPD Patrolmen’s Benevolent Association (PBA), the police officers’ union, may have something to say about how things panned out, too! Although the matter is now laden with national security implications and it is a federal criminal case, imaginably the PBA might have had something to say about how far the NYPD allowed the officer to stay if his superiors actually had been made aware of what he was doing. However, a PBA spokesman said the union would not be representing Angwang in the criminal case. It is stated with no interest insult or to condescend, that the majority of NYPD officers are neither steeped in international affairs and US foreign policy nor familiar enough with diplomatic arts to fully understand the implications of such contact with the local Chinese diplomatic post that garners great attention from the US Intelligence Community.

In view of how Angwang was operating with an extraordinary amount of autonomy with regard to contacts-as a local government employee–with the People’s Republic of China Consulate in New York. Experienced senior executives and managers in UFWD might have wondered whether the NYPD officer was being supervised and whether he was reporting any of his contacts with, and activities on behalf of, the People’s Republic of China Consulate in New York. Senior executives and managers in UFWD would want to know why no superior officer in the errant officer’s precinct chain of command did not order him to break contact with the People’s Republic of China Consulate in New York. One might assume that the Consulate had a fully complemented suite of foreign intelligence officers, likely from more than one service, to include Communist Party of China intelligence elements.

Once Angwang’s activities were discovered, one might have expected senior executive from the NYPD, out of an abundance of caution, to approach the Consul General of the People’s Republic of China in New York and inform the official that it was not the interest or intent of the NYPD to have its community liaison officers probe Consulate officials about the inner workings of their government. Further, one might expect that the NYPD would make it clear that it was not permissible to allow its officers, essentially in the role of agents, to perform community liaison tasks for their Consulate or any foreign government Consulate for that matter.

Interesting Behavior by the Chinese Government

On the other side of the coin, the People’s Republic of China Consul General of New York did not contact the NYPD about the probing, officer with his telephone calls, comments concerning evaluations of Consulate staff by senior officials in the Chinese government, and his efforts to insinuate himself in the activities of Consulate staff member by engaging, by his own admission, in a self-managed efforts promote a staff member with superiors in Beijing. As aforementioned, the officer’s pushy, boorish nature and peculiar efforts were hardly what a Consulate official from any country would want to cope with under normal circumstances.

What compelled the Consulate to actually let it all continue is difficult to discern. That decision surely has leaves the door open to consider the decision from a different angle than simply engaging in typical Consulate activities such as supporting China’s diplomacy with the US, handle legal matters, and foster business, educational, cultural, travel, social, and community relations in the New York Metropolitan Area and to that extent, the US. There are many possibilities.

As for the response of the Chinese government, a People’s Republic of China Ministry of Foreign Affairs spokesperson, Wang Wenbin, stated at a daily briefing on September 22, 2020: “The relevant accusations made by the US side are pure fabrication.” Interestingly using the word “plot,” he explained: “The US plot to discredit the Chinese consulate and personnel in the United States will not succeed.” Wenbin continued by curiously stating that the indictment against Angwang was full of hedging terms such as “seems” and “possibly,” giving the appearance that prosecutors were straining to make their case. From this particular statement, one can get a better sense of how, as postulated in the discussion here, Communist Party of China organs involved in this case, that publicly being the UFWD, and Chinese government bureaucracies interested in it, that being the Ministry of State Security and the Ministry of Foreign Affairs, surely examined the criminal complaint against Angwang closely. Both bureaucracies have the responsibility to support united front work. As presumed in this discussion also, certainly all information pertaining to Angwang’s contact with the People’s Republic of China Consulate in New York was carefully scrutinized by them. Perchance, as hypothesized by greatcharlie, for responsible senior executives and managers of the UFWD and also most likely among interested Chinese foreign intelligence and counterintelligence services of the Ministry of State Security, sufficient indicia existed to suspect that Angwang’s second set of contacts with the People’s Republic of China Consulate in New York and the UFWD official were most likely inauthentic.

To that extent and without a great leap of thought, it becomes more likely the case that the two year period of Angwang’s second contact with the People’s Republic of China Consulate in New York, which included numerous contacts with the UFWD official, was used in a curious way by UFWD senior executives and managers in Beijing to study, from arms length and with sufficient safety measures in place, the tactics, techniques, procedures, and methods of US foreign intelligence and counterintelligence services. They would seek to better understand and prepare for expectant future attempts to covertly insinuate operatives into the Chinese foreign and national security apparatus, including particularly both the clandestine posts and covert networks of civilian and military Chinese intelligence services and Communist Party of China organs operating overseas, as UFWD. As aforementioned, they doubtlessly understand the situation the US Intelligence Community has faced, scoring few victories and suffering many defeats in the intelligence struggle with China, and they very likely recognize that US foreign intelligence and services are anxious to turn the situation around and get some things going. Whether there is any merit to this theory that in Beijing relevant Communist Party of China elements and government bureaucracies viewed the whole matter in this way, remains to be seen. Given the peculiarities of the world of intelligence, this analysis should not be deemed too extravagant.

Angwang in his Community Affairs role (above). Communist Party of China organs involved in this case, that publicly being the UFWD, and Chinese government bureaucracies interested in it, that being the Ministry of State Security and the Ministry of Foreign Affairs, surely examined the criminal complaint against Angwang closely. As presumed in this discussion also, certainly all information pertaining to Angwang’s contact with the People’s Republic of China Consulate in New York was carefully scrutinized by them. Perchance, for responsible senior executives and managers of the UFWD and also most likely among interested Chinese foreign intelligence and counterintelligence services of the Ministry of State Security, sufficient indicia existed to conclude that Angwang’s second set of contacts with the People’s Republic of China Consulate in New York and the UFWD official were most likely inauthentic.

The Way Forward

There is no intention to remotely question the actions of the US Department of Justice on the Angwang matter. With an interest in better understanding the counterintelligence case that resulted in Angwang’s indictment, greatcharlie has taken a deeper dive into facts made available. Along these lines, it has provided a reappraisal based on what it has found. It is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing adversarial foreign intelligence services operating against the US.

John Milton, the renowned English poet, polemicist, man of letters, and a civil servant for the Commonwealth of England under Oliver Cromwell, wrote in Comus (1634): “He that has light within his own clear breast May sit in the centre, and enjoy bright day: But he that hides a dark soul and foul thoughts Benighted walks under the mid-day sun; Himself his own dungeon.” Angwang’s behavior might only be explained by some mystery in his life. Left unknown to the public, it is possible to say. What stands out from the criminal complaint is that whenever Angwang involved himself in things, to include immigration, the US Army Reserve, and the NYPD, he has displayed an inclination to approach them in a way that was usually a bit off-kilter. For that reason, perhaps it can be estimated that Angwang’s aberrant and purportedly illicit choices in this case were the result of long habit. Indeed, this episode may be one more, but perhaps the most unfortunate, of a collection of odd instances in his life. To the degree that he was involved with a UFWD official, as laid out clearly in the criminal complaint, Angwang had provided him services, albeit seemingly voluntarily and arguably without direct instructions from that contact. He left no doubt that he wanted to promote what he apparently believed were the goals of UFWD official and his organization. When individuals turn their brains to misanthropy and wrongdoing, the world becomes more wicked. For certain, the FBI interprets Angwang’s services for the UFWD official as being aimed at supporting intelligence activities. As of this writing, the public has yet to hear a recounting of Angwang’s experiences in this case in his own words.

Angwang may very well be an isolated phenomenon within the NYPD ranks, and among municipal police departments around the US. However, the presence and activities of the array of Chinese intelligence services both of the government and the Communist Party of China must not be underestimated. It appears to be growing in intensity. Keen observers of China policy must appreciate the predicament of US counterintelligence services as Chinese intelligence services seek to further exploit it. There is a handle. As suggested in previous greatcharlie posts, new thinkers, from outside of the bureaucracy, may rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. They would surely look at issues from other angles, moving away from the usual track, and thereby most likely peel back surface layers, figuratively, to reveal what may have been missed for a long time. What outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that in some cases might very well have thwarted the recruitment of the outside thinker.

Hiring such outside thinkers could be done with delicacy. There should be an exactness about the selection process. Those sought should be already known and possess the ability to present what may be unorthodox innovative, forward-looking perspectives. The projects on which such individuals would work on would be very compartmentalized and limited in scope and duration. Their attention could be directed to  special cases that may be exceptionally difficult to crack. Some senior executives and managers of US counterintelligence services, determined to stand as solid pillars of conventional thinking and behavior that will not be blown down by the winds of change, may not brook the idea of bringing in outsiders to handle sensitive matters. However, the tide of Chinese espionage has lapped up so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among those possible dissenters, an interest, not solely due to exigency, might grow on the idea. Ratio et consilium propriae ducis arte. (Reason and deliberation are the proper skills of a general.)