Book Review: Robert Spalding, War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022)

People’s Republic of China People’s Liberation Army (PLA) Navy’s Aircraft Carrier, Type 001A Shandong (Hull 17), the PLA Navy’s second aircraft carrier, but the first built domestically (above). In War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022), retired US Air Force Brigadier General Robert Spalding discusses China’s military concept of unrestricted warfare. Spalding points out the concept may also include the use of armed force with its arsenal of weapons as the Type 001A Shandong, it is a military concept designed for the use of non-military forms of warfare: psychological, media, information, technology, cyber, financial, political, social, and espionage. The aim of unrestricted warfare is to weaken the US internally and to exploit its vulnerabilities. Spalding says there can be no doubt that the ultimate goal of the Communiet Party of China is world dominance. From his perspective, that does not bode well for the US.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping promises the Chinese people that China will supplant the US as the world’s dominant power in every sector. (Surely, it would be out of character for Xi to assure the Chinese people something as mundane as French King Henry IV declared one day in 1598 as France was just beginning to emerge from its ruinous religious wars: “Je veux que chaque laboureur de mon royaume puisse mettre la poule au pot le Comanche.” (I desire that every laborer in my realm should be able to put a fowl in the pot on Sundays.). Reference is commonly made to that statement with the phrase, “poulet au pot.”) One might imagine that some similitudes of the romanticism á la the French Revolution, megalomania, or some bizarre combination of both, perhaps in concert with others, have driven the zeal of Communist Party of China’s leadership over the years to achieve this goal. Xi will very likely have a lot of other unsettling things to say as time goes on. As attaining the dominant position in the world has been a long sought goal but never reached, some experts, scholars, and policy practitioners still look askance at the whole idea. China’s ambitions and capabilities as they concern attaining this lofty goal no longer sit in the realm of the theoretical or left to philosophical meanderings. Xi is clearly determined to achieve it under his leadership. If China were ever to make the dream of dominance come true, it would not be so willing to relinquish that position. Beijing would doubtlessly do whatever it took to stay on top.

Although the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The idea of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether its friend or foe. The subject of this review is Robert Spalding’s War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022). In his book, Spalding says there can be no doubt that the ultimate goal of the Communiet Party of China is world dominance. From his perspective, that does not bode well for the US. A retired US Air Force Brigadier General, Spalding, in War Without Rules, expresses his most recent meditations about China’s efforts to achieve dominance overseas and even greater control at home. He offers more answers on how the US and its allies might respond to that effort. Spalding states in his “Introduction”: It is not enough to know what your enemy wants. One needs to understand his strategy. In this regard, Washington has been, to use Spalding’s words, “really confused.” He says the US is “primed to fight in one way-all-out war-and see aggression through the same lens.” The indications and implications of this is that the US over the years has failed to discern and accept the Chinese are doing something very different and thereby, Washington has failed to act appropriately. To that extent, War Without Rules is a further attempt by Spalding to get the word out to US political leaders about what China is doing. Yet, more than a book about China’s concepts, intentions, and actions to knock the US off its perch as the dominant power in the world, greatcharlie found that War Without Rules is a book that stirs the reader’s curiosity. The reader is caused to inquire further into the author’s judgments and give greater consideration of their own views on the matter. Such books are figurative catnip for greatcharlie.

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possesses. Spalding is a former insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that as a former flag officer and B-2 Stealth bomber pilot and unit commander, he was among a him in unique, elite caste of military officer, not quick to speak out, does not lightly show emotion, at least publicly or react because of it, not the type to fret over a perception without the full facts, and whose views when expressed should be taken very seriously.

Overview

In War Without Rules, Spalding frames the problem in getting Washington to understand how China has been steadily moving in the direction of achieving dominance in his Introduction by stating: “From our standpoint, we use military force to achieve a political outcome.” To that extent, he continues: “So they’re constantly in a state of war, they never exit time to peace. And that means they’re always fighting for advantage, they’re always fighting . . . to gain an advantage over their opponent, and . . . are willing to do whatever means necessary.” Spalding states that over those years he came to two key realizations: first, the number one goal of the Chinese Communist Party is the survival of the Chinese Communist Party; and, second, the number one threat to achieving that goal is American democracy. Spalding observes that although there may not be full agreement in the US that China is an enemy, China certainly views the US as its enemy, an existential one. Much as with Spalding’s preceding work, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), which greatcharlie reviewed in its November 30, 2021 post, Wat Without Rules is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction.

Unrestricted Warfare: the Playbook 

The central element of Spalding’s discussion on China’s efforts to dethrone the US as the world’s dominant power is the concept of “unrestricted warfare.” That concept is laid out in a 1998 book entitled Unrestricted Warfare authored by two People’s Republic of China People’s Liberation Army (PLA) colonels, Qiao Liang and Wang Xiangsui. Spalding essentially uses War Without Rules to parse out the text which was once relatively unknown in the West. In each of the chapters of War Without Rules, Spalding presents excerpts from Unrestricted Warfare along with his interpretations and assessments of the text.

Spalding explains the concept of unrestricted warfare, or what the two authors call a “cocktail mixture of warfare” and define as “warfare which transcends all boundaries and limits.” Spalding points out that while China’s version of unrestricted warfare may also include the use of armed force, it is a strategy that prioritizes the use of non-military forms of warfare: psychological, media, information, technology, cyber, financial, political, social, and espionage. (The espionage element will be considered in greater detail later in this review.) The aim of unrestricted warfare is to weaken the US internally and to exploit its vulnerabilities. (Spalding would call unrestricted warfare in War Without Rules as “beyond-limits combined war.” As the term seems to best reflect the flavor of strategy’s meaning in Chinese, greatcharlie shall hereinafter refer to the strategy of unrestricted warfare more thoroughly as “beyond-limits combined war.”) Since under what was a new concept in 1998 the battlefield is everywhere, for the PLA, everything can be weaponized. On a short list of things weaponized, Spalding includes computers, drugs (fentanyl), financial markets, viruses (COVID-19), social media platforms, universities, scientific organizations, NGOs, trade, and media outlets. To create a foundation for the conceptualization of their new approach, Spalding explains that the two PLA colonels “pulled together centuries of Chinese thinking about warfare and made it relevant in a modern context.” To that extent, Spalding goes as far as to state that the book, Unrestricted Warfare, preached a new version of a very old Chinese formula for victory first set down in print thousands of years ago by Sun Tzu, who wrote in Art of War (c. 5 B.C.), which focused on military organization, leadership, and battlefield tactics, that the acme of skill was to defeat an enemy without fighting.

Spalding insists Unrestricted Warfare is “the main blueprint for China’s efforts to unseat America as the world’s economic, political, and ideological leader.” He states further, it is “the key to decoding China’s master plan for world domination.” Spalding points out that the two colonels wrote the book at a time when the US was enjoying its brief “unipolar moment,” having recently achieved victory over the Soviet Union in the Cold War and won a one-sided military victory in the First Persian Gulf War. And China had not yet attained economic and military superpower status. Much as their superiors in the Communist Party of China, the sense of ardor of the two PLA colonels were respectively inflamed by what they witnessed in the Gulf War and they became more determined than ever to find a way to enhance their country’s capabilities and raise its status globally. Given what Spalding says Unrestricted Warfare endows, it is a wonder why its two authors were allowed by their masters to publish, nonetheless write such a piece in an unclassified context. There must have initially been some nervousness in China’s Ministry of Defense and the Communist Party of China over security concerns. Some time and effort was presumably put into parsing out how the US and its allies would react if a copy got into their hands.

Cynics and conspiracy theorists would doubtlessly go as far as to say Unrestricted Warfare may be a false document, a piece of disinformation, generated by one or more national governments wanting to create a picture of a virulent, predatory China hellbent upon dethroning the US as the global superpower in any way possible. To that extent, they ostensibly insinuate that Spalding has taken the bait and run with it to an extreme. They would perchance offer a caveat to the effect that readers not allow themselves to be bewitched by Spalding the “dream-weaver” or the “teller of tales”. Other detractors of Spalding’s opus would hypothesize that if political leaders were sufficiently impressed by the length and breadth of Chinese activities depicted in the book, it would open the door to greater overwatch and responsibilities for counterintelligence services in the US Intelligence Community and federal law enforcement. Thereby, the document was very likely created within the intelligence industry to influence political support for enhancing their respective powers, broadening their respective missions, and increasing their respective resources. That would be quite a judgment on the character of the men who run the intelligence services and federal law enforcement organizations in the US. Anything is possible from an industry in which many of its professionals as a practice must deny their own names and concealing their accomplishments and contributions is de rigueur. So many “capers” are still kept close to the vest by top executives and managers. Then again, some could say conversely that any effort to create second thoughts on Unrestricted Warfare could possibly be the work of the opposition, a misinformation campaign of some sort.

Everyone is entitled to an opinion. Having said that, it might be helpful to remind such cynics that Spalding in part resolves the provenance of Unrestricted Warfare by laying out the manner in which events have unfolded and continue to unfold and how Chinese activities “follow the script” of Unrestricted Warfare practically to the letter. Spalding notes that Unrestricted Warfare has been used at China’s military academies. It would be unusual for a “misinformation tool” to be placed on syllabi in such educational institutions. Surely, that evidence alone should help carry his argument well-outside the realm of conjecture and settle it down into reality for most. All that being stated, greatcharlie reckons that diving any deeper into such matters, would be counterproductive, and that it would be best to “stay on mission” and discuss the good readers will find in War Without Rules.

As a book concerning the course of China’s implementation of beyond-limits combined war, War Without Rules, to an extent, is a book about both the past and present. Yet, more importantly, it is an argument concerning the type of future the US and the rest of the world’s industrialized democracies really want. Spalding leaves doubt that he believes the idea of Chinese dominance is unacceptable given the nature of China’s totalitarian government. He feels the growing concern about China within Washington and the capitals of its allies is warranted. Spalding insists that much more must be done by those capitals to convince China that the matter of it becoming the world’s dominant power is simply out of court. In his view, too many mistakes have been made already by them, especially by Washington, that have allowed China to advance quite a bit in that direction. Spalding makes considerable reference to the political leaders, business leaders, senior government officials, and distinguished scholars, academics, and technical experts who exercise the lion’s share of authority within their countries. Western elites called themselves keeping an eye on Beijing, but Spalding explains for far too long have assumed the military is China’s main weapon in a war. To his amazement, he observed they somehow or another failed to realize that money can be a stronger weapon. To the detriment of the interests of their own respective countries, through interactions with China, particularly economic through commerce, finance, and trade, have lavished Beijing with enough money to wage a beyond-limits combined war against them which the Communist Party of China fully intends to win! 

In Act II, scene iv, of William Shakespeare’s The Life and Death of Richard the Second, a Welch captain speaks these words of doom and gloom to the Earl of Salisbury: “The bay-trees in our country are all wither’d / And meteors fright the fixed stars of heaven; The pale-faced moon looks bloody on the earth / And lean-look’d prophets whisper fearful change; / Rich men look sad and ruffians dance and leap, / The one in fear to lose what they enjoy, / The other to enjoy by rage and war:” Rest assured, War Without Rules is not a manifestation of a sense of doom and gloom concerning China held by Spalding. War Without Rules does not present a “scare story”, pour employer une phrase populaire. Spalding certainly is not whining about China in War Without Rules.  From what greatcharlie is aware of, operating with such a mindset would hardly be Spalding’s way of thinking or doing things. Despite his strong feelings, his discussion is more intellectual than overtly emotional. Afterall, he is a consummate professional from the US foreign and national security policy realmand for warriors such as Spalding, “strength of character consists not only of having strong feelings, but maintaining one’s balance in spite of them!” Spalding has a mind and will to win.

In a 1978 October 13, 1978 Wall Street Journal article entitled, “U.S. Monetary Troubles” by Lindley H. Clark Jr., Paul Samuelson, the Nobel laureate from the Massachusetts Institute of Technology, recalled that John Maynard Keynes once was challenged for altering his position on some economic issue. “When my information changes,” he remembered that Keynes had said, “I change my mind. What do you do?” Spalding admits initially having been somewhat dismissive, himself, about the Unrestricted Warfare and viewed the precepts revealed by the two PLA colonels as somewhat fanciful or lofty. Spalding notes in the Introduction of War Without Rules: “When I first read the Chinese war manual Unrestricted Warfare in 1999, I thought it was wacky. I was flying B-2 Stealth bombers out of Whiteman Air Force Base in western Missouri and reading a lot about war. As an Air Force officer, I thought it was part of my day job to understand the bigger picture–even though the prevailing attitude in the military was ‘Just fly the planes.’ ” Torah Lishmah! Spalding’s whole perspective changed once he discerned China was putting everything he read into motion, and doing it well. Spalding spoke truth to power at the Pentagon and the White House then, and speaks of only what he knows to be the truth in War Without Rules now.

At the time of this review, a 212 page translation of Unrestricted Warfare: China’s Master Plan to Destroy America, Reprint ed. (Echo Point Books & Media, 2015) has been made available for purchase on Amazon.com. The description provided for the book on Amazon is as follows: “Two colonels in the People’s Liberation Army, Qiao Liang (乔良) and Wang Xiangsui (王湘穗). Its primary concern is how a nation such as China can defeat a technologically superior opponent, such as the United States.” Having examined Unrestricted Warfare, greatcharlie would wholeheartedly agree that the audience best situated to parse it out in the round would be academics, other scholars, and practitioners in the province of foreign and national security policy. Any level-best effort by those somewhat unfamiliar with these matters, which would be laudable. Still, Unrestricted Warfare is made more easily understood through Spalding’s lens, colored by his expertise and experience. Spalding’s examination of the book via War Without Rules better enables readers with the chance to gain knowledge on a matter that would essentially be limited to those thoroughly steeped in China policy, Chinese defense issues, Chinese military culture, and military science. To that extent, his book will remain an important resource in every personal, public, academic, and institutional library.

The Roman historian Titus Livius (59 B.C.-A.D. 17), known as Livy, provided in Greek, a history of Rome that begins with the earliest legends of Rome before the traditional founding in 753 B.C. through the reign of Emperor Caesar Augustus during his own lifetime. In Book XLIV, sec. 15 of that history Ad Urbe Condita (From the Founding of the City) (c. 28 B.C.), he writes: “Plerumque ipsam se fraudem, etiamai initio cautior fuerit, detegere.” (A fraudulent intent, however carefully concealed at the outset, will generally, in the end, betray itself.) Increasing sunlight has been shone upon China’s activities, not just on the coronavirus disaster or in the domain of foreign and national security policy, but the totality of its malign actions. Included among those actions would be: predatory investment scams directed against trusting governments of often small and less industrialized countries; intrusions into sovereign waters for mass fishing; intellectual property theft from companies and research labs that have invested millions in research and development into; and, demands of censorship insisted upon of those in any arena who have received funding from, or are doing business with, China, Beijing must accept that as a result of such actions, impressions of China have not generally been positive worldwide. Communist Party of China leaders have doubtlessly come across the many statements made internationally about Chinese government spokespersons, diplomats, and other officials. To that extent, the Communist Party of China can hardly be happy about the damage being done worldwide to China’s reputation through books such as War Without Rules. Spalding’s voice is surely one that is looked upon as something better than annoying by the Communist Party of China. Spalding is among an ever growing group of China specialists who are determined to uncloak the fraudulent intent of China established decades ago. They put China’s intentions in full view of the world to see. Perhaps what specialists as Spalding present on China might be perceived as nothing less than affront or rebuke. It could only have been worse it his voice emanated from Taiwan. Then Beijing would have considered his act of writing and publishing the book as one more betrayal.

Spalding holding up copies of War Without Rules (left) and Stealth War (right). Although packed with excellent suggestions, War Without Rules, as with his preceding work, Stealth War, is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Given the success of Stealth War, Spalding was undoubtedly pre-empted to write another work of such magnitude. Surely, he was not lumbered by that task, and welcomed the opportunity to gnaw further at the issue of China ambitions and maligned actions and intentions. War Without Rules is every bit as brilliant as its predecessor. It is another superb exposition of Spalding’s pragmatic thinking.

The Author

In War Without Rules, readers are presented with the perspectives and insights on US-China relations through the lens of a man with years of experience on such matters. While hesitant to rewrite the biography of the author from its aforementioned November 30, 2021 post in which it reviewed Stealth War, greatcharlie believes that only by presenting his singular education and military experience in that way can the reader get a true sense of qualifications to inform readers on the subject matter.

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possesses. Excluding his list of educational accomplishments, it reads as follows: “General Spalding received his commission through Fresno State University’s ROTC program in 1991. He earned his doctorate in economics and mathematics from the University of Missouri at Kansas City in 2007. The general attended undergraduate pilot training in 1993, and was subsequently assigned as a B-52 Stratofortress co-pilot in the 5th Bomb Wing at Minot Air Force Base, North Dakota. He subsequently transitioned to the B-2 Spirit at Whiteman AFB, Missouri. In 2001, he was selected as one of three Air Force Olmsted Scholars, and was a distinguished graduate of Mandarin Chinese language training at the Defense Language Institute in Monterey, California. Afterward, the general attended Tongji University in Shanghai as a graduate research student. He then returned to Whiteman AFB as a B-2 evaluator pilot and assistant director of operations for the 393rd Bomb Squadron. The general was then assigned to the Office of Secretary of Defense’s Prisoner of War Missing Personnel Office as the military assistant for the deputy assistant secretary of defense. During the Iraq surge in 2007, General Spalding deployed to Baghdad and directed the Personal Security Coordination Center. After a stint at the Air War College at Maxwell AFB, Alabama, he was reassigned to the B-2 at Whiteman AFB. While at Whiteman AFB, he was the chief of safety, operations group commander and vice wing commander. He was then selected as a Military Fellow at the Council of Foreign Relations in New York. General Spalding then served as the chief China strategist for the chairman of the Joint Chiefs, the Joint Staff at the Pentagon, Washington DC. His next assignment led him back to China as the Senior Defense Official and Defense Attache to China in Beijing, China. Prior to his current assignment he served at the White House as the Senior Director for Strategic Planning at the National Security Council, Washington D.C.”

Spalding is by no means an outsider, with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that being a former flag officer and B-2 Stealth bomber pilot and unit commander, which placed him in unique, elite caste of military officer, not quick to speak out, does not lightly show emotion, at least publicly or react because of it, not the type to fret over a perception without the full facts, never speak idly, and whose views when expressed should be taken very seriously. 

On Stealth War

Spalding’s Stealth War was promoted as a book which discusses how China has quietly waged a six-front war on America’s economy, military, diplomacy, technology, education, and infrastructure, and has been winning. It might be enough for greatcharlie just to describe Spalding’s exceptional achievement with Stealth War as providing piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis and its practitioners, both past and present. However, Spalding, even more, has interestingly taken his own dissatisfaction, disappointment, and anger over how badly the US has handled China, placed his country in some considerable degree of danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how atrocious events are unfolding right before the eyes of every US citizen.

Although packed with excellent suggestions, Stealth War, as with War Without Rules, is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Given the success of Stealth War, Spalding was undoubtedly pre-empted to write another work of such magnitude. Surely, he was not lumbered by that task, and welcomed the opportunity to gnaw further at the issue of China ambitions and maligned actions and intentions. War Without Rules is every bit as brilliant as its predecessor. It is another superb exposition of Spalding’s pragmatic thinking.

If you were fortunate enough to have read Spalding’s Stealth War, you are certainly primed and ready to approach the heady revelations of War Without Rules with an open mind. However, if you have not had the chance to read his preceding work, you can still jump right in War Without Rules. If Spalding had written War Without Rules solely to communicate with professionals within the US foreign and national security policy bureaucracies or the respective bureaucracies of US allies, his target audience still would have been somewhat sizable, and in of itself a market satisfying enough for his publisher. 

However, knowing the considerable level of interest in China across an array of issues is presently high, the targeting of a larger general audience was very likely insisted upon by his publisher. Of course, publishers make money selling books. Spalding, himself, was evidently willing to reach a far greater audience with his work, but his priority in writing this book apparently went beyond turning a profit. As Spalding explains in his “Introduction”, in attempting reach a larger audience, his intention was  to make average citizens, particularly in the US, better aware of China’s malign aims and objectives and tactics. An attendant benefit of that would possibly be mobilizing them to get their representatives in the US Congress and especially the White House to mitigate its creeping influence.

As part of his effort to reach a greater audience with War Without Rules, Spalding intentionally presents his discussion in a way as to coast the most interested China policy wonk as well as someone who has not read a book on China beforehand comfortably through the subject matter. Spalding does not take for granted how much the reader can absorb from what he teaches. As part of his effort to control that process, he carefully apportions how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Spalding ratchets up the complexity of discussion and his anecdotes. Spalding surely accomplished that presumed mission, as his text is informative, lucid, challenging and accessible.” One can only imagine an individual with his richesse connaissances is holding back considering how much more he could have potentially ruminated upon. To that extent, while all should find War Without Rules a browsable, satisfying meditation, Spalding’s lack of profundity might disconcert some.

Previous Reviews

As Beijing pushes ahead with its varied malign efforts, books as Spalding’s War Without Rules surely deserve a look from the eyes of many. In most reviews readily available online, appreciation is shown toward Spalding’s willingness to share the meditations of his praiseworthy exploratory mind. Reviewing War Without Rules for the New York Review of Books, Francis Sempa, who at the time was Assistant US Attorney for the Middle District of Pennsylvania, explains that China, according to Spalding, is the enemy of the US, and its statesmen and strategists to “know” the enemy better and to appreciate the enemy’s strategy. Sempa points to Spalding’s view that the aforementioned US statesmen and strategist need to appreciate that we are at war with China, though not yet “a shooting war”, and suggests it is uncertain whether they will recognize that reality. Sempa notes Spalding’s evidence that China is waging war lies in the tactics and strategies set forth in Unrestricted Warfare. Citing what Spalding gleaned from that text, Sempa similarly explains that unrestricted warfare, or what the Chinese authors call “beyond-limits warfare,” includes psychological, media, information, technology, cyber, financial, political, social, and espionage warfare. to. Revealing even more from the text of War Without Rules, Sempa explains Spalding believes that China’s practice of waging war with non-military means lulled the US into a false sense of security after the Cold War by convincing US elites that China was liberalizing politically and that the US could benefit financially by “engaging” China rather than containing or confronting it. Sempa notes that a lot of American elites did (and still do) benefit financially from engagement with China. Overall, the review was favorable. Yet, Sempa notes, too, that Spalding failed to mention another factor that imperils US security–the gradual formation of a new Sino-Russian strategic partnership, which developed and expanded while the US was distracted by wars in Afghanistan and Iraq. He says additionally that China has also engaged in a massive military build-up and has extended its influence throughout the Indo-Pacific region via its Belt and Road Initiative. Sempa declares: “Unrestricted warfare also includes geopolitics.

Reviewing the book for the journal of the US Naval Institute, Proceedings, a Lieutenant Cregge states that War Without Rules is “no doubt a blistering critique of the Chinese Communist Party.” Cregge cites Spalding’s explanation that two Chinese PLA colonels, Unrestricted Warfare, provide the playbook for a broad, undeclared Chinese war against the US. Beyond a translation of the two colonels concepts to English, War Without Rules seeks “to explain the challenging prose, logic, and colloquialisms” of Unrestricted Warfare that remain. Through his own description, Cregge notes that the colonels reflected on, among many other topics, how the face of war “would change”, given the US preeminence demonstrated both in its coalition victory in the First Persian Gulf War and its commanding position in the international economic and diplomatic orders. Cregge states that for those interested in examining an array of examples of Chinese coercion against the US-led international order, War Without Rules provides such cases “in spades.” He also notes that for more skeptical China doves, it may be less convincing. Criticizing the War Without Rules, Cregge proffers the book’s compelling argument suffers for two reasons. He explains that many modern examples of Chinese unrestricted warfare against the US rely on seemingly arbitrary citations. He further asserts the book’s partisan perspective is evident throughout, which may further estrange some policymakers or voters, despite a desire, quoting Spalding, that “we should all be China hawks.” Cregge admits that these particular critiques do not argue that the information asserted is necessarily wrong. Cregge additionally criticizes the book saying that given the weight of accusations against Chinese and US organizations and even named individuals, a comprehensive citation regime and bibliography would have greatly reinforced War Without Rules.

Providing a review of War Without Rules for The Epoch Times, that also makes use of quotes from an interview Spalding provided Epoch TV’s “China Insider” program, journalists Hannah Ng and David Zhang report his book walks readers through the principles outlined in the Chinese publication, revealing the regime’s belief that there is no sector of life outside the realm of war. Spalding, they note, determined that this approach stemmed from a doctrine laid out by two Chinese colonels back in 1999 in their book, Unrestricted Warfare. Seeking to boil the matter down further, Ng and Zhang state that according to Spalding, the notion of war espoused by the Chinese communist regime is completely different from ideas in the West. Citing Spalding, the reviewers note that from the Western standpoint, military force is used to achieve a political outcome. However, the “Chinese Communist Party” sees the outside world as always in a state of war. Thus, China is constantly in a state of war with it. That necessitates always fighting to gain an advantage over their opponent, and are willing to accomplish that through any means necessary. To push back against this unconventional war imposed on the US, Ng and Zhang say Spalding called for the country to decouple from China. Quoting Spalding once more, the reviewers write: “If we can decouple from China . . . get them out of our economic, political, academic and natural systems and begin to reinvest in our own citizens, reinvest in infrastructure and manufacturing in science and technology and STEM [science, technology, engineering, maths] education, you’re going to start to see opportunities arise that haven’t been there for decades in the United States.”

Interestingly enough, more than just reviews exist of Spalding’s book. As of the time of this writing, a couple of unofficial “study guides” for War Without Rules have been made available for purchase on Amazon.com at prices oddly not far short of the cost for the book itself! The study guides are in effect synopses of a synopsis of a book. (Without pretension, greatcharlie hopes readers will not find that its review of War Without Rules should be placed within that category, too.)

The August First Building in Beijing, Headquarters of the People’s Liberation Army (above). The central element of Spalding’s discussion on China’s efforts to dethrone the US as the world’s dominant power is the concept of “unrestricted warfare.” That concept is laid out in a 1998 book entitled Unrestricted Warfare authored by two People’s Republic of China People’s Liberation Army colonels, Qiao Liang and Wang Xiangsui. Spalding essentially uses War Without Rules to parse out the text which was once relatively unknown in the West. In each of the chapters of War Without Rules, Spalding presents excerpts from Unrestricted Warfare along with his interpretations and assessments of the text. Spalding insists Unrestricted Warfare is “the main blueprint for China’s efforts to unseat America as the world’s economic, political, and ideological leader.” He states further, it is “the key to decoding China’s master plan for world domination.”

The Chapters of War Without Rules

War Without Rules is 256 pages in length, and has 11 chapters. The chapters are well-arranged and titled as follows: Chapter 1: “Know Your Enemy”; Chapter 2: “A New Way of War”; Chapter 3: “The Magic Shoes of Technology”; Chapter 4: “The Weapons of Revolution”; Chapter 5: “The War God’s Face Has Become Indistinct”; Chapter 6: “Desert Storm: ‘A Military Masterpiece”; Chapter 7: “America’s Weakness”; Chapter 8: “Weaponizing the International Order”; Chapter 9: “Deploying All of the Above”; Chapter 10: “Calling It War”; and, Chapter 11: “Fighting Back with New Rules”. One might figuratively call each chapter a “deep penetration strike” against what the former B-2 Stealth pilot presumably views as Washington’s record of willful ignorance and to a degree, political apathy.

With the aim of not spoiling the readers’ own experience reading War Without Rules, greatcharlie will not provide a sizable review covering chapter by chapter. Instead greatcharlie delights to simply peek, to gaze therein on those parts of his admirable work that it found fascinating and captivating. The same approach was taken in its review of Stealth War. At the same time, Spalding has done a more than admirable job at breaking down the blueprint for China’s effort to attain dominance, Unrestricted Warfare, in order to allow all readers to grasp the work. There was concern in writing this review that an unintended consequence of summarizing his effort would be to gut Unrestricted Warfare to the point that its essence would be significantly obscured to readers. Thus, with a focus on keeping the discussion to the more significant lessons learned from the Gulf War by the two PLA colonels, greatcharlie presents a somewhat fulsome discussion of what it has determined to be its “top 3” chapters. They include: Chapter 4: “The Weapons Revolution”; Chapter 7: “America’s Weakness”; and, Chapter 11: “Fighting Back with New Rules”. Of course, greatcharlie believes every reader will best select for himself or herself, the chapters that content them most.

Chapter 4: “The Weapons Revolution”

In Chapter 4: “The Weapons Revolution”, Spalding explains when Unrestricted Warfare was written China did not have Stealth bombers, am adequate Navy. He notes that the colonels saw promise in what China did have in abundance. Those resources include: a billion people, computer programmers, devious hackers, financial speculators, currency reserves. Spalding, himself, adds what would be recognized as the issue de jure doctors studying exotic viruses. Spalding says the colonels explained all of these, organized and tasked to maximize their potential, could be used as weapons and must be seen as such. Effecting the possible disruption, destruction, and potentially gaining control all areas of the opponents society would be possible to the degree that the opponent’s ability to fight wars in the standard way would be broken. The opponent would be destroyed from the inside similar to an erstwhile healthy individual struck by an unseen virus. The colonels explain that with the weaponization of its abundant resources, China could strike at the very hearts of its opponents. To that extent, the two colonels suggest that fully accepting such ideas requires one to adopt “a new way of thinking about warfare.” Spalding remarks that unlike ships and planes, these weapons needed no upgrades as a result of being suited for the last conflict. The colonels write: “In the past, all that was needed was the invention of a few weapons or pieces of equipment, such as the startup and the Maxim machine gun, and that was sufficient to alter the form of war, whereas today upwards of 100 kinds of weapons are need to make up a certain weapons system before it can have have an overall effect on war. However, the more weapons that are invented, the smaller any individual weapons role in war becomes, and this Is a paradox that is inherent in the relationship between weapons and war . . . Other than the all-out use of nuclear weapons, a situation which is more and more unlikely and which may be termed nuclear war, none of the weapons, even those that are extremely revolutionary in nature possess the right to label future warfare. . . .”

Interestingly, Spalding does not delve too much into the idea that such claims by the two colonels seemed more than just skance as an effort to justify the state in which the Communist Party of China had left their country’s defense, its security. After reading the above passage, greatcharlie thought that perhaps the two colonels overlooked, or worse, dismissed an important aspect of the human element of warfare as it concerns the way weapons are often innovatively used to the extent one could call their influence on the battlefield revolutionary. Imaginably, in the PLA, the sort of go-ahead mentality that has led to innovation in the use of weapons in Western armies, does not fit well. That is doubtlessly the case in all the bureaucracies of China’s totalitarian, Communist government system. The ability of research and development teams, commanders, and soldiers, sailors, and marines to find new ways to exploit available high-tech and information warfare technologies in often absolutely brilliant ways, cannot be discounted, or worse, dismissed so readily. 

In World War II, the decision by German Army commanders to level their long range, high velocity firing, 8.8 cm Flak 18, an 88mm anti aircraft gun, at opposing forces in the North African desert in 1941 changed the picture concerning artillery range, speed, and destructive effort through the war. Batteries of 88s were successful at supporting movement of tank and infantry units and breaking up attacks by opposition forces. In terms of weapons systems as a category, airplanes were initially used in observation and reconnaissance roles. The two colonels mention the contribution of the renowned Italian air war theorist General Giulio Douhet relatively in passing in Chapter 4: “Desert Storm: A Military Masterpiece”. They do not discuss just how genuinely revolutionary his precepts on potential use of the airplane in war were. Spalding surely would have included any comments by the two colonels on US Colonel William “Billy” Mitchell if they had deigned to mention the contribution of his ideas on air power and the need to make airplanes an integral part of US defense in preparation for the next war. It took an impressive degree of inner strength it took for these commanders to subject themselves to being “the voice crying in the wilderness,” a phrase that perhaps alien to the ears of the two colonels (Certainly not to Spalding!). The impact of the airplane was multiplied exponentially when it was eventually used as an asset for tactical and strategic attacks against an enemy. They can destroy enemy positions along the forward edge of the battle area, provide close air support for troops in contact with an opponent or move to a point deep in an opponent’s rear. When attacking an opponent’s units in depth, diverting, disrupting, or destroying attacking forces before they are even in contact with friendly troops, and destroying command, control, and communication centers and lines of supply. In a strategic attack role, airplanes can disrupt and destroy an opponent’s ability to even wage war, affecting the opponent’s ability to produce weapons, train troops. Further, airplanes can serve in an air defense role, friendly forces on the ground and at sea, and provide air cover for other airplanes in strategic attacks.

The two colonels sort of obedient, lock-step, short-sighted thinking on sophisticated weapons systems was further apparent in their statements about high-tech and information warfare. In another quote from Unrestricted Warfare provided by Spalding, it was explained: “Even if in future wars all the weapons have information components embedded in them and are fully computerized, we can still not term such war as ‘information warfare’ . . . because, regardless of how important information technology is, it cannot completely supplant the functions and the roles of each technology per se. For example, the F-22 fighter, which already fully embodies information technology is still a fighter, and the “Tomahawk” missile is still a missile, and one cannot lump them all together as “information weapons” nor can a war that’s conducted using these weapons be termed information warfare. Computerized warfare in the broad sense and information warfare in the narrow sense are two completely different things. The former refers to the various forms of warfare which are enhanced and accompanied by information technology, while the latter primarily refers to war in which information technology is used to obtain or suppress information. . . .” 

Spalding explains the two colonels believe huge investments in cutting edge weapons was a misallocation of funds and a dangerous distraction from what really matters in international conflicts. To that extent, Spalding looked at US Secretary of Defense Donald Rumsfeld in the administration of US President George W. Bush falling into what the colonels saw as a self-made trap as his focus was on constantly improving US weapons systems in terms of accuracy and lethality, an approach called the Revolution in Military Affairs. Intriguingly, on this point, politics seems to be playing more of a role than some sort of singular military thinking. Lending support to the idea that the Communist Party of China has the country on the right course militarily, better than imagined, because it has not heavily invested in weapons technology as the US, could have simply been a manifestation the two colonels belief, trust in, and loyalty toward the decisionmaking of China’s leadership. L’élan de générosité des croyants. On the other hand, China has always lagged behind a bit with the US in terms of its own research, development and deployment of its “big weapons”. It appears the two colonels have gone a bridge too far in suggesting that China would only need to innovate and adapt by exploiting nonmilitary resources to surpass the US and drive it from the top of the world order. Under a totalitarian, Communist government system in which even the commas of a text would be repeatedly scrutinized, placating the leadership and Communist Party of China’s military thinkers by pandering would surely be de rigueur especially if one hopes to have a position in a bureaucracy, advance in it, or even more, stay healthy and safe. Robust expressions of appreciation and optimism over the decisionmaking of the Communist Party of China’s leadership are expected. Speaking truth to power is just not the norm in China. To that extent, as alluded to earlier, it is likely the two colonels were once more taking on the role of “justifiers” in that last passage.

The US Air Force F-22 “Raptor” Stealth Fighter (above). Spalding explains the authors of Unrestricted Warfare believe huge investments in cutting edge weapons as the F-22 was a misallocation of funds and a dangerous distraction from what really matters in international conflicts. To that extent, Spalding considers the idea that Donald Rumsfeld, US Secretary of Defense in the administration of US President George W. Bush fell into what the colonels saw as a self-made trap because his focus was on constantly improving US weapons systems in terms of accuracy and lethality, an approach called the Revolution in Military Affairs. On this point, politics seems to be playing more of a role than military thinking. The two colonels could possibly be lending support to the idea that the Communist Party of China has the country on the right course militarily, better than imagined, because it has not heavily invested in weapons technology as the US. China has always lagged behind a bit in its own research development and deployment of its big weapons.

Further criticizing the US weapons acquisition process, according to Spalding, the authors of Unrestricted Warfare further explain there is a general unwritten rule that an army fights the fight that fits its weapons. They assert that very often it is the case that only after a military acquires a weapon does it begin to formulate tactics to match it. They go on to say, with weapons coming first, there is a decisive, constraining effect on the evolution of tactics. However, as the Roman Emperor and Stoic philosopher, Marcus Aurelius Antoninus Augustus was quoted as saying: “Because your own strength is unequal to the task, do not assume that it is beyond the powers of man; but if anything is within the powers and province of man, believe that it is within your own compass also.” One only need consider how the thinking of commanders as Heinz Guderian on the use of tanks, or panzers in his case, impacted German military strategy and tactics through World War II. In 1937, when he was a relatively obscure officer in the German Wehrmacht, Guderian wrote Achtung-Panzer!: The Development of Armored Forces, Their Tactics and Operational Potential. It was a seminal text that pointed out that in the next war, the importance of the tank with the very crucial addition of motorized infantry had to be recognized by the German Army. After carefully studying armor for 15 years, he insisted through Achtung-Panzer! [Beware the Tank!] that if tank forces were “full of verve” and “fanatically committed to progress” they would “restore the offensive power of the army.” Such ideas were adopted by the German Army, the result of which would be laying the foundation for the German Blitzkrieg. Such was the revolution on the battlefield Guderian had envisioned. He was given the opportunity to put his ideas into effect. Guderian commanded the XIX Corps during the invasion of Poland in 1939 and France in 1940, and commanded Panzergruppe Guderian during Operation Barbarossa, the invasion of Russia in 1941.

Similar thoughts were espoused by other military thinkers in the West between the world wars who influenced the way World War II fought and won. then US Army Colonel George S. Patton published a piece entitled,“Tanks in Future Wars”, in the Cavalry Journal (May, 1920), pages. 342-346, in which he explained the War Department must focus on tanks as an armored force and not place them piecemeal among infantry and artillery. He concluded, “The tank corps grafted onto infantry, cavalry, artillery, or engineers will be like the third leg of a duck; worthless for control, and for combat impotent.” Reportedly, Patton was immediately told to cease and desist by the powers that were if he wished to have a career in the US Army. Patton famously led the US 3rd Army on its armored and mechanized rampage through France in 1944 and its drive into Germany in 1945. Captain Dwight Eisenhower, wrote a piece for the Infantry Journal entitled, “A Tank Discussion,” (November 1920), pages 453-458, in which he sought to make the case for keeping tanks as part of the equipment of the infantry units. Eisenhower became the Supreme Allied Commander in Europe and great say in how the war was fought in Europe. In the United Kingdom, Captain B. H. Liddel Hart and Brigadier J. F. C. Fuller also mused about a revolution in armored warfare after World War I recognizing how the nature of warfare had changed with the introduction of the airplane, poison gas, and longer range artillery, and that machinery was stronger than wool. The British Army was experimenting with armored units under General Percy Hobart beginning in the 1920s. (In 1926, Fuller who served in the Tank Corps in World and participated in both the Battles of Arras and Cambrai, was given command of an Experimental Force (Tank)  brigade at Tidworth, on the Salisbury Plain. He ran into some difficulties while there.)

After examining in the round the situation of US and NATO Allies in Western Europe which faced a massive Warsaw Pact force in the East and thoroughly reviewing the US military experience in Vietnam, in the late 1970s and early 1980s US military theorists and planners sought to move away from the notion of fighting a battle of attrition, hoping to hold the line against an armored and mechanized heavy surges across the. Inner-German Border into the North German Plain, the Fulda Gap, and the Hof (Hessian) Corridor. They developed the Airland Battle concept which included an emphasis on maneuver, the operational art, high-mobility, high-tempo operations, innovation, flexibility, agility, capabilities, and military acumen, leadership, intimate knowledge of the battlefield, enhanced command, control, communication, and intelligence, the attack in depth, firepower, greater lethality, and the better use of existing weapons systems and the introduction of new, more capable weapons systems with the belief that they would have a considerable multiplier effect on the battlefield.  Notable among those weapons systems were the F-15 Eagle fighter, F-16 Falcon fighter, A-10 close support fighter, M270 MLRS (Multiple Launch Rocket System), the UH-60 Blackhawk helicopter, AH-64 Apache attack helicopter, the M1A1 Abrams main battle tank, the M2 and M3 Bradley fighting vehicles, the HMMWV (Humvee), and many more pieces of impressive gear. Later would come rather exquisite weapons systems such as the F-117A “Nighthawk” Stealth fighter and the E-8A Joint STARS (Joint Surveillance Target Attack Radar System). Special operations forces would be better developed in order to successfully engage in direct action behind opposition lines and alongside allied forces, and provide security for critical facilities and equipment and engage in other sensitive missions. The Airland Battle concept was manifested in the US Army’s formidable FM 100-5 Airland Battle Strategy.

For all of the advanced military thinkers mentioned and beyond, it was more often not an easy route to establish a strategy-resources match. They, too, were voices crying in the wilderness in the beginning. However, they managed to get the right attention. Through research, testing, and applying lessons learned from every failure, their theories were validated, the right weapons were procured, and the result was success in its use, though not completely successful for some as Guderian, fortunately for the world, given the politics of his country and the off-kilter way higher authorities prosecuted the war in which they were used. The renowned poet of Ancient Rome, Publius Ovidius Nāsō, known as Ovid (43 B.C. – 17 A.D.) wrote: Cui peccare licet, peccat minus. (Who is allowed to make mistakes, makes fewer mistakes.) In the environment in which the two colonels functioned, it is apparent that creating a theory on war then hoping funds would be  appropriated for their development was unheard of. It is hard to imagine some burgeoning, truly innovative military thinker in China leaping up to suggest ways of fighting wars that were beyond what was immediately understandable to superiors, required the use of weapons systems China did not have, and would have called for massive expenditures on defense.

General Heinz Guderian (top) in a half-track modified for use as a mobile command center during the Battle of France, 1940. According to Spalding, the authors of Unrestricted Warfare explained the general unwritten rule is that an army fights the fight that fits its weapons. They further assert that very often it is the case that only after a military acquires a weapon does it begin to formulate tactics to match it. They go on to say, with weapons coming first, there is a decisive, constraining effect on the evolution of tactics. One only need consider how the thinking of commanders as Heinz Guderian on the use of tanks, in his case, panzers, influenced German military strategy and tactics. In 1937, when he was a relatively obscure field officer in the German Wehrmacht, Guderian wrote Achtung-Panzer!: The Development of Armored Forces, Their Tactics and Operational Potential. It was a seminal text that pointed out that in the next war, the importance of the tank with the very crucial addition of motorized infantry needed to be recognized by the German Army. His ideas were adopted, they would serve as the foundation for the German Blitzkrieg. Such was the revolution on the battlefield Guderian had envisioned.

Spalding repeatedly remarks that in this chapter of Unrestricted Warfare, the two colonels rebuke the practice of developing weapons to meet the requirements of a theory for a new tactic, doctrine, or grand strategy. The two colonels began to sound more as cynics as Spalding quoted their reflections on US weapons systems design. It seemed more of the same self-serving perspectives seemingly aimed at placating the Communist Party of China. Perhaps coming across weapons systems then being forced to find ways to use them is a problem faced by the armed forces of countries which “garner” foreign military technologies and research, development, and plans by clandestine means.

There are points on which Spalding apparently fully agrees with the two colonels’ assessments. He stated that in Somalia, for the first time in history, unilateral access to superior weapons technology stopped conferring a big advantage to the dominant power. Spalding quotes from Unrestricted Warfare: “Customizing weapons systems to tactics that are still being explored and studied is like preparing food for a great banquet without knowing who is coming, where the slightest error can lead one far astray. Viewed from the performance of the US military In Somalia, when they were at a loss when they encountered Aidid’s forces [the ragged gunmen of warlord Mohammed Aidid, who tried to force foreign troops out of Somalia in the early 1990s], the most modern military force does not have ability to control public clamor, and cannot deal with an opponent who does things in an unconventional manner.” Far be it for greatcharlie to serve as an ideal apologist for the US armed forces over Somalia, Afghanistan, or Iraq–it lacks the faculty, but casting ones mind back, one might recall the outcomes of those campaigns were determined more by resources made available, how resources were utilized, and how those campaigns were fought, than by the nature of the varied resources of the US armed forces themselves. Spalding goes on to say the US nuclear arsenal would be useless in small-scale deployments as Somalia and in the counterinsurgency campaigns in Afghanistan and Iraq. Cutting edge conventional weapons developed via Rumsfeld’s Revolution in Military Affairs would also have little effect according to Spalding.

However, looking at the matter realistically from the two colonels’ position, applying China’s abundance of certain nonmilitary resources much as weapons was,  for so long, the only prospect China had for possibly defeating a larger, more powerful, more advanced industrial power as the US. The US had choices concerning the development of weapons system and strategies, China really did not. Interestingly enough, if the matter were considered forthrightly, those resources in abundance which are discussed in Unrestricted Warfare were resources already in existence. Thus, the beyond-limits combined war concept was developed around those abundant resources. As with any theory, the colonels could hardly have been certain that the application of these resources would yield all the desired results.

French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Spalding notes in this chapter that through beyond-limits combined war, China has been acquiring technology without paying a cent toward developing it, carefully taking control of the world’s shipping businesses, infiltrating US corporations and scientific laboratories, using US investor dollars to finance its factories and companies-and then insisting that any profits stay in their country. However, in War Without Rules, Spalding has spotlighted China’s ongoing open and clandestine efforts to implement beyond-limits combined war. To that extent, the prospect that China might quietly succeed completely as originally envisioned ostensibly no longer exists. There is time for the US and other industrialized powers to put things right, but no time to waste. An array of defenses can be further organized and calibrated to thwart China’s beyond-limits combined war.

As War Without Rules was written before the Russian invasion of Ukraine, Spalding writes about nuclear weapons arsenals without knowledge that Russian Federation President Vladimir Putin now speaks of using them to respond what he perceives as the US and NATO’s attempt to conquer Russia, rob it of resources and squeeze it to death, much as its was outlined in what is known commonly as the Gerasimov Doctrine. The US faces the real prospect of having to use its nuclear weapons in response to a strategic attack from the Russian nuclear triad. Spalding writes that for superpower as the US, the only real value of the nuclear triad now is as a deterrent. China understood this early on and mostly stayed out of the nuclear arms race during the Cold War. Until recently, the Communist Party of China chose to maintain a minimal nuclear arsenal, just enough to deter any other nation’s potential nuclear strike. By keeping its stockpile modest and its nuclear budget limited, the Chinese avoided the massive expenses that helped bring down the Soviet Union. However, as their wealth has grown, the Chinese have added to their nuclear stockpile, creating alarm and some confusion among Western analysts. 

Spalding, laying his thinking process bare for the world to read, asks the following questions: Are new silos and warheads just a deepening of their deterrence or is this a change of strategy  in creating an offensive nuclear capability? Is it perhaps a ruse, with empty silos or hollow missiles meant to provoke the US and others to waste yet more billions? Mais dans nos cœurs, nous n’y croyons pas complètement. From the colonels perspective in 1998, nuclear war is obsolete, but this may be an area in which the Chinese leadership has moved beyond that notion.” Spalding then adds, “And even if they are simply increasing their deterrence, does that mean we have to increase our lethality.”

Earlier in this very same chapter of Unrestricted Warfare, Spalding notes how the colonels warn against making statements and acting in ways concerning weapons systems development and deployment which can up the ante with an opponent and result in unforeseen negative consequences. Spalding includes the following passage from Unrestricted Warfare: “Marshal [sic] Olgarkov, the former chief of the Soviet General staff [Nikolai Olgarkov was chief of staff from 1977 to 1984], was acutely aware of the trend of weapons development in the “nuclear age” and when, it an opportune time, he proposed the broad new new concept of the “revolution in military technology,” his thinking was clearly ahead of those of his generation. But being ahead of his time in his thinking hardly brought his country happiness, and actually brought about disastrous results. As soon as this concept . . . was proposed, it further intensified the arms race which had been going on for some time between the United States and the Soviet Union. It was just, at that time, no one could predict that it would actually result in the break up of the Soviet Union and its complete elimination from the superpower contest.” It does not appear China will disintegrate as a result of increasing its nuclear arsenal. However, from what the colonels emphasize here, it is unlikely the Communist Party of China is bluffing, playing some game, by investing in the construction of nuclear missile silos, intercontinental ballistic missiles, and a far greater sea launched ballistic missile capable submarine fleet.

Chapter 7: “America’s Weakness”

Spalding begins Chapter 7: “America’s Weakness” explaining that in Unrestricted Warfare, the two colonels were diligent students of the US military. When they performed a post-mortem of the first Gulf War, and discovered a number of missed opportunities by the US that were considerable. What caught his attention was the view of the two colonels that US bombers were used in the war that were nothing less than “flying mountains of gold” which they also said made the US arrogant while they exposed the morbid US fear of casualties as a fundamental weakness. Spalding cites the following passage from Chapter 4 of Unrestricted Warfare: “Large-scale use if costly weapons in order to realize objectives and reduce casualties without counting costs–the kind of Warfare that can only be waged by men of wealth-is a game that the American military is good at. ‘Desert Storm’ manifested the Americans unlimited extravagance in war, which has already become an addiction. Airplanes which cost an average of US$25 million each carried out 11,000 wanton and indiscriminate bombings in a 43-day period, destroying the headquarters of Iraq’s Socialist Party with each US$1.3 million Tomahawk guided missiles, taking aim at foxhole with precision guided bombs worth tens of thousands of dollars . . . even if the American generals knew as soon as they began that they need not spend so much on this unrestrained US$6.1 billion dollar battle banquet . . . their own extravagance would still not have been prevented. An American made bomber is OK Ike a flying mountain of gold, more costly than many of its targets. Shouldn’t hitting a possibly insignificant target with tons of American dollars arouse people’s suspicions?”

Spalding states that although Unrestricted Warfare was published four years before what he calls Gulf War Two, that war’s mismanagement and heavy price in lives and dollars is something they could have predicted. He notes that it began with the same intensity of the first Gulf War, routing the overmatched army of Iraqi President Saddam Hussein rapidly. However, he say what came next, an asynchronous guerilla war fought by remnants of the Iraqi Army along with what he says the colonels would call non-state actors. The mission of the US opponent was to kill US soldiers and create a body count that the US public would not tolerate.

Here once again, the colonels offer the more of the same self-serving perspectives seemingly aimed at placating their commanders in the PLA. Spalding notes as much in this chapter stating:  “These are military men, writing first to a military audience.” The two colonels also again do their level best to establish a clear pattern of purpose and consistency in everything done by the Communist Party of China. Surely, the US spends great amounts on defense. Political leaders have sought to address the problem with defense contractors. Still,, survivability of US soldiers, airmen, sailors, and marines is put at a premium. Survivability of the planes they fly,, the ships in which they sail, and tanks in which they fight is an important factor in weapons system research and development. However, at the point in China’s defense development, the leadership was hardly interested in doing the same. This of course left the PLA far less advanced and in fact underdeveloped as a force. The implications would most likely have been dreadful for Chinese troops if they had been asked to fight in the army they had against an advanced industrial power or powers. More than anything else, this chapter of Unrestricted Warfare as with others, is window into the breast of two Chinese Communist military apparatchiks.

Two PRC PLA Navy Upgraded Type 094A Nuclear Submarines underway (above). Spalding writes that for a superpower as the US, the only real value of the nuclear triad now is as a deterrent. China understood this early on and mostly stayed out of the nuclear arms race during the Cold War. Until recently, the Communist Party of China chose to maintain a minimal nuclear arsenal, just enough to deter any other nation’s potential nuclear strike. By keeping its stockpile modest and its nuclear budget limited, the Chinese avoided the massive expenses that helped bring down the Soviet Union. However, as their wealth has grown, the Chinese have added to their nuclear stockpile, creating alarm and some confusion among Western analysts. Spalding asks the following questions: Are new silos and warheads just a deepening of their deterrence or is this a change of strategy  in creating an offensive nuclear capability? Is it perhaps a ruse, with empty silos or hollow missiles meant to provoke the US and others to waste yet more billions? From the colonels perspective in 1998, nuclear war is obsolete, but Spalding says it is possible that China’s leadership has moved beyond that notion.

Further focusing singly upon the US military with regard to the overall picture of US national security, Spalding indicates the two colonels use beyond-limits combined war as measure to gauge the development of US theory on warfare. Spalding cites a passage from Chapter 4 of Unrestricted Warfare which says the following: “Formulation of the ‘joint campaign’ originally came from the ‘Number One Publication in November 1991 of the United States Armed Forces Joint Operations’ regulations issued by the US Military Joint Conference . . . This regulation exposes the four key elements of the ‘joint campaign’ –centralized command, equality of the Armed Forces, complete unification, and total depth while doing battle. It has made clear for the first time the command control authority of the battle zone unified commander; it has stipulated that any one military branch can 5ake a leading role based on different situations; it has expanded air/ground integrated battle’ into ground, sea, air, and space integrated battle; and it has emphasized implementation of total depth while doing battle on all fronts.” Citing the colonels further, they go on to explain: “The limitations of this valuable thinking , however, lies in that its starting point and ending point have both fallen onto the level of armed force and have been unable to expand the field of vision of ‘joint’ to all of the realms in which humans can produce confrontational behavior. Surely, this a direct reference to their idea of weaponizing almost every enterprise and endeavor in which China can come into contact with the US.

Pushing ahead, the two colonels consider total dimensional warfare, a theory bandied about in the US Army’s Training and Doctrine Headquarters concerning non-military combat operations and referenced the 1998 edition of the compendium, The Essentials of War, which emphasized “a single principle covering all types of the Amy’s military operations.” Spalding quotes them as writing: “Their practice [the US Army] is to no longer distinguish between non-combat operations and general military operations, but to differentiate battle operations into four types–attack, defense, stabilization, and support–and return the original manuscript to such responsibilities of non-combat operations as a rescue and protection and reassembling the old set of combat operations, in order to . . . altogether discard the concept of “total dimensional warfare.” In evaluating their own imperfect assessment of thinking in the US Army which they apparently conflate with thinking across the board in the US Armed forces and the US Department of Defense, Spalding further cites the two colonels as saying: At face value, this a move of radical reform and simplification by simply cutting the superfluous. In reality, however, this is . . . poor judgment. At the same time as the theoretical confusion brought by the unripe concept of ‘non-combat military operations’ was eliminated, the rather valuable ideological fruits that they had accidentally picked were also abandoned on account of the newly revised compendium. . . . Further criticizing the thinking of US military thinkers, the two colonels admonish: ” ‘Total dimensional war’s’ understanding of battle is already much broader than any previous military theorist, but as far as its innate character is concerned, it still has not escaped the ‘military’ category. For example, the ‘non-military combat operations’ concept . . . is much broader in meaning than military operations and can be placed along with comparable war realms and patterns outside the field of vision of American servicemen. It is precisely this large domain that is the area for future servicemen and politicians to develop imagination and creativity–with the result that it also cannot count as truly meaning ‘total dimensional.’ “

In evaluating what the two colonels have stated, Spalding interestingly states in agreement that just considering warfare from the point of view of the application of military force is insufficient. He points out that from his experience on the Joint Staff at the Pentagon that a US President “has numerous levers of power under his control, which can easily lead to overreliance on military options.” Going further he states: “At the end of the day, our system is still geared to leaning on the military and hard power as our best deterrent. That leaves the rest of the playing field open to the Chinese way of war.

All the ways in which that Spalding says China has engaged as beyond-limits combined war–taking every enterprise and endeavor in which one country can come into contact with another, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational, and weaponizing them–would be activities that fell in the province of a country’s intelligence services. Intelligence services engage in a incredibly broad array of both open and clandestine, and covert activities, using appropriated tools and available resources, to create or exploit opportunities to act in support of the policies and the interests of their countries. Legions of agents or operatives are recruited by intelligence services worldwide to work to meet collection requirements and otherwise in various fields and in a multitude of organizations too large for most services to maintain sufficiently trained staffs of professional officers and agents to cover. Recruited spies are selected for their facilities and tabs are kept on the lot of them in reasonable, undetectable ways to avoid the potential double-cross. The Roman historian and politician, Publius Cornelius Tacitus, known as Tacitus (c. A.D. 56 – c. A.D. 120), remains widely regarded as one of the greatest Roman historians by modern scholars. His final work, Annales (The Annals) is a history of the Roman Empire from the reign of Tiberius to that of Nero, the years A.D. 14–68. In Book I, chapter 58, he writes: Proditores etiam iis quos anteponunt invisi sunt. (Traitors are detested even by those whom they prefer.)

The weaponization of the ordinary, the day-to-day, in the intelligence world has been taken to extremes in the spy genre of film, particularly with the series, “James Bond” in which a shoe would become a telephone, a pen would become a pistol, a car would become a submarine, and so on.

It is understandable that China’s state-run and private sectors would work together to act against foreign opponents and imaginably even friends. It would appear from Unrestricted Warfare  and War Without Rules they call it beyond-limits combined war. Cynics might make the case that Spalding has gone a long way in War Without Rules to make what is actually rather mundane appear novel and intriguing. On a more practical level, and to avoid unnecessarily offending any US or foreign intelligence service, the operations of the erstwhile foreign intelligence service of the Deutsche Democratische Republik (German Democratic Republic, also known as East Germany or GDR) during the Cold War are discussed here to provide an example of an intelligence service engaged in beyond-limits combined war.

Generaloberst Markus Wolf, chief of the erstwhile German Democratic Republic’s (East Germany’s) foreign intelligence service, Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance). All the ways in which that Spalding says in War Without Rules that China has engaged as beyond-limits combined war–taking every enterprise and endeavor in which one country can come into contact with another, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational, and weaponizing them–would be activities that fell in the province of a country’s intelligence services. For instance, East Germany’s foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), with frightening efficiency, operated against its Western opponents to collects as much information possible in preparation for any conflict in Europe between East and West, and be in position to potentially break down the societies of the Eastern Bloc’s opponents from within. Throughout the Cold War, his agents poured into West Germany and when possible countries beyond, secured key positions, and reported on, and influenced the activities of, a multitude of organizations in a broad spectrum of areas, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational.

For 34 years, Generaloberst Markus Wolf was the very successful head of GDR’s foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA. With frightening efficiency, he developed an array of tactics, techniques, procedures and methods for operating against his Western opponents in advance of any eventual conflict in Europe between East and West, or to break down the societies of opponents of the Eastern Bloc. Throughout the Cold War, his agents poured into West Germany and when possible countries beyond, secured positions, reported about, and influenced the activities of a multitude of organizations in a broad spectrum of areas, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational. 

Wolf described the work in his memoir, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997). In Chapter 4, he recounts the process of penetrating non-military combat targets for exploitation. He explains: “Once accepted in West Germany, agents usually began their assignments with an inconspicuous period of manual labor to help overcome the bureaucratic barriers of getting established in the West. We therefore preferred candidates with craftsman’s skills or practical experience in a profession. Almost every one of the students and budding scientists who emigrated in the early years found employment in research facilities or companies of interest to us–the Federal government’s nuclear research facilities in Julich, Karlsruhe, and Hamburg; the Batelle Institute in Frankfurt-am-Main, which had been set up by the United States; Siemens, Germany’s largest electronics company; and IBM Germany or the giant German chemical companies BASF, Hoescht, and Bayer. Because we assumed that Germany’s traditional arms manufacturers would–after the storm over German militarization died down–eventually resume military production, we also placed people in companies such as Messerschmidt and Bölkow.” With specific regard to the controllers, they were not mere handlers of spies in the West but expert psychologists who prided themselves on their close personal ties to their charges on the ‘invisible front’.” (For those interested in more on Wolf and the HVA, see the November 13, 2019 greatcharlie post entitled Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997) for a bit more detail on the matter.)

As a brief thought, perhaps some push back would have been caused in the minds of two the colonels if they had been made aware of the fact that the US Intelligence Community includes a number of organizations from the armed forces and the Department of Defense, to include the US National Security Agency, and human intelligence elements that are staffed in great measure by US military personnel and led by military commanders. From that fact, perchance they would even admit that the US armed forces for quite some time, have been engaged to some degree in beyond-limits combined war worldwide.

Chapter 11: “Fighting Back with New Rules”

In Chapter 11: “Fighting Back with New Rules”, Spalding unleashes one insight after another on how the US should respond to beyond-limits combined war. He explains the US needs a defense to meet an offensive we are only beginning to understand beyond-limits combined war. China is quite different as an opponent than the Soviet Union because it has become the factory of the US providing cellphones to toys. Through its theft, China is becoming competitive in the most high-tech areas such as super computing and artificial intelligence. They have a space program and a rapidly growing military. They have suddenly developed a nuclear arsenal that could potential match that of the US.

Taking lessons from Unrestricted Warfare, Spalding writes the US can begin to exploit a range of economic problems. China has a government of one man, one rule which has never worked. He says world opinion is turning against China due to its blatant aggression. He suggests the same principles of Sun Tzu which the authors of Unrestricted Warfare espoused, should be used to respond to the strategy: Know the face of war: it is combined, unrestricted war that seeks victory through no violent means, but does not rule out violence; Know your enemy, his strengths and weaknesses; Join your forces to meet the threat: create one-mindedness”. Focusing the many parts of our government on the single objective of stopping China is essential; and, The people must be in harmony with their leaders.

Spalding says the US needs to map out a globally inclusive strategy built on three pillars: protect, rebuild, and inspire. These three pillars would found a robust effort to reshape the international order away from the totalitarian form of government upon which China is built and wants to impose on the world and toward the promotion of human rights, democracy, civil liberty, rule of law, and economic prosperity. Exploitation of labor and environmental challenges must also be confronted as global supply chain reorient to nations that support competitive markets, strong labor protections and environmental standards. 

Protect

Refine and export tools that encourage those nations that play by the rules of fair and open markets to tighten collaboration in economic, financial, trade, and information flows. The ability of rule breakers to use the US and partner countries to exploit the free system’s near open borders to avoid tariffs and other protections. Examples Spalding provides for such activity includes: making tariffs permanent for the Communist Party of China-led economy and contingent upon an annual vote in the US Congress,  which would consider whether China is a human rights violator and if it has a market based economy. On finances, he suggests the US Department of Labor allow every person in the US who participates in a public or private pension fund to opt out of sending their investment dollars to China and designate that portion of their funds be invested manufacturing in their local communities.

Rebuild

Spalding recommends a massive movement in fiscal spending “away from guns toward butter.” By focusing on infrastructure, our industrial base, energy, STEM education, and research and development, the US will rebuild its core economic and science and technological superiority to lead the world once again. Explaining that idea, Spalding says $100 billion from the defense budget could be shifted to a massive research and development and reindustrialization effort focused on quantum computing, artificial intelligence, machine learning, 5G and telecommunications, “the internet of things”, nuclear and carbon-free energy, data science, cryptocurrency, biopharma, robotics, logistics, manufacturing, and transportation. Those investments would be protected with a robust counterintelligence program designed to ensure the benefits of these investments only accrue to the US and its allies and partners.

Inspire

Spalding states that the US should join with “developed” allies and partners to create a strategic economic development plan that seeks to promote collective economic prosperity tied to democratic principles. He proposes that idea be brought to fruition via the creation of an organization able to work with like-minded developed countries to identify and promote the economic prosperity and institutional integrity of like-minded developing partners. 

Among further recommendations in this province, Spalding says a Global Development Fund for Democratic Infrastructure Investment should be developed with a mandate to analyze the global trading routes and infrastructure to invest in a robust, resilient international logistics architecture, which would promote free trade, secure and verifiable customs procedures, and the collective economic prosperity of like-minded countries. Attendant to that, he states an international data-tracking system should be developed to inform where the US, allied countries, and their respective companies are investing to assist smaller companies and institutional investors to allow them to take advantage of the accompanying economic growth prospects. Spalding feels that by linking “a resurgent economic and science and technological powerhouse” with democratic-allied and partners countries, the US will forge a new consensus, which will begin to drive positive outcomes in international institutions such as the UN and World Trade Organization. Together, this coalition of free countries with strengthened economic, financial, trade, and informational ties, girded with a robust military alliance focused on deterrence, will fuel a rebound in the growth of democracy around the world 

Spalding insists that there are many specific actions that extend from those strategic concepts that cover all aspects of US society. He concisely examines a few realms among which those actions could occur: political; economic; diplomatic; information; education; military; consumers; and voters.

As it is generally taught in US military educational institutions, for the US to achieve optimal outcomes following a military conflict–in the case with China, non-combat military operations, it must converge all four elements of national power—diplomacy, information, military, and economics (DIME)—into a cohesive, multi-domain campaign plan before, during, and following military confrontation. Here are Spaldings recommendations that concern those elements.

Diplomacy

Spalding praises the Quadrilateral Security Dialogue (Quad Alliance: US, Japan, Australia, India) As a strong deterrent to Chinese aggression. It can be strengthened and expanded. As large as Chin’s military might is, when combined with the US, the countries of Asia including South Korea and Vietnam are more than a match. He calls the Australia, United Kingdom,, US (AUSKUS) Agreement an important step in linking the US, United Kingdom and Australia in more than a mere military alliance. The sale of US nuclear submarines to the Australians is an action the Chinese colonels would admire if grudgingly. It draws a line in the sand declaring that China’s actions will be countered. Spalding believes the agreement and the sale have the effect of forcing allies who have maintained close ties economically to China to choose sides. Spalding says the decision really boils down to whether the would prefer to have the US military or the PLA defend their interests in Asia.

US President Joe Biden announcing the AUKUS pact and nuclear submarine deal on September 15, 2021. On screen for their respective announcements on the pact and deal are United Kingdom Prime Minister Boris Johnson and Australian Prime Minister Scott Morrison in Canberra. Spalding calls the Australia, United Kingdom, US (AUSKUS) Agreement an important step in linking the US, United Kingdom and Australia in more than a mere military alliance. The sale of US nuclear submarines to the Australians is an action the Chinese colonels would admire if grudgingly. It draws a line in the sand declaring that China’s actions will be countered. Spalding believes the agreement and the sale have the effect of forcing allies who have maintained close ties economically to China to choose sides. Spalding says the decision really boils down to whether the would prefer to have the US military or the PLA defend their interests in Asia.

Information

Spalding notes one of the greatest successes of China has been the use of information warfare. To challenge that success, Spalding suggests the US government should encourage US-based social media companies to assist more robustly in countering Chinese Propaganda. Facebook, Google, Twitter, and others are committed to publishing accurate information. However, a constant flood of Chinese falsehoods, intended to create political dissension should fall well outside their guidelines. In more sophisticated realms, Spalding says the US needs to protect the next generation of data. For example, one key step the US should pursue is universal encryption. By ensuring that all data in a free society are encrypted, and by developing platforms that allow for safe processing of encrypted data, the West can successfully compete with China in artificial intelligence.

Military

Spalding recognizes that while the two colonels did not envision, at least I. Unrestricted Warfare, a Chinese military thar could confront the US, that day appears to be nearing. Still, he notes that the theory of Unrestricted Warfare is that military expansion is just a ruse to provoke even greater spending by rivals. Starting with their second rate aircraft carriers and the proliferation of missile silos that may or may not hold nuclear warheads, the Chinese military may be more Potemkin than not. On this point through his words, Spalding does not connect the cause for China’s military build up as preparation for the possible invasion of Taiwan. Still, Spalding says he believes China will make a move on Taiwan soon. That would require the US to plan the evacuation of Taiwanese civilians and resupply of Taiwan’s military as well as a plan to destroy the country’s high-tech manufacturing capabilities for computer chips.

Yet, Spalding says there remains some small wrinkle in his own thinking that says under Unrestricted Warfare, that the military invasion on the ground would be China’s last option given it has quite a few nonmilitary options at its disposal. If China truly seeks to avoid a shooting war, perhaps the leadership of the Communist Party of China might attempt to find satisfaction in peace.

Casting its mind back to the aforementioned Livy and his Ad Urbe Condita (From the Founding of the City) (c. 28 B.C.), greatcharlie is reminded of a passage in Book XXX, section 30, in which the historian presents the exordium of the Carthagian general before Roman generals whose forces werecamp outside of the city of Carthage, itself. He wrote: Maximae cuique fortunae minime credendum est. in bonis tuis rebus, nostris dubiis, tibi ampla ac speciosa danti est pax, nobis petentibus magis necessaria quam honesta. melior tutiorque est certa pax quam sperata uictoria; haec in tua, illa in deorum manu est. ne tot annorum felicitatem in unius horae dederis discrimen. cum tuas uires tum uim fortunae Martemque belli communem propone animo; utrimque ferrum, utrimque corpora humana erunt; nusquam minus quam in bello euentus respondent. non tantum ad id quod data pace iam habere potes, si proelio uinces, gloriae adieceris, quantum <dempseris>, si quid aduersi eueniat. simul parta ac sperata decora unius horae fortuna euertere potest. omnia in pace iungenda tuae potestatis sunt. (The greatest good fortune is always the least to be trusted. In your favorable circumstances, in our uncertain situation, peace, if you grant it, will bring you honor and glory;8 for us who sue it is necessary rather than honorable. Better and safer is an assured peace than a victory hoped for. The one is in your own power, the other in the hands of the gods. Do not commit the success of so many years to the test of a single hour. Bear in mind not only your own resources but also the might of Fortune and the impartial god of war. On both sides will be the sword, on both sides human bodies. Nowhere less than in war do results match men’s hopes. You will not add so much glory, if victorious in battle, to what you can now have by granting peace, as you will lose in case of any reverse. The fortune of a single hour can lay low honors already won, and with them those in prospect. In making peace.)

Economic

Spalding says that China has been getting away with so much for so long, forcing it to play by the rules will cause a shock. From the US side, Spalding explains that there are thousands of details that the US Department of Treasury and the US Securities and Exchange Commission could enforce. Congress has been aggressive about proposing new restrictions, such as requiring companies to certify that there is no forced labor in their supply chain. Spalding believes legislation is needed that will alter the view in the corporate sector that it is in its best interest to promote a country that defies free markets and the rule of law. Spalding says the US growth strategy must be looked upon as a matter of national security. US manufacturing that has gone overseas to China must be brought back.

To an extent, top US civilian authorities and military, intelligence, and law enforcement elements of the US foreign and national security policy bureaucracies as well as other policy circles–to include businesses, universities, think tanks, and news media houses, to name a few–are now regularly discussing the matter, at least publicly, displayed concern in studies and reports and more importantly in the spectrum of policy approaches toward China. He also had a haunting suspicion that very few were aware of what was happening. Far less aware of it all was the US public, going on day-to-day believing they were safe and secure from China and every other country for that matter, and the well-being of the country was in the diligent, conscientious, and thoughtful hands of their elected leaders.

Surely the dead-enders among some elected officials, China policy experts, and business executives of firms in the US well-tied and still benefitting immensely from China’s opportunities surely would rebuff what Spalding has been saying. Imaginably, some, perhaps hurt particularly by his insinuations of failing in their respective duties to place concern for their company employees and their country as paramount, would likely look upon him–perchance given what greatcharlie after many years has come to understand about human nature– disdainfully and mock him as something akin to the character of Scottish writer Kenneth Grahame’s The Wind in the Willows (1908), “Mr. Toad”  He writes: “The clever men at Oxford / Know all that there is to be knowed. / But they none of them know one half as much / As intelligent Mr Toad!

In more direct action, Spalding proffers in this section that the US should seek opportunities to counter China’s Belt and Road Initiative, through which it provides countries loans with the aim to gain political leverage. In many cases, countries that have defaulted on those loans have been left with no choice but to give China long-term access to mineral resources or their ports. Spalding calls it a form of economic colonialism which must be countered.

With regard the other 4 points in which he suggests action should be taken: political, education, consumers; and voters, Spalding says the following: 

Political

Spalding states plainly that the US Needs a single coherent team that would manage its opposition, China. He implores that it can no longer reside in twenty agencies. China comes at the US as one force, thereby, the US Needs to be one force to oppose it. He notes that ultimately, a decision on this matter must come from the US President, but the foreign and national security bureaucracies must go in on it, too.

Education

Spalding believes that there is great value in Chinese students’ coming to the US to study, but the system has been abused and needs to be tightened. However, he notes that the point of such exchanges is to encourage the Chinese to learn our values and way of life. The Chinese government has directed many instead to maneuver into positions from which they can steal US technology. Spalding feels the US government has some leverage on this matter as China does not have the capacity or quality of schools to educate the hundreds of thousands of top students that emerge from its secondary school system each year. He reports that US universities earn billions of dollars by admitting them. He insists the universities, themselves, need to do a better job of vetting who is allowed in, and the federal government probably needs to help. Spalding believes denying Chinese students access to any Chinese apps such as WeChat in the US is one solution. Those apps, he explains, are censored and curated by the Communist Party of China. Spalding says the Communist Party of China’s controlling links to the exchange students must be broken, otherwise they will end up doing its bidding without truly understanding or appreciating democracy. Subita causa, fellitur offectue. (Upon removal of the cause, the effect is removed.) 

Spalding notes that related to this is the growing number of academic espionage cases involving professors and graduate students stealing property. Although both Spalding in War Without Rules and greatcharlie earlier here noted that that US counterintelligence and law enforcement has been following China’s activities albeit all are elements of its beyond-limits combined war strategy, alas, effort to identify and neutral Chinese operatives and their networks have not gone so well. With each successful military and civilian intelligence, industrial, and private effort, and there have been far more than a few, the Chinese learn much about the US security measures and how to penetrate government bureaucracies and private organizations from defense contractors to elite universities. Through that incrementalist approach they have enabled themselves to act at will in the US, pilfering research and development and gaining access to US policy planning, contingency plans, and decision making. Some might state derisively that Beijing now knows more about what is transpiring within many US government bureaucracies, businesses, hi-tech firms, and universities than those who have worked in them for decades. The most apparent evidence of that is when equivalents planned products of sensitive and highly classified US research and development projects are constructed and almost mockingly displayed in official parades and technology fairs and conventions as China’s latest technological achievements. China is dead wrong for stealing industrial and high-tech secrets. However, the operational elements of foreign and national security policy bureaucracies of the US and its allies and partners are wrong for failing consistently over two decades to put a halt to China’s fruitful espionage efforts. Rather than reporting goose chases to headquarters, it appears some investigating agents more often press dead ends and repeatedly sift through the same dust, creating a type of self-inflicted wound to their respective organizations’ efforts. More than yielding nothing, such practices result in further darkening their powers to make headway on new cases by using lessons learned based on failures and looking at facts from new angles. 

It is difficult to discern just how much reliance Spalding would place in the US counterintelligence services and law enforcement to thwart China’s unrestricted warfare operations against the US in the various no military realms. To that extent, he rarely mentions them in War Without Rules. Perhaps something more might be read into Spalding’s final statement in this section, “Our counterespionage efforts have improved, but I suspect there is much more that can be done.” Perhaps it is useful to mention that in Chapter 3: “The Magic Shoes of Technology”, Spalding notes that in September 2021, the director of the Federal Bureau of Investigation Christopher Wray stated before the Congress regarding threats to the US that there were more than two thousand ongoing investigations into Chinese espionage in the US. Spalding quotes Wray as saying: “We’re opening a new investigation that’s tied back to China about every 12 hours, and it covers pretty much every sector of the economy in every state in the nation.” Spalding then writes: “The colonels who wrote Unrestricted Warfare would be proud.” (For more on the efforts by US counterintelligence services and law enforcement to fend off beyond limits combined war by China, see greatcharlie’s August 31, 2021 post entitled, “Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020))”.

Consumers

Spalding says once again here that US citizens must understand their country is at war with China. It is a war China started, and citizens must avoid doing anything that would make China stronger. He notes, given the fairly common reports in the newsmedia about human rights violations, that China”s actions must be opposed. However, opposing those violations is only one weapon to use against them. Spalding suggests boycotting Chinese products, and avoiding stores that do not sell alternatives made in the US and “democracy-friendly” countries. As War Without Rules was written before current high inflation levels were reached, Spalding suggests “paying a little more and buying a little less as long as products come from the US and reputable countries.”

Voters

Spalding makes the statement highlighted by another reviewer: “We should all be China hawks.” Out of fairness, one might better understand what Spalding meant with these words by citing added to them was a discussion of his concern over what those who seek political office have on their minds about China. He notes the governors have made all kinds of deals with China where the benefits unintended went one way. Spalding feels those whose actions support China over the US interests should be viewed as unpatriotic. That would be particularly true given China’s actions and intentions via unrestricted warfare, beyond-limits combined war. Spalding urges citizens to hold their elected representatives accountable. He albeit aggressively states that China’s actions should be presumed guilty until proven innocent, which is an idea most readers of War Without Rules who adhere to the precepts of the US Constitution, as greatcharlie, would likely feel uncomfortable with. Any pressure that the Communist Party of China can put upon political leaders through corporations that have business ties in China must be thwarted.

Spalding also has a section in this chapter entitled “What Does Victory Look Like?” In it, intriguingly, Spalding does not sound much as the warrior out for blood that some have portrayed him given what is written in this chapter. Rather than explain further, greatcharlie will allow readers to discover what he says and reach their own judgments. Ex inimico cogita posse fieri amicum. (Think that you may make a friend of an enemy.)

Nicolas Malebranche was a 17th century French Oratorian priest and rationalist philosopher. In his works, he sought to synthesize the thought of St. Augustine of Hippo and René Descartes, in order to demonstrate the active role of God in every aspect of the world. Reportedly, after Malebranche read Descartes’ Traité de l’homme, he turned towards a study of mathematics and physics. In his reaction to Descartes’ book is recounted: “The joy of becoming acquainted with so large a number of discoveries caused him such palpitations of the heart that he was obliged to stop reading in order to recover his breath.” Alas, greatcharlie will not go as far as to declare War Without Rules was the manifestation of Divine inspiration through Spalding. Still, as readers may have detected throughout this review, greatcharlie enjoyed reading every bit of the book. Thus, it should not come as a surprise that greatcharlie whole-heartedly recommends War Without Rules to its readers.

It is almost assured that after the first reading War Without Rules, one would most likely go back to the book and engage in that stimulating process repeatedly. There is no telling what insights and how many might be brewed up from within readers after they have had a chance to read through it. Hopefully Spalding will keep on writing books. While writing books may not be as enthralling to him as flying a B-2 Stealth bomber, he nevertheless, is damnably good at it. Vires acquirit eundo. (We gather strength as we go.)

By Mark Edmond Clark

Recherché Pieces of the Putin Puzzle That May Serve To Better Enable Engagement with Him as Either an Adversary or a Partner Regarding Ukraine

US President Joe Biden (right) and Russian Federation President Vladimir Putin (left). “What is your substance, whereof are you made, . . . .” Many Western governments view working with Putin on the Ukraine crisis, which they say he caused, as an undesirable task. Still, like it or not, that is the job at hand, and it can be successfully handled. Putin has some grievances, and says he wants to get them resolved. Standing strong and fast, assured of the correctness of one’s positions, is a fine thing. On the other hand, posturing, pride and ego, do a poor job at concealing insecurities. In this crisis, the elimination of insecurities on both sides will be central to its resolution. What needs to be created is a sustainable balance of power that advances US, United Kingdom, EU, Ukrainian, and the better parts of Russian interests to promote peace and security and foster collaboration. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Here greatcharlie hopes to assist those in US foreign and national security bureaucracies seeking to get a better handle on the Ukraine crisis, and gain greater clarity about Putin and his thinking.

With imaginable strain upon the national budget, Russian troops for the moment lie snug in the Winter weather in their homeland, still close enough to its border with Ukraine to unnerve those on that side. They are ostensibly the cudgel meant to induce the minds of leaders in Western governments–the US, United Kingdom, and the EU countries–to think Putin’s way on NATO’s “ceaseless” expansion toward its border. Putin’s demand to the West boils down to “Get out of my tree and stay out!” Things have not gone exactly his way so far, but perhaps to his satisfaction he has bathed in the sound of Western government voices and broadcast newsmedia, expressing shear terror and prognosticating war and doom in the meantime. Indeed, most Western governments believe that Putin intends to do a lot more than just build up military forces defensively and induce Western thinking to his like. Reportedly, multiple analyses of Western foreign and national security policy bureaucracies have concluded that he will definitely invade Ukraine. 

Surely, this has been a beast of an episode for the relatively fledgling, democratic government in Kyiv. One might posit that Putin’s presidency is the general misfortune of all countries neighboring Russia. The threatening, aggressive atmosphere is intolerable. They must reconcile to the universal order of nature. They have knowingly, comfortably organized middle grade armies to face a first class multidimensional military force, and they have left themselves in a state in which they could never see themselves winning without the US by their side. What beats the brains of decisionmakers in Western capitals is how to mitigate the danger in a sustainable way without disturbing the status quo much or at all. Concerns expressed in conference rooms on the top floors of the US foreign and national security bureaucracies might reasonably be that relaxation of the atmosphere may require taking Putin to the limit hoping he will choose peace and avoid the massive loss that would result from even a successful push into Ukraine. There is also the possibility that relaxation of the contentious atmosphere will not reverse ambitions in Moscow regarding Ukraine. Nevertheless, at some point after applying fears to hopes and hopes to fears, both sides will need to be flexible and to compromise, if either really wants to get anything out of the diplomatic process. New calculations must be made now on both sides if the aim is peace and stability. Qui totum vult totum perdit. (He who wants everything loses everything.)

To possibly assist the efforts of the US, and its allies also, to peer in on the other side to better understand Putin’s actions and intentions concerning Ukraine by stimulating ideas in others, in this essay, greatcharlie offers a few new ideas. They were inspired while preparing greatcharlie’s preceding January 25, 2022 post entitled, “Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help”. That post also offered suggestions for optimizing US-Russia diplomacy regarding the Ukraine crisis that matched the importance, enormity of the situation. Making the effort to stimulate new ideas sometimes requires stepping onto shaky ground. A few thoughts on possible steps and schemes of Putin, the course of things and thinking that may be hidden or most often excluded from analyses, are presented here. They were developed primarily in the abstract from evidence provided by official statements and newsmedia reporting. To an extent, thoughts offered might more aptly be described as intimations. Some facts uncovered and presented may appear odd, recherché, but nevertheless they were all gleaned from credible, often official sources made available to the public. Hopefully, that will not be a distraction for readers. To hold only to existing thinking on Putin is to cut oneself off from roads to understanding him and his decisions that might result through further examination. Facilius per partes in cognitionem totius adducimur. (We are more easily led part by part to an understanding of the whole.)

Putin (left) being interviewed by Le Figaro in the Russian Cultural Center in Paris on May 29, 2017. Reportedly, within the Russian government, there are varied theories held about the level of power US presidents have and theories that US presidents are under the control of groups of individuals in the background, some allege they are shadowy figures. To the extent this relates to US President Joe Biden, some of Putin’s advisers have also apparently been informed by stories from the US that say others act as a hammer to shape him into the instrument they want. During a June 11, 2022 interview in Moscow with NBC News, Putin again referenced, albeit vaguely,, unknown parties who he believes are iInfluencing perspectives of Russia’s bilateral relationships and himself. Putin stated: “Well, I don’t know. Somebody presents it from a certain perspective. Somebody looks at the development of this situation and at yours truly (THROAT CLEARING) in a different manner. All of this is being offered to the public in a way that is found to be expedient for the ruling circles of a certain country.”

Putin’s View of “Who Is in Charge” in Washington

If readers would bear with greatcharlie through these initial points, they will discover there is a method to what on the face of it recognizably appears as madness. Reportedly, within the Russian government, there are varied theories held about the level of power US president have and theories that US presidents are under the control of groups of individuals in the background, some allege they are shadowy figures. To the extent this relates to US President Joe Biden, some of Putin’s advisers have also apparently been informed by stories from the US that say others act as a hammer to shape him into the instrument they want. (That view nearly parallels the impression previous US administrations once held on Putin’s situation in Russia.) Without judgment from greatcharlie, claims of such an arrangement have been proffered by conservative commentators, particularly those appearing on Fox News. Reportedly, Fox News pundits have repeatedly pushed the theory that Biden is president “in name only” and that a group of progressives–initially said to be led by Vice President Kamala Harris and including former US President Barack Obama and former US Attorney General Eric Holder–are actually in control in Washington. How comments so outré expressed on Fox News, as well as others concerning the US administration found on online celebrity gossip magazines, blogs, websites, and YouTube channels, could find acceptance in Moscow is a curious thing. Perhaps the original hope among Russian officials was to sift through them to pick-up faulty scraps of “palace intrigue” with the correct degree of discernment was absent. Once such ideas are caught, despite all that is wrong about them, they often worm their way into analyses. They may appear as trifles, made imperceptible by the fact that they are notions too commonplace in the mind to raise concern. Nonetheless, they are damaging much as the microscopic virus that can fell a person in good health..

Russian theories concerning the power of the US President tend to be equally off-kilter. In an August 1, 2017 article, a journalist for Time, Simon Shuster, who served a stint in Russia, explained that “confusion over the limits on executive authority goes back to the early years of Putin’s presidency, when he established control over the Russian media and began to assume that his Western counterparts could do the same in their countries.” Pointing to the memoir of former US President George W. Bush, Decision Points, Shuster noted that during a discussion at a summit in 2005, Putin refused to believe that the US commander-in-chief does not have the power to muzzle journalists in the US. Bush quotes Putin as saying: “Don’t lecture me about the free press.” Referring to Dan Rather, formerly of CBS News, Putin continued, “Not after you fired that reporter.” Shuster further explained: “In Russian officialdom (and among the public generally) people often assume that the West functions a lot like Russia, with a tame judiciary, a subservient media and a ruling clique that pulls all the strings.”

However, the most shocking theory concerning “shadowy powers the run the US is that the ones who actually run the administration are more than simple advisers in the background receiving federal government salaries supposedly. On the official website of the Kremlin is the transcript of a May 29, 2017 interview Putin provided the French publication Le Figaro. In it, Putin depicts those who, in his view, pull the strings of US presidents. He states: “I have already spoken to three US Presidents. They come and go, but politics stay the same at all times. Do you know why? Because of the powerful bureaucracy. When a person is elected, they may have some ideas. Then people with briefcases arrive, well dressed, wearing dark suits, just like mine, except for the red tie, since they wear black or dark blue ones. These people start explaining how things are done. And instantly, everything changes. This is what happens with every administration.” Putin went on to say concerning US presidents: “Changing things is not easy, and I say this without any irony. It is not that someone does not want to, but because it is a hard thing to do.” During a June 11, 2022 interview in Moscow with NBC News, Putin was told Biden viewed him as a leader of autocrats, who is determined to undermine the liberal democratic order. The interviewer asked Putin if it was true. In response, Putin vaguely referenced unknown parties who he believes are iInfluencing perspectives of Russia’s bilateral relationships and himself. Putin stated: “Well, I don’t know. Somebody presents it from a certain perspective. Somebody looks at the development of this situation and at yours truly (THROAT CLEARING) in a different manner. All of this is being offered to the public in a way that is found to be expedient for the ruling circles of a certain country.”

Concerning thoughts in the West on Russian views of how the US President in handling the Ukraine crisis, there was a considerable uproar heard worldwide, particularly in the newsmedia and expectedly from his political adversaries in the US, over how Putin might perceive and respond to a statement Biden made during his January 19, 2022 press conference at the White House. To many ears, Biden appeared to suggest that the US and its allies may not act strenuously to what he called a “minor incursion” into Ukraine. In fairness to Biden, presented here are comments in some detail to a question concerning the Ukraine crisis and whether the US and its allies were willing to put troops on the line to defend Ukraine, whether the US and its allies can agree on a sanctions package, and whether the threat of new sanctions would give Putin pause. BIden explained: “Well, because he’s never seen sanctions like the ones I promised will be imposed if he moves, number one. Number two, we’re in a situation where Vladimir Putin is about to–we’ve had very frank discussions, Vladimir Putin and I.  And the idea that NATO is not going to be united, I don’t buy.  I’ve spoken to every major NATO leader.  We’ve had the NATO-Russian summit.  We’ve had other–the OSCE has met, et cetera. And so, I think what you’re going to see is that Russia will be held accountable if it invades.  And it depends on what it does.  It’s one thing if it’s a minor incursion and then we end up having a fight about what to do and not do, et cetera. But if they actually do what they’re capable of doing with the forces amassed on the border, it is going to be a disaster for Russia if they further ingra–invade Ukraine, and that our allies and partners are ready to impose severe costs and significant harm on Russia and the Russian economy.

Damnant quod non intellegunt. (They condemn what they do not understand.) It was determined on the face of it that with those words, “It’s one thing if it’s a minor incursion,” Biden opened the door to a Russian incursion into Ukraine. There was alarm over how Putin would react. The newsmedia in the US and worldwide laid it on thick, denouncing and condemning Biden for doing far more than giving away the store. Reporters and commentators put their art of communication into providing drama, much as Rembrandt in his works, to convince that Biden somehow worsened the crisis. That was hardly valid thinking. Their forecasts did not bear out. Russian forces did not move a jot in Ukraine’s direction en masse or piecemeal, nor was the deployment of them dramatically increased. Biden would not speak idly on such a grave matter. Recognizably, Biden erred to the extent that he offered a trifle, a glint from the discussion in the backroom, that turned out to be too much information for a world ready to react with opinions on what most appear to know too little about. Even the most experienced can learn lessons on matters they have known well for a long-time. Yet, in fairness to Biden, he may have had good reason to say what he did.

While satellites and other technical means are providing streams of intelligence on the day-to-day activities of their presumed opposition Ukrainian forces, there have no doubt been occasions when Russian intelligence units have gone on forays into Ukraine to take a good look, a “shifty,” to confirm what is known or find out if anything has not been discern imagery or other information. Special reconnaissance missions are likely being performed by the Generalnogo Shtaba Glavnoje Razvedyvatel’noje Upravlenije (Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation) or Glavnoje Razvedyvatel’noje Upravlenije (Main Intelligence Directorate) or GRU Spetsnaz (special operations units), Spetsnaz of the 45th Independent Guards Reconnaissance Brigade of the Vozdushno Desantniye Voyska (Russian Airborne Forces) or VDV, and even reconnaissance units of Russian Federation Army formations. Special reconnaissance missions typically include penetrating deep behind opposition lines to engage in the covert direction of air and missile attacks, place remotely monitored sensors, and prepared the ground for other special operations troop who might engage in direct action against the opposition and unconventional warfare, to include guerrilla operations and counterinsurgency operations. On special reconnaissance missions in Ukraine, Spetsnaz might be tasked to move a little bit deep into the country to determine what activities are being conducted at certain highly secured military facilities, locate new weapon systems that have been deployed, locate and assess newly constructed defenses, monitor troop movements, locate and monitor foreign military advisers possibly operating in the Donetsk and Luhansk and Ukrainian military officers and other foreign military officials of interest.

Scouts from Russian Federation Army reconnaissance units at a minimum would do the following: investigate the quality and size of enemy units; report on all activities of opposition units observed; report grid coordinates of opposition units. (If opposition units are moving, determine whether they are advancing of withdrawing and what routes they are using; determine which opposition military units or civilians are performing an activity, collecting information on uniforms, patches, any unit designations and features of civilians; report which opposition units were engaged in a particular activities; and, collect specifics about opposition units and their activities, detailed information with descriptions of tactics used, equipment and gear involved and all other noticeable aspects.

As suggested in greatcharlie’s January 25, 2022 post, one could conceive that concerning Western military assistance, a special task force has been organized and assigned in advance, among other things, to: monitor the delivery, stockpiling of stinger, javelin, and other weapons systems to Ukrainian forces; maintain real-time knowledge of the distribution and location of those weapons; destroy those weapons systems; and, destroy or support actions by other Russian military units to destroy Ukrainian military units to which those weapons were distributed. That hypothetical task force would also likely be tasked to monitor–covertly monitor the intelligence activities and military operations of–Western countries as they relate to supplying Ukraine with special military capabilities.

Russian Federation Army reconnaissance scouts in training in the Western Military District (above). During his January 19, 2022 press conference at the White House. To many ears, Biden appeared to suggest that the US and its allies may not act strenuously to what he called a “minor incursion” into Ukraine. It was determined on the face of it that with those words Biden opened the door to a Russian invasion of Ukraine. There was alarm over how Putin would “react.” There reality is that there have doubtlessly been several occasions when Russian intelligence units have gone on forays into Ukraine to take a good look, a “shifty,” to confirm what is known or find out if anything has not been discern imagery or other information. Special reconnaissance missions are likely being performed by GRU Spetsnaz (special operations units), Spetsnaz of the 45th Detached Reconnaissance Regiment, and even reconnaissance units of Russian Federation Army formations. Surely, it was easier for many to launch into hysterics about his words than to think of a technical alternative. If the episode were docketed at all by Putin, he would most likely have done so in recognition of how the matter supported his thinking on the weakness of the US president versus the unseen forces.

Additionally, Russian military advisers are very likely present, “covertly”, in the Donetsk and Luhansk, recognized in Kyiv and by the  majority of governments in the world as the sovereign territory of Ukraine, engaging in a range of military assistance activities to separatist force the two regions to include some of the following: supplying weapon systems; resupply ammunition; provide training on new weapon systems, provide training separatist in small unit tactics and larger unit operations, support the operation of air defense systems; support the operation of intelligence, surveillance systems; support the operation of rocket systems (Interestingly enough, the Minsk Agreement requires Russia to maintain knowledge on all of these types if weapon systems, their capabilities, locations, and numbers deployed.); support air traffic control; support separatist command, control, and communications, supporting separatist operations and strategy; and support the collection of intelligence; and, provide separatist commanders with technical intelligence from Russian sources.

Finally, according to the US and the overwhelming majority of governments in the world, Crimea remains the sovereign territory of Ukraine. There is currently a rather large Russian force on that territory which moves troops and equipment in and out of it daily. The presence of those Russian forces in Crimea is a serious problem, yet the regular movement of troops in and out of the province at this point is a relatively minor matter.

In “Il Penseroso” (1631), published in his Poems (1645), the great John Milton quips: “Where more is meant than meets the ear.” With respect to Biden’s statement, it would appear more was meant than met the ear. The minor movement of Russian military personnel into Ukraine most likely for reasons outlined here would certainly not be worthy of a nuclear confrontation. Still, more pertinent is the fact that Putin, himself, unlikely believed Biden was suggesting hypothetically that Russia could move into Ukraine with a battalion sized force to capture some border territory in Donbass to establish some permanent Russian military presence or even more fanciful, land paratroopers at Kyiv’s Airport, reinforce them with tanks, create a well-defended corridor to the border along the most direct highway. Misunderstanding that says much about what the majority understands about Putin. Surely, it was easier for many to believe that Biden was suggesting such a thing and the launch into hysterics about his words than to think of a technical alternative. There was nothing that Biden or his aides could have said publicly about actual minor incursions by Russian forces into Ukraine as described here without making matters far worse. If the episode were docketed at all by Putin, he would have done so because Biden’s comments indicated the US and its allies were aware of Russian intelligence, surveillance, and reconnaissance activities inside Ukraine. He would most likely have docketed the event also in recognition of how the matter supported his thinking on the weakness of the US president versus the “shadowy forces.” 

To make one last point concerning Putin’s view on the relative impotence of the US President versus the unseen power in Washington, one must cast one’s mind back to the time when everything negative imaginable was said about US President Donald Trump in the newsmedia and elsewhere by his detractors and political adversaries. Given the sort of visceral reactions that typically ensue with the mere mention of Trump’s name, greatcharlie feels it is going out on shaky ground to remind how official action was regularly undertaken against him–in the Congress, through multiple hearings on alleged wrongdoings and two impeachment and through the appointment of a Special Counsel. All of that and more was done seemingly with a blindness to the interests of the US as it concerned the presidency as an office and US foreign and national security interests. No matter which side one might fall on this matter, it might be recognized that even to some small degree, on international matters, the new administration is reaping the bitter fruit of those negative efforts.

Conceivably, Putin (above) began the Ukraine enterprise believing he had a good understanding of the way many senior Biden administration foreign and national security policy officials, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move toward Ukraine, real or feigned. Putin had strenuously wrestled with them via diplomacy before and doubtlessly had thought about them considerably since. He possibly intuited that they hold a sense that Crimea was lost on their watch. It was a move made in tandem with his enhanced support of ethnic Russian separatist movements in Ukraine’s Donetsk and Luhansk provinces. As an element of his current gambit, Putin may have  urged Russian foreign and national security policy officials and political leaders to deliberately seek to aggravate, frustrate, and provoke US officials by denying a threat to Ukraine. Ostensibly, enough confusion might be created by Russian officials in talks and communications with what Putin may perceive as their overly sensitive US counterparts that they might stoke emotional responses from US decisionmakers on Ukraine, To the degree that they would be led to miss advantages, make big mistakes, Putin could desire an outcome in which US officials might possibly provide a provocation in words and actions that would allow him to green-light an invasion.

A Possible Manipulation of Great Conception

In greatcharlie’s January 25, 2022 post, it is noted how Putin so surprisingly has gone through some lengths to signal that he is considering a move into Ukraine. Everything done to date appears designed to ensure the US and its allies know exactly what Russian forces are doing. Putin’s experiences as an intelligence officer in the field, political leader, and national leader have no doubt given him a mighty understanding of human nature and human interactions. However, equally pertinent is the fact that he is a judoka and well-experienced tournament competitor. In this respect, he is an expert in assessing competitors’ responses and reactions to forced falls and defeat. 

Conceivably, Putin began the Ukraine enterprise believing he had a good understanding of the way many senior Biden administration foreign and national security policy officials, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move toward Ukraine, real or feigned. Putin had strenuously wrestled with them via diplomacy before and doubtlessly had thought about them considerably since. He possibly intuited that they hold a sense that Crimea was lost on their watch. They were caught flat-footed when Russian forces moved in by the thousands. They were dubbed the “green men.” It was a move made in tandem with supporting ethnic Russian separatist movements in Donetsk and Luhansk, oblasts (provinces) which border Russia. Donetsk and Luhansk are still inhabited by somewhat large populations despite the heavy fighting between Ukrainian forces and separatists within them. According to the World Population Review, in 2021, the population in Donetsk was 899,325 and in Luhansk was 398,505. Fighting in both areas was exceedingly heavy. Eventually both movements declared their provinces independent, sovereign republics. 

Despite their best efforts short of military action, Obama administration officials could not put together a response that could pry Russia out. Bonjour les dégâts! Not to offend those in power now, but on Crimea,  as on a few other issues, senior Obama administration officials would habitually underestimate Putin. Putin then added figurative insult to injury by formally annexing Crimea. His latest build up of forces, several miles distant, yet near enough to the border of Ukraine, has caused sufficient anxiety in Washington and teasingly offer the opportunity for former senior Obama administration officials in the Biden administration to have a return engagement with him, and as he might hope, an opportunity to settle an old score. Perhaps in such a way Putin, too, might be revealing his desire too for a return engagement in which he could get even more of what he wants from Ukraine. Consuetudinis magna vis est. (The force of habit is great.)

Surely, in Washington, officials would claim what happened in the past with Russia on Crimea has not colored their new reactions on Ukraine. Subconsciously, perhaps it is a different story. As Putin had strenuously wrestled with them via diplomacy before and doubtlessly had thought about them considerably since. To that extent, Putin may feel he has seen them straight, and seek, possibly as a side project, to stimulate their attitudes and behavior and calculate, even influence their moves successfully. As an element of his current gambit, Putin may have  urged Russian foreign and national security policy officials and political leaders to deliberately seek to aggravate, frustrate, and provoke US officials by denying a threat to Ukraine. Through their statements, it is clear that US administration officials believe the threat of Russian invasion is real. To enhance that sense of alarm, Putin would intermittently move a modicum of his forces in very observable ways, guaranteed to catch the attention of the US and its allies and heighten the sense of alarm, even though nothing  significant was really happening. As for the Ukrainians, every movement would hopefully serve to emphasize the defenseless condition in which the US and its allies have left them in. Putin might hope that would stir a sense of extreme vulnerability and anxiety, anguish and despair, among them. Ostensibly, enough confusion might be created by Russian officials in talks and communications with what Putin may perceive as their overly sensitive US counterparts and panic among the Ukrainians that an emotional response might be stoked from US decisionmakers on Ukraine, to the degree that they might make big mistakes or even miss considerable advantages that are right before them.

To enlarge on this point on forced mistakes, Putin could desire an outcome in which US officials might provide a provocation in words and actions that would allow him to green-light an invasion. Alternatively, depending how the wind blows, he would seek to check US decisionmakers, leaving them without any good options that would allow the successful support of US interests and only holding the choice to make compromises, even furtively, on his main demands, that  would allow Ukrainians to live in peace in some satisfactory way. No one is infallible. As Putin knows, logic sometimes fails us. Reacting out of emotions rather than logic and wisdom could only result in missteps. Perhaps US decisionmakers might not even recognize any errors were made until they witnessed Putin exploiting their choices to the fullest. This may all sound like a mad-capped scheme, However, it is all hardly beyond Putin. His thinking in formulating such a scheme would likely be informed, bolstered by the aforementioned shambolic US pull-out from Afghanistan in 2021.

Without any intention to be offensive, greatcharlie states that one top US official that Putin would seek to influence most by his actions would be the Secretary of State Antony Blinken. Putin is quite familiar with Blinken as he played a prominent role in all of the rather rough approaches taken toward him and Russia during the Obama administration–he was Obama’s National Security Adviser. He likely sees him as a real foe. Blinken is a professional, with experience in the high realms of government in the Obama administration, surely seeks only to be unwavering in his pursuit of US interests and not to be distracted by emotions toward Ukraine and its people. He is absolutely loyal and patriotic to the highest degree possible as his country’s top diplomat. In addition to being handsome and débonnaire, Blinken has a strong intellect and is strong-minded. Yet, he is mindful and very appreciative of his ethnic Ukrainian heritage. One might imagine that in a very human way, he would hope to make the land of his parents, grandparents, and ancestors very proud of his intercession in Ukraine’s time of crisis. On May 5, 2021, Blinken made his first visit to Ukraine as Secretary of State. Blinken visited Ukraine numerous times as a senior official in the Obama administration. Blinken’s great-grandfather, Meir Blinken, emigrated from Kyiv in 1904. He was accompanied by his wife Hanna and sons Solomon and Maurice Henry, Blinken’s grandfather. For Blinken, it was a cracking visit, during which his Ukrainian heritage was emphasized. At events, he often spoke the national language as taught to him by his family.

Etiam sapientibus cupido gloriae novissima exuitur. (The desire for glory is the last infirmity to be cast off even by the wise.) A shark can smell blood a mile off when he is hungry. That first Ukraine visit as Secretary of State in May 2021 meant much personally to Blinken. That visit very likely meant much to Putin, too! He no doubt, closely analyzed moments of it, to better understand Blinken and to uncover some advantages gleaned from it all. Exploiting someone’s meaningful personal event in some dark way is an unprincipled, reprehensible business, and a practice that was polished and honed within the erstwhile intelligence organization in which Putin spent his first career, the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. Needless to say, intelligence work was his metier. 

To go a little further on this point, also as explained in greatcharlie’s February 28, 2018 post, individuals as Putin can have a different context for learning about people. When Putin asks about an interlocutor’s family, home, office, even capabilities, it is not small talk or the result of friendly interest. Rather, he may be signalling, warning, that he has already evaluated an interlocutor as a potential target. He may be confirming information or collecting more. He may also be testing one’s vulnerability to falsehoods or how one might respond to unpleasant information. He is creating a perceptual framework for his interlocutor. Such tactics, techniques, procedures, and methods truly match those of a predator. Predators often use deflection, social miscues, and misinformation to provide cover for themselves. “Predatory humans” can use a contrived persona of charm and success to falsely engender trust. They have an exit plan in place, and are confident with regard to the outcome of their actions. Boiled down, they accomplish their deception using three steps: setting a goal; making a plan; and, compartmentalizing. By setting a goal, they know what they want and what it will take to get it or achieve it. They have no inhibitions about causing damage or harm. They stay focused. By making a plan, they not only determine ways to get what they want, but also develop exits if needed. By compartmentalizing, they detach themselves emotionally from attachments that might be embarrassing or be a liability if their plans are found out. They train themselves to give off no tells, so they can pivot easily into a different persona. While some might acquire this skill as Putin likely had while working in the intelligence industry, others may not have any natural sense of remorse.

US Secretary of State Antony Blinken (left) and Russian Federation Foreign Minister Sergei Lavrov (right) meeting in Geneva in January 2022. It is possible that as an element of his current gambit, Putin and Russian Foreign and national security policy officials and political leaders would likely deliberately seek to aggravate, frustrate, and provoke US officials by denying a threat to Ukraine. Through their statements, the US administration believes the threat is real. One top US official that Putin would seek to influence most by his actions would be the Secretary of State Antony Blinken. He played a prominent role in all of the rather rough approaches taken toward him and Russia during the Obama administration. Without being present, it is impossible to know if Russian Federation Foreign Minister Sergey Lavrov, perhaps obedient to possible directions from Putin, may have tried to push Blinken’s buttons so to speak in the way aforementioned. The likely consonance of Lavrov claiming there was no intent to drive Russian troops into Ukraine, yet lacking any authority to guarantee that his superior, Putin, would not order such, would imaginably be unsettling for Blinken. Perchance Lavrov would use his diplomatic acumen to artfully speak in a way to hint at compromise, to thoroughly turn Blinken’s ear in his direction, and then make a half-turn away from the correct side enough to frustrate, to perturb. In the end, it was revealed publicly that Lavrov doubled down on the demand for guarantees on NATO expansion.

Revenons à nos moutons. Without being present, it is impossible to know if Russian Federation Foreign Minister Sergey Lavrov, perhaps obedient to some possible directions from Putin, may have tried to push Blinken’s buttons so to speak in the way aforementioned. The likely consonance of Lavrov claiming there was no intent to drive Russian troops into Ukraine, yet lacking any authority to guarantee that his superior, Putin, would not order such, would imaginably be unsettling for Blinken. Perchance Lavrov would use his diplomatic acumen to artfully speak in a way to hint at compromise, to thoroughly turn Blinken’s ear in his direction, and then make a half-turn away from the correct side enough to frustrate, to perturb. In the end, Lavrov doubled down on the demand for guarantees on NATO expansion. Deeper and more subtle than what is on the surface for Blinken in such a circumstance would likely be the thought that Ukrainians at the end of all his diplomatic effort could find Russian troops sitting their laps. For him, that will not do. No prospective thought of Blinken on the whole matter would likely be more offensive than that to the extent US military units would not be involved on the ground. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul)

Although the vicissitudes of fortune in foreign affairs and war–friction in battle–have been described many times and in many ways by statesman, commanders, and scholars over millennia, greatcharlie chooses to quote Polybius (c. 204-122 B.C.), the Greek “pragmatic historian.” As presented in Book II, Ch. 4 of The General History of Polybius [Books 1-17] Tr. by Mr. Hampton 5th Ed. (TheClassics.us, 2013), he states: “In all human affairs, and especially in those that relate to war, . . . leave always some room to fortune, and to accidents which cannot be foreseen.” Whatever position Blinken may have developed concerning his ancestral homeland’s protection, perhaps its current citizens might be seeking to recast it a bit in what they deem would be a more helpful way. During a televised speech to the nation on January 25, 2022, Zelensky urged Ukrainians not to panic. It was the second such speech on the crisis in two days. The speeches were not only in response to the situation the country faced, but also in response to what Zelensky appears to perceive as ad nauseum and unhelpful comments about an imminent threat of a Russian invasion of Ukraine heard from US and other Western officials. Depicting a very trying situation facing Ukraine in a graceful way, he told Ukrainians, “We are strong enough to keep everything under control and derail any attempts at destabilization.” 

Zelensky also explained that the decision by the US, the United Kingdom, Australia, Germany and Canada to withdraw some of their diplomats and dependents from Kyiv “doesn’t necessarily signal an inevitable escalation and is part of a complex diplomatic game.” He went on to say tactfully, “We are working together with our partners as a single team.” Speaking in the Ukrainian Parliament also on January 25th, Ukrainian Defense Minister Oleksii Reznikov said that, “as of today, there are no grounds to believe” that Russia is preparing to invade imminently, noting that its troops have not formed what he called a battle group that could force its way across the border. He sought to comfort the parliamentarians by stating: “Don’t worry–sleep well,” He continued by sardonically saying: “No need to have your bags packed.” 

The indications and implications of these statements for Blinken may have been that repeatedly sounding the alarm that the “Russians are coming,” more than stoking fears of invasion among Ukrainians, was garnering considerable disfavor and rebuke from them. In this wise, it clearly appears to be the preference of his ancestral homeland to counter and handle Putin by stimulating an authentic atmosphere of cooperation. To that extent, the Ukrainian officials would surely like to douse the “madding fever” consuming its proud son over Russian moves with a bucket of ice cold water. Faber est suae quisque fortunae. (Every man is the artisan of his own fortune.) (Note as aforementioned, thoughts as these are intimations, developed in the abstract from evidence provided by official statements and newsmedia reporting.)

Ukrainian President Volodymyr Zelensky (left) and US Secretary of State Antony Blinken (right). During a televised speech to the nation on January 25, 2022, Zelensky urged Ukrainians not to panic. It was the second such speech on the crisis in two days. The speeches were not only in response to the situation the country faced, but also in response to what Zelensky appears to perceive as ad nauseum and unhelpful comments about an imminent threat of a Russian invasion of Ukraine heard from US and other Western officials. Depicting a very trying situation facing Ukraine in a graceful way, he told Ukrainians, “We are strong enough to keep everything under control and derail any attempts at destabilization.” The indications and implications of these statements for Blinken may have been that repeatedly sounding the alarm that the “Russians are coming,” more than stoking fears of invasion among Ukrainians, was garnering disfavor and rebuke from them. On this wise, it would surely be the preference of the people leading his ancestral homeland to counter and handle Putin by stimulating an authentic atmosphere of cooperation.

Putin’s Understanding of “the US Within”

In his parsing of US policy construction before engaging in the current Ukraine enterprise, Putin doubtlessly concluded societal attitudes in the US toward himself, Russia, and military action must be considered. He likely would assess that Ukraine is a country unimportant or of no-account in their day-to-day lives. He may further assess the true level of investment with what is the vague goal of halting Russia from taking control over territory in a distant country who most would not be able to locate on a map is unknown to the US public.  With regard to the more pertinent matter of committing the US in strenuous ways to Ukraine’s defense against Russian aggression, support from the US public would reasonably be decidedly low. Most apposite, there would certainly be no drum roll for  committing US troops for that purpose either. If this parsing of Putin’s line of thinking at all hits the mark, certainly polling, would support any of the analysis hypothesized as being held by him. According to a Pew Research poll published on January 26, 2022 overall, 49% of US adults perceive Russia a competitor of the US. Only 41% view it is an enemy, and oddly 7% see Russia as a partner of the US. Despite evidence of increased political polarization in recent years, Republicans and Democrats apparently hold similar views of Russia’s bilateral relationship to the US. Among Republicans and Republican-leaning independents, about 50% believe Russia as a competitor to the US, and 39% call it an enemy. About 9% of Republicans feel Russia is a partner of the US. Among Democrats and Democratic leaning independents, 49% see Russia as a competitor, while 43% view it as an enemy. About 6% of Democrats say Russia is a partner of the US.

Putin would also conceivably posit that at best what is known in the US public as the great East-West geopolitical struggle begun long-ago during postwar years and the unstemmed, unsatiated predilection of dividing up the world and deciding which country stands in which bloc, for most part is the stuff of school studies where the average Joe was concerned. If anything, they are viewed as matters in the province of government officials, policy officials. The January 26, 2022 Pew Research poll also finds that about 26% in the US public perceive the Russian military buildup near Ukraine to be a major threat to US interests. Only 33% in the US public believe Russia is a minor threat to US interests. About 7% of those polled say it is not a threat at all. As it is hypothesized here about Putin’s likely assessment, 33% of the public, a noticeably large share, are unsure whether Russian actions toward Ukraine affect US interests. Impressions of Russia’s military buildup near Ukraine also do not differ much by political affiliation. Republicans 27% of Republicans consider Russia a major threat to US interests, while 36% of Republicans view it as a minor threat in that regard. A somewhat large portion, 28% of Republicans, say they are unsure how the military buildup will have an impact. Among Democrats, 26% consider Russia’s build-up a major threat to US interests, while a greater 33% view it as a minor one, despite the position of the current Democrat-led US administration. Surprisingly, despite numerous public statements made about Ukraine by the administration, about 34% of Democrats stand slightly unsure how Russia’s military buildup will affect US interests. It would seem that for the US public, Ukraine is nothing to signify. They would do nothing to discover more about the situation. Even for those somewhat interested, doing so would hardly be worth the candle.

In his parsing of US policy construction before engaging in the current Ukraine enterprise, Putin (above) doubtlessly concluded societal attitudes in the US toward himself, Russia, and military action must be considered. He likely would assess that Ukraine is a country unimportant or of no-account in their day-to-day lives. He may further assess the true level of investment with what is the vague goal of halting Russia from taking control over territory in a distant country who most would not be able to locate on a map is unknown to the US public. With regard to the more pertinent matter of committing the US in strenuous ways to Ukraine’s defense against Russian aggression, support from the US public would reasonably be decidedly low. Most apposite, there would certainly be no drum roll for committing US troops for that purpose either.

Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.) Perhaps the worst episode of his experiences with State Department diplomats during the Obama administration was over Ukraine. Some diplomats stationed in Kyiv–names purposely excluded here–had made some very disturbing statements concerning Putin and Russia that likely seared a negative impression of State Department officials upon the Russian President. From that, one might imagine that still today, Putin may judge US foreign and national security policy officials as seeing the world strictly through the filter of their comfort. They take a high and mighty attitude toward all others. Publicly they tell the world how their interests are amplified by their values, and express concern over human rights, diversity, and global warming. Yet, privately, they are most frantic about US power and prestige, economic power foremost, and the aesthetics of its power in the world which translates into its geopolitical stance. Putin would expect them to put the US national interest first and foremost, but he may feel they take that tack with a blindness to the interests of others. On Ukraine and Taiwan, Putin hopes it will lead them down blind alleys to deadends.

To enlarge on this point, as it would concern US public opinion, State Department officials in Putin’s view, act in a world of their own, and drag the US public in directions that they for the most part are unaware of, and may disagree with, if ever consulted. As far as Putin might see, there are types in the US foreign and national security policy bureaucracies who look upon members of the US public as “Hottentots,” who could hardly fathom the complexity of the policy issues, situations their high offices contend with. Putin might imagine they would hardly believe the US public could understand what kind of skill and experience is required to maneuver against, to supplant, and to negate the interests of other countries and secure that of their own. That would closely equate to what Putin might project of his sense of the condescending attitude and behavior taken toward him during the Obama administration.

Surely, Putin would enjoy aggravating any gap between what the current US administration is doing on Ukraine and what the US public presently knows about it. If the US position could be better defined for the US public, Putin would want to be the one to do that. What would lead Putin to believe he would have a chance now at Influencing US public opinion would be his likely assessment that the Biden administration, as he may perceive has been pattern in the US administrations he has dealt with over two decades, would not want the US public to be fully aware of what is happening, what is being done about Ukraine ostensibly in their interests. Putin would certainly be following polls of the US public, too. Data directly on the point of public attention in the US to the Ukraine crisis from the January 26, 2022 Pew Research poll confirms that public interest has been very limited. While 23% of those from the US public surveyed say they have heard a lot about the deployment of Russian troops near Ukraine, a greater 45% have heard a little about the military build up, and 32% say they have heard nothing about it.

Using whatever medium might be made available and capitalizing on any popularity he may retain as an international figure, he may again seek to pitch his facts, his perception of the realities of the Ukraine matter to the US public. To be a bit more specific, Putin might express why Russia feels as it does about the situation, and what it feels it must do without security guarantees. Surely, it would be loaded with history from the Russian perspective, that any citizen living in Russia would dare not disagree with. Putin would hold out hope that the right choices will be made by the political leaders in the US. His hope would be that he will, using a diplomatic tone and soft phrases, stealthily scare the US public straight and make a lasting impression upon them, albeit a decidedly frightening one. Responding in a manner that he would doubtlessly suggest in his communication, he would hope the public will contact their Congressional Representatives and Senators, and repeat the facts and views he would have supplied them with. The ultimate hope for Putin would be to have encouraged Members of Congress to contact the White House and State Department to suggest “a better course” to Biden and top foreign and national security policy officials.

Recall that Putin attempted to reach the US public to shape opinions on Russia more than once. In a September 13, 2013 New York Times editorial entitled “A Plea for Caution,” Putin reached out to the US public concerning what he then perceived as the problematic nature of Washington’s policy approach to Syria and problems that could have been expected or possibly might have been avoided if a better path would have been chosen. He apparently believed then,  as very likely does now, that because of a perceived disinterest and disregard of public opinion in the US in foreign affairs, there was space for him to jump in to insinuate his views among the people. Misreading or miscalculation, he actually made the attempt. (See greatcharlie’s August 31, 2014 post which analyzes Putin’s 2013 editorial.) Prior to that editorial, Putin published November 14, 1999 op-ed in the New York Times, justifying Russia’s military action in Chechnya which at great cost re-established government control of the breakaway province. Putin was so concerned with shaping opinions in the US that doing so apparently in part impelled his efforts to interfere with the 2016 US Presidential Election. 

When he became Russian Federation President in 2000, he was mistakenly viewed in the West as shy, self-effacing despite his willingness to give interviews, make speeches, and publish writings, including a book entitled, First Person. An experienced national leader and well-practiced speaker, he seems more eager than ever to offer his views in public. Data directly on the point of public attention in the US to the Ukraine crisis from a January 26, 2022 Pew Research poll confirms that public interest has been very limited. While 23% of those from the US public surveyed say they have heard a lot about the deployment of Russian troops near Ukraine, a greater 45% have heard a little about the military build up, and 32% say they have heard nothing about it. Surely, Putin would enjoy aggravating any gap between what the current US administration is doing on Ukraine and what the US public knows about it. If the US position could be better defined for the US public, surely Putin would like to be the one to do that.

The Way Forward

Ita durus eras ut neque amore neque precibus molliri posses. (You were so unfeeling that you could be softened neither by love nor by prayers.) No senior Western official has publicly made the argument that Putin has lost his mind, nor has any provided evidence, even circumstantial evidence, that would lead one to believe some dramatic change in his mental health has occurred. To that extent, one might conclude no matter how disagreeable, deplorable his actions may be, it is accepted that he is behaving in a logical, quite sane manner. Moving comfortably in the reality of a leader as Putin is no mean feat. Few national leaders have had an authentic, natural rapport with him. That was not a shortcoming on their part, simply a reality as a result of their respective life experiences. Many Western governments view working with Putin on the Ukraine crisis, which they say he caused, as an undesirable task. Still, like it or not, that is the job at hand, and it can be successfully handled. Putin has some grievances, and says he wants to get them resolved. 

Standing strong and fast, assured of the correctness of one’s positions, one’s righteousness, is a good thing. On the other hand, posturing, pride and ego do a poor job at concealing insecurities. In this particular crisis, the elimination of insecurities on both sides will be central to its resolution. 

What needs to be created is a sustainable balance of power that advances US, United Kingdom, EU, Ukrainian, and the better parts of Russian interests to promote peace and security and foster collaboration. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Superficial approaches to achieving an agreement, mere appearances of taking action that lack materiality, that are elaborate and useless, must be avoided. Such fruitless efforts will end up aggravating the situation. This episode may have actually opened the door to healing wounds, to solving problems that have only been bandaged to this point. Opportunity is not easily offered, but it is easily and easily lost. Hopefully, the parties involved will make the most of this opportunity. Casus ubique valet, semper tibi pendeat hamus. Quo minime credas gurgite piscis erit. (There is scope for chance everywhere, let your hook be always ready. In the eddies where you least expect it, there will be a fish.)

Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help

Russian Federation President Vladimir (above) at the International military-technical forum “Army-2021” at the Patriot Congress and Exhibition Centre, Moscow, August 2021. Putin ostensibly wants the US and its allies to understand that their military activities in Ukraine, too near Russia’s borders, are moving very close to a red line for him. Ostensibly to achieve that, he has massively built-up Russia Federation military forces perilously close to the border with Ukraine. Some in the West believe Putin intends to do a lot more than just build up military forces defensively and negotiate. Multiple analyses of Western foreign and national security policy bureaucracies have concluded that he plans to invade Ukraine. In that way, the current situation concerning Ukraine has become an inflexion point in US-Russian relations. Still, more appears to be involved here than Putin just being the Putin he has been over four US administrations. If the US is to get a real handle on relations with him, not just a perceived one, a more useful understanding of the man will be required. To that extent, what may lie beneath the surface of Putin, the person, will be briefly scratched a bit here.

Regarding the massive build-up of Russia Federation military forces perilously close to the border of its neighbor, Ukraine, and alarming activities that may indicate those forces will invade it soon, Washington and Moscow continue to wave their fists at each other. Moscow has denied having any intention to attack Ukraine and has explained away its buildup of troops as being a defensive measure. By building up military forces near Ukraine, which is all he has actually done physically at this stage, Russian Federation President Vladimir Putin ostensibly would like to cause the US and its allies to understand that their military activities in Ukraine, too near the Russian Federation (hereinafter referred to as Russia), are moving very close to a red line for him. Putin insists that the US and its allies provide Russia with signed guarantees to refrain from expanding NATO to include Ukraine and Georgia and limiting their military activity near Russia’s borders, particularly in and around Ukraine. However, some in the West believe that Putin intends to do a lot more than just build up military forces defensively and negotiate. Reportedly, multiple analyses of Western foreign and national security policy bureaucracies have concluded that he plans to invade Ukraine. In that way, the current situation concerning Ukraine has become an inflexion point in US-Russian relations. Ukraine was a flashpoint during the administration of US President Barack Obama in February and March of 2014. It was then that Crimea, Ukraine, was quietly and orderly captured by Russian troops dubbed “the green men.” The Obama administration was similarly at odds with Russia over Syria, mutants mutandis.

Putin seems to enjoy being seen fighting the good fight against Russia’s old adversaries the US and its allies.On the other side of the coin, dealing with Russian moves, Russian aggression, has become more tiresome for US administrations and Western capitals as much as anything else. Yet, Putin has not challenged the US mainly as a result of some domestic political consideration, or even less likely boredom or some vanity. Putin did not move so many troops to Russia’s western border because that area is more commodious than the locations they were previously based. Assuredly, Putin harbors negative thoughts and feelings toward the US and choices made by decision-makers that concern Russia in a significant way. Asked to bend: retreat back away from a matter, it is unlikely that he would without acquiring “concessions” from the US and its allies. He has issued preconditions concerning an agreement on “NATO expansion” already. (Perhaps he did not issue preconditions before entering any talks because he even realized that would be going a bit too far.) One would imagine he entered into this venture thinking, hoping he could potentially get what he wanted without having Russian forces fire a shot. it does not appear that Putin and his advisers are not too far down the road to change course. However, greatcharlie agrees that he would probably go into Ukraine if at some moment he feels it is, as it likely would have been determined by him along with his advisors and war planners in advance, to be the right time to do so. One would do no more than justice to Putin by presuming he long contemplated his military moves before cutting orders to get them rolling. He is certainly not moving step by step in what might be described as a hot-headed manner. Still, the larger decision to act as he has regarding Ukraine may very well be the result of a miscalculation. It is the unsought, undesirable job of the West to help him see that.

Inquiry into the fruit of things requires consideration of how Putin may view the situation. Russia has been led by Putin and his thinking from the posts of president and prime minister since 2000. A positive relationship with Russia has not been maintained by the US. There are many patterns apparent in his repeated confrontations with the West. Some eyes in the West appear somewhat closed to what may be happening with the Russian Federation President from the inside. What currently plagues the relationship is more than Putin just being the Putin he has been over five US administrations. The threat of the use of force, even mutual destruction, underlies Washington’s diplomacy with Moscow. The idea being that a somewhat expansionist, yet plainly aggressive, Putin can be made to behave as desired by placing a club at the end of the path he is traveling. He is ostensibly put in a position to act reasonably before he reaches it. It would go a long way to explain the somewhat unbroken string of unsuccessful interactions of US administrations with him, if the problem is that no useful perspective of why Putin has responded so aggressively has been developed. If the US is to get a real handle on relations with him, not just a perceived one, a more useful understanding of the man will be required. To that extent, what may lie beneath the surface of the intractable Putin, the man, will be briefly scratched a bit here. New light is shed on the man by using a different lens. There may be something about his inner self repeatedly being manifested and must be looked at from the correct angle. The aim is not to shoot down other analyses, but hopefully to add to them in a way to figuratively help put the reticle of some analysts on the bulls-eye. Offering what may be a few missing links might create an improved understanding of Putin and his actions, lifting thinking on Putin, to a degree, up from the region of the commonplace. Periclum ex aliis facito tibi quod ex usu siet. (Draw from others the lesson that may profit yourself.)

The Russians are coming! A mixed formation of Russian attack and transport helicopters moving toward their target during the Zapad 2021 military exercise. (above). If Putin decides to go into Ukraine, firepower, astronomically massed, from ground, air, and possibly from sea assets, would likely be used to destroy Ukrainian forces in the field, and in depth as far back as units held in reserve or even on training bases. Relentless fire from air and ground would be utilized to support the movement of forces inside Ukraine. What might have been identified as the front line of Ukraine’s defense would figuratively become a map reference for Hell. Imaginably, the main objective of the deployment of Russian forces would be to create a sufficient buffer in Ukraine between Russian and “ever expanding NATO forces.” In performing this task, Russian forces would ensure territory and forces that might remain in Kyiv’s control would be of less utility to NATO as potential a launching pad for a ground attack on Russia and could not be used as part of a larger strategy to contain Russia at its own border.

The Situation: What Could Russian Forces Do?

From what can be gathered about the situation, the US Intelligence Community has concluded that the Kremlin could be planning a multifront offensive involving up to 175,000 troops. An estimated 100,000 Russian troops have already been deployed near the Russia-Ukraine border. Satellite imagery has revealed a buildup of Russian tanks and artillery as well as other gear near the border, too. Reportedly, online disinformation activity regarding Ukraine also has increased in the way it did in the run-up to Russia’s 2014 invasion of Crimea. According to the New York Times, the most evident scenario given the scale of troop movements on the ground is a Russian invasion of Ukraine may not be to conquer the entire country but to rush forces into the breakaway regions around the cities of Donetsk and Luhansk, or to drive all the way to the Dnieper River. Purportedly at the Pentagon, “five or six different options” for the extent of a Russian invasion are being examined. Suffice it to say, Moscow calls such assessments of Russia’s intentions slanderous ravings. Russia denies it is planning an invasion and, in turn, accused the West of plotting “provocations” in Ukraine. Russian Federation Ministry of Foreign Affairs spokeswoman Maria Zakharova, who unfortunately does not exactly have a watertight record for tying her statements to reality, laid it on thick in the newsmedia, alleging Western and Ukrainian talk of an imminent Russian attack was a “cover for staging large-scale provocations of their own, including those of military character.” It is really disempowering to put out such a message. 

If Putin decides to go in, firepower, astronomically massed, from ground, air, and possibly the sea assets, would most likely be used to destroy Ukrainian forces in the main battle area and in depth as far back as units held in reserve or even on training bases. Relentless fire from air and ground would be utilized to support the movement of forces inside Ukraine. What might have been identified as the front line of Ukraine’s defense would figuratively become a map reference for Hell. Russian forces would most likely be deployed in a way to prevent the resurrection of Ukrainian forces in areas which Russian forces have captured. As for reinforcements or reserves, the rest of Russia’s armed forces would be right across the border in Russia. Imaginably, the main objective of the deployment of Russian forces would be to create a sufficient buffer in Ukraine between Russian and “ever expanding NATO forces.” In performing this task, Russian forces would ensure territory and forces that might remain in Kyiv’s control would be of less utility to NATO as potential a launching pad for a ground attack on Russia and could not be used as part of a larger strategy to contain Russia at its own border.

A stern fact is that the Ukrainians will hardly receive enough military aid from partners and friends, particularly Javelin handheld anti-tank rockets and Stinger handheld antiaircraft rockets, fast enough in the short-term to check a well-coordinated, rapid advance of heavy Russian forces. In the most favorable assessment, they might be able to supply them with enough to hurt Russian forces and perhaps “tear off an arm.” Having experience in contending with somewhat recent Western efforts to assist Russia’s adversaries and those its allies in Syria, Georgia, and Ukraine militarily, perhaps a special task force has been organized and assigned in advance, among other things, to: monitor the delivery, stockpiling of Javelins, Stingers and other weapons systems shipped to Ukrainian forces; maintain real-time knowledge of the distribution and location of those weapons; destroy those weapons systems; and, destroy or support actions by other Russian military units to destroy Ukrainian military units to which those weapons were distributed. That hypothetical task force would also likely be tasked to monitor–covertly surveil the intelligence activities and military operations of–Western countries as they relate to supplying Ukraine with special military capabilities. As for an insurgency in captured areas after an invasion, doubtlessly Russian security services have some sinister plan to cope with that contingency that will not be speculated upon here.

Amat victoria curam. (Victory loves preparation. [Victory favors those who take pains.]) As aforementioned, Putin is hardly acting on impulse, making it up as he goes along. Evidently, Putin believed acting now militarily would best serve Russian interests as he perceives them, not knowing whether the opportunity would present itself again. His decision suggests to the mind that events have apparently moved in some way that enough boxes were ticked off to allow a well-thought out plan based on facts, calculations, possible opposition moves, and predicted outcomes, to be green-lit. To that wise, one might presume any and every coercive economic measure possibly levied against Russia by the West would doubtlessly be anticipated by him. One also might presume he has some plan, stratagem, to counter such steps short-term and long-term. Watching the West interact with Ukraine since the collapse of the government led by his stern ally former Ukrainian President Viktor Yanukovych in February 2014 as a result of Euromaidan, the Revolution of Dignity, Putin likely feels more and more that he is being “rock souped.” Surely, from his lens, the military dimension of the relationship remains at the forefront of Western expansion eastward. NATO forces are creeping closer to Russia’s border, and the government in Kyiv is hopelessly pulled further away from Moscow’s reach. Putin might believe any reasonable observer would accept and agree with his thinking about a threat from the West, and that his logically reached perception has actually been fostered by Western actions.

Ukrainian troops training with the FGM-148 Javelin, a handheld, shoulder-fired precision missile system designed to destroy tanks and other armored vehicles, as well as hovering helicopters (above). The Ukrainians would hardly receive military aid from partners and friends fast enough in the short-term to check a well-coordinated, rapid advance of heavy Russian forces. In the most favorable assessment, they might be able to supply them with enough to hurt Russian forces and perhaps “tear off an arm.” Having experience in contending with somewhat recent Western efforts to assist Russia’s adversaries and those its allies in Syria, Georgia, and Ukraine militarily, perhaps a special task force has been organized and assigned in advance, among other things, to handle all aspects of that matter. As for a post-invasion insurgency, surely Russian security services have some sinister plan to cope with that contingency that will not be speculated upon here.

Admittedly, it is surprising how much Putin has done to signal that he is considering a move into Ukraine. However, there is surely an art that moves Putin’s mind. One might presume that as he initially staked the situation with regard to the US, almost nothing communicated through telephone conversations or bilateral talks alone would be enough to compel the US to act as he wished. The potential use of military force could not exist as an abstraction, being left to the imagination of Western national leaders and their advisers. With a build-up military force, he could illustrate, convince US decisionmakers that the threat of military action was real.

Surely Moscow closely observed events as they developed in the border crisis between India and China. Although it has been repeated as of late that China backed down to India on the matter of the border crisis in which occasional gunfire was exchanged and lives were lost. The common wisdom is that the aggressive moves it made with ease against India placed China in a situation which in the long run would prove too consuming, too difficult to handle and contrary to national interest, particularly such an approach can have an impact economically. There was also too little gain for China both geostrategically or geopolitically as compared to the potential loss suffered from such an investment. 

An odd advantage that Putin has is that the US will act in a fairly predictable fashion. There is less for him to fear of some random, unexpected decision from the US than the US may fear about such a choice made by him. Placed in a trying position, which Putin surely hopes he has done, a certain reality would need to be faced by US decisionmakers. Conceivably, he would expect the top military officers and officials at the Pentagon (US Department of Defense) to see the situation straight. Indeed, he may be hoping the Pentagon would be the voice of reason, the source that will explain that the real possibility exists for the situation to get out of control if the US were to commit itself too heavily to Ukraine’s defense. That would seem especially true if US decisionmakers contemplated having to act if both Russia moved on Ukraine and China moved on Taiwan almost simultaneously. That is a real possibility despite how fanciful it may sound. Tremendous pressure would be placed on the available military resources of the US and its allies. It would seem unlikely to Putin that decisiommakers in Washington would sink themselves deeper into a situation in which only bad choices were left available. C’est comme ça! However, Putin still cannot be absolutely certain that Washington would parse out the situation as he has. He has the task of showing it this perspective and convincing it to acquiesce to at least most of his demands.

The clever bit for Putin would be to determine what military action by NATO, if any, would be taken to physically halt a Russian advance into Ukraine. To that extent, Putin may have assessed that with regard to Ukraine, as well with Taiwan, policies of past eras are no longer viable under current circumstances. The military forces of Russia have been transformed. Insofar as Putin is concerned, unless the US planned to transport the bulk of its armed forces into Ukraine and nearby, any challenge by the US and its allies that included military action would mean recklessly placing some small set of their forces in great peril. Russia would not back down once hostilities were initiated. Again, fighting along its own border would allow Russia countless advantages to bear on its prospective opponent. It would truly be absolute madness for Washington to commit its forces to the fight without some clear way to win or create some acceptable circumstance they could not have achieved without firing a shot. Ironically, in the name of global peace and security, to avoid a nuclear Armageddon, it would need to let its declared partners in Kyiv fall. Even though the US public today is uninterested in starting foreign wars, if the Biden administration commits the US to a fight that would have an uncertain purpose and outcome, it would garner great attention from the public and very likely fail to get its approval. To the extent that these considerations factor in Putin’s calculus, he would most likely find Washington’s stated position on Ukraine to be unrealistic and unreasonable. It only makes sense as long as Moscow does not act.

If efforts at peace fail, it is not completely clear to greatcharlie whether Putin would want all of Ukraine or just some of it: Donetsk and Luhansk for instance. If he wants more, his plans may likely include capturing Kyiv and establishing a new Ukrainian government. That would take up an enormous amount of time, resources, effort, and political capital. Putin seems too shrewd to rush into something as colossal as administering Ukraine. Still, no one is infallible. Putin has been known to miscalculate. It was a gross miscalculation to interfere with the US elections in 2016, an action Putin has repeatedly denied despite the fact that direct proof of Russian meddling has been presented on by US intelligence and law enforcement organizations. If Putin acts militarily in Ukraine and successfully captures enough territory to his content–at least on paper he should be able to with some ease, he would again be looked upon as a shining hero among supporters. The effort by NATO and the West in general to deter him would be depicted as a debacle. If he fails to make gains against the Ukrainians and capture sufficient territory, the failure would be an enormous defeat for Putin. It is possible that the rippling effect of such a prospective defeat would lay the groundwork for his departure as Russia’s leader.

US President Joe Biden (left center) and Russian Federation President Vladimir Putin (right). As aforementioned, Putin is hardly acting on impulse, making it up as he goes along. Evidently, Putin believed acting now militarily would best serve Russian interests as he perceives them, not knowing whether the opportunity would present itself again. His decision suggests to the mind that events have apparently moved in some way that enough boxes were ticked off to allow a well-thought out plan based on facts, calculations, possible opposition moves, and predicted outcomes, to be green-lit. To that wise, one might presume any and every coercive economic measure possibly levied against Russia by the West would doubtlessly be anticipated by him. One also might presume he has some plan to counter such steps short-term and long-term.

The View from the US

In remarks before meeting with his Infrastructure Implementation Task Force on January 20, 2022, US President Joe Biden laid out his position on a potential invasion of Ukraine by Russian forces. Biden, who would not expect to speak idly on such a grave matter or any matter, for that case, stated: “I’ve been absolutely clear with President Putin.  He has no misunderstanding.  If any–any–assembled Russian units move across the Ukrainian border, that is an invasion.  But–and it would be met with severe and coordinated economic response that I’ve discussed in detail with our allies, as well as laid out very clearly for President Putin. But there is no doubt–let there be no doubt at all that if Putin makes this choice, Russia will pay a heavy price. It is also not the only scenario we need to be prepared for: Russia has a long history of using measures other than overt military action to carry out aggression in paramilitary tactics, so-called “gray-zone” attacks, and actions by Russian soldiers not wearing Russian uniforms. Remember when they moved into the Donbas with “Little Green Men”?  They weren’t–they were dealing with those who were Russian sympathizers and said that Russia had no–nobody in there. Well, that includes “Little Green Men” in uniforms, as well as cyberattack. We have to be ready to respond to these as well–and decisively–in a united way, with a range of tools at our disposal.” Très, très fort!

During a two hour videolink call concerning Ukraine and other disputes on December 21, 2021, Biden also warned Putin that the West would impose “strong economic and other measures” on Russia if it invades Ukraine. Putin complained NATO is attempting to “develop” Ukrainian territory. He demanded guarantees that NATO would not expand farther eastward. Although there were no breakthroughs, the two sides agreed upon continuing communications. In greatcharlie’s December 31, 2021 post entitled, “Infrequently Discussed Issues Regarding Taiwan Likely Influencing Decisions of Communist Party of China Leaders and PLA Commanders,” it was explained that from Washington’s perspective, the door must be left open to type of contrition in diplomacy. Within time perceived to be available as conflict appears to draw near, there must exist an opportunity to amend a position. In theory, there may be an epiphany within logic and reason that leads one side to align itself with a view closely matching the other. Despite expressing concerns that Putin may invade Ukraine at any moment, there may still be some in Washington who assess and intuit, correctly or incorrectly, that since action has not been taken, with all of the tactical benefits such a surprise move would garner, it may not be taken. The delay In smashing into Ukraine may be a true lack of desire on the part of Putin to bear the burden of administering more of that country. There is the off chance that Putin may have some doubts about the military capabilities of Russian forces. The capture of Ukrainian territory may be quick and dirty but may leave unexpected problems in its aftermath. Given the way in which Biden spoke of sanctions, it is possible, despite what greatcharlie has already suggested here on this matter, that Putin may be worried about economic retaliation from the West. (Russia does not have much to shield itself from economic retaliation as compared to China, bound to the West with its products and production capabilities. The energy it provides to Europe and Nord Stream 2 are the more meaningful cards for Moscow to play. With concern to that, during the administration of US President Donald Trump, the US offered Europ a fairly decent alternative source of energy worthy of consideration.)

Putin usually plays his cards close, making it difficult to know whether some resolution might be found through a more open dialogue. No doubt officials in Western capitals are mindful of being too attached to diplomacy in coping with Putin. Each is doubtlessly versed enough in history to hark back to this infamous statement which likely has an expected chilling effect on efforts to work with him: “As long as war has not begun, there is always hope. For the present I ask you to await as calmly as you can the events of the next few days. As long as war has not begun, there is always hope that it may be prevented, and you know that I am going to work for peace to the last moment.” These words were spoken by United Kingdom Prime Minister Neville Chamberlain on September 27, 1938, during an address to the British people as concerns of war rose as negotiations between German Chancellor Adolf Hitler and himself. The tragic outcome of that effort is well-known. 

For Washington, Moscow’s actions have far greater implications than the progress of US-Russian relations. As Blinken also explained during his January 8, 2022 CNN appearance: “There are large principles at stake that go to the fundamentals of international peace and security.” He went on to note that the US is joined by international partners “to make it clear to Russia that this aggression will not be accepted, will not be tolerated.” An additional step in knocking down the idea that this crisis stands as a problem between Washington and Moscow has already been taken by the US. On January 9, 2022, US Secretary of State Antony Blinken stated very clearly on CNN: “It’s hard to see making actual progress, as opposed to talking, in an atmosphere of escalation with a gun to Ukraine’s head. So, if we’re actually going to make progress, we’re going to have to see de-escalation, Russia pulling back from the threat that it currently poses to Ukraine.” In effect, he expressed the view that despite intercession of the US and its allies, this matter remains Kyiv’s problem mainly. Looking at the crisis in that way makes it something akin to Ukraine’s “Reichenbach Falls”, the moment where Arthur Conan Doyle’s great fictional detective character, Sherlock Holmes, from The Adventures of Sherlock Holmes, originally published as twelve short stories in the Strand Magazine (1891), was confronted by his archrival Professor James Moriarty after repeatedly disrupting his criminal schemes. As the story initially went, Holmes met his end in combat with him. It was revealed in subsequent installments of the series appearing in the Strand that Holmes survived the fight, his resurrection being demanded of Doyle by the magazine’s editors to satisfy a readership made much distraught over his demise. One might hope fate will allow Ukraine to survive this crisis intact, yet there is nothing fictional about this situation. Moreover, Putin is a far more powerful opponent for Ukraine than Moriarty was to Holmes.

Putin (right) seated in a conference room at the Kremlin during a videolink call with Biden (on screen left). During a two hour videolink concerning Ukraine and other disputes on December 21, 2021, There were no breakthroughs, but the two sides agreed to continue communications. From Washington’s perspective, the door must be left open to type of contrition in diplomacy. Within time perceived to be available as conflict draws near, there must exist an opportunity to amend a position. In theory, there may be an epiphany within logic and reason that leads one side to align itself with a view closely matching the other. There is the off chance Putin may have some doubts as to the military capabilities of Russian forces. The capture of Ukrainian territory may be quick and dirty but may leave unexpected problems in its aftermath. Given the way in which Biden spoke of sanctions, Putin may very well be worried about economic retaliation from the West.

Some Key Issues for Negotiation as the Situation Stands

Washington wants to avoid a conflict in Ukraine. For Washington, success in resolving the Ukraine crisis for the moment would imaginably mean, in brief, crafting an agreement with Russia that will relax tensions, strengthen the sovereignty of Ukraine, enhance the security of Ukraine, and ensure Russia remains committed to whatever agreement is reached. Ukrainians must be allowed to enjoy full control and use of their own territory. Ukraine would retain self-determination as a sovereign state. If Ukraine wants to join NATO that wish will be protected. (Perhaps with some disagreeable yet necessary minor alteration in the short-term.) Russia would need to take action assented to in an agreement that would confirm it has no aggressive intention. Any action that may have prompted accusations by both sides that the other was moving back to the adversarial thinking of the Cold War and the paradigm of East-West spheres of influence of the past must be addressed. Lending some further context for Washington’s efforts to negotiate with Moscow on Ukraine, Blinken, also stated during his January 9, 2022 interview on CNN that, “It’s also not about making concessions. It’s about seeing whether, in the context of dialogue and diplomacy, there are things that both sides, all sides can do to reduce tensions.” 

Recognizably, neither the US nor any government in the West wants to jump through hoops to satisfy Russia. They would all doubtlessly agree they have no reason to give up anything they have. They are not bothering Russia and Russia should not be bothering them. Even if some agreement were constructed with Moscow that they could accept, they would want to know how Russia would be held to the terms of the signed document. They would be skeptical over Russia’s willingness to adhere with anything to which it might be remotely disagreeable in the long-run. Plus ça change! All would likely agree that force should not need to be relied upon to hold Moscow to it. There is the likelihood many NATO allies and neighboring countries to Russia might sign an agreement with Russia, but would be hesitant to do so. If the US sought some collective agreement concerning the situation with Ukraine, those countries may see it as too much to ask or a manifestation of naiveté by leading powers less threatened by Russia. Some capitals would likely respond to the suggestion with reproach. Even more, they may believe the constant struggles with Russia that have created their anxieties among them about negotiating with Moscow. US officials would be up against that sort of reception and more if it sought to create some consensus among the Europeans on constructing a comprehensive agreement with Russia. Perchance if the situation is approached with a degree of gentleness and patience–“with diplomacy”–their efforts may bear fruit.

Yet, given these and other considerations that would shape a diplomatic effort in this crisis, to get a firm handle on this matter, the primary focus, as postulated here, must be placed on Putin. All that has transpired, all of the preconceived management of this crisis from the Russian side, has been the manifestation of his vigorous and masterful mind. Formulating the best response diplomatically will mean better understanding him and how he thinks. For US policymakers, decisionmakers and negotiators, finding a way, within reason, within acceptable parameters of US values and interests, to satisfy Putin and themselves will be no mean feat.

Putin (center) flanked by Russian Federation Minister of Defense, General of the Army Sergey Shoigu (right) and Chief of the General Staff of the Armed Forces of the Russian Federation, General of the Army Valery Gerasimov (left). Recognizably, neither the US nor any government in the West wants to jump through hoops to satisfy Russia regarding Ukraine. Even if some agreement were constructed with Moscow, all would remain skeptical over Russia’s willingness to adhere with anything to which it might be remotely disagreeable in the long-run. To get a handle on this matter, the primary focus, as postulated here, must be placed on Putin. All that has transpired, all of the preconceived management of this crisis from the Russian side, has been the manifestation of his vigorous and masterful mind. Formulating the best response diplomatically will mean better understanding him and how he thinks. For US policymakers, decisionmakers and negotiators, finding a way, within reason, within acceptable parameters of US values and interests, to satisfy Putin and themselves will be no mean feat.

Some Common Wisdom Regarding Putin

Many Western political leaders and senior foreign and national security policy officials have claimed to have the ability to look into Putin’s soul. The reviews of their skills have been mixed. US President George Bush provided the following statement on the matter on June 18, 2016: “I looked the man in the eye. I found him to be very straightforward and trustworthy. We had a very good dialogue. I was able to get a sense of his soul; a man deeply committed to his country and the best interests of his country. And I appreciated so very much the frank dialogue.” However, given his former work in the intelligence industry, his decades of experience in politics and as a national leader, Putin is the one who has mastered such an art. While he is never publicly vocal with his findings concerning other national leaders he meets, his conclusions are best manifested by the actions he takes as they regard their interests.

Every US official Putin meets likely for him becomes the avatar of Western duplicity. He will always be distrustful, and will simply study the individual seeking to gain a sense from his or her words, the nature of the conversation among the most senior US officials on Ukraine. To this extent, each conversation informs his next move, not due to its content, but due to what he perceives to lie behind their words. In many ways times have changed for Russia, and more dramatically for Putin. Russia can not exactly match the US as a global power. It cannot exactly match the power of the US even militarily. However, its capabilities have increased and it can do more things in the world now than a decade or two ago. It would appear that Putin so badly wants to get that point across.

It was never the case that Putin could have been shaped into the Russian leader Washington wanted. Moreover, Putin was never a man to be trifled with. However, these were among many ideas about Putin perhaps carried over from the tail-end of the Clinton administration, over two decades ago, when the then young president was establishing himself both at home and abroad. Perhaps it accounts for the manner in which those officials in the Obama administration approached Putin, dismissing him to a degree as something akin to a potentate, a footnote in their dealing with a Russia that was a shadow of its former self during the Soviet era in nearly every respect. There is a popular saying among many in the younger generation that “to compete, one must compare.” Officials in the Obama administration saw no comparison between the power Russia had maintained following the Soviet Union’s collapse, and the US which was at the time, and remains, the preeminent power in the world. Putin would likely posit that Washington has done more than enough since the Obama administration to push him to act as he has.

It remains a trend to look at Putin superficially. Interestingly, it allows everyone to have an equal shot at analyzing him and his moves. To that extent, time is spent, near idly, discussing how bad a person he is. (One very senior US official referred to Putin as “a killer” In May 2021.) At the core of even such unremarkable analyses must be something about the whole authentic enough to give it true weight. Yet, aspects of such analyses are often not quite logical. It is fascinating to see how simple facts may go some way to explain what might be recognized at best as a charitable position. As seasoned analysts would tell, if that product is simulated, conclusions that result from it will be inauthentic. What is left to examine amounts to a mere perception of what is going on in Putin’s mind and in his camp as compared to the hard facts. Using conclusions that result from such analyses will never allow policymakers and other senior officials to approach him in the right way. Even logical opinions are not the equivalent of fact. Truth is not an opinion. In the defense of some analysts, adhering to such a limited, official approach to Putin could hardly be described as neglectful. Perhaps considerations outside of what is generally accepted are avoided in fear of being castigated for devoting time and effort to trivialities. There must be something stronger that lends an understanding of his state of mind

Another problem arises when such views, despite all that is wrong about them, are adopted unconsciously by senior policy officials or worm their way into analyses, and even worse, as a possible result of that contamination, more apposite aspects may fail to receive sufficient or any treatment. It is hardly deliberate. They may appear as trifles, made imperceptible by the fact that they are notions, too commonplace in the mind to raise concern. Nonetheless, they are damaging much as the microscopic virus that can fell a world class athlete.

The West’s position on Putin as it stands today is that Putin has a mind to have Russia serve as the follow-on to the Soviet Union and claim its status and glory as a power. The enterprise has faced some rough patches over the years, but has progressed nonetheless. Putin’s actions in countries formerly aligned with the Soviet Union or were under its influence decades ago have been his targets and he has managed to get the attention and response from the West led by the US, the adversary of the erstwhile Soviet Union. It sounds bad enough for his neighbors, the West, and all others interested in maintaining stability and security in their countries, regions, and the world. Yet, in taking that tack, he has to an extent guaranteed Russia would remain stuck, limited to being a only simulacrum of the Soviet Union, a shadow of the past. Granted, Russia may be seen as possessing formidable military forces, with new weapons developments and declarations of the intention to defend its territory and its interests, but not a country that was advancing politically, economically, or socially, seeking to elevate to something better. Not to offend, but perhaps that was the best he could ever expect from his people.

Putin (right) and US President Bill Clinton (left) at the G8 Summit in Nago, Okinawa Prefecture, Japan, in July 2000. When Putin became Russian Federation President, he took the seat created for Yeltsin at the G8. Perhaps the other G8 leaders felt that it was important to keep Russia in the G8 for the same reasons it was brought in but also hoped that keeping Putin in their circle might stir and help sustain a great desire within him to make Russia a country “like to one more rich in hope.” Other national leaders of the G8 may have thought that Putin would passively acquire an appreciation of their world, imagine the potential of a rejuvenated Russia fitting into their world, and acquire similarities with them. However, their eyes appear to have been closed to what was happening with Putin and Russia and why the move was nearly doomed to fail to ameliorate East-West tension in the long run due to his personality, no offense intended.

Missteps in Responding to Putin Somewhat Downplayed

The formal inclusion of the new Russian Federation in the high realms of international politics following the collapse of the Soviet Union was nobly attempted. A seat in the Permanent Five Members of the UN Security Council was inherited from the erstwhile Communist state. As important, Russia began to engage in separate meetings with leaders of the intergovernmental group of the leading economic powers, the G7, in 1994 while Russian Federation President Boris Yeltsin was in office. Russia formally joined the group in 1997 at the invitation of US President Bill Clinton and United Kingdom Prime Minister Tony Blair. This noble step was ostensibly taken in the name of international peace and security. Surely, inviting Russia to join the G7 was more than a friendly gesture and a fresh start. Membership would plug Russia into the international order, forestalling any burgeoning sense that if left isolated, control in Moscow might fall fully into the hands of organized crime groups, and so would Russia’s nuclear arsenal. Russia membership would more importantly plug the G7 countries vis-à-versa into Moscow in a structured way, creating an effective, stable line of communication and political and economic influence.

When Putin became Russian Federation President, he took the seat created for Yeltsin at the G8. Perhaps the other G8 leaders felt that it was important to keep Russia in the G8 for the same reasons it was brought in but also hoped that keeping Putin in their circle might stir and help sustain a great desire within him to make Russia a country “like to one more rich in hope.” Other national leaders of what became the G8 may have thought that Putin would passively acquire an appreciation of their world, imagine the potential of a rejuvenated Russia fitting into their world, and acquire similarities with them. However, their eyes appear to have been closed to what was happening with Putin and Russia and why the move was nearly doomed to fail to ameliorate East-West tension in the long run due to his personality, no offense intended.

At the G8, national leaders would come to the big table committed to having a positive impact in not only economic affairs, but world affairs in general. The existing seven members–the US, United Kingdom, Canada, Japan, Germany, France and Italy, plus the EU–were bound by shared values as open, democratic and outward-looking societies. Russia was not a country completely devoid of desirable things, Russia possessed natural resources, particularly oil and gas which the energy industries of the other powers coveted. Certainly, Russia retained the power to destroy with its nuclear arsenal and the residue of the once powerful Soviet military. However, Russia was hardly developed enough to participate in that way as a member. 

As for Putin, he had not as yet grabbed all reins of power firmly in Russia, much as he tightly grips them today. It is not inconceivable that his political qualities were not fully scrutinized by any member state. However, more pertinently, Putin was unlikely ready to manage Russia’s stake at the G8 when first began participating in leaders’ summits. Looking into Putin’s inner-being, it is possible that Putin, while in his own way appreciating the status G8 membership bestowed Russia and him, felt well-out of his comfort zone and despite his ego, felt that the manner in which Russia acquired G8 membership was counterfeit. For Putin to be satisfied at that time, Russia would need to possess membership on his terms, legitimate terms. Within G8 meetings, Putin presented himself with grace and charm befitting his position. If Putin ever got the idea then that Western leaders enjoyed observing him outside of his comfort zone or disrespected him in any way, he would unlikely be able to hide his anger in his countenance and dwell on lashing out in some big way. Perchance at some point Putin might have imagined that the other technologically advanced countries used G8 meetings as a stage to lampoon Russia. He would be seated before them as they flaunted their economic power and progress while giving the impression in occasional off-handed comments and perhaps in unconscious condescending behavior toward him, that they imagine everything about Russia being tawdry and slipshod, particularly its goods and services, and would describe its industrial centers resembling a carnival the day after the night before. Perhaps such thinking could be said to have some validity given that such was essentially the case in early post-Soviet Russia. Putin had already brought to the table a sense within himself that Russia remained vulnerable to Western plans and intentions. That sensibility seemed to stick regardless of all else good that came his way through the G8. The G8 experience overall may have left a bad taste in his mouth. It is likely other group leaders may not have imagined that would be the outcome.

As a result of Euromaidan, power changed hands in Ukraine, and a series of measures that enhanced Western influence were taken. Putin responded robustly. The escalation of a struggle between ethnic Russians in Donetsk and Luhansk with the fledgling democratic Ukrainian government was followed by the greater step of Russia’s seizing and annexing Crimea. Crimea, at time was the sovereign territory of Ukraine, and most national capitals say it still is. Putin’s actions resulted in Russia being placed back into what was supposed to be isolation; it was put out of the G8 and hit with many punitive economic measures. Both Putin and Russia have seemingly survived it all. Although Russia was suspended from the G8–once again the G7, Russia delayed announcing a decision to permanently withdraw from the group until 2017.

Further reflecting his hot and cold impressions about the other industrial powers, although Russia was suspended from the G8, Russia delayed announcing a decision to permanently withdraw from the G8 until 2017. Surely, Putin had great concerns over the perceptions in Russia and around the world of the decision of the G7 countries. Putin appears to have had a morbid fear that the G7 countries were exercising power over Russia and himself. That would not do. By waiting, Putin retained control of that situation by choosing when Russia would depart and then exist in the substitute reality that his country had not been pushed out of the organization and marginalized. As far as he was concerned, Russia was still a member of the club of the most powerful countries. Despite everything, that recognition remained an aspiration of his. It is an apparent odd duality. Satisfying Putin’s desire for Russia to possess the ability to discuss world problems with the leaders of the most influential countries, was Russia’s continued membership in the G20–the Group of 20, in essence a group of finance ministers and central bank governors from 19 of the world’s largest economies, including those of many developing nations, along with the EU. While the G7 existed for the top-tier industrialized countries, the G20, formed in 1999, provided a forum for the discussion of international financial matters that included those emerging economies which at the time began to represent a larger part of the global economy. The G20’s aim is to promote global economic growth, international trade, and regulation of financial markets. As of 2021 there are 20 members in the group to include Putin’s erstwhile G8 partners, the US, United Kingdom, Canada, Japan, Germany, France, Italy, and the EU, and also Argentina, Australia, Brazil, China, India, Indonesia, Mexico, Saudi Arabia, South Africa, South Korea, Turkey and his Russia. To all appearances, as a G20 member, Russia plausibly retains authority in world governance. 

Una idea perplexina. (The idea is strange to us.) Intriguingly,  Putin did not attend the G20 summit in Rome in October 2021, informing the organization that his decision was due to concerns about the COVID-19 pandemic. Not to take precaution in these times would be short-sighted, but for Putin to abstain from physically attending a G20 leaders summit could indicate that the organization, for at least that moment, may have less meaning for him. Putin participated in the summit in Rome via videolink, but the optics were hardly favorable. Reportedly, Putin coughed quite a bit during the meeting creating questions in the minds of others about his condition. That seemed unusual for a man who exudes strength and robustness. (Hopefully, Putin was not feeling any real discomfort.) It was a small matter, a trifle, but perhaps it will later be discovered that it was small in the way that small movements of a needle would indicate an earthquake on a seismograph.

One must add to this story the influence of the destructive impact of the West on the Russian economy and the country’s efforts to “build back better” immediately following the collapse of the Soviet Union on Putin’s thinking. As discussed in the June 18, 2019 greatcharlie post entitled, “Why Putin Laments the Soviet Union’s Demise and His Renewed “Struggle” with the US: A Response to an Inquiry from Students,” Putin would doubtlessly explain that under Yeltsin, the Russian leadership made the mistake of believing Russia no longer had any enemies. Putin, while ascending to the top in the new Russian Federation, saw how mesmerizing “reforms” recommended to Yeltsin’s government by Western experts unmistakably negatively impacted Russia’s economy in a way referred to somewhat euphemistically by those experts as “shock treatment.” Yeltsin was unaware that Western experts were essentially “experimenting” with approaches to Russia’s economic problems. His rationale for opening Russia up to the resulting painful consequences was not only to fix Russia’s problems but ostensibly to establish comity with the West. The deleterious effects of reform recommended by Western experts’ could be seen not only economically, but socially.  In another statement made while he was acting President in 1999, Putin diplomatically explained the consequences of relying upon foreign experts for assistance. He stated: “The experience of the 90s demonstrates vividly that merely experimenting with abstract models and schemes taken from foreign textbooks cannot assure that our country will achieve genuine renewal without any excessive costs. The mechanical copying of other nations’ experience will not guarantee success, either.” Once fully ensconced as Russia’s leader, he would publicly state that the greatest danger to Russia comes from the West. He also brought that sensibility to the G7 table with him. 

One might go as far as to say apparently none of the negative perspectives, memories that Putin held regarding the West were revealed. He concealed them with sangfroid and equanimity. Yet, he likely thought of them by day and nursed them by night. Inclusion was not enough to stem those feelings or his responses to Western moves albeit in Russia’s direction. Once power changed hands in Ukraine, and a series of measures that enhanced US influence were taken, Putin responded robustly. The promotion of a struggle between ethnic Russians in Donetsk and Luhansk with the fledgling democratic Ukrainian government was followed by the greater step of Russia’s seizing and annexing Crimea, then the sovereign territory of Ukraine. His actions resulted in Russia being placed back into what was supposed to be isolation; it was put out of the G8–now once again the G7–and hit with many punitive economic measures. Both Putin and Russia have seemingly survived it all.

Putin (left) United Kingdom Prime Minister David Cameron (center) and US President Barack Obama (right) at the G8 Summit in Lough Erne, Northern Ireland in June 2013. Putin was unlikely ready to manage Russia’s stake at the G8 when first began participating in leaders’ summits. Looking into Putin’s inner-being, it is possible that Putin, though appreciating the status G8 membership bestowed Russia and him, he likely felt well-out of his comfort zone and despite his ego, felt somewhere inside that the manner in which Russia acquired G8 membership was counterfeit. Perchance Putin could imagine that the other technologically advanced countries used G8 meetings as a stage, and he would be seated before them as they flaunted their economic power and progress while giving the impression in occasional off-handed comments and perhaps unconscious condescending behavior toward him, He already brought to the table a sense within himself that Russia remained vulnerable to Western plans and intentions. The whole G8 experience may have left a bad taste in his mouth.

Putin from a Different Lens

What one might gather from this part of the story is that more than anxiety and dissatisfaction with US policies and moves, there is apparently a real sense of vulnerability in Putin toward the US and its allies. It has been a subtle and profound undercurrent in his decisionmaking and approaches toward them. Often, that sense of vulnerability has been exacerbated by efforts from Washington to make diplomatic inroads with countries Putin seems to feel belong to Russia. Note how every step taken eastward by the US in Europe, as innocuous as each may have appeared to Washington’s eyes, has led to hyper-vigilance–for example, increased intelligence and surveillance activity and aerial and naval incursions in the territory of NATO Members–and military action by Moscow. Though it has been listened to with skeptical ears in the West, Putin has said that US moves evoke his actions.

In a December 21, 2021 Washington Post opinion piece entitled, “Putin Wants Us To Negotiate over the Heads of Our Allies. Washington Shouldn’t Fall for It”, the former US Ambassador to the Russian Federation Michael McFaul lists what he identifies as Russian actions and policies undermining European security. McFaul included the following on that list: Russia well-maintains troops and weapons from the territory of the Republic of Moldova; Russia has recognized the regions of South Ossetia and Abkhazia as independent countries; Russia caotured and annexed Crimea and well-supports the separatist movements in eastern Ukraine; Russia has deployed SS-26 Iskander missiles in Kaliningrad and maintains them in other deployment locations; Russia has placed tactical nuclear weapons in Kaliningrad; Russia has engaged in assassination operations, such as those conducted in the European cities of London, Moscow, Salisbury, Berlin and Tomsk; and, Russia has aided remaining European dictators who kill and arrest Europeans exercising freedom of assembly and freedom of expression. One can only imagine Putin’s inner-dialogue as he took each step.

Cast one’s mind back to Putin’s greatest expression of vulnerability in March 18, 2014 speech declaring Russia’s annexation of Crimea. He vented his anger at the US and EU, enumerating some Western actions that fostered contempt in Moscow. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he referred to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Conceivably, the aggregate of US moves eastward in Europe over time have truly rattled Putin and could potentially push him over the edge. That must always be considered. If the actual intention is to irritate Putin, then there will be no firm peace ever reached while he runs Russia.

Putin (above) in an office in the Senate Building at the Kremlin. In state-to-state talks between the US and Russia concerning Ukraine a structure has been established in which talks are held in rank order. Biden communicates with Putin, and Blinken communicates with Russian Federation Foreign Minister Sergei Lavrov. On both sides, the possibility exists that a set of reactions and responses to the positions and personas have already been formed. It would only be human to color anything truly novel added to the dialogue with considerations of what had already been said. Accordingly, it might be useful to enlist an envoy who could deliver the message that will end Putin’s sense of vulnerability and give immediate legitimacy to a call for multi-party negotiations for a comprehensive agreement on European security. That individual would need to have considerable standing with Putin to deliver that message.

What Might Be Done Regarding Putin To End This Crisis?

More than once has Putin associated himself with the ideas of “West German” Parliamentarian Egon Bahr on East-West competition. Discussing NATO in an interview published on January 11, 2016 in Bild, Putin provided insight into his thinking then and now. During the interview, Putin quoted Bahr who stated in 1990: “If we do not now undertake clear steps to prevent a division of Europe, this will lead to Russia’s isolation.” Putin then quoted what he considered an edifying suggestion from Bahr on how to avert a future problem in Europe. According to Putin, Bahr proffered: “the USA, the then Soviet Union and the concerned states themselves should redefine a zone in Central Europe that would not be accessible to NATO with its military structure.” Putin claimed that the former NATO Secretary General Manfred Worner had guaranteed NATO would not expand eastwards after the fall of the Berlin Wall. Putin perceives the US and its allies as having broken their promises to avoid expanding further eastward, and doing only what is best for their own interest in the name of all countries. Putin told his interviewer: “NATO and the USA wanted a complete victory over the Soviet Union. They wanted to sit on the throne in Europe alone. But they are sitting there, and we are talking about all these crises we would otherwise not have.”

Vitae summa brevis spem nos vetat inchoare longam. (Life’s short span forbids us to enter on far reaching hopes.) Whatever it is that Putin wants to achieve, he must move faster than time wastes life. Time is not on Putin’s side. National leaders and political figures in power now in the capital of those countries of the former Eastern bloc which Putin so dearly covets to develop Russian influence are individuals of the last generation that even briefly lived while the Soviet Union had considerable influence, sway in their countries. Coming generations will only know the Soviet Union from history books. They will unlikely as a pattern, by inertia, due to insouciance  simply seek as their predecessors seek to connect with Moscow. The benefits of connection to the West will be well understood by them. Relatives who in the past decades who immigrated West would likely have some influence on their understanding of those benefits. Russia simply will not compare, offer anything they would desperately want to invest in their future. Russia itself represents the past, and how bad things were, something no one should reasonably want to be like or be part of.

As greatcharlie ruminated on in its January 18, 2018 post entitled, “Trump Wants Good Relations with Russia, But if New Options on Ukraine Develop, He May Use One,” Putin very likely has considered what Russia would be like after he, as one might presume he accepts, is “called to heaven” or perhaps elsewhere, goodness knows. It would seem that now while on Earth, he is on course regarding Ukraine to saddle future generations of Russians with a country or parts of it that are still economically, socially, and politically challenged that they will need to care for, to pay for. Future generations may not appreciate that. In Donetsk and Luhansk, future generations might abandon their homelands for “the other Ukraine” or points further West. They would unlikely pour into Russia for employment, a “better life.” In the future, a Russian leader might very well try to reverse whatever Putin seems to be attempting in Ukraine due to financial strains caused, or–not to be offensive–out of decency. Taking on Donetsk and Luhansk might very well be viewed in the future as a grave miscalculation, another step toward sealing Russia’s fate as a second tier superpower. It is greatcharlie’s assessment that future generations of Russians will not want to hold on to Ukraine as leaders of Putin’s generation, with an idea to reestablish Russia to resemble the Soviet Union. This reality may have value in negotiations with Putin. 

US Secretary of State Antony Blinken (left) and Russian Federation Foreign Minister Sergei Lavrov (right) meeting at Hotel Wilson in Geneva, Switzerland. January 21, 2022. For their next diplomatic step with Moscow, US policymakers, decisionmakers and negotiators must find a way for the two sides to work together in similar positive ways to create an outcome in which they both have a mutual and balanced influence on the situation. For instance, perhaps ways in which Ukraine could be helped along the way by both the West and Russia in tandem through an agreement that would also promote the maintenance of good neighborly relations and support the establishment of strong, positive relationships overseas without anyone being irritated. Washington and Moscow could engage in an exploratory dialogue during which suggestions could be sought on how the two sides could get from where they are to where they want to be.

A Possible Way Ahead in Diplomacy

For their next diplomatic step with Moscow, US policymakers, decisionmakers and negotiators must find a way for the two sides to work together in similar positive ways to create an outcome in which they both have a mutual and balanced influence on the situation. For instance, perhaps ways in which Ukraine could be helped along the way by both the West and Russia in tandem through an agreement that would also promote the maintenance of good neighborly relations and support the establishment of strong, positive relationships overseas without anyone being irritated. Engaging in what in essence would be an exploratory dialogue, transparent and frank, between Washington and Moscow on such matters would be the first step. In that dialogue, suggestions could also be sought from Moscow on how the two sides could get from where they are to where they want to be. If the US and Russia can cooperate on matters concerning the International Space Station, surely they can cooperate on an Earthly matter as Ukraine. N’est-ce pas vrai?

In theory, enough compromise might result from the collective talks to result in an agreement that would satisfy hopes and mitigate fears on all sides. Perhaps it would become the paradigm for peace in Europe that would remain until that time a new generation of Russia leadership that would share the values of other open, democratic and outward-looking societies. After the agreement is reached, Putin would need to feel freer and be able to stand upright. The US and its allies, the EU, NATO, the OSCE, the UN, and especially Ukraine would be on a long list of those who would need to be satisfied with the plan for negotiating with Russia and the resultant argument. Creating consensus and acquiring agreement across the board on everything negotiated with Russia will take time but that course must be taken. Besides, if one is to believe Putin, and accept that he has no plans to invade Ukraine, then there is no real need to rush.

In state-to-state talks between the US and Russia concerning Ukraine a structure has been established in which talks are held in rank order. Biden communicates with Putin, and Blinken communicates with Russian Federation Foreign Minister Sergei Lavrov. On both sides, it is possible that a set of reactions and responses to the positions and personas have already been formed. It would only be human to color anything truly novel added to the dialogue with considerations of what had already been said. Accordingly, it might be useful to enlist an envoy who could deliver the message that will end Putin’s sense of vulnerability and give immediate legitimacy to a call for multi-party negotiations for a comprehensive agreement on European security. That individual would need to have considerable standing with Putin to deliver that message. It could be a former US President, German Chancellor, or European President or Prime Minister that Putin seemed to favor. Perhaps a small multinational delegation of doyens rather than a single doyen could meet with Putin. He may appreciate that. The immediate task of whoever meets Putin would be agreement to cease actions threatening Ukraine and publicly making demands for that would require its government to surrender self-determination and freedom to associate with other countries as Kyiv saw fit. The appropriate alternative suggested would be to discuss all issues. Putin would need to be convinced that everything Moscow, he, might deem pertinent could be hashed out at the suggested multi-party talks. The theme of the conversation would essentially be “Let us do everything the right way this time.” Again, Putin may appreciate that.

As for any agreement reached through multi-party talks, if Putin accepts that approach to diplomacy, more than simple guarantees must be insisted upon. Apparently, Lavrov presented a rather one-sided draft treaty to Blinken when they met in Geneva on January 21, 2022. That will not do. It was a rather incommesurate and hasty approach to the situation given its enormity. The effort to maintain Ukraine’s security, Russia’s security, Europe’s security must not only be comprehensive, it must be a dynamic process. Not to get into too much detail,, but as a comprehensive agreement, a new agreement would supersede the existing Minsk Agreement, although its terms could be referenced. Reasonably, terms of a new agreement could be built upon terms of the Minsk Agreement when directly related. Of course, the decision on that, as with everything else, is completely in the hands of the negotiating parties. All issues concerning Crimea and existing sanctions could be disassociated from these talks. Those talks could continue in their current venue. Again, the choice there is completely in the hands of the negotiating parties.

The negotiation process might require parties to take some the following steps, among many others: construct detailed plans of action on every key area as mutually recognized, each issue of contention, must be formulated to ensure greater clarity not confusion; create a security zone could be created within which zero tolerance of isolation of the agreement would be established; create firm timetables for actions as reducing the number of destabilizing forces near border; create a security zone could be created within which zero tolerance of isolation of the agreement would be established; create firm timetables for the suspension for refraining from existing actions such as military exercises; reduce the scope and scale of military exercises near the Russia-Ukraine border despite perceptions of whether they are threatening or benign; establish liaison offices in the security zone on both sides of the Ukrainian-Russian border could be created staffed by Russian and Ukrainian officers and military advisers if desired by either party; organize limited but comprehensive aerial surveillance over the security zone would be organized and appropriately scheduled; establish multiple military and diplomatic committees each with responsibilities in key areas of the agreement and respectively staffed with appropriate expertise and authority could be created to review plans for action in key established under the main agreement or hash out nagging issues could possibly exist; organize and schedule direct Ukraine-Russia talks, in a multiparty forum, at the ministerial level and deputies just below to include NATO Members and non-NATO Members in European countries neighboring Ukraine can be created.

It would be crucial to eliminate all ambiguities at the negotiating table through multilayered agreements if necessary as the process moves along. Pull all loose threads detected at the negotiating table may include using scenarios and hypotheticals. Whether a negotiating path as suggested will create stability in Europe right away, greatly improve Ukraine’s security and remove Russia’s fears, perhaps even through some very creative steps, remains to be seen. Nil sine magno vita labore dedit mortalibus. (Life grants nothing to us mortals without hard work.)

Ukraine’s President Volodymyr Zelensky (center) visiting his country’s eastern frontline in December 2021 (center). On January 9, 2022, US Secretary of State Antony Blinken expressed the view on CNN that in the end, despite the vigorous efforts of the to correct the situation, this matter is mainly Kyiv’s problem and the Ukrainians have a Russian “gun to their head.” Viewing the crisis in that way makes it something akin to Ukraine’s “Reichenbach Falls”, the moment where Arthur Conan Doyle’s great fictional detective character, Sherlock Holmes was confronted by his archrival Professor James Moriarty after repeatedly disrupting his criminal schemes. As the story initially went, Holmes met his end in combat with him. It was revealed in subsequent installments of the series appearing in the Strand Magazine that Holmes survived the fight, his resurrection being demanded of Doyle by the magazine’s editors to satisfy their readership. One might hope fate will allow Ukraine to survive this crisis intact, yet there is nothing fictional about this situation.

The Way Forward

Non enim parum cognosse, sed in parum cognito stulte et diu perseverasse turpe est, propterea quod alterum communi hominum infirmitati alterum singulari cuiusque vitio est attributum. (For it is not having insufficient knowledge, but persisting a long time in insufficient knowledge that is shameful; since the one is assumed to be a disease common to all, but the other is assumed to be a flaw to an individual.) Putin does not seek to make Russia first in Europe nor match the power and position of the US in the world. Russia lacks the wherewithal, the resources,, and a lot of other things required to accomplish such objectives. However, Putin does want to control what he claims to be in Russia’s “near abroad”: the former Soviet republics on its border. As the US and its European allies become more engaged with them, it becomes less likely that he will be able to accomplish that goal either. If the US and its allies were not enough trouble for Putin, his “friends” in Beijing have been knocking on the doors of those near abroad governments, making enticing, huge offers, which Moscow cannot match, to invest in their economies and support industrial and infrastructure development as a way to enhance ties–albeit perhaps not always in a legitimate way. Unfortunately for Putin, he was unable to shape Russia’s position in the world positively over the past two decades, by transforming the country to be a contributing member as an advanced industrialized, economic power, and present Russia as anything close to an alternative as a partner to its neighbors. Russia remained a country from which villainy of some sort was expected more than anything else. Unable to sway the capitals of bordering former Soviet republics to Russia’s camp, it would seem he made the decision a while back to use brute force. US decision-makers should not simply expect Putin to get a hold of himself, and get a grip concerning the use of greater military force in Ukraine. He already moved on Crimea, so for many, no points could be argued that would convince them that he would not do more. The capture of Crimea may have actually been only the first phase in a plan of far greater conception concerning Ukraine.

Washington wants to avoid a conflict in Ukraine. For Washington, success in resolving the Ukraine crisis would likely mean crafting a sustainable agreement with Russia, within acceptable parameters of US values and interests, and that is the rub. Some national leaders in Europe might go as far as to say aggression simply resides in Putin and it is too late for any worthwhile diplomacy with him. They may need to overcome an anxiety over the history of Russian behavior before altering their thinking on that. Still, at the same time, no responsible party involved in this matter wants war. Given how Putin thinks, more than aggression and dissatisfaction with US policies and moves inform his actions. A real sense of vulnerability in Putin toward the US and its allies has been a subtle and profound undercurrent in his decisionmaking and approaches toward them. That sense of vulnerability is intensified by Washington’s efforts to make diplomatic inroads with countries Putin seems to feel belong to Russia. Putin has actually said that US moves evoke his actions, which thereby are actually reactions. That is hardly something he, or any military commander, would want to admit or to accept.

As suggested here, US policymakers, decisionmakers and negotiators must find a way for the two sides to work together in similar positive ways to create an outcome in which they both have a mutual and balanced influence on the situation. For instance, perhaps ways in which Ukraine could be helped along the way by both the West and Russia in tandem through an agreement that would also promote the maintenance of good neighborly relations and support the establishment of strong, positive relationships overseas without anyone being irritated. Some, despite everything presented here, albeit in brief, might contend that there is little obvious room for compromise from either side. However, the referee has not yet blown the whistle for full-time. It has always been greatcharlie’s contention that smart people are usually able with the appropriate amount of effort to find answers to problems. A posse ad esse. (From possibility to actuality.)

Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago

A most apparent sign of the presence of Chinese intelligence services in Hong Kong is this plaque outside the People’s Republic of China National Security Office there (above). This essay is as a companion piece to greatcharlie’s proceeding essays on Chinese intelligence services. For the scholar who is a regular reader of greatcharlie, the essay will hopefully be an interesting discussion on the function of intelligence services in China with respect to functions of services in the United Kingdom and the US. However, this essay has the additional purpose of serving as a vehicle to assist students. For students, this essay aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels and the development of further insights. Hopefully, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights.

For a one man shop as greatcharlie, reviewing a voluminous quantity of sources in the preparation of the July 31, 2020 and August 31, 2020 posts entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 1 and 2 respectively), was, to a degree, an exercise in large data processing. Yet, while engaging in that consuming, yet satisfying process, the thoughts of greatcharlie’s founder and editor hearken back to an assignment received as an undergraduate at Columbia College, Columbia University in a course “The Politics of Policymaking.” The course instructor, Roger Hilsman (1919-2014), who was also the student advisor and mentor of greatcharlie’s editor, asked students to construct an essay or, as he dubbed it, a “thinkpiece,” in which they were required to present their “observations, meditations, ruminations, assumptions, and hypotheses” that billowed up after reading a primary or secondary source directly related to a foreign and national security policy topic covered in his class. (The source greatcharlie’s editor used, at the suggestion of Hilsman, was Glenn Paige’s The Korea Decision (June 24-30, 1950) (Macmillan, 1968).) However, Hilsman’s goal with the assignment was to encourage students to move away from simply regurgitating what was studied and writing the derivative college essay. Instead, he wanted students to evoke thoughts from their respective sources and lessons but also from personal experience, and their albeit youthful worldview, and draw from them their best insights on the topics they chose. For Hilsman, a phenomenal educator, the assignment was not founded upon some understanding of the requirements of analytical work in international affairs developed in the abstract, but rather, developed upon substantial experience preparing his own analyses and supervising and mentoring subordinates and colleagues in their analytical work in the US military, intelligence, and diplomatic arenas; real world! More specifically, Hilsman’s background included: studying at US Military Academy; service in Merrill’s Marauders and command of an Office of Strategic Services guerilla warfare battalion in Burma in World War II (Hilsman’s valorous service is superbly related in his memoir, American Guerilla: My War Behind Japanese Lines (Brassey’s, 1990)); his work as a military planner for NATO and the Supreme Headquarters Allied Powers Europe; service in the administration of US President John Kennedy as Director of the Bureau of Intelligence and Research for the US Department of State; and, service as Assistant Secretary of State for Far Eastern Affairs in the administration of US President Lyndon Johnson.

Hilsman would not only transmit his sagacity through his “The Politics of Policymaking” course, but through discussions on policymaking and analysis that he had with students during seminars held at his residence were marked not only by the inspiration and encouragement he would give to students in their research and career plans, but also by a frankness and realism that would give them a leg up in future endeavors. The reminiscences Hilsman would share directly with greatcharlie’s founder and editor during office hours were from those periods of his life that are perhaps the most intriguing in his biography. During lectures, he would always provide a riveting anecdote from his experiences during the 1962 Cuban Missile Crisis to accompany his “pearls of wisdom.” The student-teacher relationship between Hilsman and greatcharlie’s founder and editor was mentioned in a March 8, 2016 greatcharlie post entitled, “An Look at Stephen Marrin’s ‘Improving Intelligence Studies as an Academic Discipline’ and Remembering a Professor and Friend, Roger Hilsman.”

For student readers, this essay, divided into three segments, aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels, and to stimulate the development of further insights. Hopefully, by focusing on the topics discussed, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights. The essay also aims to foster conscious critical reading of scholarly works by student readers. Some emphasis is placed on the sources themselves. Hopefully, reading about spies and spying makes this unsolicited bit of mentoring all the more interesting. For scholars who are regular readers of greatcharlie, the aim of the essay is to provide an edifying discussion on the function of intelligence in China relative to intelligence functions in the United Kingdom and the US. This essay also stands as a companion piece to greatcharlie’s preceding essays on Chinese intelligence services. While as a thinkpiece this essay may be limited in scope, greatcharlie surely has not touched bottom of its well of ideas on the subject of Chinese intelligence services. For greatcharlie, this “multipurpose” essay is only a part of its process of worming out the story of Chinese foreign intelligence and counterintelligence. Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.)

MPS officer finger-wags a warning to photographer in Beijing (above). Except for experienced hands on China policy and the Chinese intelligence services and national security via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, is responsible for foreign intelligence, counterintelligence, and internal security as well.

I. MPS and MSS: Keystones of Chinese Intelligence

Two relatively quiet but absolutely key elements of the Chinese government that impact its foreign and national security policies: the Ministry of Public Security (MPS) and the Ministry of State Security (MSS). Except for experienced hands on Chinese foreign and national security policy and Chinese intelligence services via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems firstly through providing consumers in Beijing of analyzed information to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, government ministers, senior executives of relevant ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions. They additionally share what is collected and analyzed with the People’s Liberation Army (PLA). At times, that information is also collected and analyzed with the help of the military. The impact of the MPS and MSS is also demonstrated through contacts their officers and operatives respectively have daily with officials and staff of foreign governments as well as personnel at all levels of Chinese and foreign businesses engaged in international trade, high-tech-firms, defense contractors, financial institutions, academia, and organizations from all fields in China and worldwide.

The true foundations for MPS and MSS were laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Mao Zedong thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces in 1949, a full array of government intelligence organizations were created to supplement Party-based intelligence services such as SAD. CDSA would draw information from foreign news agencies and open sources.

The Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a Deputy Chief of Staff to People’s Liberation Army (PLA) Chief of Staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. According to Xuezhi Guo in China’s Security State: Philosophy, Evolution, and Politics (Cambridge University Press, 2012), it took on the role of a security service in a manner based on Soviet and Eastern Bloc models. It eventually received responsibility for all aspects of security, from regular police work to intelligence, counterintelligence, and the suppression of anti-Communist political and social groups. That led to receiving  official jurisdiction over counter subversion, counterintelligence, and the conduct of espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. 

MPS made its way through the turbulent 1960s with the Cultural Revolution and dynamic changes in politics in the 1970s with the loss of Mao and the coming of Chairman Deng Xiaoping. By 1983, there was considerable frustration within the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to a new organization known as the Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS. The Communist Party of China’s first big mission for MSS was to place focus on students in both China and abroad. Students had left no doubt that there was reason for the Chinese leaders to hold such concern after the Tiananmen Square protests. Chinese leaders struggled to deal with fallout from it. The sense of danger that students posed to the country was promoted with the announcement by Chinese authorities that some 200 Chinese had been accused of spying for the Soviet Union. When the reorganization of MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak.

In the West, certainly the most significant, largest, and most powerful intelligence services reside in the US. However, the foundational intelligence services that was the model upon which the main US intelligence services have been based–as well as the services of many other countries–are those of the United Kingdom, namely the Security Service, known popularly as MI5, and the Secret Intelligence Service, known popularly as MI6. To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. Two prominent works, central to the discussion here, are Christopher Andrew, Defend the Realm (Knopf, 2009) and Stephen Dorril, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000). Both scholars undertook Herculean tasks respectively and managed to fulfill them marvelously and masterfully. Both texts respectively hold richly textured accounts of intelligence activities at home and around the world, the British Empire as it still was for a time in the 20th Century. Both are major contributions to the scholarship on intelligence in the United Kingdom.

A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. Plainly, there is no moral equivalence between MI5 and MI6 and their opposites, MPS and MSS. What the United Kingdom and Chinese intelligence services would call successful operations based on the respective goals of political authorities are quite disparate. Officers of the respective countries’ intelligence services are certainly not birds of a feather. Additionally, and importantly, MI5 and MI6 are the opponents of MPS and MSS, and visa-versa. Enlarging on the point of the political authorities they obey, the respective societies and political authorities, that the intelligence services of the United Kingdom and China serve, are considerably divergent, and founded on disparate philosophies. The United Kingdom is a parliamentary democracy under a constitutional monarchy. Despite having the structure, the veneer, of being a multiparty system at the national level, for all intents and purposes, China is a single party, Communist, police state. 

Quaeritur belli exitus, non causa. (Of war men ask the outcome, not the cause.) At a basic level with regard to intelligence services, moral principle and philosophy, in this case whether recognized as being based on Judeo-Christian values, Liberalism, Capitalism, Communism, Socialism, Maoism, or otherwise, is not method. Method is method. Philosophy is philosophy. Moreover, in the intelligence industry, results are what matter most. To that extent, at the basic level, the work of the two services are going to have sufficient likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here. With this in mind, hopefully scholars will be open to considerations presented.

Two MPS officers operating high-tech optical equipment in Beijing (above). To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. at the basic level, the work of the two services are going to have enough likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here.

Using MI5 as a Yardstick to Gauge MPS and Its Activities

The Security Service, known informally and hereinafter referred to in this essay as MI5, is the United Kingdom’s government agency assigned with managing the country’s internal security. It is authorized to investigate any person or movement that might threaten the country’s security. Although MI5 is responsible for domestic counterespionage, it has no powers of arrest. MI5’s motto is: Regnum Defende (Defend the Realm). The Secret Intelligence Service, known informally and hereinafter referred to in this essay as MI6, is the United Kingdom’s government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. MI5 has only a few thousand employees. It is headquartered in London, at Thames House. MI5 is a component of a vast intelligence apparatus in the United Kingdom. Reportedly, command and control is directed via no less than four entities: the Central Intelligence Machinery, the Ministerial Committee on the Intelligence Services, the Permanent Secretaries’ Committee on the Intelligence Services, and the Joint Intelligence Committee. Communications intelligence is the responsibility of the Government Communications Headquarters (GCHQ), which works closely with the Communications Electronics Security Group, while a number of agencies manage military intelligence under the aegis of the Ministry of Defense. Even London’s Metropolitan Police, or Scotland Yard, has its own Special Branch concerned with intelligence.

While MI5 is the agency responsible for the internal security of the United Kingdom, it primarily provides security services and intelligence operations within England and Wales. Its current role was best expressed by the Crown Minister in 1945, with regard to its postwar raison d’être: “The purpose of the Security Service is defense of the Realm and nothing else.” MI5 reports to the Home Secretary of the Home Office. It may be confused as being a domestic law enforcement organization, but it is far from that. To perform the internal security function, MI5’s activities include: domestic counterintelligence; counterespionage; counterterrorism, counterproliferation, and cyber work within the country and protective details for many top government officials. Its officers do not have authority to arrest citizens. When needed, MI5 will work in close cooperation with London’s Metropolitan Police Service (headquartered at New Scotland Yard) and other local police agencies within England and Wales. This is especially when it concerns their efforts to fight domestic terrorism. MI5 may also interface with MI6 when foreign intelligence and domestic intelligence activities intersect.

It cannot be overemphasized that MI5 is a secretive organization. Well back in 1931, the firm instruction to a new employee was: “No one, not even our own families, should be told where we worked or for whom.”  The existence of MI5 was not acknowledged officially until 1979, when Mrs Thatcher unmasked Sir Anthony Blunt as the Fourth Man in a statement to the House of Commons. Its head was publicly named for the first time in 1991. It was also at that time when some previously classified information about MI5, such as the number of its employees and its organizational structure, was made public. During the past three decades, MI5 worked its way through a number of scandals–to include incessant hunts for apparently nonexistent moles–that further tarnished its reputation in many circles. Reflective of British culture, members of the intelligence services, from top to bottom, were unwilling to display any disappointment or hurt and never looked to cry on anyone’s shoulder. They remained reticent about attitudes toward them and placid, straightforward, as they performed their work. Somewhere along the line, a solution was found. The decision was made to release their stories, not to drain themselves out, but let little bit find its ways into the public marketplace to unmask appearances public relations-wise. Through the use of surrogate voices, a sudden fracture in the marble reveals the interior. The inner life. Studies were commissioned to tell their stories, to the extent possible.

Most relevant in Andrew’s Defend the Realm to the examination of MI5 in this essay, are anecdotes loaded with insights on events that were in their time of the utmost importance. Those cases chronicalized, carefully selected from MI5’s storied past, and detailed the complex nature of MI5’s modern day work is revealed. Additionally, from Andrew’s work, one receives a picture of MI5 as a tightly-knit institution, in which many officers keep body and soul together, and others actually thrive, in its atmosphere of secrecy. Based on what has been made public, in an investigation of a threat to the United Kingdom, MI5 officers will usually seek to gather covert intelligence directly. Often, they operate openly and declare themselves as representatives of foreign intelligence services to their host country. The methods used by MI5 officers vary widely, and are often limited only by their ingenuity. Armed with a suite of the latest high-tech tools for surveillance, they will use it to eavesdrop, tap telephone calls and communicate secretly. Normally, MI5 officers will recruit spies to obtain intelligence on their behalf. 

More formally, a spy working for MI5 is known as a “covert human intelligence source,” but in the United Kingdom, spies are more commonly referred to as agents (Interestingly, in the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), a covert human intelligence source is called an “informant” rather than an “agent.” Such agents have been consistently referred to as operatives by greatcharlie.) MI5 agents will do far more than just inform about people and events. Agents secretly provide private information to which few or no others might have access, as well as classified information to an officer. An agent will probably not be a professional “spy” but an MI5 intelligence officer will usually provide them with some basic instruction in tradecraft, espionage methods. The human relationship between intelligence officers and their agents remains a key element of espionage.

MI5’s earliest precursor was a secret service formed in 1569 by Sir Francis Walsingham, who later became secretary of state to Elizabeth I. What came to be called MI5 was formed in 1909 under the leadership of Vernon Kell, then a captain in the British army, to identify and counteract German spies then working in the United Kingdom. It performed that task with great effect. MI5 originally stood for “Military Intelligence [Department] 5.” (In fact, there were a number of departments within the Directorate of Military Intelligence–MI1 through MI19–which dealt with a range of issues. MI1, for instance, was responsible for code-breaking, and MI2 handled Russian and Scandinavian intelligence. The responsibilities of these departments were either discontinued or absorbed into The War Office, MI5 and MI6 and, later, the Government Communications Headquarters.) After World War I, MI5 remained in place as part of the United Kingdom’s effort to centralize control of intelligence functions. In 1931, MI5 was renamed the Security Service, but was still commonly known as MI5 then as it is today. About the time it was renamed, MI5 was paired with MI6, under the Defence Ministry and functioned with a “combined staff” of only two men. Kell, MI5 founder, remained in charge of the agency until 1940. During World War II, with far more staff, MI5 enjoyed a considerable number of successes. One was the Double-Cross System, which fed disinformation to Nazi Germany. For the most part, however, it is recognizably difficult to measure MI5’s success, since it can only be judged by things which do not happen, such as the prevention of sabotage. 

There was initial period of confusion at the start of World War II as a MI5 was inundated with work and had too few staff at all levels to handle it. Missteps led to “life-saving” reforms with the coming of Sir David Petrie in April 1941. MI5 is better known in the war as having achieved great success in uncovering Nazi agents in the United Kingdom. Captured Nazi records studied after 1945 indicated almost all of the Nazi agents working against the United Kingdom were captured. The exception was ine the committed suicide. MI5 managed to recruit a number of the enemy agents to become counterespionage agents for the service and fed false information to the enemy concerning military strategy during the war. MI5 executed the famous “Double Cross” system which was a deception that supported the success of the D-Day Invasion at Normandy in 1944. A proud episode for MI5 was its defense of Gibraltar from enemy agents and saboteurs throughout the war.

MI5 engaged in a hard fought struggle with Soviet, Eastern Bloc and Chinese espionage efforts in the United Kingdom. The situation was made more difficult was the rise in IRA terrorism during the Troubles. One MI5 renowned victories was its uncovering of Soviet Union’s most valuable agents was exposed. However, MI5’s record during the Cold War, actually was mixed. There were a number of widely publicized blunders during that period. The Soviet Union was found to have deeply penetrated MI5, as well as MI6 which reportedly undermined the public’s confidence in the organization.

Low morale reportedly plagued MI5 after the end of the Cold War and the Good Friday agreement of 1998, which led to massive cutbacks. The agency’s focus would eventually shift after the Cold War from counter-espionage and counter-subversion to counterterrorism. That shift was given greater emphasis following the September 11, 2001 terrorist attacks in the US, and counterterrorism became a role of the utmost importance following the July 7, 2005 and July 11, 2005 terrorist bombings in the United Kingdom. MI5’s ranks were filled out rapidly, and within it was a renewed sense of purpose. Today, counterterrorism operations still account for much of MI5’s activities. 

Not all of the anecdotes that Andrew offers spotlight the valor of its officers. There are some of the rather lurid intrigues. They include a cast of cheats, schemers, supplanters, unsavory allegiances, and unimaginable acquaintances. One dare not imagine the sensibilities of the errant individuals behind them. In the discussion of the work done within the analytical shops of MI5, the finer shades of analysis and deduction are spotlighted. Information was looked upon pathologically as the source of motives, clues, indications, and implications. With that analyzed information, MI5 leaders would speak truth other power, whatever it came upon, no matter how offensive, it was told straight.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

Intelligence Work of MPS

If one placed the history of Chinese intelligence alongside that of the United Kingdom, one would find that the craft of intelligence was studied in China long before the idea of formally organizing intelligence activity was manifested in 16th century England. The most illustrious expressions of intelligence concepts and methods in China was in Chapter 13 of The Art of War, a treatise dating from the 5th century by the Chinese military strategist Sun Tzu. Chapter 13 focused on the importance of developing good information sources, and identified five specific types of intelligence sources along with ways to best manage each. However, the lineage of modern Chinese intelligence services,  as noted earlier, have more recent beginnings in the era of Mao. Similarities between MPS and MI5 exist insomuch that it is the Chinese intelligence service charged with internal security and domestic counterintelligence activities of China. It investigates and acts against any person or movement that might threaten China’s security, but unlike MI5, its officers have the power to arrest. In addition to its performing those standard domestic functions as an intelligence service, MPS is very much tied to the Communist Party of China to maintain control of the population and maintain the Communist order. To that extent, it has remained obedient to the ever shifting requests and requirements the Party issues to it. To be more specific concerning the responsibilities of MPS, they include: preventing, stopping and investigating criminal activities; fighting against terrorist activities; maintaining stability and order; administering to transport, fire fighting and dangerous objects; administering to household registration, identification cards, nationality as well as entry, status and exit of Chinese and foreign nationals; maintaining border security; protecting persons, venues and facilities as designated by the state; managing gatherings, parades and demonstrations; supervising public information networks; supervising security concerning state organizations, social organizations, enterprises, institutions, and large construction sites; and, guiding community security commissions.

The Communist Party of China has hardly proven to be pristine in practicing what it preaches. What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. Normally, finding the truth is sine qua non among intelligence and counterintelligence services, and law enforcement. To fail to find the truth, well-aware that one holds a paucity of facts, information and data, is to fail oneself. Naturally, being aware of the existence of information that contradicts one’s initial hypothesis and doing nothing to dig deeper is counterintuitive.  Having stated that, in the intelligence industry, the slightest deviation from the course ordered on an investigation to satisfy the requirements of the powers that be throw the rules out of the window. However, when tasked directly by the Communist Party of China, the truth lies in what the Party says the truth is. If MPS officers were to present findings from an investigation that held information contradicting the truth as declared by the Communist Party of China, they would unlikely garner understanding from their respective national provincial, or municipal senior executives and managers. In the best case scenario, the ironic admonition might come from on high to stick with the primary problem instead of rooting around at “extraneous matters.” That is the type of relationship that Chinese intelligence services have had with the Communist Party from their very beginning. They are charged with the responsibility for ensuring the tranquility of order. From outside of China, one can freely call the well-experienced intelligence officers who fill the ranks of MPS as tragedians, specializing in a very tragic role for their country.

Manifestations of Political Pushes from Behind in MI5’s Past

In examining MPS, it cannot be stressed enough that it is a political creature of the Communist Party of China. MI5’s circumstances are not remotely similar. MI5 is not an organization designed intrinsically to service the political interests of political authorities. However, there have been occasions when political authorities have misused the vital security arm by using pressure to influence its actions, for purposes that were questionable. Shockingly, the MI5 carried out secret surveillance of the colonial delegations which came to London to discuss terms for independence in the 1950s and 1960s. Andrew gives a disturbing account of the stealthy gathering of intelligence on the delegates attending conferences which negotiated the independence of Cyprus and Kenya. The Home Secretary, Rab Butler, cynically condoned these operations on the grounds that “obviously the product was of great importance and of great value to the government negotiators”.

In most of the British Empire, claims Andrew, MI5 contributed to a smooth transfer of power through the work of its liaison officers. However in Guyana, where United Kingdom Prime Minister Sir Winston Churchill wanted to “break the Communist teeth,” a shameful exception was witnessed. MI5 obediently provided support for the United Kingdom and US covert action to oust the democratically-elected Cheddi Jagan from power. Andrew claims that the dominant intelligence agency in the years leading up to Guyana’s independence in 1966 was the Central Intelligence Agency (CIA). However,  MI5, and thereby the government of the United Kingdom, nevertheless had a hand in the affair. 

In the present day, such outcomes are certainly not intended in MI5, an organization tasked and trusted to protect and serve the United Kingdom. To ensure that remains so, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. The Home Secretary oversees MI5, as well as the National Criminal Intelligence Service and Scotland Yard. To the extent that there is always the need for such a degree of oversight from above, one must never overlook the shadowy side of the business. It is at the core of intelligence work. There is a reality that by doing the dirty work, the people of the United Kingdom are allowed to sleep peacefully at night. When the situation is dire and urgent enough, use has been made of agent provocateurs who may take direct action to maintain their bona fides within their groups for the organization’s purposes.

Today, officers join and serve MI5 with the belief that its work has much to do with the wider good. As the targets of MI5 efforts are the terrorists or the war criminals or the nuclear proliferators. There is an understanding how the need to approach a matter of the utmost importance with the most effective method available can subordinate all else. Whether or not exigent circumstances permit, there at least exists the earnest aim among them to defend the values of the United Kingdom’s liberal democracy. Unlike its counterpart in the Chinese intelligence services, MPS, causing harm to the free people of their own country, who are living within the law, is never the intended purpose of MI5. Indeed, while also ostensibly tasked and trusted to protect and serve the people of their country. MPS keeps a boot not only to the neck of criminals and true threats within China, but of groups of innocent citizens labeled as undesirable by the Communist Party of China, and doing that appalling work at the Party’s behest, to be frank, could be ascribed as an essential part of their raison d’etre.

Other Ugly Truths

As long as humans are involved in an organization and its plans and activities, rarely will outcomes be perfect. It could be expected to be imperfect shaped by mistakes, misjudgments, biases, and emotions. To that extent, there is no purpose here to establish MI5 as a paragon of moral behavior. In its history, mistakes were made. Pointing to them means admitting to the truth. (Interestingly, the historical record indicates the nearly contemporary national intelligence service has suffered from its share of mistakes.) What can be greatly appreciated in Defend the Realm is that Andrew tells the MI5 story straight. The ugly truth as told, creates some disappointment, yet from it, lessons were certainly made available that would allow for the organization’s improvement. According to Andrew, recruitment within MI5 was perhaps the most outward expression of inward thinking in the organization. It was surely not acceptable by today’s standards intellectually, morally, ethically, and professionally. Indeed, within the organization itself, MI5, a public service, did not advertise openly for recruits before 1997. Up to that point, recruitment was based on personal recommendation. This was a narrow social group, many of whom had served in India or elsewhere in the Empire. To that extent, the organization was sure to recruit “from good Anglo-Saxon stock.” Reportedly, male officers listed their recreations as cricket and hunting, while female officers were graduates of elite schools and universities

Right up to the mid-1970s, the post-war Security Service refused to recruit Jews on the grounds that a dual loyalty to both Israel and the United Kingdom might create a conflict of interest. This was “inexcusable,” Andrew rightly observes. There was also a very disturbing attitude taken toward Blacks interested in joining the Security Service. In 1949, then Deputy Director General Guy Liddell told the Joint Intelligence Committee: “It was true that niggers coming here often went to the C[ommunist] P[arty].” That fact that he held such appalling racist views were reinforced when he explained there was no doubt in his mind that “West African natives are wholly unfitted for self-rule.” There was a sour spirit to it all. Yet, that was the spirit of the moment. A sort of “pigs in clover” self-satisfaction influenced and distorted thinking in the world of that past era.

While MI5 was busy keeping some citizens out of its intelligence service, its rank and file was surprised to discover who they had let in. In 1951, as the result of the decrypted telegram of the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, that any of the Cambridge Five–then current or former all MI5 or MI6 employees, who were recruited as spies by the Soviets in the 1930s when they were young misguided Communists at Cambridge University–were identified. The bombshell revelation sent shock waves through the halls of MI5. In response, MI5 initiated an investigation that lasted 30 years in order to get to the bottom of the matter.

Among other unfortunate episodes for MI5 was the “Wilson plot” of the 1970s in which United Kingdom Prime Minister Harold Wilson was accused of being a Soviet agent–the information came from the CIA’s Counterintelligence Division, James Jesus Angleton based on claims of questionable source. MI5 investigated the claims and found them to be false. There was also the “Death on the Rock” case in 1988 in which MI5 with Spanish authorities were alarmed about three members of the Provisional Irish Republican Army (IRA) Belfast Brigade who travelled to Spain. It was presumed that they planned an attack against British troops in Gibraltar. MI5 intended to capture the IRA members with the assistance of the British Army’s Special Air Service Regiment cooperation of Spanish Authorities, but all three were killed in the process.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

The Communist Party of China’s Political Manipulation of the MPS Today

It would appear that the leadership of the Communist Party of China is usually distressed exceedingly when even the mere suggestion is made that some underlying evil is present in the decisions and actions of the Chinese government towards its own people. There is the insistence by the Communist Party of China that it acts only in their best interests and the thinking behind each choice is gifted by what their Western counterparts would call scruple. Thus, when any reports, photos, or videos of the actual treatment of ethnic and religious minorities in China are secreted out of the country and headlined in the West or anywhere else in the world, it is nothing less than an absolute disaster. The belief among Communist Party of China’s leadership and members that China’s Communust society is near perfect and would be best for the world is a belief in a false reality. The prospect of any citizen or any foreigner, unmasking the appearance created by Beijing of China being an advanced industrialized society and superior culture truly seems to terrify the Communist Party of China. Burned rotten by somewhat regular investigative reports and exposé documentaries, written and produced in the West, they, without fail, will attempt to cover their traces rather than spill it out. Government and Party spokespeople will roar about China’s innocence and the false and bizarre nature of what is reported. Trying to figuratively get the toothpaste back into the tube has never worked though. Focusing on what it can control, the Communist Party of China engages continuously in an effort to grease the wheels of citizens thinking to ensure that it always slides in its favor and toward appreciation of the Communist Revolution. To stanch the thickening of misgivings among the Chinese people toward its actions, ever present are warnings to citizens to guard themselves against foreign agents, look upon foreigners with some suspicion, and be cognizant of the possibility of unwittingly giving cause for foreign agents to trace them and spot them as potential recruits as spies and informants through seemingly innocuous contact.

The Communist Party of China has long acknowledged that there is always a threat that could arise from the “unsuccessful” education of Chinese citizens. A symptom of that would be the attraction to materialistic symbols of success for the former bourgeoisie class apparatus of success: business success, homes, cars, things constructed around people. It was what identified them as being above the proletariat, the working class. In China, given its relative prosperity, there exists the fear among leaders of the Communist Party and government bureaucracies that the bourgeoisie existence of the West would insinuate itself in the thinking of Chinese citizens and become a preference in their minds. Any aspiration created for what the West has to offer not under controlled circumstances could figuratively spread among the people much as a virus, infecting the proletariat, potentially creating some mass disaffection toward the system. Perhaps such sensibilities reveal a secret doubt that Chinese citizens could see that so-called ideals of Maoist Thought and Marxist-Leninism had been betrayed or perhaps were simply Utopian, and that they would desire great changes. Communist Party of China leaders determined long ago that the response to this threat needed to be strong enough to match “the severity of the disease.” 

As part of its efforts at population control, the Chinese government insists that the people keep a watchful eye over threats to the new system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema. It was in the performance of the mission to discourage, punish and obliterate that threat that the MPS earned a reputation for being the horrifically oppressive cats paw of the authoritarian regime. The MPS has interfered in interactions and relationships between citizens, ordered citizens to spy on their fellow citizens, demanded that they betray one another, regularly performed intrusive and demeaning searches of citizens’ person, homes, and workplaces. There have been arrests of many innocent citizens, accompanied by abusive and endless interrogations. The shadow of sudden death hangs over the head of any individual in MPS custody.

As of late, what should be of greatest concern is the approach the MPS has been taking toward foreign visitors. (The matter is elaborated upon later in this essay.) As a practice, foreigners, especially, Westerners, are closely observed and often investigated by provincial offices and local MPS stations. Under such circumstances, there is always a real possibility that one might be arrested or “briefly” detained for questioning, would be created. Foreign visitors who have faced such treatment have almost immediately become the center of a frightful international incidents, which is actually the goal of Chinese authorities. Regardless of one’s status in the US, it can happen in China. Reportedly, the attempt has been made with some foreigners to persuade with the pressure of interviews, interrogation, and detainment or use certain manipulations to convince them to let themselves go and reveal “the truth.” Telling the truth would mean copping to preconceived ideas held by their interrogators about their alleged wicked missions against the People’s Republic of China. The treatment of Chinese citizens detained by the MPS for even lesser “offenses,” is always decidedly worse.

The Beijing Municipal Public Safety Bureau Office Building (above) MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. Assessments of what type of temptations could be used to bring them to China’s side will be based on observations of the foreigner’s lifestyle. MPS officers have no qualms about exploiting individual weaknesses.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) Spin concerning the maltreatment of ethnic and religious groups is propagated through narratives in the state-run news media of how much the Communist Party of China is doing to protect China from enemies, domestic and foreign, at the hands of which the Chinese people have suffered for so long. Nevertheless, a good number of Chinese people are aware that one cannot know with certainty what is real from what one hears from the government. However, holding a secret doubt about the system in China can lead to a solitary despair. The secret doubt becomes dissatisfaction with one’s work and one’s situation which can become a full-blown loathing of the system. Soon after may come the rejection of authorities. In response to conditions forced upon them, being subjected to humiliations, Chinese citizens of some ethnic and religious minorities have acted in protest, releasing a sense of frustration. Becoming vocal may relieve his sense of frustration for the moment will only open the door to far greater problems. To Chinese government authorities, it represents nothing less than a social dissembling within those groups.

Loyal Communist Party members can hardly understand that any other citizen’s disillusionment or disappointment in government efforts to respond to their needs could be based in logic. Thereby, the attitudes of those citizens are irrational and reactionary. Surely, those approached by MPS display intense emotions, very likely overwhelmed by great fear and sheer terror, given an expectation the worst will befall them given the organization’s reputation, would avail themselves to be apprehended and held indefinitely as their situation would immediately be converted into a psychiatric issue. After all, any charge will do. The goal is to cull the so-called threatening population by plausibly arresting benign citizens and warehousing them away from their homes. One can only imagine that it would mean for those declared to have psychiatric issues to be placed in the hands of medical professionals linked to the MPS. MPS officers are apparently not timid to draw very false, aberrant, far-fetched inferences from fact collected during investigations. Of course, no professional ethics, no moral principles founded upon religion, and no less spiritually based philosophy of humanism could not obstruct such actions. Ethnic and religious minorities must feel akin to big chickens in a world of foxes.

A principle is a precise standard, a course of conduct you are committed to, a way of life that you live by. Adherence to principles, has little meaning to the Communist Party of China unless the principles adhered to are those of the Party. Publicly available sources show that Beijing considers Falungong, Tibetans, Uyghur Muslims, democracy activists and pro-independence Taiwanese undesirables as they adhere to principles and a way of life adverse to that insisted upon by the Communist Party of China. They have been named the “five poisons” that constitute the greatest threat to Beijing’s rule. Tibetans, Uyghur Muslims, in particular, are essentially looked upon as vindictive ill-balanced creatures of China’s hinterland.

As noted here MI5 unfortunately has a record of past mistakes and poor judgment, too, and fortunately from that history, lessons have certainly been learned. Yet still, making mistakes and misjudgments is a far cry different from being deliberately bad, acting the name of injustice and engaging in cruelty, based on a contrived motive and without any reasonable provocation. MPS currently engages in activities which, not to apportion wickedness, manifest just how different the two intelligence services really are. MPS, as an organization, espouses great anger about ethnic and religious minorities, dubbing them activists, reactionaries, counterrevolutionaries, and terrorists, and for the sake of the Communist Party of China and the Communist Revolution, has done what it does best, acted aggressively toward such “threats.” If one is of a ethnic group or religious groups at variance with the Communist Party of China, and consequently under the thumb of the MPS, one will have the sense of being in contact with an evil of an exceptional nature. In recent years, egregious abuses have increased through government policies under the pretext and justification of fighting the “three evils” of “ethnic separatism, religious extremism, and violent terrorism.” 

Tibet is an autonomous region in the People’s Republic of China. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability. Omnis enim ex infirmitate feritas est. (All savageness is a sign of weakness.)

Tibetans detained by MPS officers facing judgment in court (above). China has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability

Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.” A commonality among the homelands of the different ethnic and religious groups in China is the fact that they are depressed regions with unemployment, poor infrastructure and many structures tumbled down. Interdum volgus rectum videt, est ubi peccat. (At times the world sees straight, but many times the world goes astray.)

Regarding religious minorities, during the first thirty years of its existence, the Communist Party of China committed itself to making atheist Marxism the fundamental ideology of the country. depriving the Chinese people of their constitutional right of religious liberty. There is a clarity and certainty that comes from being able to know another’s origins. One place to look to identify, research, is to study a the  of culture, history, customs, that may shape the subject’s attitudes and behaviors, worldview. Adherence to religion, culture and identity as well, stiffens resistance to authoritarian pressures and coercion, and girds uncommon perseverance. To that extent, the Communist Party of China surely fears citizens’ adherence to their religions and cultures, and the rejection of Communism. In response to that threat, Beijing has formulated and implemented new policies, regulations, and legislation impacting religious freedom have been created and implemented, particularly since 1979. The idea of it all being to surgically strip citizens of their ethnicity, culture, and religion, thereby smother the individual’s identity, leaving the individual with nothing to grab onto, except Mao’s teachings on Chinese Communism. In the report of the US Congressional Executive Commission on China (CECC), 2017 Annual Report 127 (October 5, 2017), it is noted that Chinese authorities commonly prosecute Falun Gong practitioners under article 300 of the People’s Republic of China Criminal Law. That information was found on the official Chinese government “anti-cult website.” In February 2018, a woman in Beijing was convicted of “using cult organizations to obstruct the enforcement of laws” under article 300 of the Criminal Law. The woman was sentenced to one and half years in prison and a fine for publicly advocating “the evil cult Falun Gong.” Falungong, essentially an anti-Communist China spiritual group, was banned by Beijing in 1999, having been labeled an “evil cult.”  In 2014, a leader of the Church of Almighty God, a quasi-Christian group also known as Eastern Lightning, was also convicted of “using cult organizations to obstruct the enforcement of laws” and sentenced to four years in prison. That church is now officially banned.

Reportedly, MPS has detained or otherwise restricted the freedom of Catholic leaders in both the underground and official churches. The government has reportedly pushed for Chinese Catholic bishops to be selected through the patriotic religious organizations and then ordained by Chinese bishops without the involvement of the Holy See. Chinese officials have also reportedly subjected Protestant Christian beliefs and practices to a wide range of restrictions. Beijing reportedly pressured unregistered house churches to join the officially recognized religious organization, the Three-Self Patriotic Movement. Protestant house churches faced raids during church gatherings, eviction from meeting spaces, and official bans on worship. Martin Luther King, Jr. said that “The moral arc of the universe bends toward justice.” While that may be true, it surely has not bent so much in China’s direction yet. Iniqua nunquam regna perpetuo manent. (Unjust rule never abides continually.)

Uyghur citizens seated in formation in a detention center (above). Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.”

II. The Role of the MSS in China’s National Security Bureaucracy

As aforementioned, Chinese intelligence services, in terms of task and purpose, work within an authoritarian government and must be viewed as a different kettle of fish than the services of the United Kingdom. Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, MSS senior executives and managers have now figuratively declared “game on” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. By conventional wisdom, one might proffer those are its priorities. It is surely what Beijing wants now and it is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined than ever before. As previously mentioned, Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. That was a mistake. Central to greatcharlie’s understanding of China’s intelligence services and their activities are the writings of Peter Mattis. Since leaving the CIA where he was a highly-regarded analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis’ writings evince an appreciation of the depth of thought, organization, and planning Chinese intelligence services have put into building up their organizations and conducting operations in all areas. To that extent, he proffers that the West as of late has been facing very modern, competitive Chinese intelligence services that make use of tactics, techniques, procedures, and methods at a level equal and in some cases far more competitive than those of Western intelligence services. As he explained in a September 2012 article in Studies in Intelligence entitled, “The Analytical Challenge of Understanding Chinese Intelligence Services,” Chinese writings on intelligence bear remarkable similarity to familiar US definitions of intelligence functions and goals. He reminds that Sun Tzu taught that “foreknowledge” (xianzhi) allowed commanders to outmaneuver opponents. However, he notes more modern definitions range from “activating [catalytic] knowledge” (jihuo zhi-shi) to information to protect national security, domestic stability, or corporate interests in a competitive environment. Mattis goes on to state that Chinese military scholars today frame intelligence as a distinct subset of knowledge, defined by its relevance to decision makers and a competitive environment. Specifically, intelligence is transmittable (chuandi xing) and is knowledge that satisfactorily (manzu xing) resolves a specific decisionmaking problem. He further asserts that empirically, Chinese intelligence officers consistently have demonstrated the use of widely practiced professional tradecraft, having successfully exploited for political and military intelligence purposes agents with vulnerabilities familiar to anyone who follows the subject.

The Minister of State Security, Chen Wenqing (above). Chinese intelligence services target a broad range of national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities of the United Kingdom, the US, and other advanced industrialized countries. Lately, the chief feature of the intelligence war between those countries and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims.

Using MI6 as a Yardstick to Gauge the MSS and Its Activities

Everyone on the outside has their own version of what MI6 is and does. Looking at MI6 as a yardstick to understand the MSS, the two organizations pair up to the degree that both are foreign intelligence services. The United Kingdom’s MI6, formally the Secret Intelligence Service as mentioned previously, is the government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. It is also charged specifically with the conduct of espionage activities outside of the United Kingdom’s territory. The MI6 motto is Semper Occultus (Always Secret), but the organization states as its mission: “We work overseas to help make the UK a safer and more prosperous place.” Much as MI5, MI6 has only a few thousand employees. It is headquartered in London, at Vauxhall Cross. It is a component of the same intelligence apparatus in the United Kingdom as MI5. 

MI6’s four main areas of focus are: countering international terrorism, combating weapons proliferation, supporting stability overseas and securing the United Kingdom’s cyber advantage. Countering international terrorism means exactly that, protecting the United Kingdom from terrorists. Performing that task entails: gathering and assessing intelligence; conducting investigations and disrupting terrorist activity; preventing people from becoming terrorists; and, protecting critical national infrastructure and crowded places. Through gathering intelligence and disrupting operations, MI6 plays an indispensable role in the United Kingdom’s counter weapons proliferation efforts directed at combatting the international proliferation of chemical, biological, radiological and nuclear weapons. Working in cooperation with key national and international partners as the US, MI6 also helps to ensure that the United Kingdom’s weapons exports never fall into the hands of terrorists. Instability and conflict overseas leads to weak governments and poor national security, and nurtures a fertile environment in which terrorists and organized crime groups can thrive. Using agents, the MI6 provides intelligence to government policymakers and decisionmakers and provides early warning indications of potentially hostile threats. Most often that information can lead to early political intervention to prevent prolonged instability. Cyber threats are a key security risk to the United Kingdom, as they have the potential to disastrously impact individuals, organizations and governments. Global and ever becoming increasingly complex, cybercrime has the unusual characteristic of having the potential to rear its ugly head and reach out from anywhere in the world. The MI6 provides secret intelligence to help protect the UK from current and emerging cyber threats across a range of adversaries such as hostile countries, terrorists and criminals. Additionally, MI6 conducts counterintelligence operations via a furtive counterintelligence section, but it is generally understood that the organization shares that work with MI5.

In order to meet the challenges of their work, MI6 officers are highly trained in the tactics, techniques, procedures, and methods of their profession. Within intelligence services, as noted earlier, it is referred to as tradecraft. High on the list skills learned and honed are espionage techniques and the use of agents. Often MI6 officers may operate openly in their host country, declaring themselves as representatives of the United Kingdom’s foreign intelligence services. Otherwise they will work covertly under the cover of other official positions such as diplomatic staff or trade delegates. Some MI6 officers may operate under non-official cover to conceal the fact that they work for an intelligence service. That usually entails posing as a business person, student or journalist for example. In some cases MI6 officers will operate under “deep cover,” meaning they will use false names and nationalities. In the intelligence industry, such officers operating under such cover are referred to as “illegals.” They operate without any of the protections offered by diplomatic immunity. MI6 officers typically seek to establish networks of agents whom they can use over a sustained period of time, so that they can obtain a reliable flow of information. As it was stated in the aforementioned discussion on MI5 agents, MI6 agents operate by exploiting trusted relationships and positions to obtain sensitive information. They may also look for vulnerabilities among those handling secrets. They may be aware of flaws in their organization’s security that they can exploit. Recruiting agents, both foreign and domestic, who can provide intelligence on terrorist plans and organizations is of the utmost importance to MI6 officers.

MI6 was constituted in its present form in 1912 by Commander (later Sir) Mansfield Cumming as part of the United Kingdom’s attempt to coordinate intelligence activities prior to the outbreak of World War I. In the 1930s and ’40s it was considered the most effective intelligence service in the world. Following the rise to power of Adolf Hitler in Germany, MI6 conducted espionage operations in Europe, Latin America, and much of Asia. When the US entered World War II, MI6 helped to train personnel of the US Office of Strategic Services (OSS). As mentioned, it was the organization in which Hilsman served. Much of OSS’ foreign intelligence and counterintelligence tradecraft was adopted from MI6. Indeed, the CIA still uses much of it today. Reportedly, many “old boys,” veterans of the OSS are fond  of saying, “The Brits taught us everything that we know, but certainly not everything that they know.” The two organizations worked closely during the war. MI6 has since cooperated extensively with the OSS’s successor, the CIA. MI6 senior executives, managers, and officers refer to the US intelligence organization the “American cousins.” Details of MI6 operations and relationships have rarely appeared in the press. In the mid-1950s, the public reacted with consternation when it was revealed that MI6 had been penetrated by double agents who had served the Soviet Union since the 1930s. It was not until the 1990s, that the head of MI6 was publicly named for the first time. Still, information about MI6 is still much more closely guarded than that about MI5, which carries out internal security and domestic counterintelligence activities. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. MI6 reports to the Foreign Office.

Stephen Dorril’s work, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service, is a true reflection of the organization, its people and its history, what it has done and where it has been most influential . Dorril, a meticulous observer and chronicler of the security services, demonstrates an understanding of everything one might have thought about MI6. Through the text, readers learn that MI6’s postwar activities were mired in prewar attitudes and practices. Many in the United Kingdom imagined the foreign policy task dividing up the world with US and other global powers. Instead, the preoccupation was the Soviet Union and the Cold War. In chronicalizing the Cold War segment of MI6’s history, Dorril fills the pages with anecdotes of its most spectacular failures, stirring successes, unsavory plots and bizarre missions, the real-life cloak-and-dagger world is exposed. There is a discussion of Operation Stalin, which exploited the Russian dictator’s paranoia and led to the execution of thousands. There is another about the tunnel MI6 dug beneath the Berlin Wall. During the Cold War, in the intelligence war, it seems that there was no opportunity, in the midst of his work against the Eastern Bloc and more the Soviet Empire, to view matters from a broader or humane perspective. Surely, with the benefit of hindsight, it is easy to enumerate all of the mistakes, poor choices that were made. By 1992, influence abroad had been lost in the Middle East, most of Africa and large swathes of Asia. The United Kingdom was not exiled and isolated as some might suggest. It was then and remains a key partner to the US with its superpower status, and often takes lead from the US, the main push was to abrogate the world’s resources. In the post-Cold War era, there was once again a sense, particularly in the administration of US President Bill Clinton of the West’s entitlement to the world’s spoils. That rush to take what was available was intensified by the need to get to what was out there before the People’s Republic of China did. Political power seemed to embrace corporate power. As a consequence, there was the appearance that corporate power was supported by government power. MI6, one of the great information-gathering organizations of the world, was put to that task, placing some strains on the service.

The book presents a well of extraordinary characters. As alluded to earlier, the lion’s share of what was told is meat and drink for those who enjoy spy novels, but it is all real. Yet, in addition the book presents the similitudes of the intelligence industry with profoundly human stories. The world of the intelligence officer is often a dank and grey one, visceral, boring at times. There is a drudgery about agent running. Doing chores in the analytical shops can be tedious. One is invited to understand the suffering and sacrifices of MI6 officers. Prerogatives are surrendered, loves, passions, moral ambiguities, moral compromise. Many officers fall off, finding satisfaction in other professions and pursuits, others engaged in betrayal, a few entered the device with the objective of spying. As with MI5, MI6, as a dynamic, intelligence service, operating worldwide, has a history riddled with complexity. Stories of unpleasantness are even found in Dorril’s authorized study, too! The more counterintuitive these acts are from the past, the more puzzling they are. In such an old, but odd profession, if one finds oneself doing odd things, the hope would be to catch oneself out when one is so far out of bounds that nothing good is being accomplished.

The People’s Republic of China Embassy in Washington, DC (above), home to the MSS resident in the US. Much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness, nevertheless, it is happening. In the recent case of an New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats.

Present Day Focus and Operations of MSS

MSS, as well as other Chinese intelligence services, target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Lately, the chief feature of a defacto intelligence war between West and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims. To understand the intelligence efforts of MSS, one must understand how guIding concepts from Deng Xiaoping led to a decision by Chinese intelligence to make economic espionage an even greater emphasis. Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves. To get an idea of how well the MSS operates, one only needs to consider its ongoing activities in the US. Without the intention of tarnishing or being beastly toward US intelligence and  counterintelligence services, and law enforcement, they have been unable to prosecute a successful, fruitful, and victorious campaign against Chinese intelligence services operating in the US and against US interests globally. Readers might recall from previous posts on the subject, greatcharlie noted that Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. Further, in previous US administrations, particularly in the administration of US President Barack Obama, a somewhat relaxed attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology. The burgeoning threat was apparently not fully discerned or appreciated. 

In response to past US missteps, Chinese intelligence services presumably placed a laser focus upon enhancing and adjusting their approaches to US targets. As a product of their success in recruiting officers and contractors from the US intelligence services, Chinese intelligence services have apparently managed to better understand what the US has been doing to try to recruit Chinese intelligence officers, operatives, and informants is prioritized. To the extent, US intelligence officers and contractors recruited as spies are typically tasked with actions to support Chinese counterintelligence requirements. Doubtlessly, the collection of information on what MSS foreign intelligence has been doing has been insufficiently analyzed in light of information collected on US counterintelligence surveillance strategies and technological capabilities would inspire audits in Chinese intelligence services to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, one must become reconciled with the fact that Chinese spies do not go astray so often.

Foreign Intelligence Operations of MSS

Successful multifaceted activities of Chinese Intelligence services have included: conventional espionage; outright intellectual property theft via corporate and academic institutions worldwide, and cyber attacks. For a good idea of how MSS conducts conventional espionage today, Ryan Clarke, a senior fellow at the East Asia Institute, a Singapore-based think tank, boils it down well in a July 31, 2020 Asia Times article entitled, “The Face of Chinese Spying in Singapore.” Curiously using MSS efforts primarily in the US primarily as an example, Clarke asserts its intelligence operations are highly targeted and tethered to specific state goals. He explains: “These types of operations are quite simple with relatively few moving parts, which is why they are replicable at scale.” To illustrate the variety of targets attacked by MSS, Clarke says: “We’ve seen operations against a range of American targets, from Covid-19 vaccine research to the F-35 fighter jet program.” With regard to the collection effort, Clarke goes on to propound: “The general approach is to establish target priorities and then proceed to collect what appear to be rather innocuous inputs with relatively limited value when viewed in isolation. Sometimes the information may not even be classified. This is done on a massive scale in-country with a parallel synthesis-fusion operation in China itself.” Putting such a massive and energetic effort into perspective, Clarke maintains: “The strategic logic is that, in the aggregate, this massive collection and synthesis-fusion effort will yield unique findings and insights which the Chinese Communist Party can leverage across a range of domains.” The Idea that a massive synthesis-fusion operation exists to mine useful intelligence from piles of information collected was also proferred and the analytical operation was conceptualized in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).”

So far as is known publicly, counterintelligence services of the countries Chinese intelligence services have struck, to include the US, have yet to get to the bottom of their business in their countries in order to put an appreciable dent in their work. One might imagine that trying to spot, intercept, neutralize, and recruit significant numbers of Chinese intelligence officers, operatives, and informants has become an exercise in chasing shadows. This has likely left senior executives and managers of many counterintelligence services in a mute frenzy. For the US, in particular, long gone are the opportunities such as the relatively facile recruitment of the MSS officer Yu Zhengsan back in 1985. Then, when MSS was barely up and running for two years, Yu Zhengsan, a mid-level MSS officer from a well-connected political family, was allegedly aided by the CIA allegedly in escaping China and defecting to the US. Once in US hands, Yu provided investigative leads for US counterintelligence services to capture Larry Wu-Tai Chin, a retired CIA language analyst, who had spied for China since the 1940s. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, US counterintelligence services must become reconciled with the fact that, today, Chinese spies do not go astray so often. That is, there must be nothing so creative that US counterintelligence services are doing or offering to encourage them to do so.

Prior to the coming of the administration of US President Donald Trump, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with defeating China’s operations had no real effect on the course of the administration of US President Barack Obama and Chinese intelligence activities steadily intensified. In response to counterintelligence and cyber defense missteps, Chinese intelligence services seem to have placed a laser focus upon enhancing and adjusting their approaches to US targets.

It is important to note that much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness. However, while it is madness, it is happening. Clearly, the Communist Party of China must think it makes sense or they would be acting in this way. In the recent case of a New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats. To be more precise, they will twist the tails of émigrés by threading to harm family members still living in China if cooperation was not provided.

The People’s Republic of China National Security Office in Hong Kong (above). MSS counterintelligence certainly would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations.

MSS Counterintelligence

MSS shares the counterintelligence role with MPS. The primary mission of organic MSS counterintelligence elements is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. Its primary targets hands down are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

A Difficult Comparison with MI6 Counterintelligence

Making a proper comparison between MSS counterintelligence operations and those of MI6 is difficult due to the fact there are only soupçons to go on with regard to that United Kingdom intelligence service. One aspect of that work already noted here is that counterintelligence responsibilities among the United Kingdom’s intelligence services have been divided between MI5 and MI6. In Nigel West’s Historical Dictionary of British Intelligence (Scarecrow Press, 2014), one of his many superlative reference books on the subject of intelligence, not surprisingly one can find at least some reference to the work of MI6 in that province. As explained in the Historical Dictionary of British Intelligence, in the United Kingdom, counterintelligence is the discipline devoted to penetrating the adversary’s intelligence structure and protecting one’s own organization. (This is significant for a number of other intelligence services take a different approach to the matter. In the CIA and the FBI in the US and in the erstwhile Soviet Union’s KGB and the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, for instance, counterespionage operations are organic to the work of their organizations’ counterintelligence sections.)  West notes that during World War II, the MI6 counterintelligence section was designated Section V, the romance numeral five being the cause of considerable misunderstanding and confusion for outsiders.

With regard to counterespionage, in the Historical Dictionary of British Intelligence, West notes that responsibility for such operations lies primarily with MI5, although inevitably the Secret Intelligence Service and Government Communications Headquarters as well occasionally encounter evidence of hostile activity and investigate it. During World War II, counterespionage was acknowledged as an interagency discipline that overlapped different organizations and in 1942, was the motive for an attempt at amalgamation, which was ultimately rejected. Following the collapse of the Soviet Union, MI5’s commitments were reevaluated periodically, and the counterespionage branch, designated K in 1968, was absorbed to a new D Branch in 1994 

To elaborate further on MSS counterintelligence, certainly it would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Shifting a bit from United Kingdom intelligence efforts to elaborate more effectively on this point, federal indictments and criminal complaints against MSS foreign intelligence operatives and informants caught in the US indicate that they are generally tasked, as most field operatives and informants of any intelligence service, as intelligence collection requirements demand. As noted in greatcharlie’s August 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” from what can be learned from indictments and criminal complaints about such cases that are made public, in almost all of the MSS taskings of those intercepted operatives and informants, certain counterintelligence aspects can be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In order to develop ways to counter the efforts of US counterintelligence services against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding the surveillance strategies of US counterintelligence services, particularly the FBI, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along US counterintelligence services have had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. (If one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. The particulars of those real possibilities will not be delved into here. Not one case has been a “wilderness of mirrors.” It is hard to know what to make of how things are currently transpiring.)

FBI wanted poster for hackers Zhu Hua (left) and Zhang Shilong (right) of the Advanced Persistent Threats 10 (APT 10 Group) which acted in association with the MSS Tianjin State Security Bureau. In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy.

MSS Electronic Intelligence

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy. If human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome. Cyber collection complements all other forms of attack well. Typically, Chinese spokespersons from the People’s Republic of China Ministry of Foreign Affairs or the Communist Party of China, itself, will issue declarations seemingly designed to create the false impression that China was engaged in a lex talionis of allegations with the US on cyber espionage. Perchance the aim in doing so was to distract the world from the reality of its one-way abusive and criminal cyber attacks to obtain classified information from the federal government, intellectual property from private firms, and research from academic institutions in the US.

When GCHQ Was Part of MI6

For a time, MI6 also enjoyed having an organic technical surveillance capability. That technical surveillance capability today resides in an independent intelligence agency known as the Government Communications Headquarters (GCHQ). GCHQ grew out of the Government Code and Cypher School (GC&CS), established in November 1919. During the 1920s and 1930s, GC&CS had considerable success in its efforts to decipher German and Soviet transmissions. Once Nazi Germany acquired the Enigma machine, with its apparently unbreakable ciphers, in the late 1930s, GC&CS greatly stepped up its efforts. In August 1939, just before war broke out in Europe, it moved its headquarters to Bletchley Park outside London. There its cryptanalysts undertook Operation Ultra, the breaking of the Enigma cipher—a project whose details remained classified until the 1970s. Renamed the Government Communications Headquarters in 1942 to conceal its activities, this leading communications intelligence agency of the United Kingdom. Through GCHQ, MI6 enjoyed a number of successes during World War II, most notable among them being the Ultra program to break German Enigma ciphers. Today GCHQ functions similarly to the US National Security Agency (NSA) Working in coordination with the NSA during the Cold War, it greatly escalated its efforts. Reportedly, it participates in the Echelon global surveillance network. Much of what is known about how GCHQ is organized was provided publicly in James Bamford’s famous 1982 book on NSA, The Puzzle Palace (Houghton Miflin Harcourt, 1982). Knowing how GCHQ is organized allows one to infer with at least some degree accuracy, how it functions. According to Bamford, GCHQ at that time had six directorates. Among these were the Composite Signals Organization, dedicated to radio intercepts; the Directorate of Organization and Establishment, whose functions were chiefly administrative; the Directorate of Signals Intelligence Plans, concerned with long-range planning and management; and the Joint Technical Language Service, which intercepted foreign communications. Bamford stated that the largest and most secretive directorate, the Directorate of Signals Intelligence Operations and Requirements oversaw codebreaking activities. 

Returning to the discussion of MSS technical collection, it can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decisionmaking processes.

MI6 in the Political Realm: A Bad Mix

There is much beyond the controlled bearing, composure of MI6 officers and the organization itself. From what has been revealed, their efforts have been defined by hard work, establishing solid foundations, diligence and forethought, practicality and organization, determination and dependability, passion and drive. Creativity is combined with thoughtful effort and hard work to manifest positive energies, opportunities and results. 

As aforementioned, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. MI6 answers to the Foreign and Commonwealth Secretary. The Foreign Secretary receives assistance from the Permanent Secretaries’ Committee on the Intelligence Services. Finally, the Joint Intelligence Committee draws up general intelligence needs to be met by MI6. It also prepares National Intelligence Estimates.

As with officers in MI5, speaking truth to power is also the charge entrusted to leaders of MI6. Yet circumstances have often been complicated enough to spoil adherence to that. One might say how MI6 has performed, has really boiled down to leadership. Indeed, the intelligence services may have figuratively been wonderful horses but the chief or key senior executives–no names here–may have been less-than-perfect jockeys in matters of high policy. Admittedly short on specifics of such cases here, yet with all conspiracy theories aside, it may be enough to say the resources and capabilities of MI6 allegedly have reportedly  on certain occasion been used by political leaders to turn a situation that might not necessarily stand in their favor due to interests beyond those urgent and important to the United Kingdom. Some believe it was really seen during the Iraq War when the United Kingdom followed the US into the whole affair which was unfortunately founded on false intentions,  namely weapons of mass destruction were being produced by the regime of the erstwhile Iraqi President Saddam Hussein. Tragically, MI6 became the alleged coauthor and signatories to misleading information

When misgivings and disfavor might have been expressed what may have been proposed from the top, it may have been the case that  the powers that be would brook no denial. Those too concerned of their position or being politically indebted, might have seen themselves with little option but to follow orders. Those who see themselves as pragmatists, may explain away a decision to go along thoroughly with a suggestion from on high as an effort to simply adapt in a shifting world. They may not have seen themselves as keepers of some sacred flame. The fatal mistake occurs when the choice is made to play along thoroughly. No proper MI6 or MI5 officer would be expected to shrink at the last. If the organization’s leadership had decided to disappoint the political leadership, they might not only have been forced to surrender the coveted privilege to serve their country in the intelligence services. To many in the intelligence service, that idea would be anathema. Such thoughts likely broke through any defenses their minds raised against them. Additionally, after their departure they might find the whole force of the state on his or her back. L’homme c’est rien—l’oeuvre c’est tout.

Assuredly, Parliament, which provides oversight of MI6, has a process for ascertaining the truth about such matters. The principal oversight committee for British intelligence is the Central Intelligence Machinery, based in the Prime Minister’s Cabinet Office. It oversees the coordination of security and intelligence agencies. It also acts as a mechanism for assessment and accountability, observing and reporting on the performance of specific agencies. Further, it more directly intelligence operations as it is also concerned with tasking and the allocation of resources.

To discuss such issues concerning MI6, even if it is just a part of a mere commentary on MSS, is to walk out on shaky ground given many who may read this post may be invested in maintaining the image of the organization and may have previously been invested heart and soul in its work. While admittedly greatcharlie has sought to be sensitive to the concerns of those readers, doubtlessly, the soupçons discussed here will still be an issue of contention in some quarters and there will surely be those disposed to quarrel most bitterly over it. All the same, what is opined here is only what has been publicly discussed by those familiar with the issue. To that extent, not being aware first-hand of it all, greatcharlie would not like to swear by it.

There is no legal “right to know” what is undertaken abroad in the name of the United Kingdom’s security, what it costs or how it is run. Reportedly, beyond mere concerns exposing any classified information about MI6, to write about MI6, even today, risks harassment and prosecution. Former members and current commentators are fully aware of this and have complied thereby allowing the organization to remain beyond any educated public scrutiny. In the past, any dissident reports of its operations were effectively snuffed out. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. As one might imagine, this reality does not sit well with the citizens of the United Kingdom. There is a perception among many in the United Kingdom that such behavior brings the organization more closely in sync with that of MSS, an organ of an authoritarian government, than it should in a free society. Civil rights groups and average citizens argue that the policy of total should be reconsidered and scrapped, should not be disparaged as rubbish in any quarter.

Meeting of the Politburo of the Communist Party of China (above). Changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. One change was the decision of the Communist Party of China wanted MSS looking further abroad than minority groups on China’s periphery. Another change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence.

MSS in the Political Realm

MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. With its inception, MSS added new dimensions to China’s foreign intelligence scheme while freeing MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the intelligence game so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. MSS also represented the tidying up of old ways of conducting its business, and a modernization of Chinese intelligence that was long overdue. The MSS generally appears to have adhered to the non-politicization  of the service. This is not to say that occasionally shifts away from that position by some senior executives has not impacted the organization. MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. However, the Ministry rarely appears connected to any elite political maneuvering or purges. Since 1983, only the purges of Beijing Party secretary Chen Xitong (1995) and Shanghai Party secretary Chen Liangyu (2006) were rumored to involve the ministry. In the wholesale purges after the fall of Bo Xi laid and Zhou Yongkang, the Beijing State Security Bureau chief Fangfoss Kent and Vice Minister Qiu Jin were ousted precisely because they exploited MSS resources to back particular leaders in their political struggles against each other.

Of course, the foreign policy influence of intelligence services depends on the quality of their inputs and their leadership’s influence with key policymakers. If an intelligence chief is not influential, then his service’s influence depends on performance. The MSS’s role in policymaking could be rising as China’s overseas interests expand. When China entered the World Trade Organization (WTO) in 2001, the thought was that there would be an influx of foreign business into China. That was a concern. At the time, the response was to make greater use of MPS. However, changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. When direct political power is absent, influence usually relates to merit and necessity. Senior foreign policymakers would eventually want the MSS in the room, contributing to the discussion. The Communist Party of China’s leadership wanted an MSS looking further abroad than minority groups on China’s periphery. The MSS’ foreign intelligence service is now more similar to the CIA. Another major change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Indeed, MSS has managed to move from backstage, second to MPS, to frontstage, up from behind its bureaucratic competitor in internal security.

The Way Forward

As indicated in its introduction, this post serves as an expatiation of a technique learned long ago for directing one’s thoughts upon developing ideas and insights on issues in international affairs and other subjects of interest. Given its subject matter, it hopefully managed to satisfy the experienced scholar, academic, and policy analyst. By showcasing the generation of ideas and insights on subjects, hopefully it satisfied the desire of students to see examples and will become a subject of inquiry for some. 

By their very nature, insights are inherent to the writer, unique in that way. At least, they should be. No truer are the words, “everyone is entitled to an opinion.” The ideas and insights of the novice writer have a right to be aired equal to that of experienced, published authors in the various fields. Note, however, that eccentric, whimsical, and outlandish ideas are seldom useful and never desirable. In some respect, the process of generating ideas and insights is a form of self-exploration. One’s mind must be open to all reasonable considerations and all plausible possibilities. Nontraditional students should try to apply sensibilities shaped by a multitude of experiences. The length and breadth of their knowledge and experience may allow for a broader understanding of humanity. That is what the world will most appreciate reading.

Saepe stilum vertas, iterum quae digna legi sint scripturus. (Often must you turn your pencil to erase, if you hope to write something worth a second reading.) It is perfectly in order to feel a bit timid about drawing inferences and sharing them for others to review. Accept those awkward feelings, but write down all of the ideas and insight that may develop inside anyway. Have at it! To enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. Ruminate on events in relation to those that proceed them and meditate on what the future may bring. Build on that thinking. Strive to forecast decisions that may shape what might come and proof one’s efforts by watching events unfold in the news. Some of the best ideas and insights may come at inopportune times. Whether one is struck with a coruscating flash of logic, or has a nagging thought on an issue that builds throughout the day, notes must be kept of it all. At one’s earliest convenience, write those ideas and insights down in a notebook, on a pad, or on the back of an envelope. If one can, type them up on an electronic device. Organize them as bullet points if that is easier, however, one must make certain that enough is recorded to ensure that actual ideas are being expressed and that they “feel” compelling. Avoid simply jotting down statements of fact, or worse, simple fragments of your thoughts. State your conclusions about matter! Each expression can be fleshed out and tidied up with editing later. Sticking to this course may not be easy at first. After a time and with honest effort, one should become accustomed to it. Optimally, a writer will effectively generate enough ideas and insights to allow for the selection of more reasoned, potent, and eloquent among them for inclusion in a draft essay. The ability to increase quantity and improve the quality of ideas and insights produced will come with practice. Plus novisti quid faciendum sit. (You have learned more what has to be.)

China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1)

The Headquarters of the Ministry of State Security (above). China’s primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of cutting-edge technologies from the US. This essay provides a few insights from outside the box on the MSS, the tactics, techniques, procedures, and methods, it believes, help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US.

There was a time not so long ago when discussion in US foreign policy circles concerning China centered on issues such as trade, Hong Kong, Taiwan, the South China Sea, North Korean denuclearization, and human rights. Now the primary focus of discussion is the coronavirus. China is where the virus originated and was surely ineptly handled, setting the stage for the current pandemic. How China has responded to the crisis turned pandemic has been a source of curiosity and absolute outrage globally. Despite preening about its own advances in science and medicine, China proved not to be up to the task of handling the outbreak that most experts agree more than likely began disastrously in a Wuhan laboratory. It is difficult to fully comprehend what on Earth went on in the minds of China’s leadership upon learning about their country’s coronavirus epidemic. Shutting down cities and restricting travel was among the means to control the spread among their own citizens but China’s government was quite derelict in ensuring the virus would not break out around the rest of the world. Worse, the Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. China very quickly became exercised with the US over the matter. They became particularly warm toward US President Donald Trump. The words of official spokespeople were certainly not seasoned in grace. Although it has found itself in an unpleasant, contentious relationship with the US as a result of its own doing, Beijing has nevertheless effectively doubled-down on the behavior that exacerbated the situation. China’s government spokespeople will most likely continue to assail the global media with waves of distortions. At the same time around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, People’s Republic of China President Xi Jinping is well-aware of what is transpiring and has set some type of guidance on just how far this whole cabaret put on by Beijing should go. Numquam enim temeritas cum sapienta commiscetur. (For rashness is never mixed together with wisdom.)

The figurative hammer of the foreign and national security policy apparatus swung by the arm of the Communist Party of China against the US is China’s intelligence services. They are the ones on the front lines of the political warfare struggle. Among those intelligence services, the primary element engaged is the Ministry of State Security (MSS). The Ministry of State Security is the embodiment of the logic that created the Chinese system’s intimidating, authoritarian order and for years has choreographed events to accomplish the Communist Party’s purposes. To that extent, the Communist Party of China has entrusted the defense of “their creation,” the modern Communist Chinese state, to this complex government organization. China has only offered soupçons about the MSS, and even less than that lately. Unless one is engaged in diplomatic, intelligence, defense, military, or law enforcement work, MSS is an elements of the Chinese government with which most outsiders when engaged in their normal business related to China, whether inside the country, in a country near by, or even at home, will have contact, but will often be completely unaware. The ostensible purpose and task of MSS is to defend China against external as well as internal threats. By performing its mission of collecting vital information about China’s friends, allies, competitors and adversaries MSS gives the leadership of the Communist Party of China time to make decisions and space to take action. To that extent, the MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. However, it has also robustly enhanced another mission of collecting intellectual property and an array of cutting-edge technologies from the US. The Communist Party of China is surely counting upon it to successfully take on China’s adversaries in a large way with a small footprint. Interestingly though, there has been far greater discernment worldwide of MSS political warfare activities than Beijing might have imagined. The immediate implication of that has been the infliction of considerable damage to China’s reputation as a world leader. Veritas nimis saepe laborat; exstinguitur numquam. (The truth too often labors (is too often hard pressed); it is never extinguished.)

This essay does not focus on the political warfare effort by MSS, the nuts and bolts of which are somewhat straight forward, and compressed into summary form in the March 31, 2020 greatcharlie post entitled, “Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic”. It focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. This section, “Part 1,” provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. “Part 2” continues that discussion and, without an ax to grind, greatcharlie calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China Chairman Mao Zedong (left) and Kang Sheng (right). After the defeat of Imperial Japanese forces in China and prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations that were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

Chinese Intelligence Under the Communist Party: The Beginning

The foundation of the Chinese intelligence services was laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the othjer was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Maoist thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communist Party of China’s main intelligence institution was the Central Department of Social Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

The Ministry of Public Security was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a deputy chief of staff to People’s Liberation Army (PLA) chief of staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. However, as time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the violent mentality of its initial leader, Kang. Despite his alleged romance with Mao’s wife, Kang was far from a charming man. Rather, he was known for being an absolute brute. He would move on to become a member of the Communist Party of China Political Bureau, and Li Kenong moved up to take command there. In 1962, the decision was made to move Ministry of Public Security counterespionage functions over to the CID.

The 1960s were a volatile time for Chinese intelligence services as with all military institutions in China. Li Kenong died in 1962 and in 1966 he was succeeded by Luo Quinchang, who had been adopted by Kang in 1958 and ushered into the MPS. However, the MPS became involved in the power struggles that embroiled the Communist Party during the Cultural Revolution. Mao, feeling his power base was threatened mainly as a result of his failed Great Leap Forward, implemented the “Four Cleans Movement,” with the objective of purifying politics, economics, ideas, and organization of reactionaries, led by a one time ally, Luo Quinchang of MPS. His staff files were seized and mined for candidates for criticism and banishment to the lao jiao prison system.

Kang Sheng (above). The Ministry of Public Security (MPS) was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. As time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the mentality of Kang, who was known for being an absolute brute.

Most of the leadership of the CID was sent to the countryside for reeducation and the organization, itself, was abolished for a time. Its activities and assets were absorbed by the Second Department of the PLA’s general staff taking over its duties. The Second Department oversaw human intelligence collection to include military attachés at Chinese embassies overseas clandestine collection agents sent to other countries to collect military information, and the analysis of overt sources of information. Mao turned to Kang to ensure that his ideological and security directives were implemented. Kang, Mao’s wife Jiang, Wang Hongwen, Yao Wenyuan, Zhang Chunqiao, dubbed the “Gang of Four,” worked together in a campaign to renew China’s revolutionary spirit. With the assistance of the Red Guards, a mass student led paramilitary movement mobilized and guided by Mao from 1996 to 1967, the Gang of Four set out to destroy the “Four Olds” of society: old customs, old culture, old habits, old ideas. The Red Guards were particularly disruptive. Apparent moral confusion caused the base student army to rise and nearly wreck China by attacking senior Communist Party leaders such as Deng Xiaoping and by conducting mass executions. There were reports that the Red Guards cadres had engaged in cannibalism, eating students. They destroyed approximately 66 percent of China’s famous temples, shrines, and heritage sites. These included nearly 7,000 priceless works of art in the Temple of Confucius alone. The Red Guards would face resistance in major cities. Often the PLA was forced to violently put down their destructive attacks. The organization having fully flown off the rails, Mao instructed leaders of the Red Guards to end their movement.

Meanwhile, Kang had returned to the intelligence service from on high to assume responsibility for the CID cadres that remained left in limbo. Eventually, a new organization, the Central Case Examination Group, composed of CID cadres under Kang was created. That organization was instrumental in the removal of Deng Xiaoping from power. The CID was reestablished in 1971 following the death of Lin Biao and then again became entangled in another power struggle as Hua Kuo-feng and Deng Xiaoping vied for control of the party. By then, Kang had receded into the distance, viewed as too connected to the untidiness of the Cultural Revolution.

Following Mao’s death in 1976, the new leadership under Hua Guofeng initially tried to return to the pre-Cultural Revolution years and strengthen the CID. When Hua Kuo-feng and Wang Dongxing assumed power in 1977, they tried to enlarge the CID and expand the Communist Party of China intelligence work as part of their more general effort to consolidate their leadership positions. However, their hopes and dreams met their fate. Deng Xiaoping, having steadily ascended within the leadership ranks of the Communist Party of China, was uncertain of CID loyalties and his opinion of it was unfavorable. Circumstances indicated that he should order the shut down of all Investigation Offices in Chinese embassies. Although it remained part of the Chinese intelligence services, the CID was officially downgraded. According to Anne-Marie Brady in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the impact of the CID’s downgrade was softened by the fact that its intelligence efforts  were being paralleled and to some degree occasionally outmatched by the extraordinarily secret International Liaison Department of the Communist Party of China, which became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies worldwide.

The emblem of the Ministry of State Security (above). In 1983, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the new Ministry of State Security (MSS). Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up in July 1983 to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus.

The Inception of the Ministry of State Security

The story of the Ministry of State Security (MSS) began thoroughly in July 1983. That year, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the MSS. Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. When the reorganization of the MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. It eventually bring new dimensions to China’s foreign intelligence scheme. The creation of MSS freed MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the domestic intelligence game so to speak. It represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers.

At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed predominantly with PLA and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was to perform as police. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. Tiananmen Square, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them to remain greatly concerned over a possible follow on move by students. That concern was thoroughly evinced when Chinese authorities announced that some 200 Chinese had been accused of spying for the Soviet Union. One might say that the counterintelligence purpose of the assignment made giving it to the MSS plausible. However, MPS had the domestic counterintelligence mission covered. Redundantly taking on the assignment concerning the student–surely MPS was on it–was a turn in a wrong direction. The MSS would eventually develop into an authentic foreign intelligence service, but it would take time. It would be an evolutionary process.

An ocean of student protesters in Tiananmen Square in May 1989 (above). At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with People’s Liberation Army and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was police work. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. The protests, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them great concern regarding a possible follow-on move by students.

As aforementioned, a paucity of quality information exists publicly from the Chinese government about the present-day MSS in primary or secondary sources. No official Chinese government website exists for the intelligence organization. There have been no press releases distributed or press conferences held by the organization’s public relations department. Access to information from the organization is essentially nonexistent. No significant writings have been published  by security scholars in China on the MSS. Precious few defections from MSS have occurred, so little has been provided from an insider’s view. What is best known generally about MSS in the US has been superbly relayed in I.G. Smith’s and Nigel West’s celebrated Historical Dictionary of Chinese Intelligence (Rowman & Littlefield, 2012).

The MSS headquarters is located in Beijing in a large compound in Xiyuan, on Eastern Chiang’an Avenue, close to Tiananmen Square. Within the security perimeter is snowing apartment block, Qian Men, where many of the MSS staff and their families live. The MSS is a civilian intelligence service and operates independently from the People’s Liberation Army General Staff Second and Third Departments, which also conduct military intelligence and counterintelligence operations. Although it has a central headquarters, the MSS actually was not built up as a centralized organization. It is composed of national, provincial, and local branches much as the MPS from which it sprang. Even the initial CDSA and later CID units of the MPS operated domestically under a decentralized and autonomous structure throughout China that was supported by the Communist Party of China. Their structure somewhat resembles that of the erstwhile regional and Soviet republic KGB bureaus. The provincial, and local branches receive directives from headquarters in Beijing and are financed by National Security Special Funds. Yet, only to the extent that provincial and local branches receive “administrative expenses,” could they be considered accountable to headquarters. They are largely autonomous in reality, reportedly acting as essential adjuncts to the local administration. The formal chief of the MSS holds the title Minister of State Security. As of this writing, the minister is Chen Wenqing. However, from the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of Communist Party of China leaders. Initially, the most important of these was the Political-Legal Commission (Zhongyang Guoja Anquan Weiyuanhui). The Political-Legal Commission was chaired by a Politburo member at the Central level with the title Secretary, who serves essentially as China’s security czar. There are Deputy Party Secretaries at the lower levels. The lower-level commissions oversee all state security, public security, prisons, and procuratorate (judicial) elements for their levels. Currently, there is a Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) who oversees China’s security apparatus and law enforcement institutions, also with power reaching into the courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs  Xi announced the creation of the Central State Security Commission (CSSC) in the Third Plenary Session of the Eighteenth Party Congress in November 2013. The CSSC held its first meeting on April 15, 2014. The purpose of this new commission was twofold. First, it was intended to balance internal political power created by the expansion of the security services and their capabilities in the 2000s. Second, the commission orient’s the MSS and other security forces toward planning and preempting threats to the party-state. At lower levels, provinces, counties, and municipalities have state security leading small groups (Guoja Anquan Lingdao Xiaozu). The political-legal Commissions and State Security leading small groups overlap in personnel but not perfectly. They combine with defense mobilizations committees and 610 offices to create a kind of system of systems that oversees local security and intelligence work. Headquarters is surely kept apprised of what the provincial and local branches are doing. Each level reports to the next MSS level up and the Political-Legal Committee at that level. This florid arrangement of horizontal and vertical relationships often creates bureaucratic competition that encourages pushing decisions upward while hiding information from elements of equal protocol rank.

Intellect, will, and hard earned experience drove MSS leaders forward as they molded the MSS into a truly effective intelligence organization. What compelled the domestic focus of its initial work is further apparent in that process. The first two ministers, Ling Yun and Jia Chunwang, faced the challenge of turning a small Ministry with only a handful of outlying provincial departments into a nationwide security apparatus. The expansion occurred in four waves. In the first wave during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments expanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. The MSS policy of expanding representative offices in most major towns and cities was reversed in 1997. Nevertheless, when MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level. Presently, the MSS’ thirty-one major provincial and municipal sub-elements. Interestingly, as MSS moved through each growth spurt, it did not ignite efforts to rename the organization, to divide it into pieces and parcel out some of its departments among other Chinese intelligence services, or to disband it altogether in the way CDSA and MPS suffered in the two previous decades. There seemed to be an understanding system wide that the need existed for a solid civilian foreign intelligence as well as counterintelligence capability. 

The Wuhan Hubei National Security Office in China, home of the provincial Ministry of State Security Bureau (above). The expansion of MSS provincial departments occurred in four waves. In the first wave, during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, creating the Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang bureaus. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments expanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. Presently, the MSS has thirty-one major provincial and municipal sub-elements.

As relayed previously, MSS was initially staffed with personnel drawn largely from the MPS. Many local MPS officers transitioned overnight from being police to MSS officers. The MSS foreign intelligence capability was built up when intelligence cadres from the Communist Party of China were brought into its ranks. The new MSS was also funded in part by the MPS. The fact that MSS, in a similar way to MPS, established provincial offices, which operated under cover names, such as “Unit 8475,” has been completely uncloaked and was made fairly well-known courtesy of the Historical Dictionary of Chinese Intelligence. To help MSS take on its mission, MPS passed some networks to the new organization. Yet, with some uncertainty that existed as to the political nature of MSS, MPS was reportedly reluctant to make such transfers. Weariness and disappointment was also apparently felt among some of the old MPS professionals who opted to move to the MSS. While there were far greater opportunities for foreign travel, the financial side-benefits of working closely with industry were no longer available to them.

Employment on the MSS staff continues to hold considerable social status and is generally thought of as a desirable career. MSS intelligence officers are usually recruited before or during their university education, and a large proportion are graduates of the China Institutes of Contemporary International Relations (CICIR), the Beijing Institute of International Relations, the Jiangnan Social University, or the Zhejiang Police College. Those requiring technical skills usually attend the Beijing Electronic Specialist School. These establishments provide training for MSS recruits, who usually come from families with MSS links or otherwise are influential and beneficiaries of guanxi. Nevertheless, however well connected the candidates are, they will have to be dedicated and disciplined although not yet necessarily Party members. Guanxi is often exercised to facilitate entry into the MSS.

Promotions aee endorsed at both the bureau and headquarters levels. Senior branch positions require the approval of the local administration, although, in practice, the will of headquarters usually goes unchallenged. The quality of performance during the information war over the coronavirus pandemic will also likely play a considerable part in future promotion. Interestingly, although thoroughly part of the MSS, branch personnel are regarded as employees of the local government. More than half the MSS staff recruitment takes place in the region’s where the officers will be posted for the breath of their careers and where they have family links. Those family links are quite important. This structure enables the MSS to fulfill the increasingly large responsibility of ensuring social stability, considered a significant operational priority. There is no equivalent to this system in the West. Training takes place in the branches. There are no centralized, formal training academies, and new personnel are expected to learn their profession on the job by reading old and current operational files, by working with mentors, and attending occasional lecturers and conferences. Expectedly in the Communist country, during training, a heavy emphasis is placed on political indoctrination, and although probably less than 15 percent of MSS staff are women, they tend to be almost entirely Communist Party of China members. Internal transfers, and secondments are routine and occur mainly from the law and political departments of local government. There a tacit understanding that one could find a home in the MSS with all of the care and comfort imaginable during and after active service.

Mao (left) and Soviet Premier Joseph Stalin (right). Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people. Despite reservations, Mao welcomed assistance from Moscow in the form of physical aid but experts and advisers. Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country, with hope of exploiting it to the greatest degree possible. However, cooperation that was established between Chinese and Soviet intelligence services ended with the split between Chinese and Soviet leaders.

Residual Impact of Soviet Intelligence Upon Chinese Intelligence?

Naturally, the once significant impact and influence of the Soviet intelligence service on Chinese intelligence has faded more and more with the coming of each new generation into the system. Yet, fragments from that past past still remain. Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people, and to that extent was only interested in formulating the best path to Socialism for China. Mao had held reservations about overlaying China with the Soviet model, but nonetheless welcomed assistance from Moscow in the form of physical aid but experts and advisers. Nevertheless, an agreement was established between Mao and Stalin to have a Soviet advisory mission providing physical aid and significant guidance and advice on nearly all aspects of government. Concerning intelligence, Chinese and Soviet services liaised significantly and comfortably. Soviet advisers used their own service as a model to structure the organization, staffing, training, intelligence operations, and resources of Chinese intelligence services. In the end, Chinese intelligence services mirrored those of the Soviets. It became an effective tool for China’s security. What happened with the Chinese also happened with intelligence services of Eastern Bloc and other Communist governments’ intelligence services in the late 1950s. However, also much as in the Eastern Bloc, Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country that Soviet intelligence could exploit to the greatest degree possible.

Consequently, for decades after World War II, the Chinese intelligence service, even without Soviet direction, evinced some organizational and operational aspects similar to those of the Soviet intelligence services of the past. To that extent, the KGB has remained a fully useful yardstick from which one could measure, understand, and conceptualize the structure and functions of the Chinese intelligence services as they evolved. Interestingly, the period in which Chinese intelligence services received advice and closely liaised the Soviet counterparts was also a period of evolution of Soviet intelligence. As soon as one intelligence organization was opened for business in the Soviet Union, it was replaced by another with added responsibilities. Those organizations included: Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKVD; 1938-1946, Narodnyi Komissariat Gosudarstvennoe Bezopasnosti (People’s Commissariat for State Security) and Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKGB-NKVD, placing police and security functions under one chief; and, 1946-1953, Ministerstvo Vnuirennikh Del (Ministry for Internal Affairs) and Ministerstvh Gosudarstvennoe Bezopasnosti (Ministry for State Security) or MVD-MGB. Eventually, in 1954, all of the non-military security functions were organized in what was dubbed the Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or the KGB. It was under odd circumstances that Soviet intelligence services would identify themselves as models for those of other countries to follow. Interestingly enough, there was a lesson for the Chinese to take away from that period of the growing pains felt by Soviet intelligence services. In effect, the evolution of the Chinese intelligence services was inevitable if it was to meet the evolving needs of the leadership in a changing world. Without wanting to declare or insinuate some causality, or proffering that there was some curious act of imitation, it must be noted that Chinese intelligence services, following the years of close contacts with the Soviet counterparts, went through a similar period of near continuous organizational and name change.

Cooperation that was established between Chinese intelligence services and Soviet intelligence services could not survive the split between Chinese and Soviet leaders. The cause was gaping differences in outlook. Mao’s perception of the right relationship between the Soviet and Chinese Revolutions was influenced by his profound identification with the Chinese national tradition, which led him to reject conceptions and political lines not sufficiently suited to the mentality of the Chinese people and to their originality and creativity. Such were the sensibilities behind the “Great Leap Forward.” Not even quiet liaison through a virtual cross border masonry between field officers of the two intelligence services would have been allowed.  

Unlike its sister civilian intelligence service, the MPS, the MSS generally appears to have adhered to the non-politicization  of the service. MSS senior executives have evinced an acumen for being clever with politics. Occasionally, they have not been pristine in avoiding any mix up between their true task and purpose and extraneous political matters. Indeed, MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. The purges of Beijing Party secretary Chen Xitong in 1995 and Shanghai Party secretary Chen Liangyu in 2006 were understood to have involved the ministry. Following the fall of Bo Xilai and Zhou Yongkang, the Beijing State Security Bureau chief Fang Ke and Vice Minister Qiu Jin were ousted in rather widespread purges as a consequence of their use of MSS resources to support certain leaders in their political tussles.

How MSS Is Organized

In terms of operations and functional (administrative) duties, a common understanding has been that MSS is divided into bureaus, each assigned to a division with a broad directive and each bureau is given a specific task. On a Weibo account, reportedly associated with the MSS, a suitable outline of the first 11 bureaus was posted in November 2016. A description of that organizational structure of the MSS is easy enough to find online. The bureaus on that list, along with an additional six bureaus, was discovered on the common yet only moderately reliable source, the online encyclopedia, Wikipedia: Confidential Communication Division: Responsible for the management and administration of confidential communications; International Intelligence Division: Responsible for strategic international intelligence collection; Political and Economic Intelligence Division: Responsible for gathering political, economic, and scientific intelligence from various countries; Taiwan, Hong Kong, and Macau Division: Responsible for intelligence work in Taiwan, Hong Kong, and Macau; Intelligence Analysis Division: Responsible for analysing and reporting on intelligence and collecting guidance on how to handle intelligence matters; Operational Guidance Division: Responsible for directing and supervising the activities of provincial level MSS offices; Counterintelligence Division: Responsible for gathering counterintelligence information; Counterintelligence Division: Responsible for monitoring, investigating, and potentially detaining foreigners suspected of counterintelligence activities. This Bureau is reported to primarily cover and investigate diplomats, businessmen, and reporters; Internal Security and Anti-Reconnaissance Division: Responsible for protecting the MSS from infiltration by foreign entities by monitoring domestic reactionary organizations and foreign institutions; External Security and Anti-Reconnaissance Division: Responsible for monitoring students and institutions abroad in order to investigate international anti-communist activities; Information and Auditing Division: Responsible for the collection and management of intelligence materials; Social Research Division: Responsible for conducting public opinion polling and surveying the population; Science and Technology Investigative Division: Responsible for managing science and technology projects and conducting research and development; Science and Technology Investigative Division: Responsible for inspecting mail and telecommunications; Comprehensive Intelligence Analysis Division: Responsible for the analysis and interpretation of intelligence materials; Imaging Intelligence Division: Responsible for collecting and interpreting images of political, economic, and military targets in various countries through both traditional practices and through incorporation of satellite imagery technologies; and, Enterprises Division: Responsible for the operation and management of MSS owned front companies, enterprises, and other institutions. (Additionally, In 2009, the MSS was reported by a former official to have a Counterterrorism Bureau.)

Since leaving the Central Intelligence Agency (CIA) where he was a highly-regarding analyst on China, Peter Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Among a number of issues, Mattis expressed a view compatible with greatcharlie’s here in a 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” Studies in Intelligence Vol. 56, No. 3 (September 2012) 47, that “Protecting the integrity of US intelligence and policy processes is an important task for the US Intelligence Community, but clear understanding of Chinese intelligence serves more than the CI [counterintelligence] mission. At the core, analysis of Beijing’s intelligence institutions is about trying to understand systematically how the Chinese government uses information to inform its policy formulation, guidance to diplomats and security officials, and the execution of its policies.” Along with a former military intelligence officer and diplomat, Matthew Brazil, Mattis published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant. In covering the web of Chinese intelligence services that engage in intelligence operations, Mattis and Brazil present a great deal about the super secret MSS which one can be sure is cutting edge stuff. For many analysts in defense, foreign affairs, and intelligence worldwide, it presents nothing less than a treasure trove and should find a permanent place in syllabi in college and university courses worldwide for years to come. (Regular reference is made to Mattis’ writings in this essay.)

Mattis and Brazil share the view that MSS headquarters is organized into numbered bureaus. They further explain that it is spread across at least four compounds in Beijing. However, in their assessment, they believe MSS is organized a bit differently than in the outline of its departments aforementioned. They state that at the present, the MSS is believed to possess at least eighteen bureaus. Unlike the People’s Liberation Army  (PLA) where military unit cover designators offer a way to track units, MSS elements, they explain, are not so readily identified. In Mattis’ and Brazil’s own words, “The following designations are ones in which we possess a modicum of confidence”: First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations; Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers; Third Bureau: unknown; Fourth Bureau: Taiwan, Hong Kong, and Macau Bureau; Fifth Bureau: Report Analysis and Dissemination Bureau; Sixth Bureau: unknown; Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside of China; Eighth Bureau: Counterespionage Investigation,  runs investigations to detect and apprehend foreign spies in China; Ninth Bureau: Internal Protection and Reconnaissance bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage; Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates activities of reactionary organizations abroad; Eleventh Bureau: China Institutes of Contemporary International Relations,  performs open source research, translation, and analysis. It’s analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows; Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the United front work system; Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluations Center (Zhongguo Xinxi Anquan Ceping Zhongxin) may manage the research and development of other investigative equipment; Fourteenth Bureau: Technical Reconnaissance Bureau conducts mail inspection and telecommunications inspection and control; Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. It’s public face in the Institute of Taiwan Studies at the China Academy of Social Sciences; Sixteenth Bureau: unknown; Seventeenth Bureau: unknown; and, Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the US.

Chairman Deng Xiaoping (above). Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Chinese industry needed to retain a competitive edge. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government. They receive intelligence collected by Chinese intelligence services. They undertake commercial espionage for their own benefit as well.

Intelligence Targets of Today’s MSS

Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, it would seem MSS senior executives and managers have now figuratively declared “game on!” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. That is primarily what Beijing wants and that is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined. By conventional wisdom, one would proffer that as a priority, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Infiltration of these operations by an adversary as China would certainly have far-reaching implications for US national security. Although the PLA would most interested in US military equities in its region and elsewhere in and around Asia, the MSS would expectedly support that work by collecting what it could on the instruments that the US uses to make conventional war and nuclear war. The intelligence threat China has posed to US national security further extends overseas, as China’s foreign intelligence service seeks to infiltrate the systems of US allies and partners. This particular aspect is seen as potentially having grave implications for US alliance stability and the security of US national defense information. Lately, the chief feature of the intelligence war between the US and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its victims.

Deng Xiaoping and the Emphasis on Economic Espionage

Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves.

During the administration of US President Barack Obama, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with China’s operations had no real effect on the Obama administration’s course and Chinese intelligence activities steadily intensified. The leadership of the Communist Party of China has not concealed the fact that they recognize the link between economic and national security, and its commercial and national security espionage efforts function in tandem to exploit it.

US Attorney General William Barr (above). The present US Attorney General William Barr is both troubled and angered by China’s espionage efforts against the US and he intended to defeat those efforts. Barr insists China is working to supplant the US as the leader in technology in all areas, by literally stealing away the future of the US. He explains that to accomplish that, China has continuously sought, through a variety of clandestine ways, to grab whatever about US technologies,  developmental practices, and manufacturing practices. Barr wants the US business community to accept these realities and become part of the answer. In making deals with China, US businesses are often selling out their own long-term viability of us companies sold out for short term gain. As dangerous, China has been able to cultivate relationships with their employees and recruit them for spying.

US Attorney General William Barr, in a June 21, 2020 interview on FOX NEWS “Sunday Morning Futures,” proffered that the US for decades has been a leader in technology. China would like to overcome US dominance in the field. To that end, China has been stealing all US technologies, developmental practices, manufacturing practices. Barr stated: “The way I look at is, this is a fundamental challenge to the United States. Since the late 19th century, our opportunity and our growth, our prosperity as a country has come from our technological leadership. We have been the technological leader of the world. In the last decade or so, China has been putting on a great push to supplant us, explicitly. They want to be the leader in all the future technologies that are going to dominate the economy. And so what’s at stake is the economic opportunity of our children and our grandchildren, whether we can continue to be the technological leader of the world. The Chinese have embarked on a very aggressive program during this time of stealing and cheating in order to overtake us. They have stolen our intellectual property. When they steal our secrets about future technology, they’re stealing the future of the American people.”

Barr left no doubt that China was quite some distance from competing fairly. He insisted that it was the intention of the Trump administration to put a halt to China’s very open efforts at robbery. Barr explained: “The Chinese efforts run the gamut from more traditional espionage of recruiting people to work for them, explicitly, to cultivating relationships that they are then able to use. And the people frequently are not completely attuned to the fact that they are being used as essentially stooges for the Chinese. So, it runs the gamut of things. And, sometimes, some of these programs, high-sounding programs, are used to the advantage of the Chinese.” Barr expressed concern over how educational programs have been used by Chinese intelligence services to penetrate US academic institutions and take away the knowledge, training, and research offered for use in China’s efforts to overwhelm the competitive edge the US possesses. Barr explained: “We are clearly cracking down on researchers and others that are sent over here to get involved in our key technological programs. And, by the way, this is not just weapons systems. This is agriculture. This is medicine. This is robotics. This is artificial intelligence and so forth. It’s the whole gamut of important technologies going forward.”

Dimensions of MSS Intelligence Collection

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three more apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Assuredly, the illicit procurement of specific technology by MSS is executed through the use of Chinese front companies. It is a relatively soft approach to intelligence collection, but it has had a devastating impact. According to Mattis in his 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” cited earlier here, FBI analysts reported that over 3,200 such companies had been quietly set up as fronts for intelligence collection purposes. Other relative short-cuts in espionage included tasking scholars, and scientists to purchase information before they travelled to countries that possessed targeted technologies. MSS has also encouraged Chinese firms to buy up entire companies that already possessed the desired technology.

With regard to the cyber attack, it is perhaps the most prolific type of attack against industry in the US, EU, and within other advanced industrialized countries. This dimension of Chinese intelligence collection is perhaps the most aggressive, and hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running human agents. It is a full-fledged dimension of China’s intelligence campaign strategy. If human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome. Cyber collection complements all other forms of penetration and collection very well.

By far, the most complex and risky dimension of MSS intelligence collection are its human intelligence operations. Least challenging are MSS operations in China. No resource constraints hinder the MSS in terms of both manpower to use against foreigners there. The efforts of foreign counterintelligence services typically face great limitations in terms of ways and resources to stem Chinese efforts against their foreign intelligence colleagues on the ground. The close proximity of other countries in the Far East would appear to make operating in these countries easier, too! Difficulties begin when tries to take a bite out of more advanced industrialized countries in the region. Japan, for example, has historically been a difficult country for Chinese intelligence services to operate within. Against Japanese targets, attempts to cultivate operatives and informants still occur, but a greater reliance is surely placed on technical collection by MSS. Outside of its region, in target rich US, EU Member States, and other advanced industrialized countries, even the Russian Federation, Chinese intelligence services as a whole initially encountered some difficulty figuring out how to go about approaching a target using officers. They would also naturally be concerned over facing considerably stiffer resistance from more adept counterintelligence services such as those of Japan. Interestingly, as time went on, they managed to find a number of sweet spots from which, and methods with which, they could conduct human intelligence collection operations with some degree of success. Lately, it seems to have been easy enough for Chinese intelligence services to establish networks of operatives and informants, and reportedly even sleeper agents, in the US, placing them in locations from which they could do considerable harm.

Collection through Front Companies and Operatives

The use of front companies is a very quiet, ubiquitous and pernicious approach to intelligence collection by Chinese intelligence services the US. Most US citizen can look direct at the activities of what appear to be benign companies and not observe or discern that it is fully engaged in a form of foreign attack against their country. With little threat of being discovered, Chinese front companies set up where they can best acquire companies, technologies, brain power in the form of students, and even intelligence operatives and informants. Some US firms that have unwittingly linked themselves to seemingly innocuous, but actually nefarious institutions in China, business, academic, scholarly, or otherwise, that are tied to the government, particularly the Chinese intelligence services, may often have Chinese intelligence operatives working out of them, thus providing a convenient cover for their activities. In July 2019, a federal grand jury in Chicago indicted Weiyun “Kelly” Huang, a Chinese citizen, on fraud charges, charging her with providing fake employment verifications. A grand jury indicted her two companies, Findream and Sinocontech, on charges of conspiracy to commit visa fraud. The two companies incorporated by Huang did not exist, except on paper. Federal authorities allege the Findream and Sinocontech were front companies used to provide false employment verification for Chinese students, convincing immigration officials that they were here legally. Huang made use of a website based in China, chineselookingforjob.com, and the China-based “WeChat” platform, as well as Job Hunters of North America, to recruit for her companies. Court records explain that over 2,600 Chinese students declared themselves as employees for either Findream or Sinocontech from September 2013 to April 2019. In a bungling oversight Huang claimed to have employed so many young people that according to a 2017 US Immigration and Customs Enforcement list, Findream and Sincocontech ranked among the top US-based companies that hired students under the federal Optional Practical Training program. Findream ranked number 10, just behind Facebook. Sinocontech ranked number 25, just behind Bank of America. Surely, that served to call some attention from US counterintelligence services to its activities. Tragically, on LinkedIn, it is indicated that great numbers of graduates from schools from around the country wrote in their online biographies that they were employed by either Findream or Sinocontech as data analysts, web developers, consultants and software engineers. Huang compiled approximately $2 million from the alleged fraud scheme. Prosecutors state that the citizen of “Communist” China indulged herself lavishly at Neiman Marcus, Louis Vuitton, Prada, Chanel, Hermes, and other luxury retail stores.

In a September 2018 criminal complaint from the US Department of Justice, Ji Chaoqun, a Chinese citizen, was charged with one count of knowingly acting as an agent of a foreign power, China. While Ji was still in school in China, an intelligence officer from the Jiangsu State Security Department, a provincial bureau of the MSS, approached him at a recruitment fair. They recruited Ji and tasked him with gathering biographical information on eight naturalized, ethinc-Chinese, US citizens after he arrived in Chicago to begin his studies. Reportedly, Chinese intelligence wanted to recruit those individuals, most of whom “worked in or were recently retired from a career in the science and technology industry, including several individuals specializing in aerospace fields.” Ji performed the task of collecting the information. After graduating with a master’s degree in electrical engineering from the Illinois Institute of Technology in 2015, he remained in the US through a temporary work program known as Optional Practical Training. That program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. After Ji graduated with a master’s degree in electrical engineering in 2015, he remained in the US through a temporary work program known as Optional Practical Training. The program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. Ji stated that he was employed as a software engineer for a company called Findream LLC. According to court records, Ji’s responsibilities included writing “well designed, testable, efficient code by using best software development practices.” Although Findream was advertised as a startup technology company based in Mountain View, California, the company did not exist, except on paper. In April and May of 2018, the FBI made clandestine contact with Ji via an undercover agent. During the May meeting, Ji revealed that he was first approached by the MSS. In October 2017, email and MSS messages exchanged between the MSS officer and Ji were uncovered by the FBI.

Technical Intelligence Collection and Cyber Attacks

MSS technical collection can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decision making processes. Several instances of such cyber attacks have been made public, among them: in 2010, China reportedly attempted to infiltrate the email accounts of top US national security officials, including then Chairman of the Joint Chiefs of Staff Admiral Mike Mullen and then Chief of Naval Operations Admiral Gary Roughead; in July 2015, the US Office of Personnel Management announced that hackers had extracted personnel records of roughly 22 million US citizens. The hackers were reportedly affiliated with the MSS. Some of the stolen files contained detailed personal information of federal workers and contractors who have applied for security clearances. Among the information extracted were the fingerprints of 5.6 million people, some of which could be used to identify undercover US government agents or to create duplicates of biometric data to obtain access to classified areas; and, in May 2016, the then Director of National Intelligence James Clapper stated there was indicia supporting a concern that foreign actors had targeted the 2016 US Presidential Campaigns with cyber operations. Those foreign actors plausibly included Chinese intelligence services, as well as actors in the Russian Federation and other countries. During the 2008 US Presidential Election, evidence existed that indicated China infiltrated information systems of the campaigns of then Senator Barack Obama and Senator John McCain. The experience gained and the lessons learned by MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game. An indictment unsealed in October 2018 revealed that US was made aware of at least a portion of MSS directed cyber operations aimed at swallowing up technologies researched and developed by firms in the US and other advanced industrialized countries.

In October 2018, the US Department of Justice unsealed charges leveled on 10 Chinese nationals, alleging a persistent campaign by Chinese intelligence officers and their recruits to steal aerospace technology from companies in the US and France. In a thoroughly complex operation, from January 2010 to May 2015 a provincial bureau of the MSS, the Jiangsu Province Ministry of State Security (‘JSSD”), headquartered in Nanjing, China, conspired to steal sensitive commercial technological, aviation, and aerospace data by hacking into computers in the US and other advanced industrialized countries. According to the indictment, MSS officers managing the operation included Zha Rong, a Division Director in the JSSD, Chai Meng, a JSSD Section Chief, and other MSS officers who were not named. Both Zha and Chai supervised and directed human intelligence and activities by one or more members of the conspiracy aimed at hacking into the computers of targeted firms that were used in and affecting interstate and foreign commerce and communications, and steal information, to include intellectual property and confidential business data, and to use these companies’ computers to facilitate further computer intrusions into other companies.

As for their computer savvy MSS operatives, Zhang Zhang-Gui, a computer hacker who operated at the direction of the JSSD, tested spear phishing messages and established and maintained infrastructure used in multiple intrusions. Zhang also coordinated hacking activities and shared infrastructure with Liu Chunliang, a fellow computer hacker who operated at the direction of the JSSD, and coordinated the activities of other computer hackers and malware developers, including Gao Hong Kun, Ma Zhiqi, and an identified unindicted co-conspirator (‘UCC-1″). Among his activities, Liu established, maintained and paid for infrastructure used in multiple intrusions, deployed malware, and engaged in domain hijacking in connection with the intrusion of a San Diego-based technology company. The hacker Gao Hong, who operated at the direction of Liu and was an associate of Zhang, engaged in the computer intrusions into Capstone Turbine, a Los Angeles-based gas turbine manufacturer and an Arizona-based aerospace company. Ma Zhiqi, also mentioned, a computer hacker who operated at the direction of LIU, was a personal acquaintance of Liu and UCC-1 as well. Zhuang Xtaowei, a computer hacker and malware developer, who also operated at the direction of Liu, managed malware on an Oregon-based aerospace supplier’s systems and stole the firm’s data from no earlier than September 26, 2014, through May 1, 2015. On February 19, 2013, one or more members of the conspiracy hacked into a second French aerospace company’s server affiliated with Liu, using credentials Liu had provided to Ma on December 14, 2012. Gu Gen, the Information Technology Infrastructure and Security Manager at the French aerospace manufacturer with an office in Suzhou initially mentioned, provided information to JSSD concerning the firm’s internal investigation into the computer intrusions carried out by members of the conspiracy while under the direction of an identified JSSD intelligence officer. Tjan Xi, an employee of the same French firm who also worked in its Suzhou office as a product manager, unlawfully installed Sakula malware on a computer of the firm at the behest of the same unidentified JSSD Intelligence Officer.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi (above), for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide. Experience gained and the lessons learned by the MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi, for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide, stealing terabytes of weapons designs, pharmaceutical research, software source code, and personal data from targets that included dissidents and Chinese opposition figures. The 27-page indictment alleges that both Li and Dong were contractors for the Guangdong State Security Department of the MSS. Prosecutors also allege that the MSS, prosecutors said, supplied the hackers with information into critical software vulnerabilities to penetrate targets and collect intelligence. The indictment mostly did not name any companies or individual targets, but The indictment indicated that as early as January 2020, the hackers sought to steal highly-valued COVID-19 vaccine research from a Massachusetts biotech firm. Officials said the probe was triggered when the hackers broke into a network belonging to the Hanford Site, a decommissioned US nuclear complex in eastern Washington state, in 2015. US Attorney William Hyslop in a public statement on July 21, 2020 emphasized that there were “hundreds and hundreds of victims in the United States and worldwide.” Indeed, their victims were also located in Australia, Belgium, Germany, Japan, Lithuania, Netherlands, South Korea, Spain, Sweden and the United Kingdom. The MSS has been known to utilize contractors for its cyber espionage operations. Clearly, MSS is not adverse to putting its faith in the young hackers to compromise security and deeply penetrate US systems to steal untold amounts of information. Integrating contractors in its cyber espionage operations allows the MSS access to a much desired wider pool of talent. Under China’s National Security Security Law, they are obligated to serve the needs of the government of course with some remuneration, a point which will be explained later in this essay. To some degree, it provides some plausible deniability of the hackers work against some countries, but as demonstrated by this case it provides MSS a limited shield from US capabilities. Li and Dong both studied computer application technologies at the University of Electronic Science and Technology of China, in Chengdu. As a modus operandi, Dong would research victims and find potential methods of remotely breaking into computer systems. Li would then compromise the networks and steal the information. The truth is rarely pure and never simple in the intelligence arena, so it remains unclear whether US counterintelligence, following the identification of these hackers and their activities, has managed to neutralize them and set up satisfactory defenses to prevent further Interference by MSS hackers. Oddly enough, there was some benefit gained by Beijing, perchance unknowningly by the Communist Party of China. To the extent that the hackers are young and ingenious, they are somewhat relatable to contemporaries and even younger people fascinated by Internet technology inside and outside of China. Presumably, Li and Dong still reside safely in China.

MSS Human Intelligence Collection

As human intelligence collection in the field is perhaps the most complex dimension of MSS operations, it is presented here in greater detail than those aforementioned. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma (above), a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of technology and data. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma, a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. According to court documents, twelve years after he retired from the CIA in 1989, Ma met with at least five MSS officers in a Hong Kong hotel room, where he “disclosed a substantial amount of highly classified national defense information,” including facts about the CIA’s internal organization, methods for communicating covertly, and the identities of CIA officers and human assets. After providing that information to MSS officers in March 2001, Ma and a relative that assisted him, also worked for the CIA, were paid $50,000. Prosecutors were not fully aware of how much Ma was paid by the MSS following the initial payment. They are aware, however, that Ma returned from one trip to China with $20,000 and a new set of golf clubs. In an effort to gain access to additional sensitive information, Ma secured a position in 2004 as a contract Chinese linguist for the FBI. He used his new position and security clearance to copy or photograph classified documents related to guided missile and weapons systems and other US secrets and passed the information to his Chinese intelligence handlers. In 2006, Ma arranged for his wife to travel to Shanghai to meet with his MSS contacts and pass a laptop to them. (Interestingly, Mao’s wife was not named in the criminal complaint.) The FBI eventually saw Ma straight and according to court documents, special agents intercepted Ma using an undercover FBI employee posing an MSS officer conducting an audit of his case. The undercover operative also claimed to be tasked with looking “into how Ma had been treated, including the amount he had been compensated.” In a clandestine video recording a of a meeting with the FBI undercover operative, Ma is seen counting $2,000 in cash the operative gave his supposedly to acknowledge his work on behalf of China. Ma, who was born in Hong Kong, is recorded saying that he “wanted ‘the motherland’ to succeed” and admitted that he provided classified information to the MSS and that he continued to work with some of the same intelligence officers who were at the 2001 meeting. Prosecutors stated that the relative of Ma, who assisted him, is now 85-years-old and suffers from “an advanced an debilitating cognitive disease.” Given that mitigating circumstance, he was not charged.

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student, however, the record of his activities indicates that the young operative was not in the US to just brush up his English. When Zhao was actually arrested in September 2018, investigators discovered photos and videos of government buildings and an antenna field on his digital camera and smartphone. Eyewitnesses saw Zhao ignore a sign clearly indicating the area was restricted and walk directly toward the antenna field and take photos. Although Zhao had actually studied in a summer exchange program that ended in September 2018, his visa had already expired when he was arrested. In his defense, Zhao alleged that he was just a tourist who got lost. By successfully denying that he was engaging in espionage, Zhao avoided being expelled from the US, persona non grata, but that did not prevent his prosecution for taking photos in a prohibited place. Court documents indicate none of the photos and videos found on his cell phone and digital cameras were of any tourist attraction sites in Key West. Reportedly, Zhao was in touch with Chinese intelligence officers inside the US before he took photographs at the base. During his interrogation, Zhao told the FBI that he was the son of a high-ranking Chinese military officer and that his mother worked for the Chinese government. The fact that the young spy was tasked to take photographs at an extremely high security location with the great risk of being detained perhaps meant that there was a certain urgency to collect the information. (With so many internal political squabbles remaining largely unknown, it seems odd that the young man would be sent on a near Kamikaze mission into the figurative dragon’s lair, knowing that there was better chance than not that he would be caught, very likely causing some embarrassment for his father and mother.)

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Particularly with regard to students, Chinese intelligence agencies often use the “flying swallow” plan, whereby overseas Chinese students who serve as spies work with a single contact in China—just as swallows pick up only one piece of mud at a time to build their nests. The students do not have their personal files inside China’s intelligence system, so if they are caught, there is little information to be revealed.

As this approach has resulted in a reasonable degree of success, and MSS officers could continue to capitalize on a cultural and language affinity, a preconception had actually developed in the minds of interested parties in the US that the MSS would continue to take that course. Support could also found for that view looking at the success of MSS in Taiwan, with its ethnic Chinese population. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles. Reported, Chinese intelligence officers recruited Hsieh’s comrade  Hsin with all of stops out while he was in China, leading a Taiwanese tour group. Hsin, a former colleague, allegedly first approached Hsieh about working for Chinese intelligence. According to the prosecutors, Hsieh traveled to Malaysia and Thailand to meet his handlers. The indications and implications of Hsieh’s pattern of travel are that he may have been working for Chinese intelligence since 2009 or 2010. In addition to collecting and passing classified materials, both Hsieh and Hsin agreed to assist Chinese intelligence in spotting and recruiting other sources.

In March 2010, Wang Hung-ju, who was arrested because of his connections to an espionage case. Wang was a former official in the Special Service Command Center in the National Security Bureau, and served for a short period as the bodyguard for Taiwanese Vice President Annette Lu before retiring in 2003. The Taiwanese press repeatedly reported that Wang was uncovered as part of the investigation of a Taiwanese businessman, Ho Chih-chiang. MSS intelligence officers, plausibly from the MSS bureau in Tianjin, recruited Ho in 2007 and used him to approach Taiwanese intelligence officials. Ho’s handlers instructed and empowered him to offer money and other inducements to recruit serving officials. Supposedly, Ho was in contact with Wang, which led to his travelling to China where he was recruited by the Tianjin State Security Bureau. Wang reportedly attempted to recruit two friends into his intelligence network, including an officer in the Military Police Command. While the shift to recruiting a broad base of foreign recruits in China was an important step in the evolution of Chinese intelligence, the process still had its limitations. Nearly all foreign-born operatives were recruited within China, rather than their home countries or elsewhere.

Retired Taiwanese Major General Hsieh Chia-kang (center) MSS officers continue to capitalize on a cultural and language affinity in the recruitment of ethnic Chinese worldwide. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles.

However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method. One can better estimate how active and well MSS officers and operatives are performing by who has been recently caught among their recruits and what they have been discovered doing.

In April 2020, Candace Claiborne, a former US Department of State employee, pleaded guilty to conspiracy to defraud the US. The criminal complaint against her alleges that Claiborne, having served in a number of posts overseas including China and having held a top-secret security clearance, failed to report contacts with suspected intelligence officers from a bureau of the MSS. Claiborne’s MSS handler used the cover of operating an import-export company with a spa and restaurant on the side. The MSS tasked with collecting and passing information on US economy policy deliberations and internal State Department reactions to talks with China. They more specifically told Clairborne that her reporting on US economic policy was “useful but it is also on the Internet. What they are looking for is what they cannot find on the Internet.” In accord with her instructions, prosecutors claim Claiborne provided copies of State Department documents and analysis. In return, Claiborne and a co-conspirator received “tens of thousands of dollars in gifts and benefits,” including New Year’s gifts, international travel and vacations, fashion-school tuition, rent, and cash payments.

In May 2019, Kevin Mallory was charged under the Espionage Act with selling US secrets to China and convicted by a jury last spring. In May 2020, sentenced to 20 years in prison; his lawyers plan to appeal the conviction. Mallory’s troubles began in 2017 when his consulting business was failing and he was struggling financially. In early 2017, prosecutors said, he received a message on LinkedIn, where he had more than 500 connections. It had come from a Chinese recruiter with whom Mallory had five mutual connections. That recruiter, Michael Yang, according to the LinkedIn message, worked for a think tank in China, the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. Mallory was deployed to China for part of his career and was fluent Mandarin. The message led to a phone call which led to Mallory boarding a plane for Shanghai to meet Yang. Mallory would later tell the FBI he suspected that Yang was not a think-tank employee, but a Chinese intelligence officer, which apparently was okay by him. Yang was an MSS intelligence officer. Mallory’s visit to China initiated an espionage relationship with the MSS by which he received $25,000 over two months in exchange for handing over government secrets. Reportedly, the FBI eventually caught him with a digital memory card containing eight secret and top-secret documents that held details of a still-classified spying operation.

Kevin Mallory (above). Mallory was charged in May 2019 under the Espionage Act with selling US secrets to China. In targeting ethnic-Chinese for recruitment, MSS found itself simply working on the margins. The method was too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. In early 2017, prosecutors said,  Mallory received a message on Linkedin from a Chinese recruiter, who allegedly worked for the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. He was actually an MSS intelligence officer. Other communications led to Mallory’s visit to China and the creation of an espionage relationship with MSS. When the FBI eventually caught him, he possessed a digital memory card containing eight secret and top-secret documents with details of a still-classified spying operation.

In the wild kingdom, ambush predation, a behavior displayed by MSS officers in the instances just presented, works well instinctively for many animals, but it requires possessing an innate patience. The prey must enter a well-set trap of some kind. The haul of victories will be determined by how target rich the environment in which the trap set is with the prey the predator wants. Increasing the number of those targets would mean becoming proactive, going out and hunting that desired prey down. Thus, in the third and most recent step in the evolution of Chinese intelligence, MSS officers have become willing to recruit agents while abroad. The risk was greater, but the potential fruits would be greater, too! According to Mattis, the new approach was first identified by Sweden in 2008, when its intelligence services and law enforcement determined Chinese intelligence officers operating out of the Embassy of the People’s Republic of China in Stockholm, had recruited a Uyghur émigré to spy on fellow émigrés inside as well as outside of Europe. German intelligence and counterintelligence services identified a second instance in 2009, alleging the existence of a spy ring controlled by a Chinese intelligence officer operating out of the Consulate of the People’s Republic of China in Munich.

Once determined to go after even a broader pool, MSS naturally thought strongly about collecting intelligence with might and main throughout the US. Fast forward three years and one will discover how successful Chinese human intelligence penetration has been at some of the finest academic institutions in the US: in January 2020, the chair of Harvard’s Department of Chemistry and Chemical Biology, Charles Lieber, was alleged to have violated federal law by failing to disclose his involvement in China’s Thousand Talents Plan to Harvard administrators, who allegedly then passed along false information to the federal government. Lieber was reportedly paid more than $1 million by China in exchange for agreeing to publish articles, organize international conferences and apply for patents on behalf of a Chinese university; in December 2019, a Chinese Harvard-affiliated cancer researcher was caught with 21 vials of cells stolen from a laboratory at a Boston hospital; in August 2019, a Chinese professor conducting sensitive research at the University of Kansas was indicted on charges he cloaked his links to a university in China; and, in June 2019, a Chinese scholar at the University of California, Los Angeles was convicted of shipping banned missile technology to China. The National Counterintelligence Executive, Evanina, has explained, “A lot of our ideas, technology, research, innovation is incubated on those university campuses.” He further stated, “That’s where the science and technology originates–and that’s why it’s the most prime place to steal.” However, MSS does not limit itself to seeking big things from big places such as Harvard. Desired information on national security matters can be found just about anywhere in the US. Consider, in April 2016, a Florida woman was charged by the US Department of Justice, in an 18-count indictment for conspiracy to illegally export systems, components, and documents on unmanned underwater vehicles, remotely operated vehicles, and autonomous underwater vehicles to China.

Selecting Prospective Recruits

Visits to China by foreigners may be viewed by the Ministry of Tourism as an opportunity to display China’s cultural richness and advancements in all areas. The MSS would only characterize those visits by foreigners as intrusions into China. The foreigner, to them and their sister intelligence, counterintelligence and law enforcement organizations, will always represent a potential threat. MSS could only imagine exploiting the situation by seeing opportunities to recruit new operatives. Commonly acknowledged among experts in this province is that domestically, the MSS exercises responsibility for the surveillance and recruitment of foreign businessmen, researchers, and officials visiting from abroad. The MSS Investigation Department surveillance of dissidents and foreign journalists is often quite obvious. It is supported by more clandestine measures taken by state ministries, academic institutions, and the military industrial complex. The various Chinese intelligence services can identify foreigners of interest in China through a number of means such as trade fairs, exhibitions, and business visas. Once identified, an intelligence officer using a cover may try to develop a friendship or business friendship often using lavish hospitality and flattery. The Chinese intelligence services have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Sometimes efforts will be made via social media to spot potential recruits. A variety of ploys will be used to get to the target to travel to China where the meat and potatoes of the recruitment process will get underway.

In the current environment, US citizens especially will be closely investigated by a provincial MSS office. That kind of investigation would not be conducted with a view to recruit immediately. For the MSS, it was important to construct a psychological profile of a person, his political orientation, his attitude towards his home country and towards the country he was visiting for some reason. What is very clear about the recruitment of foreign operatives and informants by the MSS in China is that rigor is used in the selection process. The ostensible way MSS to determine whether a foreign official should be targeted would be to investigate whether they ticked certain boxes through evaluating their actions and other information available. Among those boxes were likely the following examples: standing and influence within his organization, access to required information; standing and influence own people given position; standing and influence among specific people given position and access to decision making process and required information; and, the ability to provide secure access to information for MSS officers.

The likes and dislikes of the target and observed particular appetites of the target that may have left the door open to manipulation by seduction or blackmail are vigorously investigated. If a file secreted from the target organization can be collected by MSS agents in a position to grab it. It would be copied or stolen and included in the target’s file. A background that included an exceptional interest in China, left-leaning sympathies, and even affiliation with Socialist or Communist groups would make the target even more attractive for MSS to recruit for China’s case and the Communist Revolution. Particularly useless are observations and “insights” that merely verify generalizations, derivative, or even bigoted preconceived ideas about the target. After accumulating a sizable amount of material using plain observation, clandestine contacts and conversations, and use of a suite of technical tools for audio- and video-surveillance of the places of residence, all the information is analyzed and conclusions are reached on it. A decision is then made about transforming the investigation into a recruitment. The MSS officer who attempts the recruitment in China will exploit whatever has been collected about the target. Information acquired while the recruitment is underway will also be made available to the officer and his manager. The MSS officer will appeal to the target’s discretion. Ideally, the target wil be led to voluntarily agree to work for MSS. However, under exigent circumstances, compromising materials might be used, however, in this day and age it is hard to determine what behavior is recorded would qualify as compromising–”Goodness knows, anything goes!.”

The same rigorous selection process of operatives and informants would be used overseas as in China. By the time of their recruitment of a target, MSS would be fully aware of their recruits’ particulars. Productive operatives are a true sign of a successful recruitment. Sometimes, the prospective recruit will be asked to travel to another country where MSS officers will more formally bring in the target and introduce him or her to the world of espionage. Additionally as in China, the objective of an overseas recruitment may not always be collection. The goal can also be to educate a foreigner, conveying a favorable image of China and how it represents the best future for the world.

Within the Chinese intelligence services, the belief is that foreigners lack the strength of connection, patriotism, that Chinese have for their country is dogma. With ethnic Chinese émigrés, the belief is that the strength of their connection to China can be exploited. For decades the line emanating from Beijing has been that the people of the West for that matter are rich, sick, and filthy. With specific regard to the US, world’s chief superpower, a guiding idea in China’s geopolitical and geostrategic struggle with it has been that the US is a terminal empire. The belief that the US is collapsing from within flourishes despite the country’s decades long record of economic success and steady ascent. In current times, Beijing’s line has become nuanced to express the view that the US is spiraling downward under the weight of racism endemic to all institutions and neo-fascism. To that extent, the liberal democracy is suffocating on its own self-aggrandizement. China sees its quest for dominance over the US further aided by the fact that the US citizen, in the face of an ever encroaching China, would prefer to enjoy an easy life, a lazy existence, and would hardly be concerned with providing any resistance. So far, MSS has been able to add one successful recruitment after another to its tally.

The Minister of State Security, Chen Wenqing (above). The male MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. Their comportment resembles that of the MSS Minister Chen Wenqing, seen above. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. However, shrewd MSS managers are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch.

Some Specifics on How It Is Done: The MSS Officer on the Beat in the US

Based on information gleaned from defectors, MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. Having stated that, it is also very likely that far greater numbers of MSS officers as well as officers from the PLA and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. More often than not, they operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial.

Possunt quia posse videntur. (They are able because they appear able.) The MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. MSS is results oriented, and that is always foremost in the minds of good managers. Actions taken will never be perfunctory, and situations should not be forced. In the field, operating against an opponent, nothing can be thought of as too trivial to disregard. After being read-in on reports, must let nothing escape a manager’s consideration. Every target for recruitment is unique, requiring some nuance. Thus, shrewd managers in MSS are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating and counterintuitive. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch. That might make the target more comfortable and easier to handle once the collection process begins. This is not any reference to sexual enticement or manipulation. Rather, the touch of a female officer may prove more effective. For some operatives, the female officer may be able to effectively take a “motherly approach,” comforting them and making them more responsive. Having stated that about female officers, in some cases, it may be discovered after the initial approach that a woman may prove to be, for a variety of reasons, too intimidating for a target and make the interaction difficult and likely unsuccessful. The target may simply hold a bias against women, and perhaps may find working for a woman disagreeable. Such are the realities of human interactions.

Among scientists, technicians and engineers, it may be the case that the target would be best approached by a more compatible, “bookwormish,” reserved and understanding officer, who can connect with the target not only on a professional level, being able to discuss technical details of information sought and the work in which the target may be engaged, but on a social level, perhaps having many of the same interests as the target. In every case though, the main pitch to the target would include something along the lines that Just as humanity has no nation, science has no nation. The line that would soon follow is how China would be the dominant power and be the country to lead humanity to excellence and so on.

As mentioned earlier, possessing a diverse team of male and female officers for operations is not likely to be the case for most MSS managers operating under either official cover or non-official cover. For this reason, it has become necessary for MSS to seek to the cooperation of scientists, technicians and engineers from other government branches or civilian enterprises who would be directed to attend lectures, conferences, conventions trade shows and the like, and make contact with targets and establish an interaction that could lead to passing the target of to an MSS officer or actually engaging in the tradecraft necessary to recruit the target and manage the target’s activities, use tradecraft to collect information procured and provide requirements collection and solutions to problems.

For an intelligence officer recruiting agents, speech is everything. Word choices must build confidence, create trust, console, assure, inspire, and comfort. To create compliant agents, the right word choice must be made every time. Some submission of operatives and informants to the words of the officer must take place, causing the operatives and informants to put aside what they may know or imagine and accept the new knowledge the officer puts before them. While of course in reality, all operatives and informants are being manipulated and corrupted by their foreign intelligence officer handlers, a relationship akin to a teacher and student or mentor and mentee is established in optimal cases. As in those sort of relationships, the operative or informant becomes the responsibility of the officer. Further, as in such relationships, it should be the hope of the officer that the operative or informant performs superbly and exceeds all expectations.

The less certain the recruit is about the objective truth, the more likely the individual will be drawn to a false reality. Many who are successfully recruited ultimately would believe that their actions were humanitarian contributions to peace. It is very unlikely that the operative will ever know the degree to which that furtive bit of information he or she is stealing will support any nefarious plans the officer and his country may have cooked up for the US or another country. That is always thrown into the bargain. The MSS officer’s relationship with the operative is only professional. Friendship is established due to necessity. All appearances will be false. Intriguingly, the intellects of the majority of recruits are unable to confound insincerity. Targets of MSS recruitment indeed often fail to realize that if it were not for the officer’s need to collect information from, or pass the Communist Party of China-line to, the operative, the officer would hardly have anything to do with anyone of such character that they would willingly betray their own homeland. The only reality for the recruit is that they are being molded, groomed to do nothing more than committing treason at the behest of a hostile intelligence service of a foreign country. It is all certainly not some childish parlor game. Quid est turplus quam ab aliquo illcieli? (What can be more shameful than to be deceived by someone?)

In a number of cases in the US in which economic espionage has occurred identified as having a Chinese nexus, indications were that nontraditional actors have been used in Chinese intelligence operations for quite some time. Just how many nontraditional actors are in a position and willing to serve the interests of the Chinese intelligence services could only be known based on intercepted information, informants working for US intelligence and counterintelligence and after they may be activated to collect information or materials. A conversation on the margins of a professional gathering that begins with innocuous banter. There could be a clandestine contact, an email or letter, sent to the target requesting to discuss a matter in the target’s field to assist with the writing of an article or book, to assist with academic or other scholarly research, or to discuss a grant or prize from an overseas nongovernmental organization of some type. The next contact, if any, might include leading comments or questions on technical matters or one’s work, might appear odd. That would be an almost sure sign that the inquisitive interlocutor, if not simply socially inept, was probing. If the target had even the slightest awareness of the efforts of Chinese intelligence services to recruit spies, it is at that point the individual should realize that he or she is in a bad situatupion and break that contact immediately. If the MSS officer notices that the target realizes his or her questions were compelled by more than a thirst for knowledge and does not run, the officer knows he may have hooked his fish.

As part of their tradecraft, MSS officers would prefer hole-in-corner meetings with prospective recruits in small, quiet locations such as cozy, dimly lit establishments, conversing over coffee or tea, perhaps a dash of brandy or even a bite to eat. It would be a far better site for a furtive discussion than some crowded establishment or a spot nearby some busy thoroughfare. Other sites usually selected are hotel rooms, gardens, and parks. The MSS will also want to have an unobstructed view of passersby and other patrons to at least determine whether observable surveillance activity is being directed upon the meeting. The MSS officer will want to eliminate as many distractions as possible as he or she will want to focus wholly on communicating with the prospective recruit and have reciprocate with the same level of attention. The officer will want to analyze the individual close-up and personal and every response to his or her remarks. If a full-on recruitment effort is not made right away, everything will be done to establish a close association for the moment with the target. The figurative “contracted specialist,” will engage in similar activities, and much as the MSS officer, would also try to become a close associate of the prospective recruit. Much as an intelligence officer would be, the contracted agent would doubtlessly be placed under the close supervision of an MSS manager most likely operating under non-official cover, but potentially under officer cover. If a prospective “contracted specialist” left no doubt in the minds of MSS officer that he or she would be unable to perform the more hands-on job of recruiting operatives and informants, they might be called into service to “spot” experts at professional gatherings or even at their workplaces who MSS desires or to collect information from available databases and files there.

The Tianjin State Security Bureau (above). The thirty-one major provincial and municipal sub-elements of the MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations.

Overseas Espionage by the Provincial Bureaus: A Dimension within the Human Intelligence Dimension

It is important point out that although the bureaucratic center of gravity may reside in its Beijing headquarters, in a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau,” Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial state security departments and municipal state security bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations. He further explains that unless specific units are referenced, reality will contradict general assessments. The indication and implication of this is that defeating MSS efforts in the US will require a broad-based strategy that accounts for the scale of the intelligence organization and compartmentation.

The Shanghai State Security Bureau (SSSB) has surfaced in several US espionage cases. The record its uncloaked operations leaves no doubt that SSSB is constantly looking for opportunities to collect foreign intelligence. It was actually SSSB intelligence officers that approached Clairborne and requested that she provide information on US economy policy deliberations and internal State Department reactions to talks with China. It was SSSB that recruited Mallory. It was SSSB that approached a freelance journalist focused on Asian affairs, received SSSB requests for short, interview-based papers related to US policy in Burma, US contacts with North Korea, and US talks with Cambodia related to the South China Sea. Away from the US, in a case involving South Korean diplomats in Shanghai, a Chinese woman, in exchange for sex, requested and received telephone and contact information for senior South Korean government officials. Beyond government documents, the woman also used her influence to help Chinese citizens acquire expedited visa approvals to South Korea. SSSB reportedly blackmailed a Japanese code clerk working in the Japanese Consulate in Shanghai in 2003 and 2004 over his relationship with a prostitute. Allegedly, the illicit relationship began at a karaoke parlor that may have been owned by the SSSB and that catered to Japanese diplomats and businesspeople. Once the code clerk in the grips of the SSSB, its intelligence officers demanded background information on Japanese diplomats posted to the consulate and the schedule for diplomatic pouches going back to Tokyo. Counterintelligence plays a key role in SSSB efforts, too! When the SSSB blackmailed the Japanese code clerk, the organization reportedly asked him to name all of the Chinese contacts of the Japanese consulate in Shanghai.

Other evidence available indicates the SSSB is responsive to the global needs of the MSS and China’s central decision makers. A job announcement, likely errantly circulated publicly around Shanghai universities in 2015, encouraged students who spoke English, Japanese, German, French, Russian, Taiwanese, or the languages of China’s recognized minorities to apply to the SSSB. Mattis proffers that the request for those specific language skills are suggestive of foreign-intelligence targets, counterintelligence coverage of foreigners inside China, and domestic intelligence work for monitoring the party-state’s internal enemies. The job announcement also emphasized that skills in information security, computer software programming and telecommunications as being desirable. In its recruitment efforts, SSSB benefits from a local pool that includes some of the best universities in China, including Fudan and Shanghai Jiao Tong. Shanghai’s universities, think tanks, businesses, and modern infrastructure draw a large, high-quality pool of foreigners from which the SSSB can recruit operatives. Shanghai Jiaotong University, one of China’s most prestigious universities, has been linked to military thefts in cyberspace, leaving open the possibility that such students also might seek work with state security. Admittedly, the job announcement did not describe whether such skills were required in technical support or operational positions. A recently-passed intelligence law prescribes “[combining] open work and secret work” in intelligence operations. Thus, SSSB capabilities very likely exceed human-intelligence operations to include computer network operations.

As the Historical Dictionary of Chinese Intelligence revealed it to be the pattern within the provincial departments  and municipal bureaus, the SSSB leadership appears to come from within the bureau or at least the MSS. The current bureau director is Dong Weimin, who has run the organization since 2015. Unlike the Beijing State Security Bureau’s leadership, service in the SSSB unlikely provides for upward mobility to other parts of the MSS. The directors of the Beijing State Security Bureau regularly move into the MSS party committee and become vice ministers. The most notable among these are Qiu Jin and Ma Jian. The only example of an SSSB director promoted upward in recent memory seemingly is Cai Xumin. He led the SSSB from 2000 to 2004, when he was promoted to MSS vice minister. Cai would eventually return to Shanghai to serve as the city’s deputy procurator in late 2006.

Away from the economic espionage and technology theft in particular, MSS officers regularly have operatives engage in something akin to a Hollywood depictions of “secret agent spying” by taking photographs of restricted areas, gaining entry into restricted areas, and collecting documents, materials, and other property from a restricted area. Those types of activities are perhaps more commonplace that most ordinary citizens might believe. It is only after an MSS officer is captured, or officer of another Chinese foreign intelligence service such as the Second Department of the PLA, that they are made aware that such activity is taking place. Greater awareness that is occurring is the only chance of thwarting suspicious activity when it occurs. When Chinese nationals engaged in such activity are occasionally captured, usually found in their possession is a cache of surveillance equipment. There is typically so much that it evinces the agent believed, with a high degree of confidence that he or she would be able to act without relative impunity in or around a targeted restricted area. It may also very well have been the precedence of previous success spying on the site that helped fashion that notion. Despite the regularity of such activity, the use of MSS officers to recruit agents to do the dirty work of spying has been a fruitful approach.

MSS Informants: Motivations

Attendant to any discussion of the use of actual research scientists across the spectrum of advanced technologies as operatives, as surrogates for MSS officers in the field, would be the discussion of civilian informants and responsibilities of Chinese citizens under China’s National Security law. In the West there usually would be a variety of motivations for citizens to more than likely violate their own Constitution to engage in surveillance and higher levels of activity on behalf of US intelligence and counterintelligence services and law enforcement. Against a foreigner, they might see it as a Patriotic duty. To surveil another citizen might cause pangs of dismay anxiety for there would be the real possibility of violating the 1st Amendment and Fourth Amendment rights of a fellow citizen under the US Constitution. Sadly the motivations of money ideology, conspiracy, and excitement, as well as a healthy dose of indifference will often cure any anxieties or nervousness about another citizens Constitutional rights. Different from Western democracies, however, for the Chinese citizen, such motivations do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of the intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, the homeland. Supposedly, revolutionary zeal drives the heart of China as one beating heart so to speak.

The National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress declares under Article 9 that in maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MSS does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security.”

On MSS Informants Overseas

The immediate impression created when one learns that China regularly makes full use of Chinese nationals to support the intelligence collection process is the mind boggling prospect of a multitude of adults from China’s population, which according to the World Population Review as of this writing is put at nearly 1,439,239,000. While there may very well be several Chinese national informants moving around Western countries on a given day, that number is certainly not in the millions. Certainly, not every adult in China will be directly asked to be an informant overseas. Seasoned members of the service have decades of experience approaching young Chinese travelers. Usually prospective informants are approached just before travelling overseas for business or tourism or early in their overseas education or career. The younger the informant, the more time they might have in place and more likely they might be responsive to an MSS officer’s entreaties to take on the job. It is not a matter of taking anyone who comes along. MSS officers are looking for a safe pair of hands; those with cool heads, who can comfortably kick around foreign parts. They must be the very soul of discretion and not easily rattled.

Glenn Duffie Shriver (above). Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. The recruitment is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. A number of cases that conform to this type of recruitment have been made public. In a notable one, Glenn Duffie Shriver after graduating college decided to live in China after a short period of study there from 2002–2003. MSS officers convinced him to assist their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. In October 2010, pleaded guilty to conspiring to provide US national defense information to the MSS.

Recruiting Spies for the Long-Run: MSS Style

Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. This was also a method that Soviet intelligence was famous for. To that extent, the recruitment process is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. As for the recruit, the motivation is typically emotional, somewhat ideological. For example, from the moment of contact with the MSS, they may sense that they are able to shape the fate of the world through their furtive activities. If the recruitment takes long enough, the target will even be passed on to another officer for development. When the recruit “matures” to the point of getting into position in a business, think tank, government organization, academic institution, or some other targeted location, the MSS officer handling the individual will begin full-fledged tasking. All forms of espionage and active measures will get under way full throttle. All in all, the speed differential with other forms of recruitment is not as critical as the depth of penetration by the recruit. What MSS gets from the effort is a highly prepared mole buried deep within the US foreign and national security policy apparatus.

A number of cases that conform to this type of recruitment have made public. In a notable one, in October 2010, Glenn Duffie Shriver pleaded guilty to conspiring to provide US national defense information to a SSSB intelligence officer. Shriver, a recent US college graduate decided to live in China after a short period of study there from 2002–2003. Apparently finding Shriver to be a viable target, Chinese intelligence officers successfully pitched him the idea of assisting their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. If he managed to be hired by either, he would have been obligated to communicate classified US national defense information to their organization. The apparent intent of the SSSB’s was to collect a stream of reporting on US foreign policy. It was seemingly inconsequential that only some of a portion of it would have been directly related to Asia and particularly China.

Honey Traps

As noted in the discussion on the overseas intelligence operations of MSS provincial bureaus, Chinese human Intelligence officers have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Indeed, a bog-standard method of snagging traveling businessmen is the honeytrap. As defined more specifically in Henry S. A. Becket, The Dictionary of Espionage: Spookspeak into English (Stein & Day, 1986), a honey trap is a method of sexual entrapment for intelligence purposes, usually to put a target [such as Kalugin] into a compromising position so that he or she can be blackmailed. The approach would be made once MSS intelligence or counterintelligence managers believed enough had collected enough about the target and the target’s activities, that they understood how the foreign national thought, and whether he would respond favorably to an effort to make that sort of clandestine contact with him, the approach is made by a selected female or make operative.

According to Kalugin in First Directorate, to further the KGB’s mission, he loosed those alluring qualities his personal appearance and attributes and those of other handsome males and females as weapons very effectively against Western officials and especially secretaries working in key offices in the US foreign and national security policy apparatus when he believed something considerable could be gained by doing so. If lucky, the target may already have become in contact with a woman from a house of elegant pleasure, and the recruitment of the prostitute is what is required. However, there are cases in which the prostitute may not have the background to engage the target in a way that is best for the MSS to establish appropriate level of contact to move forward toward effectual recruitment.

Prospective MSS intelligence officers?: Freshmen of Nanjing Campus of China Communications University in military training in 2015 (above). The MSS has been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. It is a bog-standard method known as the honeytrap. While prostitutes and “contractors” are often used for this purpose, female officers may be put in a position to take on a honey trap role. Insisting that female officers surrender themselves to act as lures for potential targets for recruitment is surely not in line with that goal. MSS officers, particularly to young female officers, have been forced to choose whether to engage in such behavior to support the MSS mission. The question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?”

The true humanist by the Marxist definition, seeks to understand human nature with the notion that all can be brought into an ideal Communist World. Insisting that female officers surrender themselves to act as lures for potential targets for recruitment is surely not in line with that goal. Nevertheless, when MSS officers, particularly to young female officers, are forced to choose whether to engage in such behavior to support the MSS mission, the question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?” The female officer would certainly need to consider what her family would say and what her community would say about her taking on such an assignment. The final answer would be founded on the officer’s own self-respect, dignity, self-worth, conscience. In a system where the desires of the individual must be subordinated to the needs of the state, the only answer is to give primacy to love of country and support the Communist Revolution. That being the case, for the majority of female officers, engaging such work would still be simply outside the realm of possibility. Ad turpia virum bonum nulla spies invitat. (No expectation can allure a good man to the commission of evil.)

Discussion will be extended in Part 2, to be published later