Ruminations on the Russian Federation’s Failure To Close the Door in Western Ukraine to Foreign Military Assistance as Part of Its Invasion Plan

US airmen and marines (above) load M777 artillery pieces marked for delivery to the Ukrainian Armed Forces on an US Air Force transport plane. Many weapon systems sent into Ukraine have had a multiplier effect on the battlefield. Firepower in the form of multiple launch rocket systems, self-propelled artillery, and heavy caliber guns, transported possibly along the now heavily traveled supply lines from both Poland and Romania enabled the Ukrainian Armed Forces to launch two highly-successful counteroffensives. Presented here are some ruminations on Russia’s failure to initially shut the door to the massive levels of military assistance to the Ukrainian Armed Forces from the US, other NATO Member States and the EU via Poland, Slovakia, Hungary, and Romania. Emphasis is placed on the likely reasons why Russia went into Ukraine militarily without addressing the potential impact of Western resupply of Ukrainian forces. To that extent, issues considered include: whether the Russian Federation General Staff was responsible for this considerable delinquency or was the Kremlin near criminally remiss for not heeding likely recommendations of the military chiefs and their war planners.

Intriguingly, Russian Federation President Vladimir Putin launched the Ukraine War lacking a strategy that took into consideration of what Vooruzhonnije Síly Rossíyskoj Federátsii (the Armed Forces of the Russian Federation, hereinafter referred to as the Russian Federation Armed Forces) would come up against. What was seemingly completely missed or misunderstood was the degree of support from the US and NATO Member States that Kyiv would receive. No effort, that was apparent, was made to obviate the ability of the US and its NATO allies to supply Ukraine at will as part of the military strategy. From the start, conquering Kyiv was the focus as if Putin, his foreign and national security policy team at the Kremlin, and his senior commanders in the Russian Federation Armed Forces. Perhaps, for Putin, the conquest of Ukraine was a dream on which he could feast his imagination. That was at least until the matter was reduced to reality. If one might think of Putin at all as a rational actor, it would seem Putin has painted himself into a corner. That is quite unlike Putin. Some might say that after all the years of accomplishments and successes, and all the experience, he was bound to make one big mistake. It is a real head rubber.

Presented here are some ruminations on Russia’s failure to initially shut the door to the massive levels of military assistance to the Ukrainian Armed Forces from the US, other NATO Member States and the EU via Poland, Slovakia, Hungary, and Romania. Emphasis is placed on the likely reasons why Russia went into Ukraine militarily without addressing the potential impact of Western resupply of Ukrainian forces. To that extent, issues considered include: whether the Russian Federation General Staff was responsible for this considerable delinquency or was the Kremlin near criminally remiss for not heeding the recommendations of the military chiefs and their war planners; whether the door was left wide open between Poland Slovakia, Hungary, and Romania with Ukraine because they were hamstrung by Putin’s concept that a successful “lighting strike in Ukraine” could be achieved even though the idea was apparently developed in the abstract; and, whether they had little choice but to acquiesce to the manifestations of Putin’s sense of vulnerability over Ukraine’s close ties to the US, the EU, and NATO. Unless one was actually behind closed doors of conference rooms in the Kremlin and the national security bureaucracies in Moscow, or “reading someone’s mail,” one cannot know for certain how the decision concerning resupply from western Ukraine was made or maybe not made. The best informed guess would inevitably be an interpretation. While “ruminating”, greatcharlie sought to stay grounded within the realm of what would actually be possible in Putin’s regime given what is known about it. Insights offered here are occasionally supported with historical examples of timeless relevance that immediately came to mind or actually helped to generate ruminations. Causa latet, vis est notification. (The cause is hidden, the result is obvious.)

Chairman of the Joint Chiefs of Staff US Army General Colin Powell (above) at press conference at the Pentagon on January 23, 1991. When a military campaign is launched, often an objective becomes separating an opposing army from what gives it support and what allows it to continue to generate combat power. Acting in this manner against an opponent is referred to as acting decisively. During the Persian Gulf War, Operation Desert Storm, the concept of separating Iraqi forces in Kuwait from resupply as well as command and control from the Iraqi military and political leadership was expressed without ambiguity by then Chairman of the Joint Chiefs of Staff US Army General Colin Powell during a press conference at the Pentagon on January 23, 1991. He famously stated: “Our strategy to go after this army is very, very simple. First, we’re going to cut it off, and then we’re going to kill it.”

Why Is Resupply an Issue?

When sent to war, the purpose of an army is to use its trained troops to deliver calculated lethal violence in protection of their country and its values wherever they are ordered to go. Not to be forgotten, is the necessity that the army’s troops place their very lives on the line in that pursuit. Equally important to note, not all countries have the same values. The values of the Russian Federation, particularly those that compelled the invasion of Ukraine, are quite different, for example, from those of the United Kingdom, France, or Germany. As professionals, army commanders act to the best of their knowledge and experience, use their troop in accordance with their army’s doctrine and in obedience to the concept and intent laid out by the army’s senior leadership. When it is the case, the army leadership acts in fol)owing with the concept and intent of their country’s political leadership. Such was the case when the Russian Federation Armed Forces were directed by Putin and ordered by the Russian Federation General Staff to invade Ukraine.

Today, armies can deploy with a considerable amount of supplies, but supplies begin to deplete as soon as the fight is underway. Nevertheless, to keep the army going, long before it becomes engaged, considerations and arrangements are made by planners and logistical (supply) officers to transport supplies wherever they are needed. Losing the ability to be resupplied means an army can fight only until the point when it metaphorically and literally, as one element of resupply, runs out of gas. To that extent, the most extreme of human endeavors becomes an even greater challenge for troops in that army. Whether resupply is possible can more often mean the difference between victory and defeat. 

To be a useful, effective fighting force on the battlefield, critical items such as bullets, grenades, rifles, other small arms, Kevlar vests, phones, petroleum, oil lubricants, and all and elements as replacement troops, and troop medical evacuation must get up to where the fight is. As shortages become problematic, commanders must begin to economize, their ability to act will be reduced, and subsequently their army becomes far less effective. The commander of the opposing army, if a capable commander, will discern the change, recognize the advantage presented and seek to exploit it as best as possible. The decision would need to be made on whether the army with dwindling supplies should be withdrawn. If the situation reaches the point when the commander can no longer act to alter the army’s situation, his army is being battered, or his army is cut off and has no available means of egress, he may be forced to surrender. While this description is somewhat oversimplified, it lends support for the idea that when a military campaign is launched, often an objective becomes separating an opposing army from what gives it support and what allows it to continue to generate combat power. Acting in this manner against an opponent is referred to as acting decisively.

During the Persian Gulf War, Operation Desert Storm, the concept of separating Iraqi forces in Kuwait from resupply as well as command and control from the Iraqi military and political leadership was expressed without ambiguity by then Chairman of the Joint Chiefs of Staff US Army General Colin Powell during a press conference at the Pentagon on January 23, 1991 alongside the US Secretary of Defense Dick Cheney. In the hour-long briefing, which detailed the first week of operations of the 28-nation coalition against Iraq, Powell famously stated: “Our strategy to go after this army is very, very simple. First, we’re going to cut it off, and then we’re going to kill it. To cut it off, that began last week when we started to go after the nerve center, the brains of the operation, the command and control of the operation, and the lines of communication that come out of Baghdad and other places in the country.”

One might have expected that Russian Federation Armed Forces top commanders and planners, in a similar vein, might have taken a similar tack toward the Ukraine Armed Forces. It might have been expected that they would have recognized that resupply not so much from Ukrainian arsenals but from those of US, other NATO Member States, and other countries in the EU would need to be blocked, cut off in some way. Yet, nothing remotely similar to what Powell expressed in 1991 was heard from theMinisterstva oborony Rossiyskoy Federatsii (Ministry of Defense Russian Federation) or General’nyy shtab Vooruzhonnykh sil Rossiyskoy Federatsii (General Staff of the Armed Forces of the Russian Federation), or from Putin, himself, about cutting Zbrojni syly Ukrayiny (Armed Forces of Ukraine, hereinafter referred to as the Ukrainian Armed Forces) off from resupply. There were no feigned movements such as moving Russian Federation forces to points outside Ukraine from which a blocking operation could best be launched in order to signal the intention to cut the Ukrainian Armed Forces off from resupply. Nothing was done sufficiently enough to cause supporters of the government of Kyiv to second guess any planned efforts to resupply the Ukrainian Armed Forces. In view of the potential decisive impact from contributions by the 30 countries in NATO,  particularly the US with its military largess, it would seem some Russian Federation Armed Forces commanders and planners thinking logically would urge the Russian Federation General Staff to suggest scrapping the operation until the problem of the Western resupply threat was resolved. 

A near endless list of situations during wars in which resupply determined the outcome of battle or even the war, itself. For example, armies have often encountered difficulties in cutting off resupply on a strategic level when fighting a determined opponent. Occasionally political leaders and army commanders have been slow in recognizing the opportunity to act decisively to mitigate resupply efforts on a strategic level. Armies have faced difficulties on the tactical level against a smaller force of well-trained, well-organized, and well-led opposing troops, even during a siege, when sufficient resupply has been made available to them

Ho Chi Minh Trail

The Ho Chi Minh Trail (Đường mòn Hồ Chí Minh) was a supply system that provided support, in the form of manpower and materiel, to the Communist insurgency, Viet Cong, and the People’s Army of Vietnam (North Vietnamese Army) during the Vietnam War. It comprised a logistical network of roads and trails that ran from North Vietnam to South Vietnam through the kingdoms of Laos and Cambodia during the Vietnam War. Initially troops, pushing heavily laden bicycles, driving oxcarts, or carrying supplies on their backs, moved hundreds of tons of supplies along it. However, trucks would become the primary means of moving supplies and troops. By 1969, tgere was even a pipeline crossed the Lao frontier through the Mu Gia Pass and, by 1970, it reached the approaches to the A Shau Valley in South Vietnam. The plastic pipeline, equipped with numerous small pumping stations, managed to transfer diesel fuel, gasoline, and kerosene all through the same pipe. By the end of 1970, the number of pipelines entering Laos increased to six that year. As a whole, supply efforts through trail were quite effective, which no mean feat given US efforts to thwart effort through trail included attacks from a CIA-raised clandestine army and the most intense air interdiction campaign in history. Mitigating the effects of US operations to destroy the trail was an existential effort. One might say the Ho Chi Minh Trail was the “center of gravity” for the Communists. Its loss probably would have led to their defeat in the war. As long as supplies could get to the Viet Cong and North Vietnamese Army, their war effort could continue with vigor which complicated US-led efforts to secure South Vietnam for the government in Saigon. South Vietnam would eventually surrender to North Vietnam.

Battle of the Atlantic 1939-1945

During World War II, Germany acted robustly to prevent merchant ships from carrying food, raw materials, troops and their equipment from North America to the United Kingdom. If they had succeeded, the outcome of war might have been radically different. The United Kingdom might have been starved into submission, which would have been complete strain on the morale. Its forces and those of its allies worldwide likely would have been deeply impacted. The supply line from the US was essentially the beating heart, the center of gravity, of the United Kingdom’s war effort. The threat to the movement of ships across the Atlantic came in the form of German submarines, the “Unterseeboot” or U-boat. United Kingdom Prime Minister Winston Churchill once wrote that, “The only thing that ever really frightened me during the war was the U-boat peril.”

At the start of World War II, the Befehlshaber der Unterseeboote (Commander of the Submarines) was Konteradmiral (Rear Admiral) Karl Dōnitz. Dönitz pushed for a German fleet that consisted almost entirely of U-boats, claiming that depriving Germany’s enemies of vital supplies such as food and oil would be the most effective way to achieve victory. He claimed that given 300 U-Boats of the latest design, the Type VII, he could defeat the entire Royal Navy. He would utilize them in tactical formations that would later be called “wolfpacks”. Dőnitz’s  superior, Oberbefehlshaber der Kriegsmarine (Commander-in-Chief of the Navy) and Großadmiral, Oberkommando der Marine (the Naval High Command) Erich Raeder, was uninterested in his theories. Raeder was a traditionalist whose focus was surface warfare. Raeder also judged that Germany could not contest the Royal Navy for control of the sea. Even more, Raeder believed submarine warfare was cowardly. By 1941, although relatively small in number, U-boats under then Vizeadmiral (Vice Admiral) Dőnitz were threatening Allied shipping as far as the US east coast. By the end of 1942, U-boat “wolfpacks” were achieving considerable success in sinking merchant ships. By early 1943, the United Kingdom’s resources, especially oil, were running out, and it became a question of whether Allied shipyards could build merchant ships fast enough to replace the tonnage that was being sunk. 

Finally recognizing the value of then Admiral Dönitz concepts on the effective conduct of submarine warfare, in January 1943, German Führer und Reichskanzler Adolf Hitler saw to it that he was advanced to the rank of Großadmiral (Grand Admiral) and replaced Großadmiral Erich Raeder as Oberbefehlshaber der Kriegsmarine and Großadmiral, Oberkommando der Marine. Interestingly, he retained his post as Befehlshaber der Unterseeboote. Dőnitz was given the authority to act as he saw fit with German naval forces too late. At that juncture, Dőnitz had 200 operational U-boats. By April 1943, his U-boats were clearly struggling to make an impact. The Allies were sinking German submarines in greater numbers, with 45 being destroyed in the months of April and May. Aggressive Allied anti-submarine tactics were aided by the introduction of new technology. Long-range aircraft were equipped with centimetric radar and directed based on Ultra intelligence from intercepts of Kriegsmarine Enigma code communications. The mass production of Liberty Ships in US shipyards would ensure that the Allies would overcome attrition rates and win the Battle of the Atlantic. Without the victory, the Allies would not have been able to land forces ashore in the Mediterranean Theater or at Normandy.

In Operation Sonnenblume, in 1941, the German Afrika Korps‘ first offensive in North Africa, it sought to advance on Alexandria and Suez. In that advance, the capture of Tobruk was a priority as it was the only deep water port in Eastern Libya and would have provided the Germans with the closest supply port to the Egypt–Libya border. Of some significance is the fact that the one the renowned military commanders to emerge from the war led the attack on Tobruk: Generalleutnant (Lieutenant-General) Erwin Rommel. In 1940, Rommel commanded the 7th Panzer Division during the invasion of France where he demonstrated skill in the new tactic of blitzkrieg. He was a military officer who knew his business. When Rommel struck, he achieved complete surprise against British Army units in Libya’s eastern coastal region. The British Army was forced to retreat several hundred miles across the desert toward Tobruk. At Tobruk, the British Army and its allies held on. The Germans frequently bombarded the port. A blockade had been organized to thwart British resupply and reinforcement efforts. However, ships of the Royal Navy’s Mediterranean Station ran the blockade, and provided Tobruk’s defenders gunfire support, supplies, fresh troops and by ferrying out the wounded. The defenders of Tobruk received enough resources to keep up the fight. Rommel was stopped and the siege was lifted in December 1941.

Tobruk Siege 1941

In Operation Sonnenblume, from February 6, 1941 to May 25,1941, its first offensive in North Africa, the German Afrika Korps sought to advance on Alexandria and Suez in that advance, the capture of Tobruk was a main objective. Tobruk was the only deep water port in Eastern Libya and would have provided Rommel a supply port closer to the Egypt–Libya border than Benghazi, 900 kilometers or 560 miles west of the Egyptian frontier, which was within the range of Royal Air Force bombers; Tripoli was 1,500 kilometers or 930 miles to the west in Tripolitania. Of some significance is the fact that the one the renowned military commanders to emerge from the war led the attack on Tobruk: Generalleutnant (Lieutenant-General) Erwin Rommel. A veteran of World War I, from 1929 through 1933, Rommel served as an instructor at the Dresden Infantry School and from 1935 at the Kriegsakademie (German War Academy) at Potsdam. In 1940, Rommel commanded the 7th Panzer Division during the invasion of France where he demonstrated skill in the new tactic of blitzkrieg. He was a military officer who knew his business. When Rommel struck, his Afrika Korps achieved complete surprise against British Army units in Libya’s eastern coastal region of Cyrenaica. The British Army was forced to retreat several hundred miles across the desert towards Tobruk.

Recognizing that he had the opportunity to capture Tobruk before the British Army and its Allies had time to organize an effective defense, Rommel advanced aggressively to exploit it. The 9th Australian Division, dubbed “The Rats of Tobruk”, supported by British Army armor and artillery, repulsed initial German assaults on April 10, 1941 to April 14, 1941, and even when the fresh 15th Panzer Division was committed to the attack on April 30, 1941, the defenders held on. The Germans frequently bombarded the port with artillery and Luftwaffe (German Air Force) dive-bombers and medium bombers. A blockade had been organized to thwart British resupply and reinforcement efforts. However, ships of the Royal Navy’s Mediterranean Station–to include the Inshore Squadron–ran the blockade. Indeed, known as the “Tobruk Ferry Service”, Royal Navy and Royal Australian Navy warships provided gunfire support, supplies, fresh troops and by ferrying out the wounded. The defenders of Tobruk were provided enough resources to keep up the fight. The Royal Air Force flew defensive sorties from airfields far away in Egypt. The siege of Tobruk was the first occasion in the war that German Panzer units had been stopped. The siege was lifted in December 1941. It must be noted that via Operation Crusader, launched on November 27, 1941, Tobruk was relieved by the British Eighth Army which after September 1941, controlled British Army and other Allied ground forces in the Western Desert. It seems worthwhile to note the Fall of Tobruk occurred when Generalfeldmarschall Erwin Rommel  commanding Panzerarmee Afrika (Panzer Army Africa) which controlled the Afrika Korps and additional German units deployed to Africa as the 90th Light Infantry Division), as well as the Italian X Corps and XX Corps, attacked  on June 20, 1942 with massed air support, broke through a weak point on the eastern defensive perimeter, and captured the port. Although the garrison on the western perimeter had not been attacked, it was cut off from supplies and transport. Lacking the means to escape, the majority had to surrender; 33,000 prisoners were taken. Rommel had indeed learned lessons during the 1941 siege.

Être Voué à L’échec dès le Début

Even if everything else had been planned and arranged in the correct manner in every other aspect for the invasion, the viability of the entire plan would still rest on the ability of the Russian Federation Armed Forces to at best destroy, acceptably disrupt, or at the absolute minimum, delay resupply from the US, EU, and NATO. Without being able to control the movement of resupply in the West, the plan for the invasion should have been scrapped or the attack should have been postponed until that was nailed down. The reasoning behind such a decision has already been made abundantly clear looking at the circumstances of the handful of examples presented here already. As it was, the “special military operation” was launched, half-baked, and billions of dollars in military assistance has reached the Ukrainian Armed Forces via their country’s western border. Many weapon systems sent into Ukraine have had a multiplier effect on the battlefield. Firepower in the form of multiple launch rocket systems, self-propelled artillery, and heavy caliber guns, transported possibly along the now heavily traveled supply lines from both Poland and Romania enabled the Ukrainian Armed Forces to launch two highly-successful counteroffensives. On August 29, 2022, a counteroffensive was launched to eject Russian forces occupying the Kherson and Mykolaiv oblasts (provinces). On September 6, 2022, a counteroffensive was launched to eject Russian forces occupying the Kharkiv, Donetsk, and Luhansk oblasts. Given the unsatisfactory nature in which the Russian invasion was arranged and indeed, has been prosecuted, the decision to go into Ukraine was the sort that if made during an instance of saber rattling and war fever in a highly-industrialized democracy, would very likely lead to the impeachment of a national leader.

Ruminations

To set the record straight from the outset, greatcharlie believes that if Russian Federation forces were selectively positioned in Western Ukraine, the Ukrainian Armed Forces would have likely used their formidable and quite impressive drone arsenal to bombard them. They might have achieved the same relative success that they have achieved with Russian Federation forces in the east and south and around Kyiv. Once aptly prepared, Ukrainian special forces would likely do their part to hunt down and displace and destroy any Russian Federation troops settled in their country’s Western region. 

Commanders and planners in the Russian Federation Armed Forces would unlikely have known or believed any of that would have been possible before the invasion. One would need to consider other reasons for the omission of a mission to thwart, to an extent blockade resupply to the Ukrainian Armed Forces from the West.The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. The. Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine.

To the left of the above map are all countries situated on Ukraine’s western border. As Ukraine is looked upon in Europe as a very large country, perchance the area in western Ukraine that would need to be covered was judged by military commanders and planners in the Russian Federation General Staff as too large and deemed too difficult to control or monitor, surveil, and launch successful interdiction attacks and raids from. The Polish–Ukrainian border has a total length of 529 kilometers or 329 miles to 535 kilometers or 332 miles according to different sources. The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. The Slovakia-Ukraine border is 97 kilometers or a bit over 60 miles. The Hungary-Ukraine border is roughly 103 kilometers or 60 miles long. It its located in Hungary’s Tisza river valley of its northeast. The Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine.

Omission or De-emphasis?

Negligentia sempre habet infortunam comitem. (Negligence always has misfortune for a companion.) Imaginably, there is a moderately rational reason behind the decision to attack the second largest country in Europe, 603,500 square kilometers or 233,000 square miles, without being fully prepared. Ukraine is second largest in size to Russia, which is 17,098,246 square kilometers or 6,601,670 square miles. As Ukraine is looked upon in Europe as a very large country, perchance the area in Western Ukraine that would need to be covered was judged as too large by military commanders  and planners in the Glavnoe operativnoe upravlenie General’nogo štaba Vooružёnnyh sil Rossijskoj Federacii (the Main Operational Directorate of the General Staff of the Russian Federation) and commanders and planners at the lower level in Yuzhnyy Voyennyy Okrug (the Southern Military District) and the Zapadnyy Voyennyy Okrug (the Western Military District) and deemed too difficult to control or monitor, surveil, and launch successful interdiction attacks and raids into. The Polish–Ukrainian border is the state border between Poland and Ukraine. It has a total length of 529 kilometers or 329 miles to 535 kilometers or 332 miles according to different sources.

Concisely and admirably described by the Mission Opérationnelle Transfrontalière (Transfrontier Operational Mission), an association that was set up in 1997 by the government of France to resolve issues for entities concerned with cross border issues, the Poland-Ukraine border begins at the tripoint formed by the Ukrainian, Polish and Slovak borders, in the middle of the Eastern Carpathian mountains. The demarcation runs initially towards the east, arriving at the Ushok Pass and the source of the San River, whereupon it turns north-west to follow the river for around 50 kilometers or 31 miles. It subsequently leaves the river to take a north-easterly direction, crossing the region known as the “Przemyśl Gate”, where mountains meet lowlands. The border then crosses large swathes of agricultural land, to reach the Bug River, which forms the last third of its demarcation. It ends at the tripoint formed by the borders of Poland, Ukraine and Belarus. Poland is a NATO Member State and an EU border state.

The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. Again using a description from the Mission Opérationnelle TransfrontalièreThe Republic of Moldova separates the border into two segments. The first in the west, at the tripoint between the Hungarian-Romanian and Hungarian-Ukrainian borders. That segment then continues across the East Carpathian mountains and terminates at the tripoint formed by the Moldovan, Romanian and Ukrainian borders. The second segment begins at the second tripoint between the Moldovan, Romanian and Ukrainian borders, on the north bank of the Danube River, and terminates as it reaches the Black Sea. Romania is a NATO Member State and an EU border state. The Slovakia-Ukraine border is 97 kilometers or a but over 60 miles long. Slovakia is also a NATO Member State and an EU border state. The Hungary-Ukraine border is roughly 103 kilometers or 60 miles long. It is located in Hungary’s Tisza River Valley in the country’s northeast. As with the preceding three countries discussed, Hungary is a NATO Member State and an EU borderstate. The. Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine. Transnistria is an autonomous republic aligned since 1992 with the Russian Federation. Russian Federation Armed Forces units have also been garrisoned there since 1992. To that extent, anyone providing military assistance to Ukraine would hardly choose to move anything through Moldova as Russian Federation intelligence services posted in Transnistria would likely be able to position themselves to monitor such resupply activities. Moving through Moldova would very likely be deemed too risky, unsafe. To an extent, one might say any effort by Russian Federation Armed Forces to monitor resupply efforts for Ukraine would indicate commanders and planners were covering the matter. Perhaps the Russian Federation General Staff sold that notion to Putin. However, while a few things could be done from Transnistria, given the sheer size of its border with Ukraine, and its position south and toward the east with respect other bordering countries, it would unlikely be enough to make a real difference. It would seem Putin did not want to stir trouble over Transnistria issue. The Russian Federation Armed Forces there have remained relatively quiet, and the West has more or less left the autonomous republic alone. If covert monitoring has been transpiring along or across the Transnistria border, it is apparently not having an impact. Thus, the focus here is on resupply from Poland, Slovakia, Hungary, and Romania.

Russian Federation President Vladimir Putin (center), Russian Federation Defense Minister General Sergei Shoigu (right), and Chief of Staff of the Russian Federation Armed Forces General Valery Gerasimov (left). Commanders and planners in the Russian Federation Armed Forces apparently “wholeheartedly” accepted the idea that the Ukrainians would acquiesce as in 2014. Despite losses inflicted upon Ukrainian defenders and territorial gains, in eastern and southern Ukraine as well as Kyiv, the mission to completely snuff out the combat power and resolve of the Ukrainian Armed Forces and force a sort of mass capitulation was not achieved. The losses of the Russian Federation Armed Forces have been exponentially higher. It seems most apparent that the Russian Federation General Staff had moved forward without a satisfactory long-term plan for the invasion. Indeed, by results alone, one might infer that there were actually no contingency plans to draw upon for the invasion of Ukraine.

Folly, Doctor-Like, Controlled Skill

Commanders and planners in the Russian Federation Armed Forces apparently “wholeheartedly” accepted the idea–fiction–that the Ukrainians would roll over and play nice doggie à la 2014. Tomaten auf den augen haben. Despite losses inflicted upon the Ukrainian defenders and territorial gains, in eastern and southern Ukraine, the mission to completely snuff out the combat power and resolve of the Ukrainian Armed Forces and force a sort of mass capitulation was not achieved. In the end, the losses of the Russian Federation Armed Forces have been exponentially higher. It seems most apparent that the Russian Federation General Staff had moved forward without a satisfactory long-term plan for the invasion. Indeed, by results alone, one might infer that there were actually no contingency plans to draw upon for the invasion of Ukraine, with solutions for all conceivable challenges. Doing the “what-ifs” beforehand was probably viewed as walking out on thin ice “politically”. While the idea might be difficult for the reasonable to reconcile, it appears the massive enterprise was  truly undertaken by Moscow on the fly. 

Allowing the Russian Federation Armed Forces to perform in such a way would be very much unlike Putin given the record of his past behavior. True, over the past two decades, he has dropped some clangers. Even the most knowledgeable and experienced can make mistakes they learned to avoid long ago. That is human nature; the human element. Still, Putin’s actions are usually thoughtful, calibrated, well calculated, with the use of resources in a measured way to achieve the most favorable outcomes. Putin can surely tell the difference between real and unreal. He has not managed to stay in power since 2000 by engaging in Quixotic pursuits. This is something new. One wonders what could possibly come next for Ukraine and for the world.

Putin was oddly hooked on the idea that among the officers, men, and women of the Ukrainian Armed Forces, there was a lingering sense of Soviet unity equal to his own. This in itself was quite interesting as Putin was hardly known for truly displaying brotherly love toward former Soviet republics. He would create an environment of fear in his relationship with their respective leaders. After Euromaidan, the Ukrainians did not want any part of that. In his invasion day television broadcast of February 24, 2022, Putin would go as far as to implore the Ukrainian Armed Forces to submit to his will and allow Russian troops to again simply march into their country. There appeared to be a singular emotional commitment on his part to the ideas of Russian-Ukrainian unity and the fealty of the officers, men, and women of the Ukrainian Armed Forces to Moscow, to him. Putin “appealed” to members of the Ukrainian Armed Forces as follows: “I would also like to address the military personnel of the Ukrainian Armed Forces. Comrade officers! Your fathers, grandfathers and great-grandfathers did not fight the Nazi occupiers and did not defend our common Motherland to allow today’s neo-Nazis to seize power in Ukraine. You swore the oath of allegiance to the Ukrainian people and not to the junta, the people’s adversary which is plundering Ukraine and humiliating the Ukrainian people.” Putin continued: “I urge you to refuse to carry out their criminal orders. I urge you to immediately lay down arms and go home. I will explain what this means: the military personnel of the Ukrainian army who do this will be able to freely leave the zone of hostilities and return to their families.” If the matter were not so grave, his words might be looked upon as comical.

Putin seemed forgetful of, or totally oblivious to, the fact that he was responsible for the greatest humiliation of the Ukrainian Armed Forces when he ordered the “green men” of the Russian Federation Armed Forces into Crimea to seize Ukraine’s sovereign territory. Further, without firing a shot, the green men first corralled members of the Ukrainian Armed Forces much as sheep in their own garrison and then herded them out of Crimea. Knowing the Ukrainians as well as he claimed he did in the February 24, 2022 broadcast, Putin should have known the Ukrainians are not sheep. He should have been well-aware that there would be payback for what happened in 2014 and everything that has happened since. He surely knows that now.

In its ill-designed aspects influenced by the political leadership, the Russian Federation’s special military operation on a macro-level much resembles the failed German campaign, Operation Barbarossa, launched on June 21, 1941. Hitler provided empty assurances resulting from his baseless analyses to Oberkommando des Heeres (High Command of the Army) to the effect that “We have only to kick in the front door and the whole rotten edifice will come tumbling down.” Oberkommando des Heeres went along with Hitler’s concept that the campaign would be a short one, and that the Soviets would give in after suffering the shock of massive initial defeats. As a result, it did not develop a satisfactory long-term plan for the invasion.  The shock and awe of the initial Blitzkrieg was dissipated by the vast distances, Supply challenges could not be overcome. There was a lack of sufficient manpower resources. German losses could not be sustained. After initial contact, there was stiff resistance from Soviet forces. Despite the serious losses inflicted on the Soviet Army the mission to completely destroy Soviet fighting power and force a capitulation was not achieved by January 7, 1942, and the operation was terminated 20 kilometers short of Moscow. Interestingly enough,a number er of fitting comparisons between Putin and a national leader whose blunders came as a result of being closed to the recommendations and entreaties of his or her top advisers, are those made with Hitler.

Delinquency

There is the real possibility that commanders and planners in the Russian Federation Armed Forces, attempting to hastily organize the massive Spetsial’noy Voyennoy Operatsii (Special Military Operation) were not even aware that the opportunity to destroy and disrupt the resupply effort for Ukraine was missed. Everything truly started off on the wrong foot from the get-go. By logic, at first glance this would seem unlikely. After all, the well-trained senior officers and planners of the Russian Federation Armed Forces would not be aware of the danger posed by Ukraine’s open western border. Perhaps there may have been some understanding among military planners that the situation there would be played-down in order to line up with thinking from the Kremlin. In the realm of conjecture, anything becomes possible. If such was the case, from that point onward, they could only hope nothing bad would come of that considerable  omission.

The US educator and organizational theorist, Russell Ackoff was a pioneer in the field of operations research, systems thinking, and management science. In a research article entitled “A Major Mistake That Managers Make” in Handbook of Business Strategy, volume 7, number 1, January 2006, pages. 225-227, Ackoff wrote: “Errors of omission, lost  opportunities, are generally more critical than errors of commission. Organizations fail or decline more frequently because of what they did not do than because of what they did.” Although the December 7, 1941 surprise attack of the Imperial Japanese Navy on Pearl Harbor was a tactical victory, it was also a strategic blunder, as the Japanese failed one of their most critical objectives: destroy the US aircraft carriers. Even worse, the Japanese failed to destroy the strategic oil reserves at Oahu, and the damage to docks and yards was slight. That oil reserve fueled the US Navy through the remainder of the war against Japan.

A well-intervaled column of German vehicles moves through the Ardennes Forest in 1940 (above). At the top of the list of historical causes for military blunders has been insufficient intelligence analyses as well as the failure of consumers to include valuable forecasts in their appraisals of situations. Consider for example how the military high command of France failed their government three times in 70 years by minimizing warnings about the intentions of Prussian and German Governments. In 1870, the Supreme Command of the French Imperial Army, with its attitude of debrouillez-vous (“We’ll muddle through somehow”), did not heed signaling that the Prussian Army would move via the Ardennes Forest through Belgium into France. In 1914, the French Grand Quartier Général (General Headquarters) did not heed indicia signaling that the Imperial German Army, to avoid French defenses on the Franco-German border, would move via the Ardennes Forest through Belgium into France. In 1940, the Anglo-French Supreme War Council, relying on the defenses of the Maginot Line, did not heed indicia signaling that the German Army would move via the Ardennes Forest through Belgium into France. Even with this history, in 1944, the Supreme Headquarters of Allied Expeditionary Forces in Europe ignored idicia signaling that the German Army might attempt to move via the Ardennes Forest into Belgium in an attempt to reach Antwerp and cut Allied Forces into two pieces. The result was the Battle of the Bulge in which US forces suffered an estimated 75,000 casualties.

Was Faulty Intelligence to Blame?

Quis, quid, ubi, quibus, auxiliis, cur, quomodo, quando? (Who, what, where, with what, why, how, when?) Very pertinent here is the attendant influence of faulty intelligence in understanding the situation of an opponent, strengths and weaknesses, capabilities and possibilities in the development of the concept and intent of an operation in terms of supply. It becomes a factor of some magnitude in planning support operations. It is imprudent for political leaders and top military commanders to ignore information from intelligence services that confirms some action by an adversary is very likely, imminent, or has been taken. Well at the top of historical causes for military missteps has been insufficient intelligence analyses as well as the failure of consumers to include valuable forecasts in their appraisals of situations. 

Consider for example how the military high command of France failed their government three times in 70 years by minimizing warnings about the intentions of Prussian and German Governments. In 1870, the Supreme Command of the French Imperial Army, with its attitude of debrouillez-vous (“We’ll muddle through somehow”), did not heed signaling that the Prussian Army would move via the Ardennes Forest through Belgium into France. In 1914, the French Grand Quartier Général (General Headquarters) did not heed indicia signaling that the Imperial German Army, to avoid French defenses on the Franco-German border, would move via the Ardennes Forest through Belgium into France. In 1940, the Anglo-French Supreme War Council, relying on the defenses of the Maginot Line, did not heed indicia signaling that the German Army would move via the Ardennes Forest through Belgium into France. Even with this history, in 1944, the Supreme Headquarters of Allied Expeditionary Forces in Europe ignored idicia signaling that the German Army might attempt to move via the Ardennes Forest into Belgium in an attempt to reach Antwerp and cut Allied Forces into two pieces. The result was the Battle of the Bulge in which US forces suffered an estimated 75,000 casualties.

Referring again to the attack on Pearl Harbor, a newly discovered official US Government memorandum has revealed that intelligence collected about the activities of the Imperial Japanese Navy, led to assessments that Japan might attack the US on the West coast, the Panama Canal, and the US naval and military bases in Hawaii some time in December 1941. The Japanese Imperial Navy would eventually execute a devastating surprise, aircraft carrier-based, aerial attack and submarine attack on the US Naval Base and Headquarters of the US Pacific Fleet at Pearl Harbor, and aerial attacks against the US Army Base at Schofield Barracks and the US Army Air Corps Base at Hickam Field. Most US military commanders were bewildered by the successful attack which they never would have believed Japan could execute before it actually happened. By leaning into those beliefs, they were caught flat-footed by the attack. Their immediate responses were meager and ineffective.

In the case of Ukraine, it would seem Putin was provided faulty information. Some intelligence services apparently did more in the direction of providing fabrications than others.. From what can be gathered by newsmedia reports about its findings, the foreign intelligence service of Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsii (Federal Security Service of the Russian Federation) or FSB, known as the organization’s 5th service. The 5th Service is a division that was established in 1998, when Putin was director of the FSB, to carry out operations in the countries that were formerly republics of the erstwhile Soviet Union. Its mission was to help ensure those countries remained within Russia’s orbit. Apparently, the 5th Service laid it on thick. There were allegedly many unproven, torrid statements on the nature of Ukrainian society made concerning the destructive impact of the West on the culture, morality, spiritually, self-image of the people, ultranationalists, and the leadership in Kyiv, and the Ukrainian people’s willingness to stand fast against an invasion. 

Are Russian Federation Satellites Functioning?

One might imagine that there was a chance that intelligence, surveillance, and reconnaissance (ISR) capabilities by Russian Federation satellites could have assisted in covering the space and monitor and act against assistance efforts by supporting calibrated attacks on supply trains, especially readily observable ones  traveling along roads and rails. Intriguingly, only a few short years ago, there was great concern expressed in the US about formidable Russian Federation satellites that were interfering with US satellites. As discussed in greatcharlie’s July 6, 2017 post entitled, “Trump to Meet With Putin at G-20 Gathering: Trump Seeks an Authentic Relationship with Russia”, there was the belief that Russia was developing the ability to approach, inspect, and potentially sabotage or destroy US satellites while they orbited the Earth. 

Now, it seems, Russian Federation satellites must be able to provide a picture of the situation in Ukraine. True, as stated here, Ukraine is the second largest country in Europe, but, if many will pardon this expression, in greater terms, it is smaller than the State of Texas in the US, which has been regularly, intensely surveilled by the Russian Federation as it was before by the Soviet Union due mainly to the many massive US military and NASA bases and other facilities there. De quoi s’agit-il ici? It appears that a breakdown in Russian ISR capabilities from space much as its military, naval, and intelligence capabilities generally, had occurred long before the special military operation was launched.

Having been responsible for the preparedness of the Russian Federation Armed Forces, the Russian Federation General Staff had to have known something was awry. it had to have known whether they were up to the job in Ukraine. While the Russian Federation Armed Forces’ Zapad and Vostok exercises perhaps indicated that they were ready for war, surely the Russian Federation General Staff was fully aware of how numbers of troops, actions, reports were, to be frank, falsified. The most senior commanders may not have been sure themselves what the true capabilities of the Russian Federation Armed Forces were. If they were living in an illusion about how mighty their forces were, that  Illusion was destroyed in the face of reality.

Snapshot of the initial wave of Ukrainian refugees (above). There is the possibility the commanders and planners in the Russian Federation Armed Forces may have believed there was more to gain by having a great flow of refugees pouring out of Ukraine to create problems, chaos and confusion, hostile reactions from populations of countries inconvenienced by overflows of Ukrainian refugees, and frustration among NATO, EU Member State capitals. Conceivably, the thinking from the Kremlin and subsequently the Russian Federation Armed Forces that if the roads out of Ukraine to Poland, Slovakia, Hungary, Romania, and Moldova were clogged, potentially military assistance could not get through, at least not efficiently. By weaponizing refugee flows an invasion would cause, it may have been believed a way found to split the seam between two possibilities. However, even in the best case scenario, the refugee exodus would be a temporary problem. If Western powers could not resolve the matter, they would at least be able to mitigate its immediate effects. Once the invasion began, humanitarian and refugee organizations of almost every kind jumped in feet first. The West could do more with assistance to stem the crisis than the Russian Federation could do by creating a refugee overflow crisis. As it turned out, the refugee crisis as the Kremlin might have envisioned and hoped did not materialize.

The Pitfalls of Creative Thinking

There is the possibility the commanders and planners in the Russian Federation Armed Forces may have believed there was more to gain by having a great flow of refugees pouring out of Ukraine to create problems, chaos and confusion, hostile reactions from populations of countries inconvenienced by overflows of Ukrainian refugees, and frustration among NATO, EU Member State capitals. That belief would very likely have been in following with the concept and intent disseminated from the Kremlin. The impact of a refugee surge was witnessed while war raged in Syria. During the 2015 Syrian Refugee Crisis, an estimated 1.3 million refugees seeking asylum literally jammed roads leading to Europe. European countries, especially the first ones along the refugees route that encountered them, were unable to handle their numbers immediately. Some capitals panicked. Many political, social, financial, and security issues subsequently arose. The refugee flow eventually subsided. 

The Weaponization of Refugees

Conceivably, the thinking from the Kremlin and subsequently the Russian Federation Armed Forces that if the roads out of Ukraine to Poland, Slovakia, Hungary, Romania, and Moldova were clogged, potentially military assistance could not get through, at least not efficiently. By weaponizing refugee flows an invasion would cause, it may have been believed a way found to split the seam between two possibilities. Zwei fliegen mit einer klappe schlagen. However, even in the best case scenario, the refugee exodus would be a temporary problem. If Western powers could not resolve the matter, they would at least be able to mitigate its immediate effects. Once the invasion began, the UN with its many aid organizations as well as and other international and regional intergovernmental humanitarian and refugee organizations jumped in feet first. The US would work with capitals in Europe, especially Warsaw, and encourage through diplomacy and support with its wherewithal, a multilateral effort by government aid agencies. The EU acted in a similar way. The International Federation of Red Cross and Red Crescent Societies, CARE and other international and regional nongovernmental humanitarian and refugee organizations. Nongovernmental refugee and displaced persons organizations, and a variety of humanitarian organizations from around the world made their way to Poland, Slovakia, Hungary, Romania, and Moldova to get a handle on the problem. 

As things went, the Russi­an Federation’s special military operation triggered a “regional forced displacement crisis.” By September 30, 2022, seven months after the invasion began, 7,536,433 Ukrainian refugees were registered outside of Ukraine. Reportedly, Poland and Germany received the most refugees; more than a million each. The Czech Republic took in the next highest number 438,926, followed by the US, the United Kingdom, France, Turkey, Italy, and Spain, each of which accepted from 100,000 to 300,000 refugees. Smaller numbers escaped to Hungary, Romania, Slovakia, and Moldova. 

Interestingly, and doubtlessly to the consternation of the Kremlin and Russian Federation Armed Forces, not only is military assistance flowing freely into Ukraine from Poland but so are “returnees”. Clear data that documents how many of the 7.5 million Ukrainian refugees have returned home permanently, reportedly is unavailable. However as of September 20, 2022, over 6 million cross-border movements were made back into the country. Border crossing points in Poland as well as Romania are said to be receiving most of the returnees, with nearly 4.5 million crossings from Poland and nearly 1 million from Romania. In the aggregate, one might conclude that the West could do more with assistance than Russia could do by creating a refugee overflow crisis. In the end, the refugee crisis that the Kremlin may likely have envisioned and hoped for did not materialize. Vide et credere. (See and believe.)

Where Was the GRU?

As a military matter, intelligence on the situation in Ukraine to the extent it would impact the special military operation had to be of great interest specifically to Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU  The GRU could not have missed the potential problem of resupply routes into Ukraine from Poland, Slovakia, Hungary, and Romania being set up. Perhaps the GRU was unable to convince the Russian Federation General Staff of the necessity to close the door to assistance from the West. Maybe there was at first a thought to use the same act twice with “green men” in the Western Ukraine. However, GRU planners may have been concerned about being unable to redeploy or evacuate troops placed perhaps at border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on deep in Ukraine in large numbers if a major problem was encountered.

It was suggested in greatcharlie’s January 25, 2022 post, one could conceive that concerning Western military assistance, a special task force has been organized and assigned in advance, among other things: monitor the delivery, stockpiling of stinger, javelin, and other weapons systems to Ukrainian forces; maintain real-time knowledge of the distribution and location of those weapons; destroy those weapons systems; and, destroy or support actions by other Russian military units to destroy Ukrainian military units to which those weapons were distributed. That hypothetical task force would also likely be tasked to monitor–covertly monitor the intelligence activities and military operations of–Western countries as they relate to supplying Ukraine with special military capabilities. It would seem that suggestion made by greatcharlie then was well-off the mark. Maybe they were concerned about potential for great casualties and huge losses of materiel.

Where Was Spetsnaz?

Voyská spetsiálnogo naznachéniya (‘Special Purpose Military Units) or spetsnaz, a carry over from the days of the Soviet Union, are trained, and tasked as special forces units and fielded in wartime as part of the GRU. As is the case with special forces in most countries, the primary missions of spetsnaz are power projection (direct action), intelligence (reconnaissance), foreign internal defense (military assistance), and counterinsurgency. The GRU may have been unable to conjure up a viable plan to use spetsnaz in western Ukraine. Again, GRU planners may have been concerned about being unable to deploy or evacuate troops placed even on raids so deep without a solid means of egress. Even if it had been possible to monitor and act in the Western region from Belarus, again, distances that needed to be traversed may have been too great.

One might wonder whether the GRU had been aware that there was someone else in Western Ukraine, covert foreign forces from governments very friendly with Kyiv, already holding the most useful entrances and exits to and from Poland, Slovakia,, Hungary,, and Romania open in case of an attack. It is the sort of thing US Special Operations Units, the Special Activities Division of the US Central Intelligence Agency, the British Army’s Special Air Service, and the United Kingdom’s Secret Intelligence Service would be very capable of doing and would likely do, covertly. Surely, this idea is drawn from the realm of conjecture, however, it would be a smart move and their hypothetical presence would hardly be reported in the Western newsmedia. If, hypothetically, such forces had been there covertly since 2014, they may have been well-engaged in successful clandestine and covert activities in the region.

Perhaps what happened in Syria may have been an issue at all in GRU Headquarters. A battle between US Special Forces and Russian private military contractors from the infamous Gruppa Vagnera (Wagner Group) may have had a long-lasting educational effect in Yasenevo. Present in Syria as part of the campaign to destroy the so-called Islamic Caliphate created by the Islamic jihadist terrorist organization, the Islamic State of Iraq and Greater Syria (ISIS) that cut across iraq and Syria, US Special Forces, in self-defense at their own base, decimated a formation of Gruppa Vagnera that attacked them. Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.)

Even if commanders and military planners had been certain that spetsnaz could well-handle any foreign forces that hypothetically might have detected in the Western region of Ukraine, there imaginably would have been a wish in the Kremlin to avoid being seen as, and being accused of, attacking those foreign troops. In dubio abstinence. (When in doubt, sustain.)

Where Were the Russian Airborne Forces?

As for the Vozdushno Desantnye Voyska (Russian Airborne Forces) or VDV, surely the Ukrainians might have expected missions launched by them to hold territory in-depth. Yet, as with the GRU, commanders and planners in the VDV may have been concerned about being unable to redeploy or evacuate troops placed perhaps at border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on deep in Ukraine in large numbers if a major problem was encountered. Maybe they were concerned about potential for great casualties and huge losses of materiel. That happened without an operation to block Western assistance coming in from the West: 50,000+ killed. 

Surely, they were made more certain that the VDV would unlikely have been able successfully operate in the Western region of Ukraine after what transpired when its units attacked Hostomel Airport in the first days of the special military operation. The VDV faced considerable troubles there. One might view the capture of an airport a sort of bread and butter target for airborne units in armies worldwide

Russian Airborne Forces landing at Hostomel Airport (above). Russian Federation Armed Forces commanders and planners may have been concerned about the potential for huge losses if a blocking operation in the West were attempted. Surely, they were made more certain that the VDV would unlikely have been able successfully operate in the Western region of Ukraine after what transpired when its units attacked Hostomel Airport in the first days of the special military operation. After securing Hostomel Airport to the extent possible, the Russian Federation Army and VDV there tried to push into the nearby town and then  advance to Bucha and Irpin. Their poorly organized movement encountered ambushes in Hostomel and Bucha which resulted in significant losses of personnel and equipment. Those in command of the Russian Federation Army and VDV troops, decided to hold their positions, digging in on the roadsides to defend themselves against Ukrainian artillery and drone strikes. They also suffered heavy casualties from night attacks by special forces units of the Ukrainian Armed Forces. On March 29, 2022, the order was given for the Russian Federation forces at Hostomel to withdraw from the Kyiv oblast. Under continuous artillery fire from Ukrainian forces, the Russians damaged equipment that had to be abandoned and made a hasty retreat.

According to reports based on what was observed, the Russian Federation Armed Forces plan of attack against Hostomel Airport included its rapid occupation, with the intention of using it as an assembly area for Kyiv’s encirclement and capture. The airport is a bit over 6 miles north of Kyiv. The Initial February 24, 2022 assault on Hostomel Airport was a success, catching its Ukrainian defenders by surprise apparently due its speed. Mi-35 and Ka-52 attack helicopters operating out of Belarus struck the airport’s defenses and opened a way for helicopter-borne VDV units in Mi-8 transport helicopters that followed. However, despite being caught off guard by the initial assault by the attack helicopters, the attack itself was ineffective as the Ukrainian defenses were left largely intact.  Without any meaningful air support–it was very likely not included in formulation of the attack plan, VDV units on the ground faced counterattacks by Ukrainian forces almost immediately.

Luckily for the VDV troops struggling with Ukrainian forces for control of the airport, Russian Federation Army units originating in Belarus broke through Ukrainian defenses near Ivankiv and rapidly drove toward Hostomel. Although the advancing Russian Federation troops faced attrition from several Ukrainian ambushes en route, they reached Hostomel Airport and assisted the VDV in securing it on February 25, 2022. The Russian Federation Army units and the VDV sought to establish Hostomel into a forward operating base from which the larger push on Kyiv could be initiated. However, it was at this juncture that the special military operation began facing fierce resistance from the Ukrainians and became stalled. Logistical problems impacted operational tempo. The most visible sign was well-televised coverage of a 40-mile-long convoy that halted due to lack of fuel. Securing Hostomel Airport to the extent possible, the Russian Federation Army and VDV there tried to push into the nearby town and then  advance to Bucha and Irpin. Their poorly organized movement encountered ambushes in Hostomel and Bucha which resulted in significant losses of personnel and equipment. Those in command of the Russian Federation Army and VDV troops, decided to hold their positions, digging in on the roadsides to defend themselves against Ukrainian artillery and drone strikes. They also suffered heavy casualties from night attacks by special forces units of the Ukrainian Armed Forces. On March 29, 2022, the order was given for the Russian Federation forces at Hostomel to withdraw from the Kyiv oblast. Under continuous artillery fire from Ukrainian forces, the Russians damaged equipment that had to be abandoned and made a hasty retreat.

A Matter of Military Science

To the extent of everything mentioned here, perhaps a hypothetical concern over sending a relatively large sized force into Western Ukraine was a matter of Russian Federation commanders and military planners remembering what they learned while studying in military educational institutions. To that extent, they wanted to avoid the circumstance faced by Allied troops during Operation Market Garden during World War II.

The story of the Battle of Arnhem, part of Operation Market Garden, a massive Airborne ground assault in from from September 17, 1944 to September 26, 1944 during World War II. remains fairly well-known, however greatcharlie will humbly seek to recount it to the extent that is pertinent here. Under the plan proposed by British Army Field Marshal Sir Bernard Montgomery, the Airborne assault would support a single drive north over the branches of the Lower Rhine River,which would  permit the British Second Army to bypass the Siegfried Line and attack the industrial Ruhr. US Airborne troops were dropped in the Netherlands to secure bridges and towns along the line of the Allied advance. Farthest north, the British 1st Airborne Division was dropped at Arnhem to capture bridges across the Nederrijn (Lower Rhine). Their assault was supported by the Glider Pilot Regiment and the 1st Polish Parachute Brigade. The British XXX Corps were assigned to reach the British-led contingent in two to three days. The division was told to expect only limited resistance from German reserve forces. However, information collected by the British Army’s 21st Army Group in Belgium and Dutch resistance that German armor units were present around Arnhem. That intelligence was supported by aerial reconnaissance. However, the commanding officer of 21st Army Group, dismissed the information. The Supreme Headquarters Allied Expeditionary Force was made aware that almost certainly two Panzer divisions were situated at Arnhem but received the information from Ultra intercepts so close to the Operation Market Garden’s launch that it chose to ignore it. Intriguingly, the First Allied Airborne Army was not made privy to information from Ultra.

The information was very accurate. German Army Generalfeldmarschall Walter Model, the commander of Army Group B, had moved his headquarters to Arnhem and was re-establishing defenses in the area and co-ordinating the reorganization of the scattered units. Thus, at the time of Operation Market Garden’s launch, several units would be present in the vicinity of Arnhem to oppose them. Most threatening among them were the II SS Panzer Corps comprising the remains of the 9th SS Panzer Division “Hohenstaufen” and  the 10th SS Panzer Division “Frundsberg”. It was the bad luck of the airborne force that both German SS divisions, during their formation, had undergone month-long anti-airborne exercises and had also spent the last 15 months studying how best to act against a parachute assault in classroom and field exercises.

The 1st Airborne Division was dropped a distance from its objectives and encountered unexpected resistance, mainly from elements of the 9th SS Panzer Division and the 10th SS Panzer Division. A small force managed to reach the Arnhem road bridge, but the advance of the main body of the division was halted on the outskirts of the town. As for XXX Corps, it was forced into a struggle at Nijmegen, and advance north was delayed. As a result, the British airborne troops were not relieved as scheduled. After four days, the small British force at the bridge was overwhelmed and the rest of the division trapped in a small pocket north of the river. Lacking reinforcement and resupply, remnants of the 1st Airborne Division, after nine days of fighting, were withdrawn in Operation Berlin. Without secure bridges over the Nederrijn and the front line stabilized south of Arnhem, the Allies were unable to advance further. The 1st Airborne Division lost almost three quarters of its strength. Battered and tattered, the division was not sent into combat again.

Concern over a Potential Panicked Response by Ukraine’s Neighbors

The Kremlin may have been uneasy about how the US, its NATO allies, and the EU would respond militarily if Russian troops landed in Western Ukraine, “danger close” to the Polish border. Even more, it may have been the case that  they were concerned political leaders in Poland, potentially panicked at observing Russian forces landing practically on its border, might have responded first by ordering Polish Armed Forces to unilaterally drive inside Ukraine border, take positions inside its Western region, and then refer the matter to NATO. Such hypothetical unilateral action might have included an armored and mechanized drive into Ukraine to create a buffer, and landing troops on border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on before they would all fall completely into Russian Federation hands. To that extent, they would likely go after the same targets in Ukraine that the Russian Federation Armed Forces would likely want. In the worst case scenario, Polish troops could have fired heavy artillery and launched missile attacks on targets to deter air landings by the Russian Federation Armed Forces.

Where Was the Russian Air Force?

Concerning Voyska Vozdushno-Kosmicheskoy Oborony, Rossijskoj Federacii (the Russian Federation Aerospace Defense Forces, hereinafter referred to as the Russian Federation Aerospace Forces), particularly the Voenno-Vozdushnye Sily Rossii, (the Russian Air Force) element, one might have presumed commanders and planners of the Russian Federation Aerospace Forces would have organized air power assets of the force to strike strategically and tactically to make a positive difference in the war effort. Strategically, disrupting its supply of weapons from external sources and destroying Ukraine’s ability to construct weapons would likely be a priority. Tactically, a priority would likely be coordinating efforts by Russian Air Force assets with ground forces as they advanced. One might have expected that with the support of the Russian Federation’s ISR capabilities, a plan would have been in prepared for the Russian Air Force to shut the door on the transport of supplies through Ukraine, interdicting supply lines as fast as they were organized. However, that has not been the case. As the situation stands in the Ukraine campaign, the Russian Air Force has been near nonexistent relative to its size, supposed power, and the expectations of military analysts worldwide. Its best fighters and fighter-bombers have been regularly blasted out of the skies by the Ukrainian Armed Forces using both pricey sophisticated air defense weapons systems provided to Kyiv by Western powers as well as javelins and stingers, shoulder fired rockets operated by individual soldiers in the field. In response to the Ukrainian air defense threat, Russian Federation warplanes are not evading by flying sorties at 15,000 to 20,000 feet as they had over Syria. Russian aircraft are often remaining above Russian airspace and firing air launched cruise missiles into Ukraine. Since aircrews cannot identify targets across the border, airstrikes are made in areas where air intelligence reports the enemy is located. In attacking urban centers, that will always result in collateral damage in the form of civilian deaths and injury and the destruction of nonmilitary structures.

The Unwillingness to Speak Truth to Power

Commanders in all branches of the Russian Federation Armed Forces are surely unwilling to speak truth to power and inform Putin of what needed to be done in the West and that they were uncertain that their forces could achieve such an objective. One might imagine that suffering Putin’s coup de gueule would be the least of their worries. It has been a symptom common among those in service of authoritarian regimes throughout history. Skilled commanders are eventually bled dry of their strength to speak out about ill-laid military plans conjured in the minds of tyrannical leaders who are convinced of the certitude of their ideas. Many have been willing to bring reprisals against those commanders, even their best, who, for the sake of the forces they command and country, might step forward to disagree with them. It causes greatcharlie to cast its mind back to the 1981 pop song Der Kommisar“, essentially a scare story originally performed in both German and English by the Austrian artist Falco (Johann Hölzel). In the penultimate chorus of the English version, are the lyrics: “Don’t turn around, wa-uh-oh (yeah-yeah) / Der Kommissar’s in town, wa-uh-oh / He’s got the power and you’re so weak / And your frustration will not let you speak / La la la la la la.”

Commanders in all branches of the Russian Federation Armed Forces were surely unwilling to speak truth to power and inform Putin of what needed to be done in Western Ukraine and that they were uncertain that their forces could achieve such an objective. One might imagine that suffering Putin’s coup de gueule would be the least of their worries. This has been a symptom common among those in service of authoritarian regimes throughout history. Skilled commanders are eventually bled dry of their strength to speak out about ill-laid military plans conjured in the minds of tyrannical leaders who are convinced of the certitude of their ideas. Many of those leadsrs have been willing to bring reprisals against those commanders, even their best, who, for the sake of the forces they command and country, have stepped forward to disagree with them.

The Military Assistance Misread

On a more political level, perhaps Putin, his Security Council, and the Russian Federation General Staff were certainly completely wrong in their most likely conclusions about the degree of assistance the West would provide, what type of weapons and the impact they would have on the battlefield. The US has committed billions of dollars in security assistance to Ukraine since February 24, 2022. Relative to what the Ukrainians would eventually receive, what they had been provided to that point would hardly have been viewed as impressive by the Russian Federation General Staff.

Much as it had been planned by the US during the days of the Cold War, much of what would be used to repel a Warsaw Pact rampage through Western Europe would be taken from prepositioned stocks of supplies or they would be flown in and shipped in. During the Cold War, from 1969 to 1993, the annual REFORGER (Return of Forces to Germany) Exercises rehearsed that reinforcement and resupply to a great degree. It seems apparent now that thinking along the same vein in the Pentagon may have driven planning for the support of Ukraine in event of an attack. This idea would very likely be a kick-in-the-head to Russian Federation Armed Forces commanders and planners who had not have recognized the parallels as yet, never foresaw the possibility that the US and its NATO allies would essentially come at them, via the Ukrainians, in a similar way.. How obvious it all might seem now.

A Miscalculation on the Political Will of the West

Perchance Putin, his Security Council, and the Russian Federation General Staff miscalculated with regard to the degree of political will in the administration of US President Joe Biden and the US Congress to support Ukraine. Mixed messages regarding US commitment. The “No US boots on the ground” talk came a tad too early perhaps. It probably was music to ears in Moscow. It may have very well created the impression the US was pulling away or could potentially abandon Kyiv if Russia invaded. It may reasonably seem a bit of an overreach to impute to Putin and his acolytes, but one would only need to look at the varying degrees of overreach they have demonstrated with regard to the Ukraine matter.

Maybe Putin and his advisers concluded that European countries could become rankled enough to lend military support to Ukraine but perhaps they were a bit better than less concerned with the quality and quantity of their potential assistance and financial giving. They would expect the US to have the matter well-covered.

Perhaps they considered that Western European resolve to be engaged robustly, wholeheartedly in Ukraine would hinge on the resolve of the US to back its NATO allies. As for the US, much as alluded to earlier, its resolve would hinge on the success or failure of Russian forces in Ukraine, which really meant the capabilities demonstrated by the Ukrainian Armed Forces. Thereby, as long as the Russian Federation Armed Forces performed well, robust military assistance beyond javelins and stingers would not be sent into Ukraine. (Based on that suspected line of thought, one might compare how that situation for Ukraine as the invasion got underway to a degree paralleled, mutatis mutandis, the situation of the fledgling US in 1777. The decisive Battle of Saratoga in which the Continental Army defeated the British Army gave the French government the confidence to sign treaties of alliance and trade with the US government and joined its war against Great Britain.  Both countries agreed to fight the war until the US was truly independent, and neither would agree to a separate peace.)

As the efforts of the Russian Federation Armed Forces became desultory, ineffective, and proved surprisingly lacking at Kyiv and Kharkiv, it became easier for the US to give more to an Ukrainian cause with the real potential for victory and convince other NATO Allies to do the same albeit to far lesser degree. Panicked efforts by Kyiv to muster support and acquire weapons were practically wasteful as they clearly had the matter covered.

Misperceptions on Zelensky: A Force To Be Reckoned With

Of likely concern for Putin’s advisers, if not Putin, was surely Ukrainian President Volodymyr Zelensky who in the months before the invasion was already burning a bit brighter than the Kremlin expected. There were hints that he potentially could display all the qualities ascribed to great leaders. Doubtlessly, it was hoped in the Kremlin that Zelensky would find himself cutting a figure not unlike Felicia Hemans’ “Casabianca” (1826), crying out for an answer, in Zelensky’s case from Washington, that would never come and his world would go up in flames. As it was, Zelensky proved to be a lion of a man, stalwart of the Ukrainian cause, and a force to be reckoned with once the Russian Federation’s special military operation began. Western government officials and news media commentators alike would view Zelensky as having galvanized the Ukrainian people to resist Russia’s effort to swallow up their country. Zelensky also impressed with his entreaties to the world to come to the aid of his fellow countrymen in the best ways that they could. One might safely assume that his efforts influenced how countries with the wherewithal to respond to the Ukraine in its time of need, worked with him, and rapidly developed and implemented plans to provide considerable support for his country. Indeed, such positive perceptions of Zelensky, his impact, helped to attract aid groups, humanitarian volunteers, foreign fighters, helpful weapons, and financial resources to support Ukraine’s cause.

Ukrainian artillerymen fire US made and gifted M142 HIMARS (High Mobility Artillery Rocket System) (above) at Russian Federation forces holding Ukrainian territory. On a more political level, perhaps Putin, his Security Council, and the Russian Federation General Staff were certainly completely wrong in their most likely conclusions about the degree of assistance the West would provide, what type of weapons and the impact they would have on the battlefield. The US has committed billions of dollars in security assistance to Ukraine since February 24, 2022. Relative to what the Ukrainians would eventually receive, what they had been provided to that point could hardly have been perceived as impressive by the Russian Federation General Staff. Much as it had been planned by the US during the days of the Cold War, much of what would be used to repel a Warsaw Pact rampage through Western Europe would be taken from prepositioned stocks of supplies or would be flown in and shipped in. The annual Reforger (Return of Forces to Germany) Exercises rehearsed that reinforcement and resupply to some degree. It seems apparent now that thinking along the same vein in the Pentagon may have driven planning for the support of Ukraine in event of an attack.

The Distorting impact of Putin’s Kyiv Obsession

Surely, Putin’s singular emotional wants and wishes beyond what was militarily and strategically logical what drove the planning of the operation or was it formulated to the best of the abilities of trained, experienced, informed military officers in the Russian Federation Armed Forces. To Putin, everything about the government in Kyiv was anathema. Recall as aforementioned that in a very perplexing way, Putin stated in his appeal to the Ukrainian Armed Forces in his February 24, 2022 broadcast: “You swore the oath of allegiance to the Ukrainian people and not to the junta, the people’s adversary which is plundering Ukraine and humiliating the Ukrainian people.” He would go on to say: “I want to emphasize again that all responsibility for the possible bloodshed will lie fully and wholly with the ruling Ukrainian regime.” The indication s and implications of such statement are that Kyiv was indeed an obsession. To that extent, among those wants and wishes was toppling the government in Kyiv. Accomplishing that apparently became a priority with Kyiv in the planning of the invasion or whatever sufficed for its planning that distorted the picture Putin, his Security Council, and the Russian Federation General Staff of the battlespace. When examined in the context of this situation, how apposite the second quatrain of William Shakespeare’s Sonnet 116 becomes: “What wretched errors hath my heart commited, / Whilst it had thought itself so blessed never! / How hath mine eyes out of their spheres been fitted / In the distraction of this madding fever!”

If one might imagine Putin was a bit more pragmatic in his thinking and approach on Kyiv, it might be believed Putin may have thought the quickest road to victory was to cut off the head, the government in Kyiv and the command and control Ukrainian Armed Forces General Staff, from their forces in the field. If that could be achieved, Putin likely believed the mass surrender of Ukrainian troops in the field would come next. If that was the case, and what has transpired in Ukraine evinces to some degree that it was, then quite a bit of creative thinking was clearly involved in the invasion’s planning. 

However, by the time of the invasion, the government in Kyiv under Zelensky was well-tied in with its Western supporters. Thorough plans to provide escalating levels of military and financial assistance were surely already in place. Even though Zelensky initially displayed a great degree of uneasiness concerning the way in which the needs of Ukraine in the crisis would be met, it might be the case that what has come Ukraine’s way has far exceeded what he might have been reasonably expected. The shortsightedness apparent in thinking that the Kyiv government could be decapitated is stark. An informed guess is that the Ukraine enterprise was not hashed out with the best foreign and national security thinkers in Russia. One would get the idea it all was the result of the thinking of one man, certain of its roundness. Such impetuous schemes and boldness are at first sight alluring, but are difficult to handle, and in the end result in disaster.

Perhaps the real problem for Putin was not just that he relied on fortune, but was driven by blind rage and to a further extent blind ambition. Ukraine was one the bigger pieces he needed to pull together a respectable number of former republics into some simulacrum of the Soviet Union. While it may seem daylight madness for the reasonable to attempt that, for Putin, it makes perfect sense.

The Distraction of Covetous Thoughts?

As discussed in greatcharlie’s May 30, 2022 post entitled, “Putin the Protector of the Russian People or the Despoiler of Ukrainian Resources: A Look at War Causation and Russian Military Priorities in Ukraine”, long before he became the legendary Russian President that he is today, Putin was a doctoral candidate at Leningrad State University (now the University of St. Petersburg.) it was at the very end of his KGB service. (A fuller discussion of that period of Putin’s life can be found in greatcharlie’s March 31, 2017 post entitled “Book Review: Vladimir Putin, First Person: An Astonishingly Frank Self-Portrait by Russia’s President (Public Affairs, 2000)). The rector at the St. Petersburg State Mining University as of this writing, Vladimir Litvinenko, chaired the committee that awarded Russian President Vladimir Putin his doctorate in Economics in 1997. He recently stated that Putin’s thesis was titled “Strategic Planning of the Reproduction of the Mineral Resource Base of a Region Under Conditions of the Formation of Market Relations.” Putin’s economic studies, at what was then Leningrad State University, were most likely heavily doused in Marxian theory. Even more pertinent here, his research made him quite knowledgeable about the resources of countries that were formerly republics of the erstwhile Soviet Union. He would be very aware of Ukraine’s wealth in minerals, particularly in the eastern and southeastern regions. Indeed, Ukraine has a large supply of many valuable mineral and raw material resources. Ukraine in fact holds approximately 5 percent of the world’s mineral resources. Its significant mineral resources include: iron ore, coal, manganese, uranium ore, natural gas, oil, salt, sulfur, graphite, titanium, magnesium, kaolin, nickel, mercury. As for stocks of iron, manganese, titanium and uranium ore Ukraine is ranked first among European countries. As for mercury ore reserves, it is second only to Spain. Attendant to capturing sovereign territory in Ukraine, much as he grabbed Crimea eight year before, Putin may have wanted possession of its supply of many valuable mineral and raw material resources. Thinking in that direction may also have distorted his picture of what would be most important in invading Ukraine successfully. 

If this was Putin’s thinking and actions on this matter, at a more detailed level than discussed earlier, it would very much mirror that of Hitler during Nazi Germany’s invasion of the Soviet Union. As explained by the Imperial War Museum, industrialists in Germany most likely influenced Hitler’s decision to seize the Southern Caucasus in the Soviet Union and Stalingrad despite the concerns and entreaties of Oberkommando des Heeres with undertaking an operation of such distance from where the German Army was situated. As aforementioned, Operation Barbarossa, launched in June 1941, failed to achieve Hitler’s objective of decisively defeating the Soviet Union in a single campaign. German forces managed to occupy vast swathes of Soviet territory and industry. However, the audacious invasion finally ground to a halt in December 1941 on the forested outskirts of Moscow, the exhausted German Army stabilized its winter front in a line running roughly from Leningrad in the north to Rostov in the south. The strain of the harsh winter campaign upon the ill-prepared Wehrmacht, as well as the severe strain placed on the Luftwaffe in its prolonged efforts to air-supply the army’s string of city-bastions along the front, was tremendous. The Germans suffered a staggering 850,000 casualties. Interestingly, despite such considerable setbacks, the Germans believed the war was still going fairly well.

However, the following year, Hitler decided to go on the offensive. A decision by Hitler to launch a campaign in the Southern Caucasus region, south of the German front was spurred on by flawed information provided to him by economic advisers. They told Hitler that Germany would be incapable of sustaining the war without the resources in the Caucasus. North of the mountains was a center of agricultural production, which also held significant coal and metal reserves; to the south, was the region of Transcaucasia, a densely populated industrial center which produced some eighty percent of the Soviet Union’s annual oil production.Responsive to the wishes of the political leadership, by February 1942, the Oberkommando des Heeres was planning an offensive in the Caucasus region. 

On April 5, 1942, Hitler issued  Führerbefehle Nr. 41 (Fűhrer Directive No. 41), laying out the basic plan for the new offensive in the Soviet Union. The new plan would become known as Fall Blau (Case Blue). The main objectives were the major oilfields in the Caucasus and Transcaucasia: Maikop, Grozny and Baku. Senior German commanders were concerned about undertaking such a deep thrust into the opponent’s territory, fearing for the safety of their flank. Hitler’s remedy was to include in the plan the occupation of Stalingrad by Germany’s Italian, Hungarian and Romanian allies. The city would initially be taken by Germans. They would also establish a defensive line along the Don River and Volga River, which would be taken over by allies, too. Capturing Stalingrad would have the additional benefit of blocking all enemy traffic on the Volga, a crucial transport artery. To Hitler, the operation, which he deemed to be “of limited scope,” made perfect sense. Events proved otherwise.

A postage stamp from the erstwhile Deutsche Democratische Republik (German Democratic Republic, also known as the GDR or East Germany) circa 1963, that includes portraits of the Prussian military leader August Neidhardt von Gneisenau (left), Prussian field marshal Gebhard Leberecht von Blücher (right). In war, the value of a reliable, knowledgeable, skilled, and open-minded adviser who truly understands the concept and intent of his commander, cannot be underestimated. A model for interaction between a political leader or military commander with his advisers was the one between the renowned 18th century Prussian Army Marshal Gebhard Leberecht von Blücher with his chief of staff General August Neidhardt von Gneisenau. In Clausewitz: (Scarborough, 1979), author Roger Parkinson quotes von Blücher with regard to his relationship with his brilliant chief of staff as follows: “Gneisenau, being my chief of staff and very reliable, reports to me on the manoeuvres that are to be executed and the marches that are to be performed. Once convinced that he is right, I drive my troops through hell towards the goal and never stop until the desire goal has been accomplished–yes, even though the officers trained in the old school may pout and complain and all but mutiny.” Regarding an offer for von Blücher to receive an honorary degree at Oxford University following the Napoleonic War, Parkinson quotes him as saying: “Well, if I am to become a doctor, you must at least make Gneisenau an apothecary, for we two belong together always.”

Eyes Wide Shut

“A lion does not lose sleep over the opinion of sheep. ” is a quote often attributed to others, but it is very likely the words of Abū ʿAbdullāh Muhammad ibn Idrīs al-Shāfiʿī (28 August 767 — 19 January 820) was a Palestinian-Arab Muslim theologian, writer, and scholar, who was the first contributor of the principles of Islamic jurisprudence (Uṣūl al-fiqh). Often referred to as ‘Shaykh al-Islām’, al-Shāfi‘ī was one of the four great Imams, whose legacy on juridical matters and teaching eventually led to the Shafi’i school of fiqh (or Madh’hab). In his thoughts, Putin is surely completely alone. He appears indifferent to whether the rest of the world sees him as a bit out of touch or strange, apart from everything else. Outside of his super fans in Russia–many of whom have been unfortunate enough to meet their end, so very young, on fields, hills, and woods in Ukraine as questionably trained conscripts–certainly does not appear gallant or chivalrous. Putin is holding the course on Ukraine, not yielding in any way that might allow for authentic and substantive negotiations to end the conflict to begin. There still does not appear to be a line of talk available to even his closest advisers that could put a different complexion on the matter.

In war, the value of a reliable, knowledgeable, skilled, and open-minded adviser who truly understands the concept and intent of his commander, cannot be underestimated. A model for interaction between a political leader or military commander with advisers was the one between the renowned 18th century Prussian Army Marshal Gebhard Leberecht von Blücher with his chief of staff Prussian Army General August Neidhardt von Gneisenau. In Clausewitz: (Scarborough, 1979), author Roger Parkinson quotes von Blücher with regard to his relationship with his brilliant chief of staff as follows: “Gneisenau, being my chief of staff and very reliable, reports to me on the manoeuvres that are to be executed and the marches that are to be performed. Once convinced that he is right, I drive my troops through hell towards the goal and never stop until the desire goal has been accomplished–yes, even though the officers trained in the old school may pout and complain and all but mutiny.” Regarding an offer for von Blücher to receive an honorary degree at Oxford University following the Napoleonic War, Parkinson quotes him as saying: “Well, if I am to become a doctor, you must at least make Gneisenau an apothecary, for we two belong together always.”

An informed guess by greatcharlie is what has likely been a reliable intuition that had served him well along the way and allowed him a leg-up in giving subjects light were darkened with regarding parsing out the many aspects of this massive enterprise in Ukraine. Imagining Putin with his mind set on invading Ukraine come hell or high-water and refusing hear any suggestion that he delay until Russian forces were fully prepared to act, maximize every advantage and exploit the liabilities of Ukrainian forces to the fullest extent, and cope with all contingencies, if one might dare discuss such with him as noted earlier. 

One can only imagine Putin’s outward attitude and behavior at that time. The thought of it all curiously reminds greatcharlie a song sung by the renowned comic, Groucho Marx in the comedy film “Horse Feathers” (1932), not that there is anything remotely humorous about any aspect of the Ukraine War. When Marx’s  character, Professor Quincy Adams Wagstaff, is made the new head of Huxley College, and asked to offer some suggestions for his administration, the first verse of his musical response was: “I don’t know what they have to say / It makes no difference anyway / Whatever it is, I’m against it / No matter what it is or who commenced it / I’m against it.”

Putin Was Blinded by Rage

A dislike of Biden administration members inflamed the ardor of Putin and closest acolytes and they became determined to hurt Kyiv for siding with them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the administration of US President Joe Biden, many of whom had held senior posts in the Obama administration, would respond to a move toward Ukraine. As discussed in greatcharlie’s January 25, 2022 post, Putin had experienced considerable dissatisfaction and disappointment in his dealing with Obama administration officials, particularly on Ukraine. As he may have perceived their actions in the past, they found it rather piquant to interact with him as if he were a lesser party, and given his positions and concerns no consideration. He likely believed they saw him as undeserving of respect. Communications were condescending, actions were often insulting. In an explosion of aggression, in part a response to his treatment, he grabbed Crimea with military force and fomented civil war in the Donbas. He engaged in other destabilizing efforts. Apparently, he was not completely satisfied with those actions, and held in his mind the idea of doing more. Seeing the appointment of many of those same officials in even higher posts in the Biden administration, most likely inflamed his sense with ardor to lash out violently. Everything those officials did in the Biden administration, Putin surely viewed with their past actions firmly in mind.

One might theorize that although he could not conventionally strike directly at those officials, Putin could reach the Zelensky government, members of which he may view as something worse than traitorous. He could well imagine the the fall of the Zelensky government would beset the Biden administration officials that he despised with a sense of loss and failure. Secondly, he would hope to cause torment and anguish among their “Ukrainian followers”. To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engagement, a rematch, with former senior Obama administration officials serving in the Biden administration and settle an old score. 

Putin (seated left) during a Russian Federation Security Council meeting just days before the special military operation was launched. A dislike of senior members of the administration of US President Joe Biden likely inflamed the ardor of Putin and closest acolytes and they became determined to hurt Kyiv for siding with them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the Biden administration, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move toward Ukraine. One might theorize that although Putin could not conventionally strike directly at those officials, he could reach the Zelensky’s government, members of which he may view as something akin to “traitorous”. He knew what anguish and loss the fall of Zelensky’s government would cause those US officials and secondly, their “Ukrainian followers”. To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engagement, a rematch, with former senior Obama administration officials in the Biden administration and settle a score.

The Way Forward

It certainly appears to many reasonable people around the world since the Ukraine War began that currently there is a dearth of rational thinkers in the Kremlin. As is so often the case in the history of warfare, perception, better still, misperception, and not reality, drove the decisionmaking of Russian Federation Armed Forces commanders and war planners. Intriguingly, in parsing out the possibilities of this pivotal moment in the war’s planning, it would seem Putin’s special military operation did not necessarily have to turn out as it has.

Too many human lives have been lost in this war. The common wisdom is that the war never should have transpired, and no one should have died. No amount of gain in Ukraine would match the degree of loss in the cold terms of blood and treasure by Russia which started the war. Nevertheless, it will likely go on and plenty more dying will be done.

Conforming to the concept and intent of their political leader, Putin, senior commanders of the Russian Federation Armed Forces mistakenly thought that the campaign would be a short one, and that the Ukrainians would give in after suffering the shock of massive initial defeats. Being responsive to the concept and intent of their political leadership was, by their training and oath, the correct thing to do, but the very wrong thing to do at the same time. Res ipsa loquitur! Perhaps the only real hope for its end on the battlefield is Ukraine’s capture of every bit of sovereign territory, to include Crimea. As mentioned here, that is within the realm of possibility. Yet, Putin would hardly find that outcome satisfactory. If a satisfactory solution cannot be found for both sides on Ukraine, there will be good reason for the world to fear the worst from him. In the cavernous assembly halls of the Kremlin where Putin speaks before top officials of his government, the Russian Federation Duma, other key political leaders at the federal provincial and local levels–nationalists, ultranationalists, and Communists–prominent supporters of the United Russia Party, and business leaders, one will not spy happy faces, filled with optimism over the future ahead. There are mainly the morose visages of people who likely whisper among themselves that the genuine end to everything may be near. Perhaps Putin is equal to his rhetoric, and Russian Federation ICBM’s will make their way out of their kennels. His supporters would likely believe that. A solution to the Ukraine War must be found soon. Utere, non numera. (Use the hours, do not count them.)

Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of China’s MSS Vice Minister

People’s Republic of China Vice Minister for counterintelligence of the Ministry of State Security Dong Jingwei (far right), and People Republic of China Minister of Public Security Zhao Kezhi (center), were among five Chinese officials attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. On June 23, 2021, officials of the People’s Republic of China Embassy in Washington presented this photograph of Dong’s very public appearance at the Shanghai meeting as proof that he is in China despite rumors that he had defected to the US four months before. The point at issue is whether the photograph presents the real Dong.

In June 2021, rumors had taken flight concerning the alleged defection of Dong Jingwei, the People’s Republic of China Vice Minister for counterintelligence of Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS–China’s relative equivalent to the Central Intelligence Agency (CIA). Dong was alleged to have defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. After arriving safely into US hands, Dong allegedly provided government officials with information about the Wuhan Institute of Virology that purportedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. However, by late June 2021, US officials began reaching out to the news anonymously to say reports of Dong’s defection were not true. and hinting that he remained in China. The mainstream news magazine Newsweek reported on June 22, 2021 that it was informed by a US government official that reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Although reticent about the rumors for the longest time, on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite claims that he had defected to the US four months before. Curiously, the photograph has not been widely accepted as incontrovertible proof of Dong’s identity, that he still resides in China, or that he did not defect among many independent China-watchers.

Before the controversy of the rumored defection, one would have had great difficulty finding Dong Jingwei’s name anywhere it might even be expected. Two resources for such information that greatcharlie’s will reach for first are: Peter Mattis and Matthew Brazil, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), and I. C. Smith and Nigel West, Historical Dictionary of Chinese Intelligence (Historical Dictionaries of Intelligence and Counterintelligence) (Scarecrow, 2012). Following the blow-up of the defection story, numerous articles online have appeared and online encyclopedias such as Wikipedia and Britannica, have developed enough information to provide decent–though some were not so verifiable–biographies of him. As was noted in greatcharlie’s June 30, 2021 post entitled The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax,” never before has Dong’s name, or any other senior MSS counterintelligence official’s name, been bandied about in the US or global newsmedia in the manner it has been lately.

What would imaginably now be a greater issue for inquiring minds than Dong’s biography, is the matter of his actual image, how he actually looks. A number of photographs of him have cropped up along with the many new articles, but two particular images of Dong have been very popular. As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. If they are photographs of two different men, one may actually be Dong. Here, greatcharlie gives making comparisons between the two images of Dong the old college try.

The June 16, 2021 tweet from the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong Jingwei had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia. Along with Han’s commentary was the popularized photograph allegedly of Dong Jingwei.

The first image mentioned above was made available widely via Twitter on June 16, 2021 as a result of being in a photograph attached to a tweet by the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia.

The second fairly popular image is included with his biography in Wikipedia. The individual in the Wikipedia photograph appears to be the same individual in the photograph that the Chinese government released of Dong attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. He is the same individual in a photograph taken when Dong was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. In the photograph, Dong is first from the left. It is alleged to be the earliest publicly available photograph of Dong after he began serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in April 2018. 

A photograph taken when Dong Jingwei (far left) was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. It is alleged to be the earliest publicly available photograph of Dong serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in the MSS in April 2018.

Si parva licet componere magnis. (If we may compare small things with great.) By placing the photograph of Dong from greatcharlie’s June 30th post beside the photograph from his biography in Wikipedia, using only the naked eye, one can find clear distinctions in at least seven areas of their respective faces. To allow readers to follow along with comparisons of facial features, the June 30, 2021 greatcharlie post photograph is included here as Figure 1. The Wikipedia photograph is included here as Figure 2. A chart that identifies parts of the human face is included here as Figure 3. Readers should refer to that chart to locate points of the face mentioned in Figures 1 and 2. The seven specific points on the face address include: philtrum; philtral columns; philtral dimple; nasolabial grooves; nasal septum; mentolabial sulcus; and, facial marks.

Figure 1 

Dong Jingwei June 16, 2021 Twitter Photograph

Figure 2 

Dong Jingwei Wikipedia Biography Photograph

Figure 3 

Face Chart

Philtrum

The philtrum on the individual in Figure 1 forms a visually straight canal with the philtral columns formed in straight lines from the nasal septum to the top of the lip. They are somewhat thick on both left and right. The canal of the philtrum appears relatively symmetric in its depth and width to the corresponding height and width of each philtral column. On the individual in Figure 2, the philtral columns appear shorter than those of the individual in Figure 1. They are separated enough to form the philtrum into a wider and somewhat deeper canal than that of the individual in Figure 1. 

Philtral columns

Although they are not marked on the chart in Figure 3–greatcharlie apologizes for that omission, the two columns of the philtrum running from the septum of the nose to the top of the upper lip are called the philtral columns. At the point the philtral columns touch the top of the upper lip–known more precisely as the vermilion border–in Figure 1, two delta shaped points form. Those delta shaped points are not present on the upper lip of the individual in Figure 2. On the individual in Figure 2, the philtral columns contact the upper lip in a way to form a horseshoe or “U” shape. The upper lip, itself–as aforementioned, called the vermillion–forms only moderate curves at the points on which the philtral columns contact it.

Philtral dimple

The philtral dimple, not marked in the chart in Figure 3–again, our apologies–is the gap between the two philtral columns where they contact the upper lip. On the individual in Figure 1, the philtral dimple is pronounced between what are visually two triangle shaped points, both left and right at the base of the philtral columns. On the individual in Figure 2, the philtral dimple is a far less pronounced facial feature.

Nasolabial grooves

The nasolabial grooves on the individual in Figure 1 are very pronounced both right and left. They begin at a point above the wings of the nose appearing to make contact with the dorsum of the nose. The nasolabial grooves on the individual do not contact the wings of the nose. They stretch in near straight lines down and to the left and down and to the right, reaching just outside the edge of the angles of the mouth. The nasolabial grooves on the individual in Figure 2 are not as long as that of the individual in Figure 1. They curve inward and contact the top of the wings of the nose of the individual. Although the nasolabial grooves are not as pronounced on the individual in Figure 2 as those of the individual in Figure 1, where they become more apparent is closer to the wings of the nose. They are somewhat deeper and the skin around them appears thicker than that for Figure 1.

Nasal septum

The nasal septum at the point where it contacts the philtrum on the individual in Figure 1 is thin. The point at which the nasal septum contacts the philtrum On the individual in Figure 2 is somewhat thick. The nasal septum also appears shorter to some degree. The individual in Figure 1 appears clean shaven beneath the nasal septum and over the philtrum to the upper lip. The individual in Figure 2, in all photos available publicly, maintains very slight hair growth, perhaps a deliberate, modest “designer stubble,” beneath the nasal septum, covering the philtrum down to the top of the upper lip and across to the angles of the mouth.

Mentolabial sulcus

On the individual in Figure 1, the mentolabial sulcus, the line or furrow formed between the base of the lower lip and the base of the chin, is prominent. There is an apparent blemish–mole, birthmark, scratch, bruise–beneath the mentolabial sulcus along its right edge, at a point just inside “the line.” The mentolabial sulcus on the individual in Figure 2 is barely perceptible. It has a somewhat curved shape. The chin on the individual in Figure 1 appears somewhat “U” shaped. The chin on the individual in Figure 2 appears more “bow” shaped. The length between the base of the lower lip and the base of the chin is shorter on the individual in Figure 2 than on the individual in Figure 1.

Facial marks

On the individual in Figure 1, there is a mole, birthmark, slight injury (scratch or bruise), beneath the mentolabial sulcus, beneath and just inside the right edge of it, not making contact with the line itself. On the individual in Figure 2, there are no similar marks on the face.

Finally, the most obvious difference between the two men is that one in Figure 1 wears eyeglasses. The individual in Figure 2 does not wear eyeglasses. It is possible, however, that the individual in Figure 2 does wear eyeglasses, but simply removes them when taking photographs.

Additional Observations Concerning Photographs

Signs of Aging

Eheu fugaces labuntur anni. (Alas, the fleeting years slip by.) What might be perceived beyond the physical about how two individuals in the photographs projected themselves at the moment their pictures were taken is that they are respectively professional, intelligent, well-minded, well-dressed, well-groomed, Chinese officials. However, from what information is publicly known, and what one may accept as true about Dong is that he is currently 57 years old, reportedly being born on November 18, 1963, one can attempt to correctly perceive aspects of his physical condition, too! To that extent, one might consider how age might impact the appearance of the real Dong.

There are many who really do not begin showing signs of aging until a bit later than 57. (By no means does one become “past one’s prime” or “over the hill” after reaching age 57!) Yet, there are some fairly common, and commonly understood, changes in appearance that normally occur. As one ages, the appearance of the face and neck typically changes. Loss of muscle tone and thinning skin can often give the face a flabby or drooping appearance. The skin also tends to dry out and the underlying layer of fat shrinks so that your face no longer has a plump, smooth surface. To some extent, wrinkles cannot be avoided. If readers would look back at the two photographs of individuals both identified as Dong in Figures 1 and 2, they will notice that the individual in Figure 2 has a rather plump, smooth surface. There are no wrinkles or furrows visible on the face. There is considerable muscle tone in the face in all three photos of him presented here, most prominently along the jaw. The individual in Figure 1, exhibits the more dried skin that comes with age. The visage of the individual is strong but there is no pronounced muscle tone. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, slight furrows can be discerned on his forehead.)

Sun exposure and cigarette smoking are likely to make them develop more quickly. However, there is no way for greatcharlie to determine whether the individual in the photograph is a heavy smoker or is regularly exposed to the sun. There is no way available for greatcharlie to determine whether these factors relate to the individual in Figure 1 either.

In another sign of aging, the number and size of dark spots on the face increase as well. It was noted earlier that there is a blemish on the right side of the face of the individual in Figure 1. However, there is no available way for greatcharlie to determine when that individual acquired the blemish. There are no discernible spots on the face of the individual in Figure 2.

With aging, the loss of bone mass in the jaw reduces the size of the lower face and makes your forehead, nose, and mouth more pronounced. The nose may lengthen slightly. In both Figures 1 and 2, there is no indication of the loss of bone mass in the jaw. The noses of the individuals in Figures 1 and 2 do not appear to have suffered ill-effects of age such lengthening. In fact, the skin on both noses appears rather smooth and plump.

A common transformation due to aging is for the fat from the eyelids to settle into the eye sockets. This can create the appearance of sunken eyes. make. The lower eyelids can slacken and bags can develop under your eyes. The weakening of the muscle that supports the upper eyelid can make the eyelids droop. This may limit vision. There is nothing to indicate any of these aspects have impacted the appearance of either individual in Figure 1 or 2. As the individual in Figure 1 wears eyeglasses, any effects on his eyes may have been influenced by them. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, it appears that there is a hint of bags under the eyes detectable through his eyeglass lenses.)

A most apparent sign of aging is gray hair on the scalp, and gray hair on the scalp, and on the eyebrows and eyelashes as well. One the individual in Figure A, there is no ability to determine whether he has gray hair in his eyebrows or eyelashes. Except for the hair above his forehead, one cannot see the hair on his scalp to determine if there is gray hair. (It must be noted that in a photograph included here below in which the same individual identified as Dong in Figure 1 is seen, his hair parted on the left side of scalp, revealing what appears to be gray hair.) The individual in Figure 2, on the other hand, clearly has no gray hair in his scalp, eyelashes, or eyebrows. In fact, as aforementioned, there is slight hair growth on his upper lip. It is decidedly black giving him a very youthful appearance. To that extent, the individual in Figure 2 appears to be younger than the individual in Figure 1, and perhaps younger than 57-years-old.

Countenance of the Face

Duriora genti corpora, stricti artus, minax vultus et major animi vigor. (Hardy frames, close-knit limbs, fierce countenances, and a peculiarly vigorous courage, mark the tribe.) In addition the changes in the face that come with aging, one’s work can be manifested in the countenance, too! As explained in greatcharlie’s June 30, 2021 post, the primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide to protect China’s citizens, secrets and technology from foreign spies. Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. If progress through interviews or interrogations of the subject of an investigation indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. 

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, speaks to this point in The Secret Pilgrim (Alfred L. Knopf, 1990) when his main character, George Smiley a senior and well experienced intelligence officer for The Circus–MI6 in nearly every respect, tells a group of probationary intelligence officers in the fictional foreign IntellIgence training school in Sarratt that he was the one who debriefed his arch rival from Moscow Center, the headquarters of foreign intelligence service of the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB.  He was known only by the name, Karla, and was captured in Delhi after escaping the US. Explaining to the trainees in general about the nature of interrogations, Smiley says at times they are “communions between damaged souls.” However, when MSS managers have determined the situation demands rough treatment, imaginably compelled by some exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, surely coercive measures will be employed to include forms of torture. That work surely takes its toll, often manifesting its pull on the countenance of those who have engaged in it. The aphorism is quite appropriate here: “L’habit ne fait pas le moine.” Still, perception might lead the reasonable to choose the individual in the photograph of Figure 1 to someone more apparently carrying such a burden based on appearance, and perhaps a bit of intuition. Ut imago est animi voltus sic indices oculi. (The face is a picture of the mind as the eyes are its interpreter.)

An image of Dong Jingwei matching that from the June 16, 2021 Twitter photograph (above). If these popular photographs of Dong in Figures 1 and 2 presented here are actually of two different men so be it. This practice may turn out to be of greater use by China’s intelligence services than anyone outside of the country might have imagined. However, there remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case then in the possible effort to conceal his identity, Dong has done the thing completely.

Concealing an Intelligence Chief’s Identity: Not an Uncommon Practice

The idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.”

Sidelights

If these popular photographs allegedly of Dong in Figures 1 and 2 here are actually of two different men so be it. It may turn out that using decoys may be a practice in greater use by China’s intelligence services than anyone outside of the country might have imagined. Perchance as a result of the Dong defection matter, it has been brought to light to the world all at once. The sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. 

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

A quote from Arthur Conan Doyle cited in greatcharlie’s June 30th post on Dong’s rumored defection might be worth repeating here. In “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in Doyle’s The Adventures of Sherlock Holmes published in the Strand Magazine (1891), his main character, Holmes, states: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

The Way Forward

Omne ignotum pro magnifico. (Everything unknown seems magnificent.) Without pretension, greatcharlie states that it does not have any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causality for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US and other allied intelligence services have doubtlessly examined all of the photographs out there that purportedly include Dong using AI and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how Dong looks, too!

As greatcharlie has noted in previous posts, in our ordered universe, it is expected that everything will follow its design. Order in the human mind is established by patterns that one can decipher. With the smattering of facts, evidence, and insights available, one can still postulate, and see if a theory formulated on what the whole Dong episode was all about can be confirmed by facts through investigation. It may not always be a tidy process. Wary of the moves Chinese intelligence can make, some might contend the matter of the varied images of Dong may actually be part of some recherché plan to create greater mystery around his identity. Imaginably, it would be viewed as a subplot hanging from a greater MSS disinformation plot to foster a bizarre defection rumor. On the other hand, some might go as far as to assert a more fanciful theory such as the leadership of MSS, in an effort to impress Communist Party of China leaders ahead of, and during, the Centennial of the Communist Party of China the decided to provide a modest demonstration of the organization’s capabilities. Thus,, MSS may have decided to have a little fun with US counterintelligence services by “just messing with them” as the saying goes, making certain that Party’s leaders were in on the joke. The whole matter has certainly had quite a meretricious effect worldwide. Of course, such a move would hardly be a schema, and perhaps the last thing one should expect from MSS. Still, though it may be improbable, it is all the same conceivable. One can be assured that similar overimaginative assessments, judgments concerning the Dong defection episode will continue to be made and published primarily online. Their creation will be driven by the fact that for inquiring minds, the curious, the enthusiasts demand more answers on the matter. In Areopagitica (1644), the great 17th century English poet and intellectual, John Milton, explains: “Where there is much desire to learn, there of necessity will be much arguing, much writing, for opinion in good men is but knowledge in the making.”

Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectedly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)

Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago

A most apparent sign of the presence of Chinese intelligence services in Hong Kong is this plaque outside the People’s Republic of China National Security Office there (above). This essay is as a companion piece to greatcharlie’s proceeding essays on Chinese intelligence services. For the scholar who is a regular reader of greatcharlie, the essay will hopefully be an interesting discussion on the function of intelligence services in China with respect to functions of services in the United Kingdom and the US. However, this essay has the additional purpose of serving as a vehicle to assist students. For students, this essay aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels and the development of further insights. Hopefully, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights.

For a one man shop as greatcharlie, reviewing a voluminous quantity of sources in the preparation of the July 31, 2020 and August 31, 2020 posts entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 1 and 2 respectively), was, to a degree, an exercise in large data processing. Yet, while engaging in that consuming, yet satisfying process, the thoughts of greatcharlie’s founder and editor hearken back to an assignment received as an undergraduate at Columbia College, Columbia University in a course “The Politics of Policymaking.” The course instructor, Roger Hilsman (1919-2014), who was also the student advisor and mentor of greatcharlie’s editor, asked students to construct an essay or, as he dubbed it, a “thinkpiece,” in which they were required to present their “observations, meditations, ruminations, assumptions, and hypotheses” that billowed up after reading a primary or secondary source directly related to a foreign and national security policy topic covered in his class. (The source greatcharlie’s editor used, at the suggestion of Hilsman, was Glenn Paige’s The Korea Decision (June 24-30, 1950) (Macmillan, 1968).) However, Hilsman’s goal with the assignment was to encourage students to move away from simply regurgitating what was studied and writing the derivative college essay. Instead, he wanted students to evoke thoughts from their respective sources and lessons but also from personal experience, and their albeit youthful worldview, and draw from them their best insights on the topics they chose. For Hilsman, a phenomenal educator, the assignment was not founded upon some understanding of the requirements of analytical work in international affairs developed in the abstract, but rather, developed upon substantial experience preparing his own analyses and supervising and mentoring subordinates and colleagues in their analytical work in the US military, intelligence, and diplomatic arenas; real world! More specifically, Hilsman’s background included: studying at US Military Academy; service in Merrill’s Marauders and command of an Office of Strategic Services guerilla warfare battalion in Burma in World War II (Hilsman’s valorous service is superbly related in his memoir, American Guerilla: My War Behind Japanese Lines (Brassey’s, 1990)); his work as a military planner for NATO and the Supreme Headquarters Allied Powers Europe; service in the administration of US President John Kennedy as Director of the Bureau of Intelligence and Research for the US Department of State; and, service as Assistant Secretary of State for Far Eastern Affairs in the administration of US President Lyndon Johnson.

Hilsman would not only transmit his sagacity through his “The Politics of Policymaking” course, but through discussions on policymaking and analysis that he had with students during seminars held at his residence were marked not only by the inspiration and encouragement he would give to students in their research and career plans, but also by a frankness and realism that would give them a leg up in future endeavors. The reminiscences Hilsman would share directly with greatcharlie’s founder and editor during office hours were from those periods of his life that are perhaps the most intriguing in his biography. During lectures, he would always provide a riveting anecdote from his experiences during the 1962 Cuban Missile Crisis to accompany his “pearls of wisdom.” The student-teacher relationship between Hilsman and greatcharlie’s founder and editor was mentioned in a March 8, 2016 greatcharlie post entitled, “An Look at Stephen Marrin’s ‘Improving Intelligence Studies as an Academic Discipline’ and Remembering a Professor and Friend, Roger Hilsman.”

For student readers, this essay, divided into three segments, aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels, and to stimulate the development of further insights. Hopefully, by focusing on the topics discussed, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights. The essay also aims to foster conscious critical reading of scholarly works by student readers. Some emphasis is placed on the sources themselves. Hopefully, reading about spies and spying makes this unsolicited bit of mentoring all the more interesting. For scholars who are regular readers of greatcharlie, the aim of the essay is to provide an edifying discussion on the function of intelligence in China relative to intelligence functions in the United Kingdom and the US. This essay also stands as a companion piece to greatcharlie’s preceding essays on Chinese intelligence services. While as a thinkpiece this essay may be limited in scope, greatcharlie surely has not touched bottom of its well of ideas on the subject of Chinese intelligence services. For greatcharlie, this “multipurpose” essay is only a part of its process of worming out the story of Chinese foreign intelligence and counterintelligence. Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.)

MPS officer finger-wags a warning to photographer in Beijing (above). Except for experienced hands on China policy and the Chinese intelligence services and national security via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, is responsible for foreign intelligence, counterintelligence, and internal security as well.

I. MPS and MSS: Keystones of Chinese Intelligence

Two relatively quiet but absolutely key elements of the Chinese government that impact its foreign and national security policies: the Ministry of Public Security (MPS) and the Ministry of State Security (MSS). Except for experienced hands on Chinese foreign and national security policy and Chinese intelligence services via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems firstly through providing consumers in Beijing of analyzed information to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, government ministers, senior executives of relevant ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions. They additionally share what is collected and analyzed with the People’s Liberation Army (PLA). At times, that information is also collected and analyzed with the help of the military. The impact of the MPS and MSS is also demonstrated through contacts their officers and operatives respectively have daily with officials and staff of foreign governments as well as personnel at all levels of Chinese and foreign businesses engaged in international trade, high-tech-firms, defense contractors, financial institutions, academia, and organizations from all fields in China and worldwide.

The true foundations for MPS and MSS were laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Mao Zedong thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces in 1949, a full array of government intelligence organizations were created to supplement Party-based intelligence services such as SAD. CDSA would draw information from foreign news agencies and open sources.

The Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a Deputy Chief of Staff to People’s Liberation Army (PLA) Chief of Staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. According to Xuezhi Guo in China’s Security State: Philosophy, Evolution, and Politics (Cambridge University Press, 2012), it took on the role of a security service in a manner based on Soviet and Eastern Bloc models. It eventually received responsibility for all aspects of security, from regular police work to intelligence, counterintelligence, and the suppression of anti-Communist political and social groups. That led to receiving  official jurisdiction over counter subversion, counterintelligence, and the conduct of espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. 

MPS made its way through the turbulent 1960s with the Cultural Revolution and dynamic changes in politics in the 1970s with the loss of Mao and the coming of Chairman Deng Xiaoping. By 1983, there was considerable frustration within the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to a new organization known as the Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS. The Communist Party of China’s first big mission for MSS was to place focus on students in both China and abroad. Students had left no doubt that there was reason for the Chinese leaders to hold such concern after the Tiananmen Square protests. Chinese leaders struggled to deal with fallout from it. The sense of danger that students posed to the country was promoted with the announcement by Chinese authorities that some 200 Chinese had been accused of spying for the Soviet Union. When the reorganization of MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak.

In the West, certainly the most significant, largest, and most powerful intelligence services reside in the US. However, the foundational intelligence services that was the model upon which the main US intelligence services have been based–as well as the services of many other countries–are those of the United Kingdom, namely the Security Service, known popularly as MI5, and the Secret Intelligence Service, known popularly as MI6. To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. Two prominent works, central to the discussion here, are Christopher Andrew, Defend the Realm (Knopf, 2009) and Stephen Dorril, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000). Both scholars undertook Herculean tasks respectively and managed to fulfill them marvelously and masterfully. Both texts respectively hold richly textured accounts of intelligence activities at home and around the world, the British Empire as it still was for a time in the 20th Century. Both are major contributions to the scholarship on intelligence in the United Kingdom.

A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. Plainly, there is no moral equivalence between MI5 and MI6 and their opposites, MPS and MSS. What the United Kingdom and Chinese intelligence services would call successful operations based on the respective goals of political authorities are quite disparate. Officers of the respective countries’ intelligence services are certainly not birds of a feather. Additionally, and importantly, MI5 and MI6 are the opponents of MPS and MSS, and visa-versa. Enlarging on the point of the political authorities they obey, the respective societies and political authorities, that the intelligence services of the United Kingdom and China serve, are considerably divergent, and founded on disparate philosophies. The United Kingdom is a parliamentary democracy under a constitutional monarchy. Despite having the structure, the veneer, of being a multiparty system at the national level, for all intents and purposes, China is a single party, Communist, police state. 

Quaeritur belli exitus, non causa. (Of war men ask the outcome, not the cause.) At a basic level with regard to intelligence services, moral principle and philosophy, in this case whether recognized as being based on Judeo-Christian values, Liberalism, Capitalism, Communism, Socialism, Maoism, or otherwise, is not method. Method is method. Philosophy is philosophy. Moreover, in the intelligence industry, results are what matter most. To that extent, at the basic level, the work of the two services are going to have sufficient likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here. With this in mind, hopefully scholars will be open to considerations presented.

Two MPS officers operating high-tech optical equipment in Beijing (above). To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. at the basic level, the work of the two services are going to have enough likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here.

Using MI5 as a Yardstick to Gauge MPS and Its Activities

The Security Service, known informally and hereinafter referred to in this essay as MI5, is the United Kingdom’s government agency assigned with managing the country’s internal security. It is authorized to investigate any person or movement that might threaten the country’s security. Although MI5 is responsible for domestic counterespionage, it has no powers of arrest. MI5’s motto is: Regnum Defende (Defend the Realm). The Secret Intelligence Service, known informally and hereinafter referred to in this essay as MI6, is the United Kingdom’s government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. MI5 has only a few thousand employees. It is headquartered in London, at Thames House. MI5 is a component of a vast intelligence apparatus in the United Kingdom. Reportedly, command and control is directed via no less than four entities: the Central Intelligence Machinery, the Ministerial Committee on the Intelligence Services, the Permanent Secretaries’ Committee on the Intelligence Services, and the Joint Intelligence Committee. Communications intelligence is the responsibility of the Government Communications Headquarters (GCHQ), which works closely with the Communications Electronics Security Group, while a number of agencies manage military intelligence under the aegis of the Ministry of Defense. Even London’s Metropolitan Police, or Scotland Yard, has its own Special Branch concerned with intelligence.

While MI5 is the agency responsible for the internal security of the United Kingdom, it primarily provides security services and intelligence operations within England and Wales. Its current role was best expressed by the Crown Minister in 1945, with regard to its postwar raison d’être: “The purpose of the Security Service is defense of the Realm and nothing else.” MI5 reports to the Home Secretary of the Home Office. It may be confused as being a domestic law enforcement organization, but it is far from that. To perform the internal security function, MI5’s activities include: domestic counterintelligence; counterespionage; counterterrorism, counterproliferation, and cyber work within the country and protective details for many top government officials. Its officers do not have authority to arrest citizens. When needed, MI5 will work in close cooperation with London’s Metropolitan Police Service (headquartered at New Scotland Yard) and other local police agencies within England and Wales. This is especially when it concerns their efforts to fight domestic terrorism. MI5 may also interface with MI6 when foreign intelligence and domestic intelligence activities intersect.

It cannot be overemphasized that MI5 is a secretive organization. Well back in 1931, the firm instruction to a new employee was: “No one, not even our own families, should be told where we worked or for whom.”  The existence of MI5 was not acknowledged officially until 1979, when Mrs Thatcher unmasked Sir Anthony Blunt as the Fourth Man in a statement to the House of Commons. Its head was publicly named for the first time in 1991. It was also at that time when some previously classified information about MI5, such as the number of its employees and its organizational structure, was made public. During the past three decades, MI5 worked its way through a number of scandals–to include incessant hunts for apparently nonexistent moles–that further tarnished its reputation in many circles. Reflective of British culture, members of the intelligence services, from top to bottom, were unwilling to display any disappointment or hurt and never looked to cry on anyone’s shoulder. They remained reticent about attitudes toward them and placid, straightforward, as they performed their work. Somewhere along the line, a solution was found. The decision was made to release their stories, not to drain themselves out, but let little bit find its ways into the public marketplace to unmask appearances public relations-wise. Through the use of surrogate voices, a sudden fracture in the marble reveals the interior. The inner life. Studies were commissioned to tell their stories, to the extent possible.

Most relevant in Andrew’s Defend the Realm to the examination of MI5 in this essay, are anecdotes loaded with insights on events that were in their time of the utmost importance. Those cases chronicalized, carefully selected from MI5’s storied past, and detailed the complex nature of MI5’s modern day work is revealed. Additionally, from Andrew’s work, one receives a picture of MI5 as a tightly-knit institution, in which many officers keep body and soul together, and others actually thrive, in its atmosphere of secrecy. Based on what has been made public, in an investigation of a threat to the United Kingdom, MI5 officers will usually seek to gather covert intelligence directly. Often, they operate openly and declare themselves as representatives of foreign intelligence services to their host country. The methods used by MI5 officers vary widely, and are often limited only by their ingenuity. Armed with a suite of the latest high-tech tools for surveillance, they will use it to eavesdrop, tap telephone calls and communicate secretly. Normally, MI5 officers will recruit spies to obtain intelligence on their behalf. 

More formally, a spy working for MI5 is known as a “covert human intelligence source,” but in the United Kingdom, spies are more commonly referred to as agents (Interestingly, in the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), a covert human intelligence source is called an “informant” rather than an “agent.” Such agents have been consistently referred to as operatives by greatcharlie.) MI5 agents will do far more than just inform about people and events. Agents secretly provide private information to which few or no others might have access, as well as classified information to an officer. An agent will probably not be a professional “spy” but an MI5 intelligence officer will usually provide them with some basic instruction in tradecraft, espionage methods. The human relationship between intelligence officers and their agents remains a key element of espionage.

MI5’s earliest precursor was a secret service formed in 1569 by Sir Francis Walsingham, who later became secretary of state to Elizabeth I. What came to be called MI5 was formed in 1909 under the leadership of Vernon Kell, then a captain in the British army, to identify and counteract German spies then working in the United Kingdom. It performed that task with great effect. MI5 originally stood for “Military Intelligence [Department] 5.” (In fact, there were a number of departments within the Directorate of Military Intelligence–MI1 through MI19–which dealt with a range of issues. MI1, for instance, was responsible for code-breaking, and MI2 handled Russian and Scandinavian intelligence. The responsibilities of these departments were either discontinued or absorbed into The War Office, MI5 and MI6 and, later, the Government Communications Headquarters.) After World War I, MI5 remained in place as part of the United Kingdom’s effort to centralize control of intelligence functions. In 1931, MI5 was renamed the Security Service, but was still commonly known as MI5 then as it is today. About the time it was renamed, MI5 was paired with MI6, under the Defence Ministry and functioned with a “combined staff” of only two men. Kell, MI5 founder, remained in charge of the agency until 1940. During World War II, with far more staff, MI5 enjoyed a considerable number of successes. One was the Double-Cross System, which fed disinformation to Nazi Germany. For the most part, however, it is recognizably difficult to measure MI5’s success, since it can only be judged by things which do not happen, such as the prevention of sabotage. 

There was initial period of confusion at the start of World War II as a MI5 was inundated with work and had too few staff at all levels to handle it. Missteps led to “life-saving” reforms with the coming of Sir David Petrie in April 1941. MI5 is better known in the war as having achieved great success in uncovering Nazi agents in the United Kingdom. Captured Nazi records studied after 1945 indicated almost all of the Nazi agents working against the United Kingdom were captured. The exception was ine the committed suicide. MI5 managed to recruit a number of the enemy agents to become counterespionage agents for the service and fed false information to the enemy concerning military strategy during the war. MI5 executed the famous “Double Cross” system which was a deception that supported the success of the D-Day Invasion at Normandy in 1944. A proud episode for MI5 was its defense of Gibraltar from enemy agents and saboteurs throughout the war.

MI5 engaged in a hard fought struggle with Soviet, Eastern Bloc and Chinese espionage efforts in the United Kingdom. The situation was made more difficult was the rise in IRA terrorism during the Troubles. One MI5 renowned victories was its uncovering of Soviet Union’s most valuable agents was exposed. However, MI5’s record during the Cold War, actually was mixed. There were a number of widely publicized blunders during that period. The Soviet Union was found to have deeply penetrated MI5, as well as MI6 which reportedly undermined the public’s confidence in the organization.

Low morale reportedly plagued MI5 after the end of the Cold War and the Good Friday agreement of 1998, which led to massive cutbacks. The agency’s focus would eventually shift after the Cold War from counter-espionage and counter-subversion to counterterrorism. That shift was given greater emphasis following the September 11, 2001 terrorist attacks in the US, and counterterrorism became a role of the utmost importance following the July 7, 2005 and July 11, 2005 terrorist bombings in the United Kingdom. MI5’s ranks were filled out rapidly, and within it was a renewed sense of purpose. Today, counterterrorism operations still account for much of MI5’s activities. 

Not all of the anecdotes that Andrew offers spotlight the valor of its officers. There are some of the rather lurid intrigues. They include a cast of cheats, schemers, supplanters, unsavory allegiances, and unimaginable acquaintances. One dare not imagine the sensibilities of the errant individuals behind them. In the discussion of the work done within the analytical shops of MI5, the finer shades of analysis and deduction are spotlighted. Information was looked upon pathologically as the source of motives, clues, indications, and implications. With that analyzed information, MI5 leaders would speak truth other power, whatever it came upon, no matter how offensive, it was told straight.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

Intelligence Work of MPS

If one placed the history of Chinese intelligence alongside that of the United Kingdom, one would find that the craft of intelligence was studied in China long before the idea of formally organizing intelligence activity was manifested in 16th century England. The most illustrious expressions of intelligence concepts and methods in China was in Chapter 13 of The Art of War, a treatise dating from the 5th century by the Chinese military strategist Sun Tzu. Chapter 13 focused on the importance of developing good information sources, and identified five specific types of intelligence sources along with ways to best manage each. However, the lineage of modern Chinese intelligence services,  as noted earlier, have more recent beginnings in the era of Mao. Similarities between MPS and MI5 exist insomuch that it is the Chinese intelligence service charged with internal security and domestic counterintelligence activities of China. It investigates and acts against any person or movement that might threaten China’s security, but unlike MI5, its officers have the power to arrest. In addition to its performing those standard domestic functions as an intelligence service, MPS is very much tied to the Communist Party of China to maintain control of the population and maintain the Communist order. To that extent, it has remained obedient to the ever shifting requests and requirements the Party issues to it. To be more specific concerning the responsibilities of MPS, they include: preventing, stopping and investigating criminal activities; fighting against terrorist activities; maintaining stability and order; administering to transport, fire fighting and dangerous objects; administering to household registration, identification cards, nationality as well as entry, status and exit of Chinese and foreign nationals; maintaining border security; protecting persons, venues and facilities as designated by the state; managing gatherings, parades and demonstrations; supervising public information networks; supervising security concerning state organizations, social organizations, enterprises, institutions, and large construction sites; and, guiding community security commissions.

The Communist Party of China has hardly proven to be pristine in practicing what it preaches. What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. Normally, finding the truth is sine qua non among intelligence and counterintelligence services, and law enforcement. To fail to find the truth, well-aware that one holds a paucity of facts, information and data, is to fail oneself. Naturally, being aware of the existence of information that contradicts one’s initial hypothesis and doing nothing to dig deeper is counterintuitive.  Having stated that, in the intelligence industry, the slightest deviation from the course ordered on an investigation to satisfy the requirements of the powers that be throw the rules out of the window. However, when tasked directly by the Communist Party of China, the truth lies in what the Party says the truth is. If MPS officers were to present findings from an investigation that held information contradicting the truth as declared by the Communist Party of China, they would unlikely garner understanding from their respective national provincial, or municipal senior executives and managers. In the best case scenario, the ironic admonition might come from on high to stick with the primary problem instead of rooting around at “extraneous matters.” That is the type of relationship that Chinese intelligence services have had with the Communist Party from their very beginning. They are charged with the responsibility for ensuring the tranquility of order. From outside of China, one can freely call the well-experienced intelligence officers who fill the ranks of MPS as tragedians, specializing in a very tragic role for their country.

Manifestations of Political Pushes from Behind in MI5’s Past

In examining MPS, it cannot be stressed enough that it is a political creature of the Communist Party of China. MI5’s circumstances are not remotely similar. MI5 is not an organization designed intrinsically to service the political interests of political authorities. However, there have been occasions when political authorities have misused the vital security arm by using pressure to influence its actions, for purposes that were questionable. Shockingly, the MI5 carried out secret surveillance of the colonial delegations which came to London to discuss terms for independence in the 1950s and 1960s. Andrew gives a disturbing account of the stealthy gathering of intelligence on the delegates attending conferences which negotiated the independence of Cyprus and Kenya. The Home Secretary, Rab Butler, cynically condoned these operations on the grounds that “obviously the product was of great importance and of great value to the government negotiators”.

In most of the British Empire, claims Andrew, MI5 contributed to a smooth transfer of power through the work of its liaison officers. However in Guyana, where United Kingdom Prime Minister Sir Winston Churchill wanted to “break the Communist teeth,” a shameful exception was witnessed. MI5 obediently provided support for the United Kingdom and US covert action to oust the democratically-elected Cheddi Jagan from power. Andrew claims that the dominant intelligence agency in the years leading up to Guyana’s independence in 1966 was the Central Intelligence Agency (CIA). However,  MI5, and thereby the government of the United Kingdom, nevertheless had a hand in the affair. 

In the present day, such outcomes are certainly not intended in MI5, an organization tasked and trusted to protect and serve the United Kingdom. To ensure that remains so, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. The Home Secretary oversees MI5, as well as the National Criminal Intelligence Service and Scotland Yard. To the extent that there is always the need for such a degree of oversight from above, one must never overlook the shadowy side of the business. It is at the core of intelligence work. There is a reality that by doing the dirty work, the people of the United Kingdom are allowed to sleep peacefully at night. When the situation is dire and urgent enough, use has been made of agent provocateurs who may take direct action to maintain their bona fides within their groups for the organization’s purposes.

Today, officers join and serve MI5 with the belief that its work has much to do with the wider good. As the targets of MI5 efforts are the terrorists or the war criminals or the nuclear proliferators. There is an understanding how the need to approach a matter of the utmost importance with the most effective method available can subordinate all else. Whether or not exigent circumstances permit, there at least exists the earnest aim among them to defend the values of the United Kingdom’s liberal democracy. Unlike its counterpart in the Chinese intelligence services, MPS, causing harm to the free people of their own country, who are living within the law, is never the intended purpose of MI5. Indeed, while also ostensibly tasked and trusted to protect and serve the people of their country. MPS keeps a boot not only to the neck of criminals and true threats within China, but of groups of innocent citizens labeled as undesirable by the Communist Party of China, and doing that appalling work at the Party’s behest, to be frank, could be ascribed as an essential part of their raison d’etre.

Other Ugly Truths

As long as humans are involved in an organization and its plans and activities, rarely will outcomes be perfect. It could be expected to be imperfect shaped by mistakes, misjudgments, biases, and emotions. To that extent, there is no purpose here to establish MI5 as a paragon of moral behavior. In its history, mistakes were made. Pointing to them means admitting to the truth. (Interestingly, the historical record indicates the nearly contemporary national intelligence service has suffered from its share of mistakes.) What can be greatly appreciated in Defend the Realm is that Andrew tells the MI5 story straight. The ugly truth as told, creates some disappointment, yet from it, lessons were certainly made available that would allow for the organization’s improvement. According to Andrew, recruitment within MI5 was perhaps the most outward expression of inward thinking in the organization. It was surely not acceptable by today’s standards intellectually, morally, ethically, and professionally. Indeed, within the organization itself, MI5, a public service, did not advertise openly for recruits before 1997. Up to that point, recruitment was based on personal recommendation. This was a narrow social group, many of whom had served in India or elsewhere in the Empire. To that extent, the organization was sure to recruit “from good Anglo-Saxon stock.” Reportedly, male officers listed their recreations as cricket and hunting, while female officers were graduates of elite schools and universities

Right up to the mid-1970s, the post-war Security Service refused to recruit Jews on the grounds that a dual loyalty to both Israel and the United Kingdom might create a conflict of interest. This was “inexcusable,” Andrew rightly observes. There was also a very disturbing attitude taken toward Blacks interested in joining the Security Service. In 1949, then Deputy Director General Guy Liddell told the Joint Intelligence Committee: “It was true that niggers coming here often went to the C[ommunist] P[arty].” That fact that he held such appalling racist views were reinforced when he explained there was no doubt in his mind that “West African natives are wholly unfitted for self-rule.” There was a sour spirit to it all. Yet, that was the spirit of the moment. A sort of “pigs in clover” self-satisfaction influenced and distorted thinking in the world of that past era.

While MI5 was busy keeping some citizens out of its intelligence service, its rank and file was surprised to discover who they had let in. In 1951, as the result of the decrypted telegram of the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, that any of the Cambridge Five–then current or former all MI5 or MI6 employees, who were recruited as spies by the Soviets in the 1930s when they were young misguided Communists at Cambridge University–were identified. The bombshell revelation sent shock waves through the halls of MI5. In response, MI5 initiated an investigation that lasted 30 years in order to get to the bottom of the matter.

Among other unfortunate episodes for MI5 was the “Wilson plot” of the 1970s in which United Kingdom Prime Minister Harold Wilson was accused of being a Soviet agent–the information came from the CIA’s Counterintelligence Division, James Jesus Angleton based on claims of questionable source. MI5 investigated the claims and found them to be false. There was also the “Death on the Rock” case in 1988 in which MI5 with Spanish authorities were alarmed about three members of the Provisional Irish Republican Army (IRA) Belfast Brigade who travelled to Spain. It was presumed that they planned an attack against British troops in Gibraltar. MI5 intended to capture the IRA members with the assistance of the British Army’s Special Air Service Regiment cooperation of Spanish Authorities, but all three were killed in the process.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

The Communist Party of China’s Political Manipulation of the MPS Today

It would appear that the leadership of the Communist Party of China is usually distressed exceedingly when even the mere suggestion is made that some underlying evil is present in the decisions and actions of the Chinese government towards its own people. There is the insistence by the Communist Party of China that it acts only in their best interests and the thinking behind each choice is gifted by what their Western counterparts would call scruple. Thus, when any reports, photos, or videos of the actual treatment of ethnic and religious minorities in China are secreted out of the country and headlined in the West or anywhere else in the world, it is nothing less than an absolute disaster. The belief among Communist Party of China’s leadership and members that China’s Communust society is near perfect and would be best for the world is a belief in a false reality. The prospect of any citizen or any foreigner, unmasking the appearance created by Beijing of China being an advanced industrialized society and superior culture truly seems to terrify the Communist Party of China. Burned rotten by somewhat regular investigative reports and exposé documentaries, written and produced in the West, they, without fail, will attempt to cover their traces rather than spill it out. Government and Party spokespeople will roar about China’s innocence and the false and bizarre nature of what is reported. Trying to figuratively get the toothpaste back into the tube has never worked though. Focusing on what it can control, the Communist Party of China engages continuously in an effort to grease the wheels of citizens thinking to ensure that it always slides in its favor and toward appreciation of the Communist Revolution. To stanch the thickening of misgivings among the Chinese people toward its actions, ever present are warnings to citizens to guard themselves against foreign agents, look upon foreigners with some suspicion, and be cognizant of the possibility of unwittingly giving cause for foreign agents to trace them and spot them as potential recruits as spies and informants through seemingly innocuous contact.

The Communist Party of China has long acknowledged that there is always a threat that could arise from the “unsuccessful” education of Chinese citizens. A symptom of that would be the attraction to materialistic symbols of success for the former bourgeoisie class apparatus of success: business success, homes, cars, things constructed around people. It was what identified them as being above the proletariat, the working class. In China, given its relative prosperity, there exists the fear among leaders of the Communist Party and government bureaucracies that the bourgeoisie existence of the West would insinuate itself in the thinking of Chinese citizens and become a preference in their minds. Any aspiration created for what the West has to offer not under controlled circumstances could figuratively spread among the people much as a virus, infecting the proletariat, potentially creating some mass disaffection toward the system. Perhaps such sensibilities reveal a secret doubt that Chinese citizens could see that so-called ideals of Maoist Thought and Marxist-Leninism had been betrayed or perhaps were simply Utopian, and that they would desire great changes. Communist Party of China leaders determined long ago that the response to this threat needed to be strong enough to match “the severity of the disease.” 

As part of its efforts at population control, the Chinese government insists that the people keep a watchful eye over threats to the new system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema. It was in the performance of the mission to discourage, punish and obliterate that threat that the MPS earned a reputation for being the horrifically oppressive cats paw of the authoritarian regime. The MPS has interfered in interactions and relationships between citizens, ordered citizens to spy on their fellow citizens, demanded that they betray one another, regularly performed intrusive and demeaning searches of citizens’ person, homes, and workplaces. There have been arrests of many innocent citizens, accompanied by abusive and endless interrogations. The shadow of sudden death hangs over the head of any individual in MPS custody.

As of late, what should be of greatest concern is the approach the MPS has been taking toward foreign visitors. (The matter is elaborated upon later in this essay.) As a practice, foreigners, especially, Westerners, are closely observed and often investigated by provincial offices and local MPS stations. Under such circumstances, there is always a real possibility that one might be arrested or “briefly” detained for questioning, would be created. Foreign visitors who have faced such treatment have almost immediately become the center of a frightful international incidents, which is actually the goal of Chinese authorities. Regardless of one’s status in the US, it can happen in China. Reportedly, the attempt has been made with some foreigners to persuade with the pressure of interviews, interrogation, and detainment or use certain manipulations to convince them to let themselves go and reveal “the truth.” Telling the truth would mean copping to preconceived ideas held by their interrogators about their alleged wicked missions against the People’s Republic of China. The treatment of Chinese citizens detained by the MPS for even lesser “offenses,” is always decidedly worse.

The Beijing Municipal Public Safety Bureau Office Building (above) MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. Assessments of what type of temptations could be used to bring them to China’s side will be based on observations of the foreigner’s lifestyle. MPS officers have no qualms about exploiting individual weaknesses.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) Spin concerning the maltreatment of ethnic and religious groups is propagated through narratives in the state-run news media of how much the Communist Party of China is doing to protect China from enemies, domestic and foreign, at the hands of which the Chinese people have suffered for so long. Nevertheless, a good number of Chinese people are aware that one cannot know with certainty what is real from what one hears from the government. However, holding a secret doubt about the system in China can lead to a solitary despair. The secret doubt becomes dissatisfaction with one’s work and one’s situation which can become a full-blown loathing of the system. Soon after may come the rejection of authorities. In response to conditions forced upon them, being subjected to humiliations, Chinese citizens of some ethnic and religious minorities have acted in protest, releasing a sense of frustration. Becoming vocal may relieve his sense of frustration for the moment will only open the door to far greater problems. To Chinese government authorities, it represents nothing less than a social dissembling within those groups.

Loyal Communist Party members can hardly understand that any other citizen’s disillusionment or disappointment in government efforts to respond to their needs could be based in logic. Thereby, the attitudes of those citizens are irrational and reactionary. Surely, those approached by MPS display intense emotions, very likely overwhelmed by great fear and sheer terror, given an expectation the worst will befall them given the organization’s reputation, would avail themselves to be apprehended and held indefinitely as their situation would immediately be converted into a psychiatric issue. After all, any charge will do. The goal is to cull the so-called threatening population by plausibly arresting benign citizens and warehousing them away from their homes. One can only imagine that it would mean for those declared to have psychiatric issues to be placed in the hands of medical professionals linked to the MPS. MPS officers are apparently not timid to draw very false, aberrant, far-fetched inferences from fact collected during investigations. Of course, no professional ethics, no moral principles founded upon religion, and no less spiritually based philosophy of humanism could not obstruct such actions. Ethnic and religious minorities must feel akin to big chickens in a world of foxes.

A principle is a precise standard, a course of conduct you are committed to, a way of life that you live by. Adherence to principles, has little meaning to the Communist Party of China unless the principles adhered to are those of the Party. Publicly available sources show that Beijing considers Falungong, Tibetans, Uyghur Muslims, democracy activists and pro-independence Taiwanese undesirables as they adhere to principles and a way of life adverse to that insisted upon by the Communist Party of China. They have been named the “five poisons” that constitute the greatest threat to Beijing’s rule. Tibetans, Uyghur Muslims, in particular, are essentially looked upon as vindictive ill-balanced creatures of China’s hinterland.

As noted here MI5 unfortunately has a record of past mistakes and poor judgment, too, and fortunately from that history, lessons have certainly been learned. Yet still, making mistakes and misjudgments is a far cry different from being deliberately bad, acting the name of injustice and engaging in cruelty, based on a contrived motive and without any reasonable provocation. MPS currently engages in activities which, not to apportion wickedness, manifest just how different the two intelligence services really are. MPS, as an organization, espouses great anger about ethnic and religious minorities, dubbing them activists, reactionaries, counterrevolutionaries, and terrorists, and for the sake of the Communist Party of China and the Communist Revolution, has done what it does best, acted aggressively toward such “threats.” If one is of a ethnic group or religious groups at variance with the Communist Party of China, and consequently under the thumb of the MPS, one will have the sense of being in contact with an evil of an exceptional nature. In recent years, egregious abuses have increased through government policies under the pretext and justification of fighting the “three evils” of “ethnic separatism, religious extremism, and violent terrorism.” 

Tibet is an autonomous region in the People’s Republic of China. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability. Omnis enim ex infirmitate feritas est. (All savageness is a sign of weakness.)

Tibetans detained by MPS officers facing judgment in court (above). China has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability

Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.” A commonality among the homelands of the different ethnic and religious groups in China is the fact that they are depressed regions with unemployment, poor infrastructure and many structures tumbled down. Interdum volgus rectum videt, est ubi peccat. (At times the world sees straight, but many times the world goes astray.)

Regarding religious minorities, during the first thirty years of its existence, the Communist Party of China committed itself to making atheist Marxism the fundamental ideology of the country. depriving the Chinese people of their constitutional right of religious liberty. There is a clarity and certainty that comes from being able to know another’s origins. One place to look to identify, research, is to study a the  of culture, history, customs, that may shape the subject’s attitudes and behaviors, worldview. Adherence to religion, culture and identity as well, stiffens resistance to authoritarian pressures and coercion, and girds uncommon perseverance. To that extent, the Communist Party of China surely fears citizens’ adherence to their religions and cultures, and the rejection of Communism. In response to that threat, Beijing has formulated and implemented new policies, regulations, and legislation impacting religious freedom have been created and implemented, particularly since 1979. The idea of it all being to surgically strip citizens of their ethnicity, culture, and religion, thereby smother the individual’s identity, leaving the individual with nothing to grab onto, except Mao’s teachings on Chinese Communism. In the report of the US Congressional Executive Commission on China (CECC), 2017 Annual Report 127 (October 5, 2017), it is noted that Chinese authorities commonly prosecute Falun Gong practitioners under article 300 of the People’s Republic of China Criminal Law. That information was found on the official Chinese government “anti-cult website.” In February 2018, a woman in Beijing was convicted of “using cult organizations to obstruct the enforcement of laws” under article 300 of the Criminal Law. The woman was sentenced to one and half years in prison and a fine for publicly advocating “the evil cult Falun Gong.” Falungong, essentially an anti-Communist China spiritual group, was banned by Beijing in 1999, having been labeled an “evil cult.”  In 2014, a leader of the Church of Almighty God, a quasi-Christian group also known as Eastern Lightning, was also convicted of “using cult organizations to obstruct the enforcement of laws” and sentenced to four years in prison. That church is now officially banned.

Reportedly, MPS has detained or otherwise restricted the freedom of Catholic leaders in both the underground and official churches. The government has reportedly pushed for Chinese Catholic bishops to be selected through the patriotic religious organizations and then ordained by Chinese bishops without the involvement of the Holy See. Chinese officials have also reportedly subjected Protestant Christian beliefs and practices to a wide range of restrictions. Beijing reportedly pressured unregistered house churches to join the officially recognized religious organization, the Three-Self Patriotic Movement. Protestant house churches faced raids during church gatherings, eviction from meeting spaces, and official bans on worship. Martin Luther King, Jr. said that “The moral arc of the universe bends toward justice.” While that may be true, it surely has not bent so much in China’s direction yet. Iniqua nunquam regna perpetuo manent. (Unjust rule never abides continually.)

Uyghur citizens seated in formation in a detention center (above). Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.”

II. The Role of the MSS in China’s National Security Bureaucracy

As aforementioned, Chinese intelligence services, in terms of task and purpose, work within an authoritarian government and must be viewed as a different kettle of fish than the services of the United Kingdom. Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, MSS senior executives and managers have now figuratively declared “game on” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. By conventional wisdom, one might proffer those are its priorities. It is surely what Beijing wants now and it is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined than ever before. As previously mentioned, Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. That was a mistake. Central to greatcharlie’s understanding of China’s intelligence services and their activities are the writings of Peter Mattis. Since leaving the CIA where he was a highly-regarded analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis’ writings evince an appreciation of the depth of thought, organization, and planning Chinese intelligence services have put into building up their organizations and conducting operations in all areas. To that extent, he proffers that the West as of late has been facing very modern, competitive Chinese intelligence services that make use of tactics, techniques, procedures, and methods at a level equal and in some cases far more competitive than those of Western intelligence services. As he explained in a September 2012 article in Studies in Intelligence entitled, “The Analytical Challenge of Understanding Chinese Intelligence Services,” Chinese writings on intelligence bear remarkable similarity to familiar US definitions of intelligence functions and goals. He reminds that Sun Tzu taught that “foreknowledge” (xianzhi) allowed commanders to outmaneuver opponents. However, he notes more modern definitions range from “activating [catalytic] knowledge” (jihuo zhi-shi) to information to protect national security, domestic stability, or corporate interests in a competitive environment. Mattis goes on to state that Chinese military scholars today frame intelligence as a distinct subset of knowledge, defined by its relevance to decision makers and a competitive environment. Specifically, intelligence is transmittable (chuandi xing) and is knowledge that satisfactorily (manzu xing) resolves a specific decisionmaking problem. He further asserts that empirically, Chinese intelligence officers consistently have demonstrated the use of widely practiced professional tradecraft, having successfully exploited for political and military intelligence purposes agents with vulnerabilities familiar to anyone who follows the subject.

The Minister of State Security, Chen Wenqing (above). Chinese intelligence services target a broad range of national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities of the United Kingdom, the US, and other advanced industrialized countries. Lately, the chief feature of the intelligence war between those countries and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims.

Using MI6 as a Yardstick to Gauge the MSS and Its Activities

Everyone on the outside has their own version of what MI6 is and does. Looking at MI6 as a yardstick to understand the MSS, the two organizations pair up to the degree that both are foreign intelligence services. The United Kingdom’s MI6, formally the Secret Intelligence Service as mentioned previously, is the government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. It is also charged specifically with the conduct of espionage activities outside of the United Kingdom’s territory. The MI6 motto is Semper Occultus (Always Secret), but the organization states as its mission: “We work overseas to help make the UK a safer and more prosperous place.” Much as MI5, MI6 has only a few thousand employees. It is headquartered in London, at Vauxhall Cross. It is a component of the same intelligence apparatus in the United Kingdom as MI5. 

MI6’s four main areas of focus are: countering international terrorism, combating weapons proliferation, supporting stability overseas and securing the United Kingdom’s cyber advantage. Countering international terrorism means exactly that, protecting the United Kingdom from terrorists. Performing that task entails: gathering and assessing intelligence; conducting investigations and disrupting terrorist activity; preventing people from becoming terrorists; and, protecting critical national infrastructure and crowded places. Through gathering intelligence and disrupting operations, MI6 plays an indispensable role in the United Kingdom’s counter weapons proliferation efforts directed at combatting the international proliferation of chemical, biological, radiological and nuclear weapons. Working in cooperation with key national and international partners as the US, MI6 also helps to ensure that the United Kingdom’s weapons exports never fall into the hands of terrorists. Instability and conflict overseas leads to weak governments and poor national security, and nurtures a fertile environment in which terrorists and organized crime groups can thrive. Using agents, the MI6 provides intelligence to government policymakers and decisionmakers and provides early warning indications of potentially hostile threats. Most often that information can lead to early political intervention to prevent prolonged instability. Cyber threats are a key security risk to the United Kingdom, as they have the potential to disastrously impact individuals, organizations and governments. Global and ever becoming increasingly complex, cybercrime has the unusual characteristic of having the potential to rear its ugly head and reach out from anywhere in the world. The MI6 provides secret intelligence to help protect the UK from current and emerging cyber threats across a range of adversaries such as hostile countries, terrorists and criminals. Additionally, MI6 conducts counterintelligence operations via a furtive counterintelligence section, but it is generally understood that the organization shares that work with MI5.

In order to meet the challenges of their work, MI6 officers are highly trained in the tactics, techniques, procedures, and methods of their profession. Within intelligence services, as noted earlier, it is referred to as tradecraft. High on the list skills learned and honed are espionage techniques and the use of agents. Often MI6 officers may operate openly in their host country, declaring themselves as representatives of the United Kingdom’s foreign intelligence services. Otherwise they will work covertly under the cover of other official positions such as diplomatic staff or trade delegates. Some MI6 officers may operate under non-official cover to conceal the fact that they work for an intelligence service. That usually entails posing as a business person, student or journalist for example. In some cases MI6 officers will operate under “deep cover,” meaning they will use false names and nationalities. In the intelligence industry, such officers operating under such cover are referred to as “illegals.” They operate without any of the protections offered by diplomatic immunity. MI6 officers typically seek to establish networks of agents whom they can use over a sustained period of time, so that they can obtain a reliable flow of information. As it was stated in the aforementioned discussion on MI5 agents, MI6 agents operate by exploiting trusted relationships and positions to obtain sensitive information. They may also look for vulnerabilities among those handling secrets. They may be aware of flaws in their organization’s security that they can exploit. Recruiting agents, both foreign and domestic, who can provide intelligence on terrorist plans and organizations is of the utmost importance to MI6 officers.

MI6 was constituted in its present form in 1912 by Commander (later Sir) Mansfield Cumming as part of the United Kingdom’s attempt to coordinate intelligence activities prior to the outbreak of World War I. In the 1930s and ’40s it was considered the most effective intelligence service in the world. Following the rise to power of Adolf Hitler in Germany, MI6 conducted espionage operations in Europe, Latin America, and much of Asia. When the US entered World War II, MI6 helped to train personnel of the US Office of Strategic Services (OSS). As mentioned, it was the organization in which Hilsman served. Much of OSS’ foreign intelligence and counterintelligence tradecraft was adopted from MI6. Indeed, the CIA still uses much of it today. Reportedly, many “old boys,” veterans of the OSS are fond  of saying, “The Brits taught us everything that we know, but certainly not everything that they know.” The two organizations worked closely during the war. MI6 has since cooperated extensively with the OSS’s successor, the CIA. MI6 senior executives, managers, and officers refer to the US intelligence organization the “American cousins.” Details of MI6 operations and relationships have rarely appeared in the press. In the mid-1950s, the public reacted with consternation when it was revealed that MI6 had been penetrated by double agents who had served the Soviet Union since the 1930s. It was not until the 1990s, that the head of MI6 was publicly named for the first time. Still, information about MI6 is still much more closely guarded than that about MI5, which carries out internal security and domestic counterintelligence activities. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. MI6 reports to the Foreign Office.

Stephen Dorril’s work, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service, is a true reflection of the organization, its people and its history, what it has done and where it has been most influential . Dorril, a meticulous observer and chronicler of the security services, demonstrates an understanding of everything one might have thought about MI6. Through the text, readers learn that MI6’s postwar activities were mired in prewar attitudes and practices. Many in the United Kingdom imagined the foreign policy task dividing up the world with US and other global powers. Instead, the preoccupation was the Soviet Union and the Cold War. In chronicalizing the Cold War segment of MI6’s history, Dorril fills the pages with anecdotes of its most spectacular failures, stirring successes, unsavory plots and bizarre missions, the real-life cloak-and-dagger world is exposed. There is a discussion of Operation Stalin, which exploited the Russian dictator’s paranoia and led to the execution of thousands. There is another about the tunnel MI6 dug beneath the Berlin Wall. During the Cold War, in the intelligence war, it seems that there was no opportunity, in the midst of his work against the Eastern Bloc and more the Soviet Empire, to view matters from a broader or humane perspective. Surely, with the benefit of hindsight, it is easy to enumerate all of the mistakes, poor choices that were made. By 1992, influence abroad had been lost in the Middle East, most of Africa and large swathes of Asia. The United Kingdom was not exiled and isolated as some might suggest. It was then and remains a key partner to the US with its superpower status, and often takes lead from the US, the main push was to abrogate the world’s resources. In the post-Cold War era, there was once again a sense, particularly in the administration of US President Bill Clinton of the West’s entitlement to the world’s spoils. That rush to take what was available was intensified by the need to get to what was out there before the People’s Republic of China did. Political power seemed to embrace corporate power. As a consequence, there was the appearance that corporate power was supported by government power. MI6, one of the great information-gathering organizations of the world, was put to that task, placing some strains on the service.

The book presents a well of extraordinary characters. As alluded to earlier, the lion’s share of what was told is meat and drink for those who enjoy spy novels, but it is all real. Yet, in addition the book presents the similitudes of the intelligence industry with profoundly human stories. The world of the intelligence officer is often a dank and grey one, visceral, boring at times. There is a drudgery about agent running. Doing chores in the analytical shops can be tedious. One is invited to understand the suffering and sacrifices of MI6 officers. Prerogatives are surrendered, loves, passions, moral ambiguities, moral compromise. Many officers fall off, finding satisfaction in other professions and pursuits, others engaged in betrayal, a few entered the device with the objective of spying. As with MI5, MI6, as a dynamic, intelligence service, operating worldwide, has a history riddled with complexity. Stories of unpleasantness are even found in Dorril’s authorized study, too! The more counterintuitive these acts are from the past, the more puzzling they are. In such an old, but odd profession, if one finds oneself doing odd things, the hope would be to catch oneself out when one is so far out of bounds that nothing good is being accomplished.

The People’s Republic of China Embassy in Washington, DC (above), home to the MSS resident in the US. Much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness, nevertheless, it is happening. In the recent case of an New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats.

Present Day Focus and Operations of MSS

MSS, as well as other Chinese intelligence services, target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Lately, the chief feature of a defacto intelligence war between West and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims. To understand the intelligence efforts of MSS, one must understand how guIding concepts from Deng Xiaoping led to a decision by Chinese intelligence to make economic espionage an even greater emphasis. Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves. To get an idea of how well the MSS operates, one only needs to consider its ongoing activities in the US. Without the intention of tarnishing or being beastly toward US intelligence and  counterintelligence services, and law enforcement, they have been unable to prosecute a successful, fruitful, and victorious campaign against Chinese intelligence services operating in the US and against US interests globally. Readers might recall from previous posts on the subject, greatcharlie noted that Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. Further, in previous US administrations, particularly in the administration of US President Barack Obama, a somewhat relaxed attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology. The burgeoning threat was apparently not fully discerned or appreciated. 

In response to past US missteps, Chinese intelligence services presumably placed a laser focus upon enhancing and adjusting their approaches to US targets. As a product of their success in recruiting officers and contractors from the US intelligence services, Chinese intelligence services have apparently managed to better understand what the US has been doing to try to recruit Chinese intelligence officers, operatives, and informants is prioritized. To the extent, US intelligence officers and contractors recruited as spies are typically tasked with actions to support Chinese counterintelligence requirements. Doubtlessly, the collection of information on what MSS foreign intelligence has been doing has been insufficiently analyzed in light of information collected on US counterintelligence surveillance strategies and technological capabilities would inspire audits in Chinese intelligence services to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, one must become reconciled with the fact that Chinese spies do not go astray so often.

Foreign Intelligence Operations of MSS

Successful multifaceted activities of Chinese Intelligence services have included: conventional espionage; outright intellectual property theft via corporate and academic institutions worldwide, and cyber attacks. For a good idea of how MSS conducts conventional espionage today, Ryan Clarke, a senior fellow at the East Asia Institute, a Singapore-based think tank, boils it down well in a July 31, 2020 Asia Times article entitled, “The Face of Chinese Spying in Singapore.” Curiously using MSS efforts primarily in the US primarily as an example, Clarke asserts its intelligence operations are highly targeted and tethered to specific state goals. He explains: “These types of operations are quite simple with relatively few moving parts, which is why they are replicable at scale.” To illustrate the variety of targets attacked by MSS, Clarke says: “We’ve seen operations against a range of American targets, from Covid-19 vaccine research to the F-35 fighter jet program.” With regard to the collection effort, Clarke goes on to propound: “The general approach is to establish target priorities and then proceed to collect what appear to be rather innocuous inputs with relatively limited value when viewed in isolation. Sometimes the information may not even be classified. This is done on a massive scale in-country with a parallel synthesis-fusion operation in China itself.” Putting such a massive and energetic effort into perspective, Clarke maintains: “The strategic logic is that, in the aggregate, this massive collection and synthesis-fusion effort will yield unique findings and insights which the Chinese Communist Party can leverage across a range of domains.” The Idea that a massive synthesis-fusion operation exists to mine useful intelligence from piles of information collected was also proferred and the analytical operation was conceptualized in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).”

So far as is known publicly, counterintelligence services of the countries Chinese intelligence services have struck, to include the US, have yet to get to the bottom of their business in their countries in order to put an appreciable dent in their work. One might imagine that trying to spot, intercept, neutralize, and recruit significant numbers of Chinese intelligence officers, operatives, and informants has become an exercise in chasing shadows. This has likely left senior executives and managers of many counterintelligence services in a mute frenzy. For the US, in particular, long gone are the opportunities such as the relatively facile recruitment of the MSS officer Yu Zhengsan back in 1985. Then, when MSS was barely up and running for two years, Yu Zhengsan, a mid-level MSS officer from a well-connected political family, was allegedly aided by the CIA allegedly in escaping China and defecting to the US. Once in US hands, Yu provided investigative leads for US counterintelligence services to capture Larry Wu-Tai Chin, a retired CIA language analyst, who had spied for China since the 1940s. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, US counterintelligence services must become reconciled with the fact that, today, Chinese spies do not go astray so often. That is, there must be nothing so creative that US counterintelligence services are doing or offering to encourage them to do so.

Prior to the coming of the administration of US President Donald Trump, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with defeating China’s operations had no real effect on the course of the administration of US President Barack Obama and Chinese intelligence activities steadily intensified. In response to counterintelligence and cyber defense missteps, Chinese intelligence services seem to have placed a laser focus upon enhancing and adjusting their approaches to US targets.

It is important to note that much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness. However, while it is madness, it is happening. Clearly, the Communist Party of China must think it makes sense or they would be acting in this way. In the recent case of a New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats. To be more precise, they will twist the tails of émigrés by threading to harm family members still living in China if cooperation was not provided.

The People’s Republic of China National Security Office in Hong Kong (above). MSS counterintelligence certainly would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations.

MSS Counterintelligence

MSS shares the counterintelligence role with MPS. The primary mission of organic MSS counterintelligence elements is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. Its primary targets hands down are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

A Difficult Comparison with MI6 Counterintelligence

Making a proper comparison between MSS counterintelligence operations and those of MI6 is difficult due to the fact there are only soupçons to go on with regard to that United Kingdom intelligence service. One aspect of that work already noted here is that counterintelligence responsibilities among the United Kingdom’s intelligence services have been divided between MI5 and MI6. In Nigel West’s Historical Dictionary of British Intelligence (Scarecrow Press, 2014), one of his many superlative reference books on the subject of intelligence, not surprisingly one can find at least some reference to the work of MI6 in that province. As explained in the Historical Dictionary of British Intelligence, in the United Kingdom, counterintelligence is the discipline devoted to penetrating the adversary’s intelligence structure and protecting one’s own organization. (This is significant for a number of other intelligence services take a different approach to the matter. In the CIA and the FBI in the US and in the erstwhile Soviet Union’s KGB and the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, for instance, counterespionage operations are organic to the work of their organizations’ counterintelligence sections.)  West notes that during World War II, the MI6 counterintelligence section was designated Section V, the romance numeral five being the cause of considerable misunderstanding and confusion for outsiders.

With regard to counterespionage, in the Historical Dictionary of British Intelligence, West notes that responsibility for such operations lies primarily with MI5, although inevitably the Secret Intelligence Service and Government Communications Headquarters as well occasionally encounter evidence of hostile activity and investigate it. During World War II, counterespionage was acknowledged as an interagency discipline that overlapped different organizations and in 1942, was the motive for an attempt at amalgamation, which was ultimately rejected. Following the collapse of the Soviet Union, MI5’s commitments were reevaluated periodically, and the counterespionage branch, designated K in 1968, was absorbed to a new D Branch in 1994 

To elaborate further on MSS counterintelligence, certainly it would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Shifting a bit from United Kingdom intelligence efforts to elaborate more effectively on this point, federal indictments and criminal complaints against MSS foreign intelligence operatives and informants caught in the US indicate that they are generally tasked, as most field operatives and informants of any intelligence service, as intelligence collection requirements demand. As noted in greatcharlie’s August 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” from what can be learned from indictments and criminal complaints about such cases that are made public, in almost all of the MSS taskings of those intercepted operatives and informants, certain counterintelligence aspects can be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In order to develop ways to counter the efforts of US counterintelligence services against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding the surveillance strategies of US counterintelligence services, particularly the FBI, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along US counterintelligence services have had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. (If one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. The particulars of those real possibilities will not be delved into here. Not one case has been a “wilderness of mirrors.” It is hard to know what to make of how things are currently transpiring.)

FBI wanted poster for hackers Zhu Hua (left) and Zhang Shilong (right) of the Advanced Persistent Threats 10 (APT 10 Group) which acted in association with the MSS Tianjin State Security Bureau. In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy.

MSS Electronic Intelligence

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy. If human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome. Cyber collection complements all other forms of attack well. Typically, Chinese spokespersons from the People’s Republic of China Ministry of Foreign Affairs or the Communist Party of China, itself, will issue declarations seemingly designed to create the false impression that China was engaged in a lex talionis of allegations with the US on cyber espionage. Perchance the aim in doing so was to distract the world from the reality of its one-way abusive and criminal cyber attacks to obtain classified information from the federal government, intellectual property from private firms, and research from academic institutions in the US.

When GCHQ Was Part of MI6

For a time, MI6 also enjoyed having an organic technical surveillance capability. That technical surveillance capability today resides in an independent intelligence agency known as the Government Communications Headquarters (GCHQ). GCHQ grew out of the Government Code and Cypher School (GC&CS), established in November 1919. During the 1920s and 1930s, GC&CS had considerable success in its efforts to decipher German and Soviet transmissions. Once Nazi Germany acquired the Enigma machine, with its apparently unbreakable ciphers, in the late 1930s, GC&CS greatly stepped up its efforts. In August 1939, just before war broke out in Europe, it moved its headquarters to Bletchley Park outside London. There its cryptanalysts undertook Operation Ultra, the breaking of the Enigma cipher—a project whose details remained classified until the 1970s. Renamed the Government Communications Headquarters in 1942 to conceal its activities, this leading communications intelligence agency of the United Kingdom. Through GCHQ, MI6 enjoyed a number of successes during World War II, most notable among them being the Ultra program to break German Enigma ciphers. Today GCHQ functions similarly to the US National Security Agency (NSA) Working in coordination with the NSA during the Cold War, it greatly escalated its efforts. Reportedly, it participates in the Echelon global surveillance network. Much of what is known about how GCHQ is organized was provided publicly in James Bamford’s famous 1982 book on NSA, The Puzzle Palace (Houghton Miflin Harcourt, 1982). Knowing how GCHQ is organized allows one to infer with at least some degree accuracy, how it functions. According to Bamford, GCHQ at that time had six directorates. Among these were the Composite Signals Organization, dedicated to radio intercepts; the Directorate of Organization and Establishment, whose functions were chiefly administrative; the Directorate of Signals Intelligence Plans, concerned with long-range planning and management; and the Joint Technical Language Service, which intercepted foreign communications. Bamford stated that the largest and most secretive directorate, the Directorate of Signals Intelligence Operations and Requirements oversaw codebreaking activities. 

Returning to the discussion of MSS technical collection, it can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decisionmaking processes.

MI6 in the Political Realm: A Bad Mix

There is much beyond the controlled bearing, composure of MI6 officers and the organization itself. From what has been revealed, their efforts have been defined by hard work, establishing solid foundations, diligence and forethought, practicality and organization, determination and dependability, passion and drive. Creativity is combined with thoughtful effort and hard work to manifest positive energies, opportunities and results. 

As aforementioned, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. MI6 answers to the Foreign and Commonwealth Secretary. The Foreign Secretary receives assistance from the Permanent Secretaries’ Committee on the Intelligence Services. Finally, the Joint Intelligence Committee draws up general intelligence needs to be met by MI6. It also prepares National Intelligence Estimates.

As with officers in MI5, speaking truth to power is also the charge entrusted to leaders of MI6. Yet circumstances have often been complicated enough to spoil adherence to that. One might say how MI6 has performed, has really boiled down to leadership. Indeed, the intelligence services may have figuratively been wonderful horses but the chief or key senior executives–no names here–may have been less-than-perfect jockeys in matters of high policy. Admittedly short on specifics of such cases here, yet with all conspiracy theories aside, it may be enough to say the resources and capabilities of MI6 allegedly have reportedly  on certain occasion been used by political leaders to turn a situation that might not necessarily stand in their favor due to interests beyond those urgent and important to the United Kingdom. Some believe it was really seen during the Iraq War when the United Kingdom followed the US into the whole affair which was unfortunately founded on false intentions,  namely weapons of mass destruction were being produced by the regime of the erstwhile Iraqi President Saddam Hussein. Tragically, MI6 became the alleged coauthor and signatories to misleading information

When misgivings and disfavor might have been expressed what may have been proposed from the top, it may have been the case that  the powers that be would brook no denial. Those too concerned of their position or being politically indebted, might have seen themselves with little option but to follow orders. Those who see themselves as pragmatists, may explain away a decision to go along thoroughly with a suggestion from on high as an effort to simply adapt in a shifting world. They may not have seen themselves as keepers of some sacred flame. The fatal mistake occurs when the choice is made to play along thoroughly. No proper MI6 or MI5 officer would be expected to shrink at the last. If the organization’s leadership had decided to disappoint the political leadership, they might not only have been forced to surrender the coveted privilege to serve their country in the intelligence services. To many in the intelligence service, that idea would be anathema. Such thoughts likely broke through any defenses their minds raised against them. Additionally, after their departure they might find the whole force of the state on his or her back. L’homme c’est rien—l’oeuvre c’est tout.

Assuredly, Parliament, which provides oversight of MI6, has a process for ascertaining the truth about such matters. The principal oversight committee for British intelligence is the Central Intelligence Machinery, based in the Prime Minister’s Cabinet Office. It oversees the coordination of security and intelligence agencies. It also acts as a mechanism for assessment and accountability, observing and reporting on the performance of specific agencies. Further, it more directly intelligence operations as it is also concerned with tasking and the allocation of resources.

To discuss such issues concerning MI6, even if it is just a part of a mere commentary on MSS, is to walk out on shaky ground given many who may read this post may be invested in maintaining the image of the organization and may have previously been invested heart and soul in its work. While admittedly greatcharlie has sought to be sensitive to the concerns of those readers, doubtlessly, the soupçons discussed here will still be an issue of contention in some quarters and there will surely be those disposed to quarrel most bitterly over it. All the same, what is opined here is only what has been publicly discussed by those familiar with the issue. To that extent, not being aware first-hand of it all, greatcharlie would not like to swear by it.

There is no legal “right to know” what is undertaken abroad in the name of the United Kingdom’s security, what it costs or how it is run. Reportedly, beyond mere concerns exposing any classified information about MI6, to write about MI6, even today, risks harassment and prosecution. Former members and current commentators are fully aware of this and have complied thereby allowing the organization to remain beyond any educated public scrutiny. In the past, any dissident reports of its operations were effectively snuffed out. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. As one might imagine, this reality does not sit well with the citizens of the United Kingdom. There is a perception among many in the United Kingdom that such behavior brings the organization more closely in sync with that of MSS, an organ of an authoritarian government, than it should in a free society. Civil rights groups and average citizens argue that the policy of total should be reconsidered and scrapped, should not be disparaged as rubbish in any quarter.

Meeting of the Politburo of the Communist Party of China (above). Changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. One change was the decision of the Communist Party of China wanted MSS looking further abroad than minority groups on China’s periphery. Another change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence.

MSS in the Political Realm

MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. With its inception, MSS added new dimensions to China’s foreign intelligence scheme while freeing MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the intelligence game so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. MSS also represented the tidying up of old ways of conducting its business, and a modernization of Chinese intelligence that was long overdue. The MSS generally appears to have adhered to the non-politicization  of the service. This is not to say that occasionally shifts away from that position by some senior executives has not impacted the organization. MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. However, the Ministry rarely appears connected to any elite political maneuvering or purges. Since 1983, only the purges of Beijing Party secretary Chen Xitong (1995) and Shanghai Party secretary Chen Liangyu (2006) were rumored to involve the ministry. In the wholesale purges after the fall of Bo Xi laid and Zhou Yongkang, the Beijing State Security Bureau chief Fangfoss Kent and Vice Minister Qiu Jin were ousted precisely because they exploited MSS resources to back particular leaders in their political struggles against each other.

Of course, the foreign policy influence of intelligence services depends on the quality of their inputs and their leadership’s influence with key policymakers. If an intelligence chief is not influential, then his service’s influence depends on performance. The MSS’s role in policymaking could be rising as China’s overseas interests expand. When China entered the World Trade Organization (WTO) in 2001, the thought was that there would be an influx of foreign business into China. That was a concern. At the time, the response was to make greater use of MPS. However, changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. When direct political power is absent, influence usually relates to merit and necessity. Senior foreign policymakers would eventually want the MSS in the room, contributing to the discussion. The Communist Party of China’s leadership wanted an MSS looking further abroad than minority groups on China’s periphery. The MSS’ foreign intelligence service is now more similar to the CIA. Another major change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Indeed, MSS has managed to move from backstage, second to MPS, to frontstage, up from behind its bureaucratic competitor in internal security.

The Way Forward

As indicated in its introduction, this post serves as an expatiation of a technique learned long ago for directing one’s thoughts upon developing ideas and insights on issues in international affairs and other subjects of interest. Given its subject matter, it hopefully managed to satisfy the experienced scholar, academic, and policy analyst. By showcasing the generation of ideas and insights on subjects, hopefully it satisfied the desire of students to see examples and will become a subject of inquiry for some. 

By their very nature, insights are inherent to the writer, unique in that way. At least, they should be. No truer are the words, “everyone is entitled to an opinion.” The ideas and insights of the novice writer have a right to be aired equal to that of experienced, published authors in the various fields. Note, however, that eccentric, whimsical, and outlandish ideas are seldom useful and never desirable. In some respect, the process of generating ideas and insights is a form of self-exploration. One’s mind must be open to all reasonable considerations and all plausible possibilities. Nontraditional students should try to apply sensibilities shaped by a multitude of experiences. The length and breadth of their knowledge and experience may allow for a broader understanding of humanity. That is what the world will most appreciate reading.

Saepe stilum vertas, iterum quae digna legi sint scripturus. (Often must you turn your pencil to erase, if you hope to write something worth a second reading.) It is perfectly in order to feel a bit timid about drawing inferences and sharing them for others to review. Accept those awkward feelings, but write down all of the ideas and insight that may develop inside anyway. Have at it! To enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. Ruminate on events in relation to those that proceed them and meditate on what the future may bring. Build on that thinking. Strive to forecast decisions that may shape what might come and proof one’s efforts by watching events unfold in the news. Some of the best ideas and insights may come at inopportune times. Whether one is struck with a coruscating flash of logic, or has a nagging thought on an issue that builds throughout the day, notes must be kept of it all. At one’s earliest convenience, write those ideas and insights down in a notebook, on a pad, or on the back of an envelope. If one can, type them up on an electronic device. Organize them as bullet points if that is easier, however, one must make certain that enough is recorded to ensure that actual ideas are being expressed and that they “feel” compelling. Avoid simply jotting down statements of fact, or worse, simple fragments of your thoughts. State your conclusions about matter! Each expression can be fleshed out and tidied up with editing later. Sticking to this course may not be easy at first. After a time and with honest effort, one should become accustomed to it. Optimally, a writer will effectively generate enough ideas and insights to allow for the selection of more reasoned, potent, and eloquent among them for inclusion in a draft essay. The ability to increase quantity and improve the quality of ideas and insights produced will come with practice. Plus novisti quid faciendum sit. (You have learned more what has to be.)