Book Review: Robert Spalding, War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022)

People’s Republic of China People’s Liberation Army (PLA) Navy’s Aircraft Carrier, Type 001A Shandong (Hull 17), the PLA Navy’s second aircraft carrier, but the first built domestically (above). In War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022), retired US Air Force Brigadier General Robert Spalding discusses China’s military concept of unrestricted warfare. Spalding points out the concept may also include the use of armed force with its arsenal of weapons as the Type 001A Shandong, it is a military concept designed for the use of non-military forms of warfare: psychological, media, information, technology, cyber, financial, political, social, and espionage. The aim of unrestricted warfare is to weaken the US internally and to exploit its vulnerabilities. Spalding says there can be no doubt that the ultimate goal of the Communiet Party of China is world dominance. From his perspective, that does not bode well for the US.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping promises the Chinese people that China will supplant the US as the world’s dominant power in every sector. (Surely, it would be out of character for Xi to assure the Chinese people something as mundane as French King Henry IV declared one day in 1598 as France was just beginning to emerge from its ruinous religious wars: “Je veux que chaque laboureur de mon royaume puisse mettre la poule au pot le Comanche.” (I desire that every laborer in my realm should be able to put a fowl in the pot on Sundays.). Reference is commonly made to that statement with the phrase, “poulet au pot.”) One might imagine that some similitudes of the romanticism á la the French Revolution, megalomania, or some bizarre combination of both, perhaps in concert with others, have driven the zeal of Communist Party of China’s leadership over the years to achieve this goal. Xi will very likely have a lot of other unsettling things to say as time goes on. As attaining the dominant position in the world has been a long sought goal but never reached, some experts, scholars, and policy practitioners still look askance at the whole idea. China’s ambitions and capabilities as they concern attaining this lofty goal no longer sit in the realm of the theoretical or left to philosophical meanderings. Xi is clearly determined to achieve it under his leadership. If China were ever to make the dream of dominance come true, it would not be so willing to relinquish that position. Beijing would doubtlessly do whatever it took to stay on top.

Although the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The idea of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether its friend or foe. The subject of this review is Robert Spalding’s War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022). In his book, Spalding says there can be no doubt that the ultimate goal of the Communiet Party of China is world dominance. From his perspective, that does not bode well for the US. A retired US Air Force Brigadier General, Spalding, in War Without Rules, expresses his most recent meditations about China’s efforts to achieve dominance overseas and even greater control at home. He offers more answers on how the US and its allies might respond to that effort. Spalding states in his “Introduction”: It is not enough to know what your enemy wants. One needs to understand his strategy. In this regard, Washington has been, to use Spalding’s words, “really confused.” He says the US is “primed to fight in one way-all-out war-and see aggression through the same lens.” The indications and implications of this is that the US over the years has failed to discern and accept the Chinese are doing something very different and thereby, Washington has failed to act appropriately. To that extent, War Without Rules is a further attempt by Spalding to get the word out to US political leaders about what China is doing. Yet, more than a book about China’s concepts, intentions, and actions to knock the US off its perch as the dominant power in the world, greatcharlie found that War Without Rules is a book that stirs the reader’s curiosity. The reader is caused to inquire further into the author’s judgments and give greater consideration of their own views on the matter. Such books are figurative catnip for greatcharlie.

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possesses. Spalding is a former insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that as a former flag officer and B-2 Stealth bomber pilot and unit commander, he was among a him in unique, elite caste of military officer, not quick to speak out, does not lightly show emotion, at least publicly or react because of it, not the type to fret over a perception without the full facts, and whose views when expressed should be taken very seriously.

Overview

In War Without Rules, Spalding frames the problem in getting Washington to understand how China has been steadily moving in the direction of achieving dominance in his Introduction by stating: “From our standpoint, we use military force to achieve a political outcome.” To that extent, he continues: “So they’re constantly in a state of war, they never exit time to peace. And that means they’re always fighting for advantage, they’re always fighting . . . to gain an advantage over their opponent, and . . . are willing to do whatever means necessary.” Spalding states that over those years he came to two key realizations: first, the number one goal of the Chinese Communist Party is the survival of the Chinese Communist Party; and, second, the number one threat to achieving that goal is American democracy. Spalding observes that although there may not be full agreement in the US that China is an enemy, China certainly views the US as its enemy, an existential one. Much as with Spalding’s preceding work, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), which greatcharlie reviewed in its November 30, 2021 post, Wat Without Rules is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction.

Unrestricted Warfare: the Playbook 

The central element of Spalding’s discussion on China’s efforts to dethrone the US as the world’s dominant power is the concept of “unrestricted warfare.” That concept is laid out in a 1998 book entitled Unrestricted Warfare authored by two People’s Republic of China People’s Liberation Army (PLA) colonels, Qiao Liang and Wang Xiangsui. Spalding essentially uses War Without Rules to parse out the text which was once relatively unknown in the West. In each of the chapters of War Without Rules, Spalding presents excerpts from Unrestricted Warfare along with his interpretations and assessments of the text.

Spalding explains the concept of unrestricted warfare, or what the two authors call a “cocktail mixture of warfare” and define as “warfare which transcends all boundaries and limits.” Spalding points out that while China’s version of unrestricted warfare may also include the use of armed force, it is a strategy that prioritizes the use of non-military forms of warfare: psychological, media, information, technology, cyber, financial, political, social, and espionage. (The espionage element will be considered in greater detail later in this review.) The aim of unrestricted warfare is to weaken the US internally and to exploit its vulnerabilities. (Spalding would call unrestricted warfare in War Without Rules as “beyond-limits combined war.” As the term seems to best reflect the flavor of strategy’s meaning in Chinese, greatcharlie shall hereinafter refer to the strategy of unrestricted warfare more thoroughly as “beyond-limits combined war.”) Since under what was a new concept in 1998 the battlefield is everywhere, for the PLA, everything can be weaponized. On a short list of things weaponized, Spalding includes computers, drugs (fentanyl), financial markets, viruses (COVID-19), social media platforms, universities, scientific organizations, NGOs, trade, and media outlets. To create a foundation for the conceptualization of their new approach, Spalding explains that the two PLA colonels “pulled together centuries of Chinese thinking about warfare and made it relevant in a modern context.” To that extent, Spalding goes as far as to state that the book, Unrestricted Warfare, preached a new version of a very old Chinese formula for victory first set down in print thousands of years ago by Sun Tzu, who wrote in Art of War (c. 5 B.C.), which focused on military organization, leadership, and battlefield tactics, that the acme of skill was to defeat an enemy without fighting.

Spalding insists Unrestricted Warfare is “the main blueprint for China’s efforts to unseat America as the world’s economic, political, and ideological leader.” He states further, it is “the key to decoding China’s master plan for world domination.” Spalding points out that the two colonels wrote the book at a time when the US was enjoying its brief “unipolar moment,” having recently achieved victory over the Soviet Union in the Cold War and won a one-sided military victory in the First Persian Gulf War. And China had not yet attained economic and military superpower status. Much as their superiors in the Communist Party of China, the sense of ardor of the two PLA colonels were respectively inflamed by what they witnessed in the Gulf War and they became more determined than ever to find a way to enhance their country’s capabilities and raise its status globally. Given what Spalding says Unrestricted Warfare endows, it is a wonder why its two authors were allowed by their masters to publish, nonetheless write such a piece in an unclassified context. There must have initially been some nervousness in China’s Ministry of Defense and the Communist Party of China over security concerns. Some time and effort was presumably put into parsing out how the US and its allies would react if a copy got into their hands.

Cynics and conspiracy theorists would doubtlessly go as far as to say Unrestricted Warfare may be a false document, a piece of disinformation, generated by one or more national governments wanting to create a picture of a virulent, predatory China hellbent upon dethroning the US as the global superpower in any way possible. To that extent, they ostensibly insinuate that Spalding has taken the bait and run with it to an extreme. They would perchance offer a caveat to the effect that readers not allow themselves to be bewitched by Spalding the “dream-weaver” or the “teller of tales”. Other detractors of Spalding’s opus would hypothesize that if political leaders were sufficiently impressed by the length and breadth of Chinese activities depicted in the book, it would open the door to greater overwatch and responsibilities for counterintelligence services in the US Intelligence Community and federal law enforcement. Thereby, the document was very likely created within the intelligence industry to influence political support for enhancing their respective powers, broadening their respective missions, and increasing their respective resources. That would be quite a judgment on the character of the men who run the intelligence services and federal law enforcement organizations in the US. Anything is possible from an industry in which many of its professionals as a practice must deny their own names and concealing their accomplishments and contributions is de rigueur. So many “capers” are still kept close to the vest by top executives and managers. Then again, some could say conversely that any effort to create second thoughts on Unrestricted Warfare could possibly be the work of the opposition, a misinformation campaign of some sort.

Everyone is entitled to an opinion. Having said that, it might be helpful to remind such cynics that Spalding in part resolves the provenance of Unrestricted Warfare by laying out the manner in which events have unfolded and continue to unfold and how Chinese activities “follow the script” of Unrestricted Warfare practically to the letter. Spalding notes that Unrestricted Warfare has been used at China’s military academies. It would be unusual for a “misinformation tool” to be placed on syllabi in such educational institutions. Surely, that evidence alone should help carry his argument well-outside the realm of conjecture and settle it down into reality for most. All that being stated, greatcharlie reckons that diving any deeper into such matters, would be counterproductive, and that it would be best to “stay on mission” and discuss the good readers will find in War Without Rules.

As a book concerning the course of China’s implementation of beyond-limits combined war, War Without Rules, to an extent, is a book about both the past and present. Yet, more importantly, it is an argument concerning the type of future the US and the rest of the world’s industrialized democracies really want. Spalding leaves doubt that he believes the idea of Chinese dominance is unacceptable given the nature of China’s totalitarian government. He feels the growing concern about China within Washington and the capitals of its allies is warranted. Spalding insists that much more must be done by those capitals to convince China that the matter of it becoming the world’s dominant power is simply out of court. In his view, too many mistakes have been made already by them, especially by Washington, that have allowed China to advance quite a bit in that direction. Spalding makes considerable reference to the political leaders, business leaders, senior government officials, and distinguished scholars, academics, and technical experts who exercise the lion’s share of authority within their countries. Western elites called themselves keeping an eye on Beijing, but Spalding explains for far too long have assumed the military is China’s main weapon in a war. To his amazement, he observed they somehow or another failed to realize that money can be a stronger weapon. To the detriment of the interests of their own respective countries, through interactions with China, particularly economic through commerce, finance, and trade, have lavished Beijing with enough money to wage a beyond-limits combined war against them which the Communist Party of China fully intends to win! 

In Act II, scene iv, of William Shakespeare’s The Life and Death of Richard the Second, a Welch captain speaks these words of doom and gloom to the Earl of Salisbury: “The bay-trees in our country are all wither’d / And meteors fright the fixed stars of heaven; The pale-faced moon looks bloody on the earth / And lean-look’d prophets whisper fearful change; / Rich men look sad and ruffians dance and leap, / The one in fear to lose what they enjoy, / The other to enjoy by rage and war:” Rest assured, War Without Rules is not a manifestation of a sense of doom and gloom concerning China held by Spalding. War Without Rules does not present a “scare story”, pour employer une phrase populaire. Spalding certainly is not whining about China in War Without Rules.  From what greatcharlie is aware of, operating with such a mindset would hardly be Spalding’s way of thinking or doing things. Despite his strong feelings, his discussion is more intellectual than overtly emotional. Afterall, he is a consummate professional from the US foreign and national security policy realmand for warriors such as Spalding, “strength of character consists not only of having strong feelings, but maintaining one’s balance in spite of them!” Spalding has a mind and will to win.

In a 1978 October 13, 1978 Wall Street Journal article entitled, “U.S. Monetary Troubles” by Lindley H. Clark Jr., Paul Samuelson, the Nobel laureate from the Massachusetts Institute of Technology, recalled that John Maynard Keynes once was challenged for altering his position on some economic issue. “When my information changes,” he remembered that Keynes had said, “I change my mind. What do you do?” Spalding admits initially having been somewhat dismissive, himself, about the Unrestricted Warfare and viewed the precepts revealed by the two PLA colonels as somewhat fanciful or lofty. Spalding notes in the Introduction of War Without Rules: “When I first read the Chinese war manual Unrestricted Warfare in 1999, I thought it was wacky. I was flying B-2 Stealth bombers out of Whiteman Air Force Base in western Missouri and reading a lot about war. As an Air Force officer, I thought it was part of my day job to understand the bigger picture–even though the prevailing attitude in the military was ‘Just fly the planes.’ ” Torah Lishmah! Spalding’s whole perspective changed once he discerned China was putting everything he read into motion, and doing it well. Spalding spoke truth to power at the Pentagon and the White House then, and speaks of only what he knows to be the truth in War Without Rules now.

At the time of this review, a 212 page translation of Unrestricted Warfare: China’s Master Plan to Destroy America, Reprint ed. (Echo Point Books & Media, 2015) has been made available for purchase on Amazon.com. The description provided for the book on Amazon is as follows: “Two colonels in the People’s Liberation Army, Qiao Liang (乔良) and Wang Xiangsui (王湘穗). Its primary concern is how a nation such as China can defeat a technologically superior opponent, such as the United States.” Having examined Unrestricted Warfare, greatcharlie would wholeheartedly agree that the audience best situated to parse it out in the round would be academics, other scholars, and practitioners in the province of foreign and national security policy. Any level-best effort by those somewhat unfamiliar with these matters, which would be laudable. Still, Unrestricted Warfare is made more easily understood through Spalding’s lens, colored by his expertise and experience. Spalding’s examination of the book via War Without Rules better enables readers with the chance to gain knowledge on a matter that would essentially be limited to those thoroughly steeped in China policy, Chinese defense issues, Chinese military culture, and military science. To that extent, his book will remain an important resource in every personal, public, academic, and institutional library.

The Roman historian Titus Livius (59 B.C.-A.D. 17), known as Livy, provided in Greek, a history of Rome that begins with the earliest legends of Rome before the traditional founding in 753 B.C. through the reign of Emperor Caesar Augustus during his own lifetime. In Book XLIV, sec. 15 of that history Ad Urbe Condita (From the Founding of the City) (c. 28 B.C.), he writes: “Plerumque ipsam se fraudem, etiamai initio cautior fuerit, detegere.” (A fraudulent intent, however carefully concealed at the outset, will generally, in the end, betray itself.) Increasing sunlight has been shone upon China’s activities, not just on the coronavirus disaster or in the domain of foreign and national security policy, but the totality of its malign actions. Included among those actions would be: predatory investment scams directed against trusting governments of often small and less industrialized countries; intrusions into sovereign waters for mass fishing; intellectual property theft from companies and research labs that have invested millions in research and development into; and, demands of censorship insisted upon of those in any arena who have received funding from, or are doing business with, China, Beijing must accept that as a result of such actions, impressions of China have not generally been positive worldwide. Communist Party of China leaders have doubtlessly come across the many statements made internationally about Chinese government spokespersons, diplomats, and other officials. To that extent, the Communist Party of China can hardly be happy about the damage being done worldwide to China’s reputation through books such as War Without Rules. Spalding’s voice is surely one that is looked upon as something better than annoying by the Communist Party of China. Spalding is among an ever growing group of China specialists who are determined to uncloak the fraudulent intent of China established decades ago. They put China’s intentions in full view of the world to see. Perhaps what specialists as Spalding present on China might be perceived as nothing less than affront or rebuke. It could only have been worse it his voice emanated from Taiwan. Then Beijing would have considered his act of writing and publishing the book as one more betrayal.

Spalding holding up copies of War Without Rules (left) and Stealth War (right). Although packed with excellent suggestions, War Without Rules, as with his preceding work, Stealth War, is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Given the success of Stealth War, Spalding was undoubtedly pre-empted to write another work of such magnitude. Surely, he was not lumbered by that task, and welcomed the opportunity to gnaw further at the issue of China ambitions and maligned actions and intentions. War Without Rules is every bit as brilliant as its predecessor. It is another superb exposition of Spalding’s pragmatic thinking.

The Author

In War Without Rules, readers are presented with the perspectives and insights on US-China relations through the lens of a man with years of experience on such matters. While hesitant to rewrite the biography of the author from its aforementioned November 30, 2021 post in which it reviewed Stealth War, greatcharlie believes that only by presenting his singular education and military experience in that way can the reader get a true sense of qualifications to inform readers on the subject matter.

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possesses. Excluding his list of educational accomplishments, it reads as follows: “General Spalding received his commission through Fresno State University’s ROTC program in 1991. He earned his doctorate in economics and mathematics from the University of Missouri at Kansas City in 2007. The general attended undergraduate pilot training in 1993, and was subsequently assigned as a B-52 Stratofortress co-pilot in the 5th Bomb Wing at Minot Air Force Base, North Dakota. He subsequently transitioned to the B-2 Spirit at Whiteman AFB, Missouri. In 2001, he was selected as one of three Air Force Olmsted Scholars, and was a distinguished graduate of Mandarin Chinese language training at the Defense Language Institute in Monterey, California. Afterward, the general attended Tongji University in Shanghai as a graduate research student. He then returned to Whiteman AFB as a B-2 evaluator pilot and assistant director of operations for the 393rd Bomb Squadron. The general was then assigned to the Office of Secretary of Defense’s Prisoner of War Missing Personnel Office as the military assistant for the deputy assistant secretary of defense. During the Iraq surge in 2007, General Spalding deployed to Baghdad and directed the Personal Security Coordination Center. After a stint at the Air War College at Maxwell AFB, Alabama, he was reassigned to the B-2 at Whiteman AFB. While at Whiteman AFB, he was the chief of safety, operations group commander and vice wing commander. He was then selected as a Military Fellow at the Council of Foreign Relations in New York. General Spalding then served as the chief China strategist for the chairman of the Joint Chiefs, the Joint Staff at the Pentagon, Washington DC. His next assignment led him back to China as the Senior Defense Official and Defense Attache to China in Beijing, China. Prior to his current assignment he served at the White House as the Senior Director for Strategic Planning at the National Security Council, Washington D.C.”

Spalding is by no means an outsider, with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that being a former flag officer and B-2 Stealth bomber pilot and unit commander, which placed him in unique, elite caste of military officer, not quick to speak out, does not lightly show emotion, at least publicly or react because of it, not the type to fret over a perception without the full facts, never speak idly, and whose views when expressed should be taken very seriously. 

On Stealth War

Spalding’s Stealth War was promoted as a book which discusses how China has quietly waged a six-front war on America’s economy, military, diplomacy, technology, education, and infrastructure, and has been winning. It might be enough for greatcharlie just to describe Spalding’s exceptional achievement with Stealth War as providing piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis and its practitioners, both past and present. However, Spalding, even more, has interestingly taken his own dissatisfaction, disappointment, and anger over how badly the US has handled China, placed his country in some considerable degree of danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how atrocious events are unfolding right before the eyes of every US citizen.

Although packed with excellent suggestions, Stealth War, as with War Without Rules, is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Given the success of Stealth War, Spalding was undoubtedly pre-empted to write another work of such magnitude. Surely, he was not lumbered by that task, and welcomed the opportunity to gnaw further at the issue of China ambitions and maligned actions and intentions. War Without Rules is every bit as brilliant as its predecessor. It is another superb exposition of Spalding’s pragmatic thinking.

If you were fortunate enough to have read Spalding’s Stealth War, you are certainly primed and ready to approach the heady revelations of War Without Rules with an open mind. However, if you have not had the chance to read his preceding work, you can still jump right in War Without Rules. If Spalding had written War Without Rules solely to communicate with professionals within the US foreign and national security policy bureaucracies or the respective bureaucracies of US allies, his target audience still would have been somewhat sizable, and in of itself a market satisfying enough for his publisher. 

However, knowing the considerable level of interest in China across an array of issues is presently high, the targeting of a larger general audience was very likely insisted upon by his publisher. Of course, publishers make money selling books. Spalding, himself, was evidently willing to reach a far greater audience with his work, but his priority in writing this book apparently went beyond turning a profit. As Spalding explains in his “Introduction”, in attempting reach a larger audience, his intention was  to make average citizens, particularly in the US, better aware of China’s malign aims and objectives and tactics. An attendant benefit of that would possibly be mobilizing them to get their representatives in the US Congress and especially the White House to mitigate its creeping influence.

As part of his effort to reach a greater audience with War Without Rules, Spalding intentionally presents his discussion in a way as to coast the most interested China policy wonk as well as someone who has not read a book on China beforehand comfortably through the subject matter. Spalding does not take for granted how much the reader can absorb from what he teaches. As part of his effort to control that process, he carefully apportions how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Spalding ratchets up the complexity of discussion and his anecdotes. Spalding surely accomplished that presumed mission, as his text is informative, lucid, challenging and accessible.” One can only imagine an individual with his richesse connaissances is holding back considering how much more he could have potentially ruminated upon. To that extent, while all should find War Without Rules a browsable, satisfying meditation, Spalding’s lack of profundity might disconcert some.

Previous Reviews

As Beijing pushes ahead with its varied malign efforts, books as Spalding’s War Without Rules surely deserve a look from the eyes of many. In most reviews readily available online, appreciation is shown toward Spalding’s willingness to share the meditations of his praiseworthy exploratory mind. Reviewing War Without Rules for the New York Review of Books, Francis Sempa, who at the time was Assistant US Attorney for the Middle District of Pennsylvania, explains that China, according to Spalding, is the enemy of the US, and its statesmen and strategists to “know” the enemy better and to appreciate the enemy’s strategy. Sempa points to Spalding’s view that the aforementioned US statesmen and strategist need to appreciate that we are at war with China, though not yet “a shooting war”, and suggests it is uncertain whether they will recognize that reality. Sempa notes Spalding’s evidence that China is waging war lies in the tactics and strategies set forth in Unrestricted Warfare. Citing what Spalding gleaned from that text, Sempa similarly explains that unrestricted warfare, or what the Chinese authors call “beyond-limits warfare,” includes psychological, media, information, technology, cyber, financial, political, social, and espionage warfare. to. Revealing even more from the text of War Without Rules, Sempa explains Spalding believes that China’s practice of waging war with non-military means lulled the US into a false sense of security after the Cold War by convincing US elites that China was liberalizing politically and that the US could benefit financially by “engaging” China rather than containing or confronting it. Sempa notes that a lot of American elites did (and still do) benefit financially from engagement with China. Overall, the review was favorable. Yet, Sempa notes, too, that Spalding failed to mention another factor that imperils US security–the gradual formation of a new Sino-Russian strategic partnership, which developed and expanded while the US was distracted by wars in Afghanistan and Iraq. He says additionally that China has also engaged in a massive military build-up and has extended its influence throughout the Indo-Pacific region via its Belt and Road Initiative. Sempa declares: “Unrestricted warfare also includes geopolitics.

Reviewing the book for the journal of the US Naval Institute, Proceedings, a Lieutenant Cregge states that War Without Rules is “no doubt a blistering critique of the Chinese Communist Party.” Cregge cites Spalding’s explanation that two Chinese PLA colonels, Unrestricted Warfare, provide the playbook for a broad, undeclared Chinese war against the US. Beyond a translation of the two colonels concepts to English, War Without Rules seeks “to explain the challenging prose, logic, and colloquialisms” of Unrestricted Warfare that remain. Through his own description, Cregge notes that the colonels reflected on, among many other topics, how the face of war “would change”, given the US preeminence demonstrated both in its coalition victory in the First Persian Gulf War and its commanding position in the international economic and diplomatic orders. Cregge states that for those interested in examining an array of examples of Chinese coercion against the US-led international order, War Without Rules provides such cases “in spades.” He also notes that for more skeptical China doves, it may be less convincing. Criticizing the War Without Rules, Cregge proffers the book’s compelling argument suffers for two reasons. He explains that many modern examples of Chinese unrestricted warfare against the US rely on seemingly arbitrary citations. He further asserts the book’s partisan perspective is evident throughout, which may further estrange some policymakers or voters, despite a desire, quoting Spalding, that “we should all be China hawks.” Cregge admits that these particular critiques do not argue that the information asserted is necessarily wrong. Cregge additionally criticizes the book saying that given the weight of accusations against Chinese and US organizations and even named individuals, a comprehensive citation regime and bibliography would have greatly reinforced War Without Rules.

Providing a review of War Without Rules for The Epoch Times, that also makes use of quotes from an interview Spalding provided Epoch TV’s “China Insider” program, journalists Hannah Ng and David Zhang report his book walks readers through the principles outlined in the Chinese publication, revealing the regime’s belief that there is no sector of life outside the realm of war. Spalding, they note, determined that this approach stemmed from a doctrine laid out by two Chinese colonels back in 1999 in their book, Unrestricted Warfare. Seeking to boil the matter down further, Ng and Zhang state that according to Spalding, the notion of war espoused by the Chinese communist regime is completely different from ideas in the West. Citing Spalding, the reviewers note that from the Western standpoint, military force is used to achieve a political outcome. However, the “Chinese Communist Party” sees the outside world as always in a state of war. Thus, China is constantly in a state of war with it. That necessitates always fighting to gain an advantage over their opponent, and are willing to accomplish that through any means necessary. To push back against this unconventional war imposed on the US, Ng and Zhang say Spalding called for the country to decouple from China. Quoting Spalding once more, the reviewers write: “If we can decouple from China . . . get them out of our economic, political, academic and natural systems and begin to reinvest in our own citizens, reinvest in infrastructure and manufacturing in science and technology and STEM [science, technology, engineering, maths] education, you’re going to start to see opportunities arise that haven’t been there for decades in the United States.”

Interestingly enough, more than just reviews exist of Spalding’s book. As of the time of this writing, a couple of unofficial “study guides” for War Without Rules have been made available for purchase on Amazon.com at prices oddly not far short of the cost for the book itself! The study guides are in effect synopses of a synopsis of a book. (Without pretension, greatcharlie hopes readers will not find that its review of War Without Rules should be placed within that category, too.)

The August First Building in Beijing, Headquarters of the People’s Liberation Army (above). The central element of Spalding’s discussion on China’s efforts to dethrone the US as the world’s dominant power is the concept of “unrestricted warfare.” That concept is laid out in a 1998 book entitled Unrestricted Warfare authored by two People’s Republic of China People’s Liberation Army colonels, Qiao Liang and Wang Xiangsui. Spalding essentially uses War Without Rules to parse out the text which was once relatively unknown in the West. In each of the chapters of War Without Rules, Spalding presents excerpts from Unrestricted Warfare along with his interpretations and assessments of the text. Spalding insists Unrestricted Warfare is “the main blueprint for China’s efforts to unseat America as the world’s economic, political, and ideological leader.” He states further, it is “the key to decoding China’s master plan for world domination.”

The Chapters of War Without Rules

War Without Rules is 256 pages in length, and has 11 chapters. The chapters are well-arranged and titled as follows: Chapter 1: “Know Your Enemy”; Chapter 2: “A New Way of War”; Chapter 3: “The Magic Shoes of Technology”; Chapter 4: “The Weapons of Revolution”; Chapter 5: “The War God’s Face Has Become Indistinct”; Chapter 6: “Desert Storm: ‘A Military Masterpiece”; Chapter 7: “America’s Weakness”; Chapter 8: “Weaponizing the International Order”; Chapter 9: “Deploying All of the Above”; Chapter 10: “Calling It War”; and, Chapter 11: “Fighting Back with New Rules”. One might figuratively call each chapter a “deep penetration strike” against what the former B-2 Stealth pilot presumably views as Washington’s record of willful ignorance and to a degree, political apathy.

With the aim of not spoiling the readers’ own experience reading War Without Rules, greatcharlie will not provide a sizable review covering chapter by chapter. Instead greatcharlie delights to simply peek, to gaze therein on those parts of his admirable work that it found fascinating and captivating. The same approach was taken in its review of Stealth War. At the same time, Spalding has done a more than admirable job at breaking down the blueprint for China’s effort to attain dominance, Unrestricted Warfare, in order to allow all readers to grasp the work. There was concern in writing this review that an unintended consequence of summarizing his effort would be to gut Unrestricted Warfare to the point that its essence would be significantly obscured to readers. Thus, with a focus on keeping the discussion to the more significant lessons learned from the Gulf War by the two PLA colonels, greatcharlie presents a somewhat fulsome discussion of what it has determined to be its “top 3” chapters. They include: Chapter 4: “The Weapons Revolution”; Chapter 7: “America’s Weakness”; and, Chapter 11: “Fighting Back with New Rules”. Of course, greatcharlie believes every reader will best select for himself or herself, the chapters that content them most.

Chapter 4: “The Weapons Revolution”

In Chapter 4: “The Weapons Revolution”, Spalding explains when Unrestricted Warfare was written China did not have Stealth bombers, am adequate Navy. He notes that the colonels saw promise in what China did have in abundance. Those resources include: a billion people, computer programmers, devious hackers, financial speculators, currency reserves. Spalding, himself, adds what would be recognized as the issue de jure doctors studying exotic viruses. Spalding says the colonels explained all of these, organized and tasked to maximize their potential, could be used as weapons and must be seen as such. Effecting the possible disruption, destruction, and potentially gaining control all areas of the opponents society would be possible to the degree that the opponent’s ability to fight wars in the standard way would be broken. The opponent would be destroyed from the inside similar to an erstwhile healthy individual struck by an unseen virus. The colonels explain that with the weaponization of its abundant resources, China could strike at the very hearts of its opponents. To that extent, the two colonels suggest that fully accepting such ideas requires one to adopt “a new way of thinking about warfare.” Spalding remarks that unlike ships and planes, these weapons needed no upgrades as a result of being suited for the last conflict. The colonels write: “In the past, all that was needed was the invention of a few weapons or pieces of equipment, such as the startup and the Maxim machine gun, and that was sufficient to alter the form of war, whereas today upwards of 100 kinds of weapons are need to make up a certain weapons system before it can have have an overall effect on war. However, the more weapons that are invented, the smaller any individual weapons role in war becomes, and this Is a paradox that is inherent in the relationship between weapons and war . . . Other than the all-out use of nuclear weapons, a situation which is more and more unlikely and which may be termed nuclear war, none of the weapons, even those that are extremely revolutionary in nature possess the right to label future warfare. . . .”

Interestingly, Spalding does not delve too much into the idea that such claims by the two colonels seemed more than just skance as an effort to justify the state in which the Communist Party of China had left their country’s defense, its security. After reading the above passage, greatcharlie thought that perhaps the two colonels overlooked, or worse, dismissed an important aspect of the human element of warfare as it concerns the way weapons are often innovatively used to the extent one could call their influence on the battlefield revolutionary. Imaginably, in the PLA, the sort of go-ahead mentality that has led to innovation in the use of weapons in Western armies, does not fit well. That is doubtlessly the case in all the bureaucracies of China’s totalitarian, Communist government system. The ability of research and development teams, commanders, and soldiers, sailors, and marines to find new ways to exploit available high-tech and information warfare technologies in often absolutely brilliant ways, cannot be discounted, or worse, dismissed so readily. 

In World War II, the decision by German Army commanders to level their long range, high velocity firing, 8.8 cm Flak 18, an 88mm anti aircraft gun, at opposing forces in the North African desert in 1941 changed the picture concerning artillery range, speed, and destructive effort through the war. Batteries of 88s were successful at supporting movement of tank and infantry units and breaking up attacks by opposition forces. In terms of weapons systems as a category, airplanes were initially used in observation and reconnaissance roles. The two colonels mention the contribution of the renowned Italian air war theorist General Giulio Douhet relatively in passing in Chapter 4: “Desert Storm: A Military Masterpiece”. They do not discuss just how genuinely revolutionary his precepts on potential use of the airplane in war were. Spalding surely would have included any comments by the two colonels on US Colonel William “Billy” Mitchell if they had deigned to mention the contribution of his ideas on air power and the need to make airplanes an integral part of US defense in preparation for the next war. It took an impressive degree of inner strength it took for these commanders to subject themselves to being “the voice crying in the wilderness,” a phrase that perhaps alien to the ears of the two colonels (Certainly not to Spalding!). The impact of the airplane was multiplied exponentially when it was eventually used as an asset for tactical and strategic attacks against an enemy. They can destroy enemy positions along the forward edge of the battle area, provide close air support for troops in contact with an opponent or move to a point deep in an opponent’s rear. When attacking an opponent’s units in depth, diverting, disrupting, or destroying attacking forces before they are even in contact with friendly troops, and destroying command, control, and communication centers and lines of supply. In a strategic attack role, airplanes can disrupt and destroy an opponent’s ability to even wage war, affecting the opponent’s ability to produce weapons, train troops. Further, airplanes can serve in an air defense role, friendly forces on the ground and at sea, and provide air cover for other airplanes in strategic attacks.

The two colonels sort of obedient, lock-step, short-sighted thinking on sophisticated weapons systems was further apparent in their statements about high-tech and information warfare. In another quote from Unrestricted Warfare provided by Spalding, it was explained: “Even if in future wars all the weapons have information components embedded in them and are fully computerized, we can still not term such war as ‘information warfare’ . . . because, regardless of how important information technology is, it cannot completely supplant the functions and the roles of each technology per se. For example, the F-22 fighter, which already fully embodies information technology is still a fighter, and the “Tomahawk” missile is still a missile, and one cannot lump them all together as “information weapons” nor can a war that’s conducted using these weapons be termed information warfare. Computerized warfare in the broad sense and information warfare in the narrow sense are two completely different things. The former refers to the various forms of warfare which are enhanced and accompanied by information technology, while the latter primarily refers to war in which information technology is used to obtain or suppress information. . . .” 

Spalding explains the two colonels believe huge investments in cutting edge weapons was a misallocation of funds and a dangerous distraction from what really matters in international conflicts. To that extent, Spalding looked at US Secretary of Defense Donald Rumsfeld in the administration of US President George W. Bush falling into what the colonels saw as a self-made trap as his focus was on constantly improving US weapons systems in terms of accuracy and lethality, an approach called the Revolution in Military Affairs. Intriguingly, on this point, politics seems to be playing more of a role than some sort of singular military thinking. Lending support to the idea that the Communist Party of China has the country on the right course militarily, better than imagined, because it has not heavily invested in weapons technology as the US, could have simply been a manifestation the two colonels belief, trust in, and loyalty toward the decisionmaking of China’s leadership. L’élan de générosité des croyants. On the other hand, China has always lagged behind a bit with the US in terms of its own research, development and deployment of its “big weapons”. It appears the two colonels have gone a bridge too far in suggesting that China would only need to innovate and adapt by exploiting nonmilitary resources to surpass the US and drive it from the top of the world order. Under a totalitarian, Communist government system in which even the commas of a text would be repeatedly scrutinized, placating the leadership and Communist Party of China’s military thinkers by pandering would surely be de rigueur especially if one hopes to have a position in a bureaucracy, advance in it, or even more, stay healthy and safe. Robust expressions of appreciation and optimism over the decisionmaking of the Communist Party of China’s leadership are expected. Speaking truth to power is just not the norm in China. To that extent, as alluded to earlier, it is likely the two colonels were once more taking on the role of “justifiers” in that last passage.

The US Air Force F-22 “Raptor” Stealth Fighter (above). Spalding explains the authors of Unrestricted Warfare believe huge investments in cutting edge weapons as the F-22 was a misallocation of funds and a dangerous distraction from what really matters in international conflicts. To that extent, Spalding considers the idea that Donald Rumsfeld, US Secretary of Defense in the administration of US President George W. Bush fell into what the colonels saw as a self-made trap because his focus was on constantly improving US weapons systems in terms of accuracy and lethality, an approach called the Revolution in Military Affairs. On this point, politics seems to be playing more of a role than military thinking. The two colonels could possibly be lending support to the idea that the Communist Party of China has the country on the right course militarily, better than imagined, because it has not heavily invested in weapons technology as the US. China has always lagged behind a bit in its own research development and deployment of its big weapons.

Further criticizing the US weapons acquisition process, according to Spalding, the authors of Unrestricted Warfare further explain there is a general unwritten rule that an army fights the fight that fits its weapons. They assert that very often it is the case that only after a military acquires a weapon does it begin to formulate tactics to match it. They go on to say, with weapons coming first, there is a decisive, constraining effect on the evolution of tactics. However, as the Roman Emperor and Stoic philosopher, Marcus Aurelius Antoninus Augustus was quoted as saying: “Because your own strength is unequal to the task, do not assume that it is beyond the powers of man; but if anything is within the powers and province of man, believe that it is within your own compass also.” One only need consider how the thinking of commanders as Heinz Guderian on the use of tanks, or panzers in his case, impacted German military strategy and tactics through World War II. In 1937, when he was a relatively obscure officer in the German Wehrmacht, Guderian wrote Achtung-Panzer!: The Development of Armored Forces, Their Tactics and Operational Potential. It was a seminal text that pointed out that in the next war, the importance of the tank with the very crucial addition of motorized infantry had to be recognized by the German Army. After carefully studying armor for 15 years, he insisted through Achtung-Panzer! [Beware the Tank!] that if tank forces were “full of verve” and “fanatically committed to progress” they would “restore the offensive power of the army.” Such ideas were adopted by the German Army, the result of which would be laying the foundation for the German Blitzkrieg. Such was the revolution on the battlefield Guderian had envisioned. He was given the opportunity to put his ideas into effect. Guderian commanded the XIX Corps during the invasion of Poland in 1939 and France in 1940, and commanded Panzergruppe Guderian during Operation Barbarossa, the invasion of Russia in 1941.

Similar thoughts were espoused by other military thinkers in the West between the world wars who influenced the way World War II fought and won. then US Army Colonel George S. Patton published a piece entitled,“Tanks in Future Wars”, in the Cavalry Journal (May, 1920), pages. 342-346, in which he explained the War Department must focus on tanks as an armored force and not place them piecemeal among infantry and artillery. He concluded, “The tank corps grafted onto infantry, cavalry, artillery, or engineers will be like the third leg of a duck; worthless for control, and for combat impotent.” Reportedly, Patton was immediately told to cease and desist by the powers that were if he wished to have a career in the US Army. Patton famously led the US 3rd Army on its armored and mechanized rampage through France in 1944 and its drive into Germany in 1945. Captain Dwight Eisenhower, wrote a piece for the Infantry Journal entitled, “A Tank Discussion,” (November 1920), pages 453-458, in which he sought to make the case for keeping tanks as part of the equipment of the infantry units. Eisenhower became the Supreme Allied Commander in Europe and great say in how the war was fought in Europe. In the United Kingdom, Captain B. H. Liddel Hart and Brigadier J. F. C. Fuller also mused about a revolution in armored warfare after World War I recognizing how the nature of warfare had changed with the introduction of the airplane, poison gas, and longer range artillery, and that machinery was stronger than wool. The British Army was experimenting with armored units under General Percy Hobart beginning in the 1920s. (In 1926, Fuller who served in the Tank Corps in World and participated in both the Battles of Arras and Cambrai, was given command of an Experimental Force (Tank)  brigade at Tidworth, on the Salisbury Plain. He ran into some difficulties while there.)

After examining in the round the situation of US and NATO Allies in Western Europe which faced a massive Warsaw Pact force in the East and thoroughly reviewing the US military experience in Vietnam, in the late 1970s and early 1980s US military theorists and planners sought to move away from the notion of fighting a battle of attrition, hoping to hold the line against an armored and mechanized heavy surges across the. Inner-German Border into the North German Plain, the Fulda Gap, and the Hof (Hessian) Corridor. They developed the Airland Battle concept which included an emphasis on maneuver, the operational art, high-mobility, high-tempo operations, innovation, flexibility, agility, capabilities, and military acumen, leadership, intimate knowledge of the battlefield, enhanced command, control, communication, and intelligence, the attack in depth, firepower, greater lethality, and the better use of existing weapons systems and the introduction of new, more capable weapons systems with the belief that they would have a considerable multiplier effect on the battlefield.  Notable among those weapons systems were the F-15 Eagle fighter, F-16 Falcon fighter, A-10 close support fighter, M270 MLRS (Multiple Launch Rocket System), the UH-60 Blackhawk helicopter, AH-64 Apache attack helicopter, the M1A1 Abrams main battle tank, the M2 and M3 Bradley fighting vehicles, the HMMWV (Humvee), and many more pieces of impressive gear. Later would come rather exquisite weapons systems such as the F-117A “Nighthawk” Stealth fighter and the E-8A Joint STARS (Joint Surveillance Target Attack Radar System). Special operations forces would be better developed in order to successfully engage in direct action behind opposition lines and alongside allied forces, and provide security for critical facilities and equipment and engage in other sensitive missions. The Airland Battle concept was manifested in the US Army’s formidable FM 100-5 Airland Battle Strategy.

For all of the advanced military thinkers mentioned and beyond, it was more often not an easy route to establish a strategy-resources match. They, too, were voices crying in the wilderness in the beginning. However, they managed to get the right attention. Through research, testing, and applying lessons learned from every failure, their theories were validated, the right weapons were procured, and the result was success in its use, though not completely successful for some as Guderian, fortunately for the world, given the politics of his country and the off-kilter way higher authorities prosecuted the war in which they were used. The renowned poet of Ancient Rome, Publius Ovidius Nāsō, known as Ovid (43 B.C. – 17 A.D.) wrote: Cui peccare licet, peccat minus. (Who is allowed to make mistakes, makes fewer mistakes.) In the environment in which the two colonels functioned, it is apparent that creating a theory on war then hoping funds would be  appropriated for their development was unheard of. It is hard to imagine some burgeoning, truly innovative military thinker in China leaping up to suggest ways of fighting wars that were beyond what was immediately understandable to superiors, required the use of weapons systems China did not have, and would have called for massive expenditures on defense.

General Heinz Guderian (top) in a half-track modified for use as a mobile command center during the Battle of France, 1940. According to Spalding, the authors of Unrestricted Warfare explained the general unwritten rule is that an army fights the fight that fits its weapons. They further assert that very often it is the case that only after a military acquires a weapon does it begin to formulate tactics to match it. They go on to say, with weapons coming first, there is a decisive, constraining effect on the evolution of tactics. One only need consider how the thinking of commanders as Heinz Guderian on the use of tanks, in his case, panzers, influenced German military strategy and tactics. In 1937, when he was a relatively obscure field officer in the German Wehrmacht, Guderian wrote Achtung-Panzer!: The Development of Armored Forces, Their Tactics and Operational Potential. It was a seminal text that pointed out that in the next war, the importance of the tank with the very crucial addition of motorized infantry needed to be recognized by the German Army. His ideas were adopted, they would serve as the foundation for the German Blitzkrieg. Such was the revolution on the battlefield Guderian had envisioned.

Spalding repeatedly remarks that in this chapter of Unrestricted Warfare, the two colonels rebuke the practice of developing weapons to meet the requirements of a theory for a new tactic, doctrine, or grand strategy. The two colonels began to sound more as cynics as Spalding quoted their reflections on US weapons systems design. It seemed more of the same self-serving perspectives seemingly aimed at placating the Communist Party of China. Perhaps coming across weapons systems then being forced to find ways to use them is a problem faced by the armed forces of countries which “garner” foreign military technologies and research, development, and plans by clandestine means.

There are points on which Spalding apparently fully agrees with the two colonels’ assessments. He stated that in Somalia, for the first time in history, unilateral access to superior weapons technology stopped conferring a big advantage to the dominant power. Spalding quotes from Unrestricted Warfare: “Customizing weapons systems to tactics that are still being explored and studied is like preparing food for a great banquet without knowing who is coming, where the slightest error can lead one far astray. Viewed from the performance of the US military In Somalia, when they were at a loss when they encountered Aidid’s forces [the ragged gunmen of warlord Mohammed Aidid, who tried to force foreign troops out of Somalia in the early 1990s], the most modern military force does not have ability to control public clamor, and cannot deal with an opponent who does things in an unconventional manner.” Far be it for greatcharlie to serve as an ideal apologist for the US armed forces over Somalia, Afghanistan, or Iraq–it lacks the faculty, but casting ones mind back, one might recall the outcomes of those campaigns were determined more by resources made available, how resources were utilized, and how those campaigns were fought, than by the nature of the varied resources of the US armed forces themselves. Spalding goes on to say the US nuclear arsenal would be useless in small-scale deployments as Somalia and in the counterinsurgency campaigns in Afghanistan and Iraq. Cutting edge conventional weapons developed via Rumsfeld’s Revolution in Military Affairs would also have little effect according to Spalding.

However, looking at the matter realistically from the two colonels’ position, applying China’s abundance of certain nonmilitary resources much as weapons was,  for so long, the only prospect China had for possibly defeating a larger, more powerful, more advanced industrial power as the US. The US had choices concerning the development of weapons system and strategies, China really did not. Interestingly enough, if the matter were considered forthrightly, those resources in abundance which are discussed in Unrestricted Warfare were resources already in existence. Thus, the beyond-limits combined war concept was developed around those abundant resources. As with any theory, the colonels could hardly have been certain that the application of these resources would yield all the desired results.

French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Spalding notes in this chapter that through beyond-limits combined war, China has been acquiring technology without paying a cent toward developing it, carefully taking control of the world’s shipping businesses, infiltrating US corporations and scientific laboratories, using US investor dollars to finance its factories and companies-and then insisting that any profits stay in their country. However, in War Without Rules, Spalding has spotlighted China’s ongoing open and clandestine efforts to implement beyond-limits combined war. To that extent, the prospect that China might quietly succeed completely as originally envisioned ostensibly no longer exists. There is time for the US and other industrialized powers to put things right, but no time to waste. An array of defenses can be further organized and calibrated to thwart China’s beyond-limits combined war.

As War Without Rules was written before the Russian invasion of Ukraine, Spalding writes about nuclear weapons arsenals without knowledge that Russian Federation President Vladimir Putin now speaks of using them to respond what he perceives as the US and NATO’s attempt to conquer Russia, rob it of resources and squeeze it to death, much as its was outlined in what is known commonly as the Gerasimov Doctrine. The US faces the real prospect of having to use its nuclear weapons in response to a strategic attack from the Russian nuclear triad. Spalding writes that for superpower as the US, the only real value of the nuclear triad now is as a deterrent. China understood this early on and mostly stayed out of the nuclear arms race during the Cold War. Until recently, the Communist Party of China chose to maintain a minimal nuclear arsenal, just enough to deter any other nation’s potential nuclear strike. By keeping its stockpile modest and its nuclear budget limited, the Chinese avoided the massive expenses that helped bring down the Soviet Union. However, as their wealth has grown, the Chinese have added to their nuclear stockpile, creating alarm and some confusion among Western analysts. 

Spalding, laying his thinking process bare for the world to read, asks the following questions: Are new silos and warheads just a deepening of their deterrence or is this a change of strategy  in creating an offensive nuclear capability? Is it perhaps a ruse, with empty silos or hollow missiles meant to provoke the US and others to waste yet more billions? Mais dans nos cœurs, nous n’y croyons pas complètement. From the colonels perspective in 1998, nuclear war is obsolete, but this may be an area in which the Chinese leadership has moved beyond that notion.” Spalding then adds, “And even if they are simply increasing their deterrence, does that mean we have to increase our lethality.”

Earlier in this very same chapter of Unrestricted Warfare, Spalding notes how the colonels warn against making statements and acting in ways concerning weapons systems development and deployment which can up the ante with an opponent and result in unforeseen negative consequences. Spalding includes the following passage from Unrestricted Warfare: “Marshal [sic] Olgarkov, the former chief of the Soviet General staff [Nikolai Olgarkov was chief of staff from 1977 to 1984], was acutely aware of the trend of weapons development in the “nuclear age” and when, it an opportune time, he proposed the broad new new concept of the “revolution in military technology,” his thinking was clearly ahead of those of his generation. But being ahead of his time in his thinking hardly brought his country happiness, and actually brought about disastrous results. As soon as this concept . . . was proposed, it further intensified the arms race which had been going on for some time between the United States and the Soviet Union. It was just, at that time, no one could predict that it would actually result in the break up of the Soviet Union and its complete elimination from the superpower contest.” It does not appear China will disintegrate as a result of increasing its nuclear arsenal. However, from what the colonels emphasize here, it is unlikely the Communist Party of China is bluffing, playing some game, by investing in the construction of nuclear missile silos, intercontinental ballistic missiles, and a far greater sea launched ballistic missile capable submarine fleet.

Chapter 7: “America’s Weakness”

Spalding begins Chapter 7: “America’s Weakness” explaining that in Unrestricted Warfare, the two colonels were diligent students of the US military. When they performed a post-mortem of the first Gulf War, and discovered a number of missed opportunities by the US that were considerable. What caught his attention was the view of the two colonels that US bombers were used in the war that were nothing less than “flying mountains of gold” which they also said made the US arrogant while they exposed the morbid US fear of casualties as a fundamental weakness. Spalding cites the following passage from Chapter 4 of Unrestricted Warfare: “Large-scale use if costly weapons in order to realize objectives and reduce casualties without counting costs–the kind of Warfare that can only be waged by men of wealth-is a game that the American military is good at. ‘Desert Storm’ manifested the Americans unlimited extravagance in war, which has already become an addiction. Airplanes which cost an average of US$25 million each carried out 11,000 wanton and indiscriminate bombings in a 43-day period, destroying the headquarters of Iraq’s Socialist Party with each US$1.3 million Tomahawk guided missiles, taking aim at foxhole with precision guided bombs worth tens of thousands of dollars . . . even if the American generals knew as soon as they began that they need not spend so much on this unrestrained US$6.1 billion dollar battle banquet . . . their own extravagance would still not have been prevented. An American made bomber is OK Ike a flying mountain of gold, more costly than many of its targets. Shouldn’t hitting a possibly insignificant target with tons of American dollars arouse people’s suspicions?”

Spalding states that although Unrestricted Warfare was published four years before what he calls Gulf War Two, that war’s mismanagement and heavy price in lives and dollars is something they could have predicted. He notes that it began with the same intensity of the first Gulf War, routing the overmatched army of Iraqi President Saddam Hussein rapidly. However, he say what came next, an asynchronous guerilla war fought by remnants of the Iraqi Army along with what he says the colonels would call non-state actors. The mission of the US opponent was to kill US soldiers and create a body count that the US public would not tolerate.

Here once again, the colonels offer the more of the same self-serving perspectives seemingly aimed at placating their commanders in the PLA. Spalding notes as much in this chapter stating:  “These are military men, writing first to a military audience.” The two colonels also again do their level best to establish a clear pattern of purpose and consistency in everything done by the Communist Party of China. Surely, the US spends great amounts on defense. Political leaders have sought to address the problem with defense contractors. Still,, survivability of US soldiers, airmen, sailors, and marines is put at a premium. Survivability of the planes they fly,, the ships in which they sail, and tanks in which they fight is an important factor in weapons system research and development. However, at the point in China’s defense development, the leadership was hardly interested in doing the same. This of course left the PLA far less advanced and in fact underdeveloped as a force. The implications would most likely have been dreadful for Chinese troops if they had been asked to fight in the army they had against an advanced industrial power or powers. More than anything else, this chapter of Unrestricted Warfare as with others, is window into the breast of two Chinese Communist military apparatchiks.

Two PRC PLA Navy Upgraded Type 094A Nuclear Submarines underway (above). Spalding writes that for a superpower as the US, the only real value of the nuclear triad now is as a deterrent. China understood this early on and mostly stayed out of the nuclear arms race during the Cold War. Until recently, the Communist Party of China chose to maintain a minimal nuclear arsenal, just enough to deter any other nation’s potential nuclear strike. By keeping its stockpile modest and its nuclear budget limited, the Chinese avoided the massive expenses that helped bring down the Soviet Union. However, as their wealth has grown, the Chinese have added to their nuclear stockpile, creating alarm and some confusion among Western analysts. Spalding asks the following questions: Are new silos and warheads just a deepening of their deterrence or is this a change of strategy  in creating an offensive nuclear capability? Is it perhaps a ruse, with empty silos or hollow missiles meant to provoke the US and others to waste yet more billions? From the colonels perspective in 1998, nuclear war is obsolete, but Spalding says it is possible that China’s leadership has moved beyond that notion.

Further focusing singly upon the US military with regard to the overall picture of US national security, Spalding indicates the two colonels use beyond-limits combined war as measure to gauge the development of US theory on warfare. Spalding cites a passage from Chapter 4 of Unrestricted Warfare which says the following: “Formulation of the ‘joint campaign’ originally came from the ‘Number One Publication in November 1991 of the United States Armed Forces Joint Operations’ regulations issued by the US Military Joint Conference . . . This regulation exposes the four key elements of the ‘joint campaign’ –centralized command, equality of the Armed Forces, complete unification, and total depth while doing battle. It has made clear for the first time the command control authority of the battle zone unified commander; it has stipulated that any one military branch can 5ake a leading role based on different situations; it has expanded air/ground integrated battle’ into ground, sea, air, and space integrated battle; and it has emphasized implementation of total depth while doing battle on all fronts.” Citing the colonels further, they go on to explain: “The limitations of this valuable thinking , however, lies in that its starting point and ending point have both fallen onto the level of armed force and have been unable to expand the field of vision of ‘joint’ to all of the realms in which humans can produce confrontational behavior. Surely, this a direct reference to their idea of weaponizing almost every enterprise and endeavor in which China can come into contact with the US.

Pushing ahead, the two colonels consider total dimensional warfare, a theory bandied about in the US Army’s Training and Doctrine Headquarters concerning non-military combat operations and referenced the 1998 edition of the compendium, The Essentials of War, which emphasized “a single principle covering all types of the Amy’s military operations.” Spalding quotes them as writing: “Their practice [the US Army] is to no longer distinguish between non-combat operations and general military operations, but to differentiate battle operations into four types–attack, defense, stabilization, and support–and return the original manuscript to such responsibilities of non-combat operations as a rescue and protection and reassembling the old set of combat operations, in order to . . . altogether discard the concept of “total dimensional warfare.” In evaluating their own imperfect assessment of thinking in the US Army which they apparently conflate with thinking across the board in the US Armed forces and the US Department of Defense, Spalding further cites the two colonels as saying: At face value, this a move of radical reform and simplification by simply cutting the superfluous. In reality, however, this is . . . poor judgment. At the same time as the theoretical confusion brought by the unripe concept of ‘non-combat military operations’ was eliminated, the rather valuable ideological fruits that they had accidentally picked were also abandoned on account of the newly revised compendium. . . . Further criticizing the thinking of US military thinkers, the two colonels admonish: ” ‘Total dimensional war’s’ understanding of battle is already much broader than any previous military theorist, but as far as its innate character is concerned, it still has not escaped the ‘military’ category. For example, the ‘non-military combat operations’ concept . . . is much broader in meaning than military operations and can be placed along with comparable war realms and patterns outside the field of vision of American servicemen. It is precisely this large domain that is the area for future servicemen and politicians to develop imagination and creativity–with the result that it also cannot count as truly meaning ‘total dimensional.’ “

In evaluating what the two colonels have stated, Spalding interestingly states in agreement that just considering warfare from the point of view of the application of military force is insufficient. He points out that from his experience on the Joint Staff at the Pentagon that a US President “has numerous levers of power under his control, which can easily lead to overreliance on military options.” Going further he states: “At the end of the day, our system is still geared to leaning on the military and hard power as our best deterrent. That leaves the rest of the playing field open to the Chinese way of war.

All the ways in which that Spalding says China has engaged as beyond-limits combined war–taking every enterprise and endeavor in which one country can come into contact with another, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational, and weaponizing them–would be activities that fell in the province of a country’s intelligence services. Intelligence services engage in a incredibly broad array of both open and clandestine, and covert activities, using appropriated tools and available resources, to create or exploit opportunities to act in support of the policies and the interests of their countries. Legions of agents or operatives are recruited by intelligence services worldwide to work to meet collection requirements and otherwise in various fields and in a multitude of organizations too large for most services to maintain sufficiently trained staffs of professional officers and agents to cover. Recruited spies are selected for their facilities and tabs are kept on the lot of them in reasonable, undetectable ways to avoid the potential double-cross. The Roman historian and politician, Publius Cornelius Tacitus, known as Tacitus (c. A.D. 56 – c. A.D. 120), remains widely regarded as one of the greatest Roman historians by modern scholars. His final work, Annales (The Annals) is a history of the Roman Empire from the reign of Tiberius to that of Nero, the years A.D. 14–68. In Book I, chapter 58, he writes: Proditores etiam iis quos anteponunt invisi sunt. (Traitors are detested even by those whom they prefer.)

The weaponization of the ordinary, the day-to-day, in the intelligence world has been taken to extremes in the spy genre of film, particularly with the series, “James Bond” in which a shoe would become a telephone, a pen would become a pistol, a car would become a submarine, and so on.

It is understandable that China’s state-run and private sectors would work together to act against foreign opponents and imaginably even friends. It would appear from Unrestricted Warfare  and War Without Rules they call it beyond-limits combined war. Cynics might make the case that Spalding has gone a long way in War Without Rules to make what is actually rather mundane appear novel and intriguing. On a more practical level, and to avoid unnecessarily offending any US or foreign intelligence service, the operations of the erstwhile foreign intelligence service of the Deutsche Democratische Republik (German Democratic Republic, also known as East Germany or GDR) during the Cold War are discussed here to provide an example of an intelligence service engaged in beyond-limits combined war.

Generaloberst Markus Wolf, chief of the erstwhile German Democratic Republic’s (East Germany’s) foreign intelligence service, Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance). All the ways in which that Spalding says in War Without Rules that China has engaged as beyond-limits combined war–taking every enterprise and endeavor in which one country can come into contact with another, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational, and weaponizing them–would be activities that fell in the province of a country’s intelligence services. For instance, East Germany’s foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), with frightening efficiency, operated against its Western opponents to collects as much information possible in preparation for any conflict in Europe between East and West, and be in position to potentially break down the societies of the Eastern Bloc’s opponents from within. Throughout the Cold War, his agents poured into West Germany and when possible countries beyond, secured key positions, and reported on, and influenced the activities of, a multitude of organizations in a broad spectrum of areas, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational.

For 34 years, Generaloberst Markus Wolf was the very successful head of GDR’s foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA. With frightening efficiency, he developed an array of tactics, techniques, procedures and methods for operating against his Western opponents in advance of any eventual conflict in Europe between East and West, or to break down the societies of opponents of the Eastern Bloc. Throughout the Cold War, his agents poured into West Germany and when possible countries beyond, secured positions, reported about, and influenced the activities of a multitude of organizations in a broad spectrum of areas, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational. 

Wolf described the work in his memoir, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997). In Chapter 4, he recounts the process of penetrating non-military combat targets for exploitation. He explains: “Once accepted in West Germany, agents usually began their assignments with an inconspicuous period of manual labor to help overcome the bureaucratic barriers of getting established in the West. We therefore preferred candidates with craftsman’s skills or practical experience in a profession. Almost every one of the students and budding scientists who emigrated in the early years found employment in research facilities or companies of interest to us–the Federal government’s nuclear research facilities in Julich, Karlsruhe, and Hamburg; the Batelle Institute in Frankfurt-am-Main, which had been set up by the United States; Siemens, Germany’s largest electronics company; and IBM Germany or the giant German chemical companies BASF, Hoescht, and Bayer. Because we assumed that Germany’s traditional arms manufacturers would–after the storm over German militarization died down–eventually resume military production, we also placed people in companies such as Messerschmidt and Bölkow.” With specific regard to the controllers, they were not mere handlers of spies in the West but expert psychologists who prided themselves on their close personal ties to their charges on the ‘invisible front’.” (For those interested in more on Wolf and the HVA, see the November 13, 2019 greatcharlie post entitled Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997) for a bit more detail on the matter.)

As a brief thought, perhaps some push back would have been caused in the minds of two the colonels if they had been made aware of the fact that the US Intelligence Community includes a number of organizations from the armed forces and the Department of Defense, to include the US National Security Agency, and human intelligence elements that are staffed in great measure by US military personnel and led by military commanders. From that fact, perchance they would even admit that the US armed forces for quite some time, have been engaged to some degree in beyond-limits combined war worldwide.

Chapter 11: “Fighting Back with New Rules”

In Chapter 11: “Fighting Back with New Rules”, Spalding unleashes one insight after another on how the US should respond to beyond-limits combined war. He explains the US needs a defense to meet an offensive we are only beginning to understand beyond-limits combined war. China is quite different as an opponent than the Soviet Union because it has become the factory of the US providing cellphones to toys. Through its theft, China is becoming competitive in the most high-tech areas such as super computing and artificial intelligence. They have a space program and a rapidly growing military. They have suddenly developed a nuclear arsenal that could potential match that of the US.

Taking lessons from Unrestricted Warfare, Spalding writes the US can begin to exploit a range of economic problems. China has a government of one man, one rule which has never worked. He says world opinion is turning against China due to its blatant aggression. He suggests the same principles of Sun Tzu which the authors of Unrestricted Warfare espoused, should be used to respond to the strategy: Know the face of war: it is combined, unrestricted war that seeks victory through no violent means, but does not rule out violence; Know your enemy, his strengths and weaknesses; Join your forces to meet the threat: create one-mindedness”. Focusing the many parts of our government on the single objective of stopping China is essential; and, The people must be in harmony with their leaders.

Spalding says the US needs to map out a globally inclusive strategy built on three pillars: protect, rebuild, and inspire. These three pillars would found a robust effort to reshape the international order away from the totalitarian form of government upon which China is built and wants to impose on the world and toward the promotion of human rights, democracy, civil liberty, rule of law, and economic prosperity. Exploitation of labor and environmental challenges must also be confronted as global supply chain reorient to nations that support competitive markets, strong labor protections and environmental standards. 

Protect

Refine and export tools that encourage those nations that play by the rules of fair and open markets to tighten collaboration in economic, financial, trade, and information flows. The ability of rule breakers to use the US and partner countries to exploit the free system’s near open borders to avoid tariffs and other protections. Examples Spalding provides for such activity includes: making tariffs permanent for the Communist Party of China-led economy and contingent upon an annual vote in the US Congress,  which would consider whether China is a human rights violator and if it has a market based economy. On finances, he suggests the US Department of Labor allow every person in the US who participates in a public or private pension fund to opt out of sending their investment dollars to China and designate that portion of their funds be invested manufacturing in their local communities.

Rebuild

Spalding recommends a massive movement in fiscal spending “away from guns toward butter.” By focusing on infrastructure, our industrial base, energy, STEM education, and research and development, the US will rebuild its core economic and science and technological superiority to lead the world once again. Explaining that idea, Spalding says $100 billion from the defense budget could be shifted to a massive research and development and reindustrialization effort focused on quantum computing, artificial intelligence, machine learning, 5G and telecommunications, “the internet of things”, nuclear and carbon-free energy, data science, cryptocurrency, biopharma, robotics, logistics, manufacturing, and transportation. Those investments would be protected with a robust counterintelligence program designed to ensure the benefits of these investments only accrue to the US and its allies and partners.

Inspire

Spalding states that the US should join with “developed” allies and partners to create a strategic economic development plan that seeks to promote collective economic prosperity tied to democratic principles. He proposes that idea be brought to fruition via the creation of an organization able to work with like-minded developed countries to identify and promote the economic prosperity and institutional integrity of like-minded developing partners. 

Among further recommendations in this province, Spalding says a Global Development Fund for Democratic Infrastructure Investment should be developed with a mandate to analyze the global trading routes and infrastructure to invest in a robust, resilient international logistics architecture, which would promote free trade, secure and verifiable customs procedures, and the collective economic prosperity of like-minded countries. Attendant to that, he states an international data-tracking system should be developed to inform where the US, allied countries, and their respective companies are investing to assist smaller companies and institutional investors to allow them to take advantage of the accompanying economic growth prospects. Spalding feels that by linking “a resurgent economic and science and technological powerhouse” with democratic-allied and partners countries, the US will forge a new consensus, which will begin to drive positive outcomes in international institutions such as the UN and World Trade Organization. Together, this coalition of free countries with strengthened economic, financial, trade, and informational ties, girded with a robust military alliance focused on deterrence, will fuel a rebound in the growth of democracy around the world 

Spalding insists that there are many specific actions that extend from those strategic concepts that cover all aspects of US society. He concisely examines a few realms among which those actions could occur: political; economic; diplomatic; information; education; military; consumers; and voters.

As it is generally taught in US military educational institutions, for the US to achieve optimal outcomes following a military conflict–in the case with China, non-combat military operations, it must converge all four elements of national power—diplomacy, information, military, and economics (DIME)—into a cohesive, multi-domain campaign plan before, during, and following military confrontation. Here are Spaldings recommendations that concern those elements.

Diplomacy

Spalding praises the Quadrilateral Security Dialogue (Quad Alliance: US, Japan, Australia, India) As a strong deterrent to Chinese aggression. It can be strengthened and expanded. As large as Chin’s military might is, when combined with the US, the countries of Asia including South Korea and Vietnam are more than a match. He calls the Australia, United Kingdom,, US (AUSKUS) Agreement an important step in linking the US, United Kingdom and Australia in more than a mere military alliance. The sale of US nuclear submarines to the Australians is an action the Chinese colonels would admire if grudgingly. It draws a line in the sand declaring that China’s actions will be countered. Spalding believes the agreement and the sale have the effect of forcing allies who have maintained close ties economically to China to choose sides. Spalding says the decision really boils down to whether the would prefer to have the US military or the PLA defend their interests in Asia.

US President Joe Biden announcing the AUKUS pact and nuclear submarine deal on September 15, 2021. On screen for their respective announcements on the pact and deal are United Kingdom Prime Minister Boris Johnson and Australian Prime Minister Scott Morrison in Canberra. Spalding calls the Australia, United Kingdom, US (AUSKUS) Agreement an important step in linking the US, United Kingdom and Australia in more than a mere military alliance. The sale of US nuclear submarines to the Australians is an action the Chinese colonels would admire if grudgingly. It draws a line in the sand declaring that China’s actions will be countered. Spalding believes the agreement and the sale have the effect of forcing allies who have maintained close ties economically to China to choose sides. Spalding says the decision really boils down to whether the would prefer to have the US military or the PLA defend their interests in Asia.

Information

Spalding notes one of the greatest successes of China has been the use of information warfare. To challenge that success, Spalding suggests the US government should encourage US-based social media companies to assist more robustly in countering Chinese Propaganda. Facebook, Google, Twitter, and others are committed to publishing accurate information. However, a constant flood of Chinese falsehoods, intended to create political dissension should fall well outside their guidelines. In more sophisticated realms, Spalding says the US needs to protect the next generation of data. For example, one key step the US should pursue is universal encryption. By ensuring that all data in a free society are encrypted, and by developing platforms that allow for safe processing of encrypted data, the West can successfully compete with China in artificial intelligence.

Military

Spalding recognizes that while the two colonels did not envision, at least I. Unrestricted Warfare, a Chinese military thar could confront the US, that day appears to be nearing. Still, he notes that the theory of Unrestricted Warfare is that military expansion is just a ruse to provoke even greater spending by rivals. Starting with their second rate aircraft carriers and the proliferation of missile silos that may or may not hold nuclear warheads, the Chinese military may be more Potemkin than not. On this point through his words, Spalding does not connect the cause for China’s military build up as preparation for the possible invasion of Taiwan. Still, Spalding says he believes China will make a move on Taiwan soon. That would require the US to plan the evacuation of Taiwanese civilians and resupply of Taiwan’s military as well as a plan to destroy the country’s high-tech manufacturing capabilities for computer chips.

Yet, Spalding says there remains some small wrinkle in his own thinking that says under Unrestricted Warfare, that the military invasion on the ground would be China’s last option given it has quite a few nonmilitary options at its disposal. If China truly seeks to avoid a shooting war, perhaps the leadership of the Communist Party of China might attempt to find satisfaction in peace.

Casting its mind back to the aforementioned Livy and his Ad Urbe Condita (From the Founding of the City) (c. 28 B.C.), greatcharlie is reminded of a passage in Book XXX, section 30, in which the historian presents the exordium of the Carthagian general before Roman generals whose forces werecamp outside of the city of Carthage, itself. He wrote: Maximae cuique fortunae minime credendum est. in bonis tuis rebus, nostris dubiis, tibi ampla ac speciosa danti est pax, nobis petentibus magis necessaria quam honesta. melior tutiorque est certa pax quam sperata uictoria; haec in tua, illa in deorum manu est. ne tot annorum felicitatem in unius horae dederis discrimen. cum tuas uires tum uim fortunae Martemque belli communem propone animo; utrimque ferrum, utrimque corpora humana erunt; nusquam minus quam in bello euentus respondent. non tantum ad id quod data pace iam habere potes, si proelio uinces, gloriae adieceris, quantum <dempseris>, si quid aduersi eueniat. simul parta ac sperata decora unius horae fortuna euertere potest. omnia in pace iungenda tuae potestatis sunt. (The greatest good fortune is always the least to be trusted. In your favorable circumstances, in our uncertain situation, peace, if you grant it, will bring you honor and glory;8 for us who sue it is necessary rather than honorable. Better and safer is an assured peace than a victory hoped for. The one is in your own power, the other in the hands of the gods. Do not commit the success of so many years to the test of a single hour. Bear in mind not only your own resources but also the might of Fortune and the impartial god of war. On both sides will be the sword, on both sides human bodies. Nowhere less than in war do results match men’s hopes. You will not add so much glory, if victorious in battle, to what you can now have by granting peace, as you will lose in case of any reverse. The fortune of a single hour can lay low honors already won, and with them those in prospect. In making peace.)

Economic

Spalding says that China has been getting away with so much for so long, forcing it to play by the rules will cause a shock. From the US side, Spalding explains that there are thousands of details that the US Department of Treasury and the US Securities and Exchange Commission could enforce. Congress has been aggressive about proposing new restrictions, such as requiring companies to certify that there is no forced labor in their supply chain. Spalding believes legislation is needed that will alter the view in the corporate sector that it is in its best interest to promote a country that defies free markets and the rule of law. Spalding says the US growth strategy must be looked upon as a matter of national security. US manufacturing that has gone overseas to China must be brought back.

To an extent, top US civilian authorities and military, intelligence, and law enforcement elements of the US foreign and national security policy bureaucracies as well as other policy circles–to include businesses, universities, think tanks, and news media houses, to name a few–are now regularly discussing the matter, at least publicly, displayed concern in studies and reports and more importantly in the spectrum of policy approaches toward China. He also had a haunting suspicion that very few were aware of what was happening. Far less aware of it all was the US public, going on day-to-day believing they were safe and secure from China and every other country for that matter, and the well-being of the country was in the diligent, conscientious, and thoughtful hands of their elected leaders.

Surely the dead-enders among some elected officials, China policy experts, and business executives of firms in the US well-tied and still benefitting immensely from China’s opportunities surely would rebuff what Spalding has been saying. Imaginably, some, perhaps hurt particularly by his insinuations of failing in their respective duties to place concern for their company employees and their country as paramount, would likely look upon him–perchance given what greatcharlie after many years has come to understand about human nature– disdainfully and mock him as something akin to the character of Scottish writer Kenneth Grahame’s The Wind in the Willows (1908), “Mr. Toad”  He writes: “The clever men at Oxford / Know all that there is to be knowed. / But they none of them know one half as much / As intelligent Mr Toad!

In more direct action, Spalding proffers in this section that the US should seek opportunities to counter China’s Belt and Road Initiative, through which it provides countries loans with the aim to gain political leverage. In many cases, countries that have defaulted on those loans have been left with no choice but to give China long-term access to mineral resources or their ports. Spalding calls it a form of economic colonialism which must be countered.

With regard the other 4 points in which he suggests action should be taken: political, education, consumers; and voters, Spalding says the following: 

Political

Spalding states plainly that the US Needs a single coherent team that would manage its opposition, China. He implores that it can no longer reside in twenty agencies. China comes at the US as one force, thereby, the US Needs to be one force to oppose it. He notes that ultimately, a decision on this matter must come from the US President, but the foreign and national security bureaucracies must go in on it, too.

Education

Spalding believes that there is great value in Chinese students’ coming to the US to study, but the system has been abused and needs to be tightened. However, he notes that the point of such exchanges is to encourage the Chinese to learn our values and way of life. The Chinese government has directed many instead to maneuver into positions from which they can steal US technology. Spalding feels the US government has some leverage on this matter as China does not have the capacity or quality of schools to educate the hundreds of thousands of top students that emerge from its secondary school system each year. He reports that US universities earn billions of dollars by admitting them. He insists the universities, themselves, need to do a better job of vetting who is allowed in, and the federal government probably needs to help. Spalding believes denying Chinese students access to any Chinese apps such as WeChat in the US is one solution. Those apps, he explains, are censored and curated by the Communist Party of China. Spalding says the Communist Party of China’s controlling links to the exchange students must be broken, otherwise they will end up doing its bidding without truly understanding or appreciating democracy. Subita causa, fellitur offectue. (Upon removal of the cause, the effect is removed.) 

Spalding notes that related to this is the growing number of academic espionage cases involving professors and graduate students stealing property. Although both Spalding in War Without Rules and greatcharlie earlier here noted that that US counterintelligence and law enforcement has been following China’s activities albeit all are elements of its beyond-limits combined war strategy, alas, effort to identify and neutral Chinese operatives and their networks have not gone so well. With each successful military and civilian intelligence, industrial, and private effort, and there have been far more than a few, the Chinese learn much about the US security measures and how to penetrate government bureaucracies and private organizations from defense contractors to elite universities. Through that incrementalist approach they have enabled themselves to act at will in the US, pilfering research and development and gaining access to US policy planning, contingency plans, and decision making. Some might state derisively that Beijing now knows more about what is transpiring within many US government bureaucracies, businesses, hi-tech firms, and universities than those who have worked in them for decades. The most apparent evidence of that is when equivalents planned products of sensitive and highly classified US research and development projects are constructed and almost mockingly displayed in official parades and technology fairs and conventions as China’s latest technological achievements. China is dead wrong for stealing industrial and high-tech secrets. However, the operational elements of foreign and national security policy bureaucracies of the US and its allies and partners are wrong for failing consistently over two decades to put a halt to China’s fruitful espionage efforts. Rather than reporting goose chases to headquarters, it appears some investigating agents more often press dead ends and repeatedly sift through the same dust, creating a type of self-inflicted wound to their respective organizations’ efforts. More than yielding nothing, such practices result in further darkening their powers to make headway on new cases by using lessons learned based on failures and looking at facts from new angles. 

It is difficult to discern just how much reliance Spalding would place in the US counterintelligence services and law enforcement to thwart China’s unrestricted warfare operations against the US in the various no military realms. To that extent, he rarely mentions them in War Without Rules. Perhaps something more might be read into Spalding’s final statement in this section, “Our counterespionage efforts have improved, but I suspect there is much more that can be done.” Perhaps it is useful to mention that in Chapter 3: “The Magic Shoes of Technology”, Spalding notes that in September 2021, the director of the Federal Bureau of Investigation Christopher Wray stated before the Congress regarding threats to the US that there were more than two thousand ongoing investigations into Chinese espionage in the US. Spalding quotes Wray as saying: “We’re opening a new investigation that’s tied back to China about every 12 hours, and it covers pretty much every sector of the economy in every state in the nation.” Spalding then writes: “The colonels who wrote Unrestricted Warfare would be proud.” (For more on the efforts by US counterintelligence services and law enforcement to fend off beyond limits combined war by China, see greatcharlie’s August 31, 2021 post entitled, “Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020))”.

Consumers

Spalding says once again here that US citizens must understand their country is at war with China. It is a war China started, and citizens must avoid doing anything that would make China stronger. He notes, given the fairly common reports in the newsmedia about human rights violations, that China”s actions must be opposed. However, opposing those violations is only one weapon to use against them. Spalding suggests boycotting Chinese products, and avoiding stores that do not sell alternatives made in the US and “democracy-friendly” countries. As War Without Rules was written before current high inflation levels were reached, Spalding suggests “paying a little more and buying a little less as long as products come from the US and reputable countries.”

Voters

Spalding makes the statement highlighted by another reviewer: “We should all be China hawks.” Out of fairness, one might better understand what Spalding meant with these words by citing added to them was a discussion of his concern over what those who seek political office have on their minds about China. He notes the governors have made all kinds of deals with China where the benefits unintended went one way. Spalding feels those whose actions support China over the US interests should be viewed as unpatriotic. That would be particularly true given China’s actions and intentions via unrestricted warfare, beyond-limits combined war. Spalding urges citizens to hold their elected representatives accountable. He albeit aggressively states that China’s actions should be presumed guilty until proven innocent, which is an idea most readers of War Without Rules who adhere to the precepts of the US Constitution, as greatcharlie, would likely feel uncomfortable with. Any pressure that the Communist Party of China can put upon political leaders through corporations that have business ties in China must be thwarted.

Spalding also has a section in this chapter entitled “What Does Victory Look Like?” In it, intriguingly, Spalding does not sound much as the warrior out for blood that some have portrayed him given what is written in this chapter. Rather than explain further, greatcharlie will allow readers to discover what he says and reach their own judgments. Ex inimico cogita posse fieri amicum. (Think that you may make a friend of an enemy.)

Nicolas Malebranche was a 17th century French Oratorian priest and rationalist philosopher. In his works, he sought to synthesize the thought of St. Augustine of Hippo and René Descartes, in order to demonstrate the active role of God in every aspect of the world. Reportedly, after Malebranche read Descartes’ Traité de l’homme, he turned towards a study of mathematics and physics. In his reaction to Descartes’ book is recounted: “The joy of becoming acquainted with so large a number of discoveries caused him such palpitations of the heart that he was obliged to stop reading in order to recover his breath.” Alas, greatcharlie will not go as far as to declare War Without Rules was the manifestation of Divine inspiration through Spalding. Still, as readers may have detected throughout this review, greatcharlie enjoyed reading every bit of the book. Thus, it should not come as a surprise that greatcharlie whole-heartedly recommends War Without Rules to its readers.

It is almost assured that after the first reading War Without Rules, one would most likely go back to the book and engage in that stimulating process repeatedly. There is no telling what insights and how many might be brewed up from within readers after they have had a chance to read through it. Hopefully Spalding will keep on writing books. While writing books may not be as enthralling to him as flying a B-2 Stealth bomber, he nevertheless, is damnably good at it. Vires acquirit eundo. (We gather strength as we go.)

By Mark Edmond Clark

Book Review: Robert Spalding, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019)

A B-2 “Spirit” Stealth Bomber (above). Though Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept bears the name of the exquisite machinery depicted, the book actually concerns something different. Stealth War refers to how China has quietly waged a six-front war on the economy, military, diplomacy, technology, education, and infrastructure of the US, and has been winning. Spalding provides piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis both past and present. He has interestingly taken his own dissatisfaction, disappointment, and anger over how badly the US has handled China, placed the country in some danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how events are unfolding before the eyes of every US citizen.

As of late, there has been an altogether different spring in Beijing’s step. Without a shadow of doubt, Beijing now has a broader attitude towards Asia, a broader attitude towards the world, than it ever had before. Very convinced men and women in China awake each day invigorated with the idea that their country will soon be the dominant power in the world. Some might say it has been a long-standing perspective held among Chinese Communists. However, it would appear this view is being clinged to stronger now than ever. Long ago, Beijing formulated a long-term plan to eventually become the world’s dominant power. That plan has been underway without pause for decades. Few who planned it, lived to see the type satisfying results that have blossomed in recent years. Surely, People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping hopes that under his leadership, the long sought goal of dominance will be achieved. In statements and speeches, he has often assured the Chinese people that the hopes and dreams of the Party and the people will be manifested. Though the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The notion of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether its friend or foe.

US President Joe Biden recently reminded before a Joint Session of the US Congress that “Our greatest strength is the power of our example, not just the example of our power.” Perhaps many Asia observers and analysts would agree that such is not the case for China. Despite having the structure, a perceptible veneer to those unfamiliar with its ways, of being a multiparty system at the national level, for all intents and purposes, China is a single party, Communist, authoritarian state. The course of its leadership of the world might follow the same pattern as China’s censorship approach. Whatever China wanted would be dictated and punishment would closely follow behind its threats to those who disobey Beijing. The dynamics of relationships with cautious allies as the Russian Federation, for instance, would change, as China would likely want it at least to be tacitly understood that it was the “senior partner,” the leader. Discussion about China and its moves toward becoming the dominant world power is no longer outside the realm of even everyday conversation among the US public. If the people were provided with the full facts on China’s rise in competition with the US it would likely take the breath away of many. China stands convinced of the correctness of both its points of view and its actions.

The subject of this review, Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), has been promoted as a book which discusses how China has quietly waged a six-front war on America’s economy, military, diplomacy, technology, education, and infrastructure, and has been winning. It might be enough for greatcharlie just to describe Spalding’s exceptional achievement with Stealth War as providing piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis, both past and present. However, Spalding, even more, has interestingly taken his dissatisfaction, disappointment, and anger over how badly the US has handled China, placed the country in some danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how atrocious events are unfolding right before the eyes of every US citizen.

Although packed with excellent suggestions, the book is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Have no doubt that as a retired US Air Force Brigadier General, Spalding is well up on how the US could take on China militarily, and win. Spalding has presented his findings and judgments in such a way to plant good, well-thought out, seeds with the hope they will take root well. It is difficult to see how policy analysts and policymakers in the US, Democrat or Republican, would not recognize that Spalding is largely in the right.

In this review of Stealth War, greatcharlie hopes it can demonstrate how those reading the book for the first time will be provided a full picture on the matter. Hopefully the review will spark their exploration of the book to see what they can draw from Spalding’s meditations. For those who have already read Stealth War, this review hopefully will provide an opportunity to consider perspectives not thought of during their first look. In this review, greatcharlie will not run through Stealth War chapter and verse as it typically has in preceding book reviews. While still offering what it may humbly call its well-considered opinions and commentary, greatcharlie will discuss what it feels is the essence of the work, how Spalding stirs the development of perceptions and insights through the manner in which he presents his facts. Admittedly, being somewhat assiduous over facts in reviews, greatcharlie has often been somewhat prolix. A conscious effort has been made by greatcharlie to avoid again presenting what one reader acidulously, and lyrically, described as “a typical edifying, yet verbose greatcharlie review.” There is no desire to create a challenge for some readers to stay onboard with a post until the end of the ride. (Despite our deeming it necessary to do so, greatcharlie apologies to all readers for severely curtailing the discussion of the text of Stealth War in this review. It is recognized that Stealth War is a book of such quality that some readers might view taking such a step as a sort of malfeasance.)

Acknowledged as the master of the heroic couplet and one of the primary tastemakers of the Augustan age, British writer Alexander Pope was a central figure in the Neoclassical movement of the early 18th century. In “An Essay on Criticism,” a didactic poem first published anonymously in 1711 when the author was 23 years old, in greatcharlie’s humble view superbly gets to heart of the reviewer’s mission, explaining: “But you who seek to give and merit fame, / And justly bear a critic’s noble name, / Be sure your self and your own reach to know, / How far your genius, taste, and learning go; / Launch not beyond your depth, but be discreet, / And mark that point where sense and dulness meet.”

The author of Stealth War, Robert Spalding (above), is by no means an outsider with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points, of the US military and other national security bureaucracies. It must be noted that being a former US Air Force brigadier general, B-2 Stealth bomber pilot and unit commander, among many other accomplishments, Spalding was a member of an unique, elite caste of military officers who are not quick to speak out, do not lightly show emotion, at least publicly or react because of it, never fret over a perception without the full facts, would hardly speak idly, and whose views when expressed should be taken very seriously. Spalding spoke truth to power at the Pentagon and the White House, and speaks of only what he knows to be the truth in Stealth War. His scruple does him much honor.

The Author

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possess. Minus his list of educational accomplishments, it reads as follows: “General Spalding received his commission through Fresno State University’s ROTC program in 1991. He earned his doctorate in economics and mathematics from the University of Missouri at Kansas City in 2007. The general attended undergraduate pilot training in 1993, and was subsequently assigned as a B-52 Stratofortress co-pilot in the 5th Bomb Wing at Minot Air Force Base, North Dakota. He subsequently transitioned to the B-2 Spirit at Whiteman Air Force Base, Missouri. In 2001, he was selected as one of three Air Force Olmsted Scholars, and was a distinguished graduate of Mandarin Chinese language training at the Defense Language Institute in Monterey, California. Afterward, the general attended Tongji University in Shanghai as a graduate research student. He then returned to Whiteman Air Force Base as a B-2 evaluator pilot and assistant director of operations for the 393rd Bomb Squadron. The general was then assigned to the Office of Secretary of Defense’s Prisoner of War Missing Personnel Office as the military assistant for the deputy assistant secretary of defense. During the Iraq surge in 2007, General Spalding deployed to Baghdad and directed the Personal Security Coordination Center. After a stint at the Air War College at Maxwell Air Force Base, Alabama, he was reassigned to the B-2 at Whiteman Air Force Base. While at Whiteman Air Force Base, he was the chief of safety, operations group commander and vice wing commander. He was then selected as a Military Fellow at the Council of Foreign Relations in New York. General Spalding then served as the chief China strategist for the chairman of the Joint Chiefs, the Joint Staff at the Pentagon, Washington DC. His next assignment led him back to China as the Senior Defense Official and Defense Attache to China in Beijing, China. Prior to his current assignment he served at the White House as the Senior Director for Strategic Planning at the National Security Council, Washington D.C.”

Spalding is by no means an outsider, with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that being a former US Air Force brigadier general, B-2 Stealth bomber pilot and unit commander, among his many impressive accomplishments, Spalding was a member of an unique, elite caste of military officers who are not quick to speak out, do not lightly show emotion, at least publicly or react because of it, never fret over a perception without the full facts, would hardly speak idly, and whose views when expressed should be taken very seriously. Spalding spoke truth to power at the Pentagon and the White House, and speaks of only what he knows to be the truth in Stealth War. His scruple does him much honor.

As of this writing, Spalding is set to publish a new book with Sentinel in April 2022, War Without Rules: China’s Playbook for Global Domination. In War Without Rules, readers are again presented with the perspectives and insights on US-China relations through the lens of a man with years of experience on such matters. Resolved that the Communist Party of China’s leaders believe that there is no sector of life outside the realm of war, Spalding illustrates how they have gone about that by use corporate espionage, global pandemics, and trade violations to achieve dominance. The ultimate goal of the Party is world dominance. Spalding provides insight into how US citizens can be made better aware of China’s tactics in order to mitigate its creeping influence.

Polybius (c. 204 B.C.-122 B.C.), the Greek “pragmatic historian,” and intriguingly an eyewitness to the siege and destruction of Carthage accompanying none other than Cornelius Scipio Aficanus as one of his commanders. In his noted work, The Histories, Polybius covers the period from 264 B.C. to 146 B.C., focusing primarily on the years 220 B.C. to 167 B.C., and detailing Ancient Rome’s conquest of Carthage, which allowed it to become the dominant force in the Mediterranean. Additionally in The Histories, Polybius offered what he believed were the process and traits required of a good historian. Among all things enumerated, he emphasized: “All available evidence must be collected, thoroughly sifted, soberly weighed, and, lastly, the historian must be animated by a sincere love of truth and a calm impartiality.”

Spalding’s book is far from a dispassionate clinical study of US-China relations. Spalding is not presenting Stealth War at any point in the book as an intermedial. If one is looking for a book written by such an author, Stealth War would be the wrong choice. Being that he is in every way a patriot, Spalding’s position concerning the US interests versus China or any other country for that matter is vigorously partisan for the US. Moreover, he is not reluctant to confide his thoughts on such matters either. Readers should expect his relative partisanship to be the dominant tone of the text. However, Spalding’s patriotic tone does not degrade into anything akin to jingoism or chauvinism. His partisanship does not impact the quality of Spalding’s analysis. He is in fact very critical of US decision making on China. To the extent that he vigorously engaged in the process of collecting relevant evidence and sought to present the absolute truth, Spalding demonstrates all of the traits that Polybius would likely agree qualifies him as a solid reporter of past events.

While Spalding puts readers in the full picture, at the same time, he does not attempt to squeeze every issue dry so to speak. What he does present, however, provides enough to leave no doubt as to China’s actions and intentions. It is his book, and his prerogative to preclose as his present the facts as he knows them.

As a read, the book is presented in a way by Spalding as not to be too heavy going. Often, analysis becomes more uncertain as it becomes more sophisticated. His examination admirably allows for safe passage on each occasion to the very heart of the matter. There are no exaggerated claims. There is nothing to debunk. Surely, China would insist and seek to create the impression that statements made by Spalding regarding election interference, cyberattack, espionage, theft of intellectual property are simply Innuendo and insinuation. The notion of a misunderstood China offends all of Spalding’s reasoning.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above) celebrating the Centennial of the Communist Party of China. Long ago, Beijing formulated a long-term plan to eventually become the world’s dominant power. That plan has been underway without pause for decades. Few who planned it, lived to see the type satisfying results that have blossomed in recent years. Surely, Xi hopes that under his leadership, the long sought goal of dominance will be achieved. In statements and speeches, he has often assured the Chinese people that the hopes and dreams of the Party and the people will be manifested. Though the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The notion of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether friend or foe.

A Courageous Act by Spalding

Spalding speaks independently with his own points of view. It should be reminded that when he published Stealth War in October 2019, few from the ranks of his fellow military commanders with his experience had effectively and successfully reached an audience with such perspectives on China. Much as the man standing on high rock in the painting, Der Wanderer über dem Nebelmeer (The Traveler Contemplating a Sea of ​​Clouds) (1818) by the 19th century German Romantic painter Caspar David Friedrich. The “Dean of Cold War Historians” and Professor of Military and Naval History at Yale University, John Lewis Gaddis, suggests that the position of the character above the precipice and in front of a tormented landscape is contradictory because “evoking the domination over a landscape but at the same time the insignificance of the individual who is included in it.” In greatcharlie’s interpretation, Spalding could be represented by the man standing as he sees dangers that his country faces at the present and tries to imagine and consider responses to those unknown that it may face in the future. He fiercely desires to mitigate them, and thereby allow the US public to rest more easily. 

The practice of understanding the competition between powers and the clashes that result in the establishment of a dominant power was well-demonstrated more than two millennia ago by the Athenian historian and general, Thucydides (c 460 B.C.– c. 400 B.C.)  . The primary focus of Thucydides’ studies was the burgeoning competition and eventual clash of Athens and Sparta. Sparta was the superpower in the region, particularly militarily. As the Athenian empire rapidly grew with determination, to Thucydides, it clearly was just a matter of time before the two powers would clash.

In his book, Greek Political Thought from Homer to the Sophists (Cambridge University Press, 1995), Michael Gagarin presents Thucydides explanation for the Peloponnesian War which states the following: “I will first write down an account of the disputes that explain their breaking the Peace, so that no one will ever wonder from what ground so great a war could arise among the Greeks. I believe, however, that the truest reason for the quarrel, though least evident in what was said at the time, was the growth of Athenian power, which put fear into the Spartans and so compelled them into war, while the explanations both sides gave in public for breaking the Peace and starting the war are as follows.” 

There is a sense, a feeling, within the pages of Stealth War that Spalding believes the unwanted crisis, war between the US and China, will come. To that extent, he wants the US to be best prepared to fight that war and to win. There is a definite materiality in what he presents. Specific points of China’s attack on the US and suggestions on responses are clearly laid out by Spalding in the 11 chapters of his book’s 256 pages They are organized and titled as follows: Chapter 1: “Unrestricted Warfare”; Chapter 2: “How We Got Here”; Chapter 3: “Economy”; Chapter 4: “The Military Crisis”; Chapter 5: “The Digital Battlefield”; Chapter 6: “Modern Warrior 5.0: The 5G Future”; Chapter 7: “Politics and Diplomacy”; Chapter 8: “Stealing Intellectual Property”; Chapter 9: “World Domination via Infrastructure”; Chapter 10: “Sino Solutions: How to Combat and Stop China’s Stealth War”; and, Chapter 11: “Beating China at Its Own Game”. In his discussion of each issue, Spalding first looks from within, taking a deeper dive into impressions of the situation that he has developed over years of immersion in all aspects of the matter. His discussion of issues reflects the realist, the pragmatic thinker that he is. 

Support for Spalding’s pragmatic approach to examining China’s behavior vis-a-via the US, and the world, appears to have been provided more than two millennia ago by the aforementioned Thucydides. Thucydides is sometimes credited with founding of what is known as”political realism.” It is unknown to greatcharlie whether Spalding actually does or does not associate himself with the world of political realism, and it would go out on shaky ground to claim either was the case. Yet, Spalding’s discussion of China’s ambitions appears to manifest aspects of that theory. Central to political realism is the assumption that humans, deep down, are selfish, fearful, ambitious, and self-interested. As for countries, they are driven to safeguard national interests. To that extent, the tragic choice to go to war stand as indispensable tools in the management of state affairs and diplomacy: statecraft. As a result, the world has become a place in which each country may find themselves in conflict with competitors with similar interests, ambitions, and goals (targets charted by time).

In his search for a reason, a rationale, a purpose, for the current state of relations with China, Spalding, led by data available to him, explains it was the errant policy positions of former US administrations. At the core of those policies pursued, according to Spalding, was the misguided belief that economic development would lead the way to China’s transformation to a more democratic form of government and away from Communism. Given the manner in which he explains it, readers are left to contemplate how such a horrifying blunder could continue on for so long.

Even when the First Chairman of the People’s Republic of China Mao Zedong (left) was offering his olive branch to US President Richard Nixon (right), he reportedly regarded the US as the enemy, and that Chinese documents “likened it to Hitler.” Spalding notes Pillsbury recounts how People’s Republic of China Foreign Minister Zhou Enlai, during a meeting with US Secretary of State Henry Kissinger, proclaimed “America is the ba.” The Chinese interpreter rendered this statement as “America is the leader.” That was a blatant mistranslation: “ba,” as used in most political language, means “tyrant.” When the translator was later asked why he softened Zhou’s language to Kissinger, he said, “It would have upset him.” At the time, US policymakers and decisionmakers were too interested in embracing a policy of helping China in order to destabilize the Soviet Union to concern themselves with the Communust Party of China’s hostile attitudes toward their country.

China Well Exploited Pro-China Policies of the Past

Providing some framework for understanding the approach China took toward the situation, Spalding explains that war between countries in the 21st century looks much different than war in the 19th and 20th centuries. He notes that instead of bombs and bullets, it is about “ones and zeros and dollars and cents: economics, finance, data-information, manufacturing, infrastructure and communications.” He insists that today if one controls those fronts, “you can win a war without firing a shot.” Spalding calls it a simple logical strategy that leaders in the West have been very slow to grasp. To provide a taste from the text, Spalding elaborates further on matter in Chapter 1: “Unrestricted Warfare” on page 14: “Military might is only one way to express aggression, only one of many ways to attain power. In China’s view, economic power strengthens all the fields of potential engagement. In other words, money bolsters the military but also bolsters every other sphere of engagement imaginable. It can be used to influence and sway political leaders in foreign countries, silence ideas, and purchase or steal technology. It can be used to manufacture goods at dirt cheap prices and drive competitors out of business, or weaken rival economies. It can be used to create an army of academics, who fan out to gather scientific, technological, and engineering intelligence that can be used to further other goals.” 

To that extent, Spalding goes on to clarify the matter by stating that perhaps one of the most important and revealing documents of the Communist Party of China is a 1999 work entitled Unrestricted Warfare. Written by two senior colonels in the PLA, Qiao Liang and Wang Xiangsui, it discloses a number of prospective strategies that could possibly shift the balance of power throughout the world in China’s favor. Spalding insists that Unrestricted Warfare should be required reading for all branches of the US government and for business leaders because it outlines the strategy at the root of China’s policies in the world. He quotes a passage of the document that states: “The new principles of war are no longer ‘using armed force to compel the enemy to submit to one’s will,’ but rather are ‘using all means, including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests’.”

Past US Administrations: Blind as Beetles

Given what Spalding reports, it seems at one point, opinion in nearly all foreign policy circles in the US were adverse to the suggestion of an aggressive China that would challenge the US position as a the world’s leader, or as Chinese government spokespersons and Communist Party of China leaders refer to as US dominance in the world. It is to go out on shaky ground to ask readers to remember that sentiment was heard during the 2020 US Presidential Campaign when then Presidential candidate Joe Biden referring to China stated: “I mean, you know, they’re nice folks, folks. But guess what? They’re not competition for us.”

Spalding notes that in The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower (Henry Holt and Co, 2015), China observer Michael Pillsbury discloses that even when the First Chairman of the People’s Republic of China Mao Zedong offered his olive branch to US President Richard Nixon, he regarded the US as the enemy, and that Chinese documents “likened it to Hitler.” Spalding notes Pillsbury recounts how People’s Republic of China Foreign Minister Zhou Enlai, during a meeting with US Secretary of State Henry Kissinger, proclaimed “America is the ba.” The Chinese interpreter rendered this statement as “America is the leader.” Pillsbury said that was a  blatant mistranslation: “ba,” as used in most political language, means “tyrant.” When the translator was later asked why he softened Zhou’s language to Kissinger, he said, “It would have upset him.” At the time, US policymakers and decisionmakers were too interested in embracing a policy of helping China in order to destabilize the Soviet Union to concern themselves with the Communust Party of China’s hostile attitudes toward their country.

US President Bill Clinton (left) and General Secretary of the Communist Party of China, Jiang Zemin (right). From 1993 and 1998, there were several meetings between Clinton and Jiang. One the surface, US-China relations were mostly positive, a situation Spalding would explain was due to a desire in Washington to satisfy Beijing. Clinton signed a law passed by Congress establishing permanent normal trade relations with China. With the relationship codified, US investor confidence soared, as did business. China’s economy roared forward, too, due to a confluence of events: China was then accepted as a member of the World Trade Organization, Apple unveiled the iPod, and an eruption of digital goods turned into a stampede of international investment. Spalding makes the acidulous remark that many policy makers and business investors then, as well as years before, seemed to assume capitalism has special powers that could melt away authoritarianism and totalitarianism. Yet, despite China’s exponential growth, Spalding notes, as predicted by James Mann in his book, The China Fantasy: Why Capitalism Will Not Bring Democracy to China, the Communist Party of China only honed its brand of authoritarian capitalism.

Spalding remarks acidulously that many policy makers and business investors of the past seemed to assume capitalism has special powers that could melt away authoritarianism and totalitarianism. He goes on to discuss James Mann’s book, The China Fantasy: Why Capitalism Will Not Bring Democracy to China (Viking Adult, 2007), in which the author calls the West’s idea that China will morph into a liberal democratic society “the Soothing Scenario,” Mann summarizes the logic this way: “The country’s rapid economic growth will lead to far reaching political change as well. Eventually, increasing trade and prosperity will bring liberalization and democracy to China.” Spalding also points to Mann’s discussion of the opposite of the Soothing Scenario: “The Upheaval Scenario,” in which doubters envision China collapsing as a result of economic chaos or some kind of mass revolution. The result is turmoil and chaos. Spalding explains that Mann was way ahead of the curve when he wrote his book in 2007–a time when China was literally exploding with commerce and manufacturing. Six years earlier, then US President Bill Clinton signed a law passed by Congress establishing permanent normal trade relations with China. With the relationship codified, US investor confidence soared, as did business. China’s economy roared forward, too, due to a confluence of events: China was then accepted as a member of the World Trade Organization, Apple unveiled the iPod, and an eruption of digital goods turned into a stampede of international investment. Yet, despite China’s exponential growth, Spalding notes, Mann did not adhere to either the Soothing or Upheaval scenario. For Mann, all signs indicated that the Communist Party of China would continue to hone its brand of authoritarian capitalism.

There was not simply a gap between a perception of Chinese actions and intentions with a perception exemplar of the political realism school of thought as that of Spalding. Moreover, there appeared to be a gap between perception and reality on China among US political leaders and policy makers. They saw no urgency in responding effectively to what Beijing has been doing. The reality was hardly missed in Beijing that it would not be possible to simply rise to the mantle of the world’s dominant power. In order to possess the title of the world’s dominant power, China had to dispossess the US of it.

Spalding presents the subtle differences between logic and lunacy in expressing the actions of US political leaders and policymakers coddling a China determined to surpass the US, a thought many within policy circles and the general public in the US might still find difficult to wrap their heads around. Yet, Spalding curiously manages to forge an intriguing link for the US public, and imaginably the world at large, to what once quietly resided in the hearts and minds of senior military decision makers on China as well as what may generally reside in them now.

To that extent, the book has become, and will likely remain for some time, a stimulus to the discourse on US-China relations for a broader audience than other books on the subject. As awareness increases on the realities of that relationship, there has been an albeit gradual shift in perspectives on China. In foreign policy circles, it has been a gradual turn. In business circles, it has been an even slower transition, but somewhat steady. As he insists upon immediate change in response to developments, Spalding, himself, notes that “Some critics will accuse me of being alarmist or sensationalist.” Perhaps it will turn out in the end that the necessary change in thinking occurred too slowly.

Though not felt within the society as a whole but more so among a finite set of those in the national security bureaucracies whose responsibility is to keep an eye on China, there is a sense of foreboding similar to that which characterized the Cold War era when it was in full gallop during the 1950s and 1960s. Indeed, they are plenty worried. Many are worried enough to express their own concerns, if able, if permissible, in books after leaving the respective services, military, diplomatic, intelligence, sounding the klaxon loudly on China’s moves much as Spalding had already done with Stealth War. In Graham Greene’s The Ministry of Fear (Penguin Classics, 2005) is found the line: “He had been frightened and so he had been vehement.”

Indeed, since the time Spalding published Stealth War, more have joined him in shining increased sunlight China’s activities, not just on the coronavirus disaster or in the realm of national security, but a multitude of other actions, all, nonetheless, malign. Included among those actions would be: predatory investment scams directed against trusting governments of often small and less industrialized countries; intrusion of sovereign waters for mass fishing; intellectual property theft from companies and research labs that have invested millions in research and development into that which was stolen; and, demands of censorship insisted upon of those in any arena who have received funding from, or are doing business with, China, concerning anything the Communist Party of China does not want discussed. Beijing must accept that as a result of such actions, impressions of China have not exactly been positive worldwide.

The Key Chapter at the Moment: Chapter 4: “The Military Crisis

Spalding states on page 43 in Chapter 4: “The Military Crisis”, “Fortunately, for the moment, China has no interest in engaging in a ground war, or any kind of war that entails actual violence and physical destruction.” Nevertheless, it is a coming war between the US and its allies against China which haunts the story that Spalding tells and has kept many readers turning the book’s pages to find clues as to why and how it will all come about. Though Spalding admirably discussed the issue of a possible war between the US and China, he explained the situation as it existed at the time he wrote Stealth War. It appears that the problem has metastasized a bit on the diplomatic and economic front since. 

No doubt, the Communist Party of China is not expending enormous financial and material resources only to pose a potential threat to Taiwan’s self-rule and somewhat attenuated sovereignty out of academic interest or worse, some banal amusement; far from it. It is not Spalding’s message, but after aggregating what he explains with more recent events, what becomes clear can be stated in simple words for political leaders in Washington and Taipei: “The Red Chinese are coming!” If this assessment is in error, and upon greatcharlie proved, better news could not be reported for the sake of international peace and security, and humanity itself.

In the top senior policymaking offices of the civilian leadership of US and its Western and Eastern allies, officials surely believe uniformly that a show of force is the most effective option to respond to and deter: China’s territorial ambitions particularly regarding Taiwan and the waters of the Western Pacific, China’s displays of naval and air power and China’s threatening words in rebuff to US leadership and dominance in the region and the world. The most formidable show of force policymakers have used is joint exercises between US Navy aircraft carrier battlegroups and aircraft carriers of its allies and having US warships transit the Taiwan Straits. In addition to being a show of force, such deployments also serve as an excellent opportunity for the US and its allies to project joint power and demonstrate their commitment to collective defense, rehearse cooperation, and particularly allow allies to appreciate the benefits of US leadership. Based on what Spalding explains, some readers might conclude that such displays of force by the US and its allies more satisfy the need for some ostensibly strong action and serve more to soothe international concerns, provide a display of leadership, and domestic consumption. In reality, the aircraft carrier battlegroups, as mighty as they are, present themselves as easy prey for Chinese missiles.

Spalding explains that China has thousands of precision warheads tied to a sophisticated command and control system. He expounds on this by pointing out that the Dong Feng-26 (DF-26) ballistic missile–46 feet long, 44,000 pounds, and built to carry both conventional and nuclear warheads–was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. In the specific context of defending Taiwan, he gets across the idea that in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. Though noting that the US Navy has SM-6 interceptor missiles, thought to be capable of destroying the DF-26, Spalding leaves no doubt that the sheer amount of smaller, long-range ballistic missiles at China’s disposal and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to US warships. To that extent, he writes: “It is conceivable that an undetected conflict might end in thirty seconds. Game over.” That is a hard saying.

Gnawing on the subject a little bit more, Spalding explains that assessed from an economIc standpoint, the PLA constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, in plain English he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, having US and allied aircraft carriers sail within the range of the DF-26 may repeatedly send the wrong message at an exorbitant cost. In terms of deterring China regarding Taiwan, the move may have repeatedly demonstrated that the US and its allies would be unable to act in a way to halt an assault on the island while at the same time avoiding unacceptable losses. No greater support could be provided to the cluster of expressive hawks the leadership in the Communist Party of China under Xi, clamoring for an assault on Taiwan sooner than later.

China’s Dong Feng-26 (DF-26) ballistic missile (above) was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. So do the math: in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. The sheer amount of smaller, long-range ballistic missiles at China’s disposal under a sophisticated command and control system, and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to our ships. Spalding says It is conceivable that an undetected conflict might end in thirty seconds. Game over. It is a hard saying.

Following up on Spalding’s statement in Chapter 4 that the US cannot fight a ground war with China, he expounds on that point by stating products from China are crucial for the production and operations of much of the US military’s weapon systems and gear. He states directly that “the amount of goods that have been shipped and continue to be shipped from China for military use is mind-boggling.” Spalding goes into detail somewhat by offering examples of the daunting amount of military equipment that contain components made in China. He says the propellant that fires out Hellfire missiles, which are launched from helicopters, jets, and drones, is imported from China. He points the glass in night-vision goggles contains a metal called lanthanum, a large majority of which comes from China. He also points to computers that US military and naval officers write plans and reports and print them on come from China predominantly. Instructional videos are watched on screens made in China.

Spalding reminds that there are laws mandating that the US military buy goods that are made in the US. However, he believes that the US has gone too far with outsourcing and has reached a point where it is unable to defend itself and its interests without Chinese manufacturing and logistical support. If supply lines were cut from China, or even if a trade war broke out with embargoes, Spalding predicts the US military would have a nightmare sourcing its needs and getting them to the battlefield. Spalding quotes a 2015 essay by retired US Army General John Adams which states: “Our almost complete dependence on China and other countries for telecommunications equipment presents potentially catastrophic battlefield vulnerabilities.”

The Nuclear Dimension

On China’s nuclear capabilities, on page 201 in Chapter 10: “Sino Solutions: How to Combat and Stipop China’s Stealth War”, Spalding revealed that his greatest concern was that as the US seeks to balance our economic relationship, the PLA will continue to be left unrestricted. Spalding explains that unfortunately as a consequence, the US needs the threat of its nuclear arsenal as a deterrent. Spalding says the assumption is if course that these bombs will never be used. Nevertheless, he feels that “invoking fear of the unthinkable–the madman or Wildman theory of negotiation–often works.”

Delving a bit into the realm of conjecture, it is conceivable that warplanners in China may assess that they do not have the time to develop nuclear parity with US in order to offset the massive advantage the US has with its nuclear arsenal and that Washington would likely use as leverage to impact China’s choices in a conflict  However, they may have assessed that it might be feasible to create a sufficient nuclear counterbalance to threaten a rapid response retaliatory nuclear strike or sufficient first strike to convince the US that some resolution might be best to avoid incurring unacceptable losses of people and property.

From background to foreground: USS Carl Vinson (CVN-70), (Japanese Maritime Self-Defense) JS Ise (DDH-182), HMS Queen Elizabeth (R08), and USS Ronald Reagan (CVN-76). Spalding explained that from an economIc standpoint, the PLA with the DF-26 constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, having US and allied aircraft carriers sail within the range of the DF-26 may repeatedly send the wrong message at an exorbitant cost. Other than providing the US and its allies the opportunity to rehearse cooperation, display joint power, and appreciate benefits of US leadership, in terms of deterring China, the move may have demonstrated that the US and its allies are unable to act in a way to halt an assault on Taiwan while at the same time avoiding unacceptable losses. No greater support could be provided to the cluster of expressive hawks within the Communist Party of China’s leadership, clamoring for an assault on Taiwan sooner than later.

Other Thoughts That Billowed Up in This Reader on Taiwan Via Spalding’s Dialectic Ladle

In the end, central to the argument to take military action to gain and retain control of Taiwan, is what was central to arguments on how the US managed to place itself in such a challenging position with Beijing: the character of US political leaders. That is stated not to put into question the personal qualities of the men and women who have honorably and admirably chosen to dutifully serve the people to the best of their abilities.  Rather, it is to suggest that fighting the type of war that the US might be required to prosecute, defeat China, thwart China’s ambitions, drive it off and forever away from Taiwan might not be characteristic of certain leaders. In taking that course, there would be the potential for millions to die in China, unacceptable losses on the side of the US and its allies, and as grotesque as the thought may be, China could potentially level an unexpected, crippling blow to US naval and air forces could also result. What might be hoped in Beijing to be a limited lighting war launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. The nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference. Perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. In the end, it boils down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction.

Post factum nullum consilium. (Counsel is of no effect after the fact.) To race well, a jockey and horse must be one animal. The horse must be superbly harnessed. When a horse does not run well, it is typically considered that it may have a poor jockey. On China, military capabilities and resources, state diplomacy to include economic and public diplomacy, and policymaking must also function together as one figurative animal. The expectation is for senior policymakers to master the situation through their management of it. When this is the case, they can often be more precise, to an extent exact, in policy planning , formulation, and implementation. Evidence of that can be found in the fact that their figurative brush strokes will appear finer.

Policies that seem to be too far off from the realities of military capabilities and resources, military power, and awkward diplomatic exchanges and pursuits of inconsequential inroads may evince to competitors and opponents that policymakers are out of touch with the real situation and acting on mere perceptions and perhaps surmisal. Parsing out such concerning the US must be an ongoing process, an obsession, in Beijing at the moment. It would be part of the effort to determine how the US might react when presented with a situation as an assault on Taiwan.

In the US, producing the very best answers to situations is made more difficult because there are a variety of views and interests within the national security bureaucracies that must be balanced when policy is being made. if decisionmaking were directed, controlled by a single source, as in China under the Communist Party of China, under the command of Xi, a magician may seem to be somewhere in the mix who is clearly aware of what to do and how to do it in a way that keeps China a step or more ahead of its main competitor or opponent. Perhaps that is Xi, himself. On the other hand, some policy analysts perceive that for too long there has been a blindness to the best interests of the US that borders on madness. A sense is given off by them–to include Spalding it seems–that it may be too late to really change the course of things by implementing new approaches.

What might be hoped in Beijing to be a limited lighting war launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. The nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference. Perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. In the end, it boils down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction.

At the outset of the review, greatcharlie explained that the book would not be broken down to the fullest extent possible, but hopefully enough so to raise interest in readers to take a look at the book. There is so much more to discover in Stealth War. The book is a steady flow of information, data, and expressions from beginning to end. Spalding is the purveyor of a foundation upon which an honest discussion can be had on US-China relations or simply the China Threat at all levels, from the senior government policymaker to the average US citizen.

There nothing that greatcharlie appreciates more than a book that stirs the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that Stealth War is. It is assured that after the first reading Stealth War, one would most likely go back to the book and engage in that stimulating process again and again. There is no telling what insights and how many might be brewed up from within readers after they have had a chance to read through it. Too much pleasure has been lost whilst abstaining from this delightful book. As greatcharlie suggested earlier here, those reading this review who have already read Stealth War would do well to go through the book again. 

Perhaps needless to say but it is nonetheless stated, with absolute conviction and relish, greatcharlie unequivocally recommends Spalding’s Stealth War to its readers.

 

By Mark Edmond Clark

China’s Operation Fox Hunt: Facts and Theories on How Missions Succeed and Flaws and Delinquencies Ripe for Exploitation (Part 2)

People’s Republic of China Minister of Public Security Zhao Kezhi (above) Although the citizens sought by China are located overseas, identification and repatriation would be a task intrinsic to the mission of MPS. MPS surely has the most complete, up-to-date records, and tracking down and identifying Chinese citizens is a honed and polished practice of its officers. For that reason, MPS may very well be pulled into the mix of overseas espionage activities more often than may be presently conceived in the US and among its allies and partners. That same information about Chinese citizens is certainly of great interest to the Communist Party of China and in its hands via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that its present raison d’être and primary responsibility is to help the Party maintain its tight grip on the population.

This post should be considered a continuation of the preceding one

(Brief Overview of the Essay: A bungled Operation Fox Hunt mission in New Jersey that began in 2016 has allowed for the first prosecution involving Operation Fox Hunt in the US. From the New Jersey case, a few insights are drawn by greatcharlie on this particular case of Operation Fox Hunt that may provide a better understanding on what Chinese operatives are doing via the operation and how they are doing what they are doing. With the color and life of the investigative reports greatcharlie found most informative aggregated with the facts laid out plainly in the federal court document, a somewhat definitive account of the event can be constructed. By highlighting flaws in the development, planning, and execution based on available facts of that case, greatcharlie seeks to provide insight on additional ways to defeat ongoing and future Chinese identification and repatriation activities under Operation Fox Hunt or under some new operation launched by Beijing.)

Before boarding his April 12, 2017 flight to Shanghai, Zhu Feng was interviewed by US border and law enforcement officials. During the interview, Zhu identified a photograph of the defendant Tu. Zhu stated that she was a friend of his uncle and he had been Tu’s “tour guide” while she was in the US, that he did not know anything about her job other than that she traveled frequently, and that she did not ask him to do anything in particular on the flight back to China. Searching Zhu’s luggage, US border officials  discovered night vision goggles and associated accessories. When questioned about the equipment, Zhu said that the goggles belonged to Tu, and he was bringing them back to China for her. 

Opprobrium from the Communist Party of China or Observations?

One might presume law enforcement organizations federal state and municipal around the US may take issue with this statement as it feels too  near the bone, but it would seem the powers that be in Beijing assessed that investigators of those organizations often display varied levels of diligence, are often inattentive when visiting site, are rarely thorough and at time outrightly remiss when interviewing individuals of interest, display their insecurities in conversation, prone to bullying their own citizens without any professional cause, and are unprofessional often in dealing with recruited operatives, informants, and other contacts.

Shortly before boarding the flight to Shanghai on April 12, 2017, Zhu was interviewed by US border and law enforcement officials. During the interview, Zhu identified Tu in a photograph he was shown. Zhu falsely stated that she was a friend of his uncle and he had been Tu’s “tour guide” while she was in the US, that he did not know anything about her job other than that she traveled frequently, and that she did not ask him to do anything in particular on the flight back to China. A search of Zhu’s luggage by US border officials led to the discovery of night vision goggles–a device used for surveillance at night or in low-light conditions–and associated accessories. When questioned about the equipment, Zhu stated that the goggles belonged to Tu, and he was bringing them back to China for her. Tu had already departed and could not by reached by US authorities. However, more pertinent was the fact that Tu was a government official and too important to be captured. Zhu, though heavily rely upon on the mission, was expendable. It would not matter as much for him to be captured with the night vision goggles.

Following the border interview, the Zhu told Co-conspirator #2 to destroy any potential evidence: “Delete all of our chat record after reading this [message]. There are some problems. Someone in the US will be looking for you.” Zhu added: “The sooner the better”; “Delete all the chat record. Delete [a measuring application]. You are just a tour guide.”; and “Be careful of everything. If there is anything, use other phones to call. Your cell phone may be tracked.” Tu instructed Zhu on how to handle Xu’s father’s return to China before Zhu boarded his flight with Xu’s father. Tu, who attributed the instructions to Chinese Official #1, told Zhu to speak to Xu’s father about his travel posing as “staff of a travel agency.” Tu added warnings that Zhu should maintain secrecy and operational security, and should not use his own phone number to make any phone calls associated with Xu’s father. In the same series of messages, Tu instructed Zhu to hand Xu’s father to Li in Shanghai. However, during the flight, Zhu was unable to engage Xu’s father and reported that to Tu. As written in the federal court document, Zhu explained: “[John Doe #1’s] [Xu’s] father is very hostile to me and he was convinced that I was one of your young people and asked me again and again how I knew his location and travel plan and he talked to flight attendants repeatedly.” Zhu informed that the flight attendants in response to Xu’s father, forbade him from speaking with the elderly man. Zhu stated that Xu’s father expressed concern that “there is an informant on this flight.” Tu responded by instructing Zhu that he did not “need to take care of Xu’s father” and that he should “delete all the chat content” and to “leave by yourself.”

Michael McMahon, the team’s US-based private investigator, did not receive any warnings from anyone. The detective kept his emails and texts from the case which prove that. McMahon was also not made aware that Xu’s family had contacted the FBI. Still, the FBI saw clear evidence of McMahon’s alleged role in the conspiracy. Reportedly, McMahon emailed a newspaper article to himself on April 6, 2020 the day before Tu flew back to China, with the headline “Interpol Launches Global Dragnet for 100 Chinese Fugitives.” The article had photos of Xu and Liu and information about the Chinese government’s fugitive-apprehension programs. An FBI agent wrote in the criminal complaint: “Accordingly, I believe that McMahon was aware that” the couple “were Operation Fox Hunt targets,” 

As the federal court document indicates, when they believed there would be some benefit, Chinese operatives, with government authorization, have hired private investigators, some non-ethnic Chinese investigators as Michael McMahon, to assist in their effort. Ostensibly the work identification and repatriation teams would ask those investigators to do for them would be requested without informing those investigators of the true nature of the work. There was nothing on the surface so remarkably abnormal or abstruse about the Chinese investigators’ requests to alert McMahon. The Operation Fox Hunt mission planners surely designed the approach to any US private investigator to appear that way. One might suppose that because there was nothing odd, McMahon, despite becoming involved in a case tied to China, was never compelled to ask incisive questions about the purpose of the work he was contracted to do. Six FBI agents and two police officers arrested McMahon at his home in northern New Jersey at 6:00AM on October 28, 2019.

Private Investigators from the US

As the federal document indicates, when they believed there would be some benefit, Chinese operatives, with government authorization, have hired non-ethnic Chinese investigators to assist in their effort. Ostensibly the work identification and repatriation teams would ask those investigators to do for them ” nature of the work. Surely, Hu and other team leaders likely believed the private investigators would try their hardest to avoid disappointing their client as it was presumed they want to receive similar contracts of its kind from “Chinese companies” in the future.

While there appeared to be on each occasion–two well-discussed ones concerning this team–a more than sufficient amount of time and opportunity to make secure choices among private investigators available in the vicinities in which the identification and repatriation teams were operating, the selection, nevertheless, was rushed through. Diligence shown in other aspects of team, was non-existent on this point

Thereby, the private investigator, McMahon, was compromised by the fact that his Chinese client did not tell him everything or that his venal interests overcame requisite precaution when dealing with a foreign client who is a citizen or even merely closely associated with a country that is an adversary. Interestingly, his attorney alleges that he was only paid $5,017.98 for the many challenging tasks that he performed.

Truly, there is nothing on the surface so remarkably abnormal or abstruse about the Chinese investigators’ requests that greatcharlie can highlight. The Operation Fox Hunt mission planners surely designed the approach to any US private investigator to appear that way. One might suppose that because there was nothing odd, McMahon, despite becoming involved in a case tied to China, was never compelled to ask incisive questions about the purpose of the work he was contracted to do. What the Chinese may have believed in establishing this step was that the private investigators primary interest would be venal. However, the apparent failure to conduct a thorough background check of the private investigator, to include discovering his political and patriotic leanings, and the likely lack of due diligence in ensuring a private investigator in California would be motivated by payment and not just presume it was so, resulted in Hu’s team almost falling into a trap set by US counterintelligence officers and law enforcement. Hu and his identification and repatriation team were remiss with a key detail, which left a gaping hole in their security scheme, and nearly resulted in the capture of everyone involved. As it is, a number of the team’s members have been identified and indicted in federal court. Until that point, the identification and repatriation team had not been challenged in any way that halted or deterred their activities. Theirs had been la performance majuscule.

Michael McMahon and his wife (above). As the federal document indicates, when they believed there would be some benefit, Operation Fox Hunt team leaders, with government authorization, have hired private investigators, some non-ethnic Chinese as McMahon, to assist with their effort. Ostensibly the work identification and repatriation teams would ask those investigators to do for them would be requested without informing those investigators of the true nature of the work. There was nothing on the surface so remarkably abnormal or abstruse about the Chinese investigators’ requests. One might suppose that because there was nothing odd, McMahon, despite becoming involved in a case tied to China, was never compelled to ask incisive questions about the purpose of the work he was contracted to do. Interestingly, before setting up surveillance on a house in New Jersey. McMahon took the precaution of alerting local police to the surveillance presumably to prevent any misunderstandings if detected or reported by passers-by. At that point, McMahon demonstrated the willingness to cooperate with law enforcement. Thereby, ample opportunity existed  for US counterintelligence services and law enforcement to enlist his assistance as an informant or operative. For reasons unknown, the opportunity was passed up.

The Noticeable Absence of the Theorized Countersurveillance 

One might say some empiric evidence of a likely withdrawal of support of greatcharlie’s theorized Chinese intelligence covert countersurveillance team ostensibly provided to Hu’s identification and repatriation team. The most obvious evidence is the fact that some team members were captured. It is unlikely that would have transpired so hurriedly if the theorized countersurveillance team had continued to provide overwatch for them. There would most likely be protocols in place concerning the activities the theorized countersurveillance support team during exigent circumstances. If an identification and repatriation team, or some other non intelligence related service operating in the US, has erred and misstepped or stumbled into situation that might result in its detection or capture, the countersurveillance team as a result of operating in its vicinity, would also face the prospect of being detected and captured. Thus, the countersurveillance team as a protocol would perhaps be authorized to immediately disengage and clear out. One might expect it to even terminate its support of the team in operation.

French Emperor Napoleon Bonaparte is quoted as saying: “There are only two forces in the world, the sword and the spirit. In the long run the sword will always be conquered by the spirit.” Maybe that is relevant here. Approximately seven months after departing the US, Zhu returned from China. Hu had warned Zhu to remain in China after he flew back with Xu’s father, but he did so nevertheless. Once on ground, on November 9, 2017 and November 10, 2017, Zhu participated in two voluntary interviews with FBI special agents. During the interviews, Zhu admitted to his involvement in the scheme to forcibly repatriate Xu to China. Zhu admitted that he was brought into the conspiracy by Hu, that in September 2016, he was tasked by Hu with several activities related to the planning and execution of the attempted repatriation of Xu, that on or around December 2016, Zhu met with Hu, PRC Official-1 and Tu to discuss the scheme, and in April 2017, Zhu traveled to the US with Tu and participated in the effort to coerce Xu’s return to China. Intriguingly, the FBI special agents let Zhu go following the two interviews. Not even an otiose explanation has been offered for that decision. Zhu returned to China the next year.

Breakaway Identification and Repatriation Team Member

The centrality of the Operation Fox Hunt story is the Communist Party of China and its willingness to brazenly violate international law, with the goal of maintaining its iron grip on its citizens. What also emerges, though, is a picture of a country of citizens, some of whom are loyal to it and their conviction that the path it has placed China will lead to great success and in the preeminent position in the world and conversely, those who loathe their government and see nothing good coming out of being led by the Communist Party of China. That was the apparent mix of thinking found among identification and repatriation team members.

Perhaps there was never a time when Zhu did not loathe the regime, much as the larger part of émigrés he assisted in pursuing. On the days he was interviewed by the FBI, he seemed suddenly struck by his true feelings about living under the authoritarian rule of the Communist Party of China, and he chose to spill the beans to the FBI special agents on Operation Fox Hunt. (Admittedly, despite all that discussed here, the thought comes to mind that Hu and managers may have decided to use Zhu as a dangle, hoping US counterintelligence might recruit him to become something akin to a counterespionage agent inside Operation Fox Hunt. However, Operation Fox Hunt has had considerable success despite the New Jersey fiasco. To be frank, it may be the case that Operation Fox Hunt managers feel an effort specifically by MPS to penetrate a US counterintelligence service would not be worth the candle.)

FBI Interview of Key Identification and Repatriation Team Member

Interviews will always be the best way to get to understand an identification and repatriation team member. As was seen with the Fox Hunt caper, not every team member may be fully onboard with the operation and many other things. This perhaps may sound oversimplified, but what must be included in interviews of team members are casual yet personal questions. Among those on the list should be the following: “Have you had a chance to enjoy yourself while you have been in the US?” “Did you really come here at your own free will or have you been sent here and told to obey orders?”; “How are your relatives doing in China?; “Has a family member of yours been threatened with imprisonment or been imprisoned wrongfully?”; and eventually, “Would you ever consider staying in the US? It is critical to display real interest in mending what may be an individual’s broken soul. He or she may not take it, but they should be offered a chance at a better life. An explanation of how it would be made possible should be laid out.

Even if they considered making the jump to the other side, the more astute and mature team members would know the degree of China’s penetration into US national security bureaucracies, if any, and would hesitate and withdraw, feeling the move would not be safe for them on one hand and safe for their families on the other. It would seem best to limit effort placed on those team members who wholly reject anything positive discussed. Praise at unexpected points will keep him or her parsing out the interview. It may lead them to believe that they have a card to play in the future if need be. Try to open that door and wedge it open in the identification and repatriation team member’s mind.

Zheng Congying, hired muscle for the New Jersey mission (above). The identification and repatriation team leader Hu Ji gave Zhu Feng the task of overseeing operatives he had hired in the Chinese community in New York. Among them was Zheng Congying, the 25 year old Chinese citizen and a legal permanent resident of the US, resided in Brooklyn, New York. On September 4, 2018, Zheng and an Anonymous defendant in the federal court case,  drove to the New Jersey residence of Xu and Liu and pounded on the front door. Zheng and Anonymous tried to force open the door to the residence, before accessing the backyard, entering a raised outdoor deck and peering into the windows of the residence. After these efforts, Zheng and Anonymous left a handwritten note taped to the front door of the residence. Surveillance video and fingerprints led investigators to Zheng.

Harassment of the Daughter of Xu and Liu

Only weeks following the failed New Jersey scheme, Hu took a more aggressive approach. The Operation Fox Hunt campaign against Xu turned toward coordinated operations targeting his adult daughter living in northern California dubbed Jane Doe #2 in the federal court document. Indeed, the campaign reportedly next included: a surveillance operation conducted against Xu’s daughter from approximately May 2017 to July 2017, and, an online harassment campaign against her from approximately April 2018 to July 2018 related to the allegations levied by China against Xu. The operations against Xu’s daughter began shortly after the conclusion of April 2017 failed attempt to render Xu, himself. Xu’s daughter had arrived in the US as a child, studying at a private boarding school years before her parents fled China. She had earned an advanced degree at Stanford, had gotten married and made a life for herself far from her parents and their problems with the Chinese courts.

Around May 2017, Zhai Yongqiang directed an an individual based in the US, dubbed Co-conspirator #3 by the US prosecutor, to hire a private investigator to locate Xu’s daughter. Zhai provided Co-conspirator #3 with personal identification information belonging to Xu’s daughter, including her name, date of birth, Social Security Number, known addresses and academic history. According to the federal court document, Zhai told Co-conspirator #3 that if he were to locate Xu’s daughter, Zhai, himself, would receive a fee from a department in the People’s Republic of China’s prosecutor’s office. Zhai Yongqiang promised to split the fee with Co-conspirator #3.

It would appear that Conspirator #3 was actually Rong Jing, Hu’s point man in California. In May 2017, as instructed by Zhai, Rong hired a private investigator to stalk Xu’s daughter. Unfortunately for Rong, the privaye investigator was a confidential informant for the FBI. US officials did not disclose if or how they maneuvered the informant into place. However, after starting an investigation in New Jersey in early April, FBI special agents had been mapping the travel and contacts of the Fox Hunt team. For instance, according to interviews and court records, the FBI became aware that Hu had spent time in California. With a man inside Hu’s operation, the next step for the FBI was to try accomplish as much as possible with him. Negligentia semper habet infortuniam comitem. (Negligence always has misfortune for a companion.)

On May 22, Rong met for four hours with the private investigator-informant at a restaurant in Los Angeles. In a recorded conversation, Rong offered the private  detective $4,000 to investigate and videotape the daughter. If the team succeeded with the repatriation, he and the detective could split any reward money, Rong stated. Rong said the managers in Wuhan had not told him “what to do with” the daughter. It was possible they could ask him “to catch” her, he told the private detective. He explained that they might have to act as proxies for Chinese officers who “wouldn’t feel comfortable to arrest her” in the US. Rong went further to say that if there are “things they wouldn’t feel comfortable to do,” he continued, “we need to be there on their behalf.”

Rong asked whether the detective had a problem with removing someone from the country. “Say, if he wants us to bring him/her over, can you bring him/her over? Would this bring about any legal issues?” Step one for the private detective was to shoot video of Xu’s daughter. The next step would be to contact Xu and Liu and persuade them to return to China, Rong said. For the next few weeks, the private investigator went through the motions of shadowing the daughter, while actually being supervised by the FBI.

Reporting to Rong on July 14, 2018, the private detective discussed photos he had provided of the daughter and her home. Then he asked: “You don’t think they’ll do any harm to her, do you?” Rong’s reply was not reassuring. He said,, if the private detective got in trouble, they would both be in trouble, “If there was an accident,” he said, “in truth you [could claim that you] were just … investigating her.” At other moments, Rong sounded less menacing. She was “simply a daughter,” he said, emphasizing that the parents were the main targets.

A Hiring Pattern/Modus Operandi?

Hiring private investigators in the US was the closest anything the identification and repatriation teams did that resembled improvised and haphazard work. The choice to succumb to expediency errantly is often the point at which many plans fail  in all fields, and in the case of espionage and other crimes, it is the act from which investigators can often catch a big break in a case.

Much as with the first private investigator in the US hired, Hu, the lead investigator wanted to establish an operational relationship with the one hired in California, dubbed by US prosecutors as P1 (Private Investigator 1). As far as one knows, hiring that second investigator felt right to him. There was apparently no reason for the lead investigator to question the private investigator’s intentions. Imaginably, the team’s lead investigator presumed his interest, first and foremost, was venal. Oddly enough, his word was presumed to be inviolate. Hu was also quite satisfied with that private investigator’s work, as was Tu. Whatever criteria caused them to tick the boxes that established confidence in the US private investigators may unlikely be the standard ever again. Yet, a trace as to whom the identification and repatriation teams may still prefer to hire might be found in any similarities in the private investigators’ backgrounds.

A Rare Glimpse Inside Operation Fox Hunt via a Braggart

Recordings of conversations that the private detective made with Rong provided a rare look inside Operation Fox Hunt. Imaginably, for the FBI, collecting those recordings was an accomplishment. As purported by Rong, he performed freelance missions under Operation Fox Hunt exclusively for Wuhan, receiving a fee for each repatriation. Rong spoke of teams of visiting “lobbyists.” He noted that they were salaried “civil servants” of the Chinese government who traveled on work visas under multiple identities. Their task was “persuading people” to return to China. In addition to being the target of surveillance efforts, Xu’s daughter was harassed via online communications from another conspirator, dubbed “Co-conspirator #4” by a US prosecutor, between April 2018 and July 2018, Co-conspirator #4 sent unsolicited and derogatory messages to Xu and Liu about their daughter. Similar messages were sent to Facebook “friends” of Xu’s daughter, as well as to Facebook friends of the spouse of Xu’s daughter.

On September 4, 2018, Zheng Congying and another unidentified co-conspirator allegedly taped a handwritten note in Chinese (above) on the front door of the home of Xu Jin and Liu Feng. The note read: ‘If you are willing to go back to mainland and spend 10 years in prison, your wife and children will be all right. That’s the end of this matter!’

Harassment of Xu Jin and Liu Feng at Their New Jersey Home

In September 2018, Xu and Liu were again harassed by members of the conspiracy, including Zheng Congying and Anonymous, among others. On September 4th, Zheng and Anonymous drove to the New Jersey residence of Xu and Liu and pounded on the front door. Zheng and Anonymous tried to force open the door to the residence, before accessing the backyard, entering a raised outdoor deck and peering into the windows of the residence. After these efforts, Zheng and Anonymous left a handwritten note taped to the front door of the residence. The note, written in simplified Chinese characters, threatened Xu: “If you are willing to go back to the mainland and spend 10 years in prison, your wife and children will be all right. That’s the end of this matter.”

Harassing Mailings to Xu Ji, Liu Feng, and a Relative of Liu

Seven months after the threats of September 2018, Xu and Liu were sent a package anonymously that contained a DVD. Over a song in Mandarin, a video showed images of their relatives in China, including the elderly father whom Hu’s team had brought to New Jersey. It was another “emotional bomb.” Xu’s father sat next to a desk where a book by Xi entitled, The Governance of China, was displayed. A FBI special agent wrote in the complaint: “I believe that this shot was deliberately staged to make [the son] aware that the Chinese government played a role in taking this picture and creating this video.” The special agent described the photo as a form of implicit coercion demonstrating “the government’s control over [the son’s] aged parents.” Reportedly, in the video, Xu’s sister pressured him to come back. She said their parents were sick, isolated and distraught. She went on to state: “When parents are alive, you can still call someplace a home,” She next said: “When parents are gone, you can only prepare for your own tomb.”

Beginning in or around February 2019, a relative of Liu who lives in the US (“Jane Doe #3”), an individual whose identity is known to the Grand Jury, received several unsolicited packages. The packages were from China, purportedly from Xu’s sister’s in China (“Jane Doe #4”), an individual whose identity is known to the Grand Jury,or Jane Doe #4’s husband. Between July 2016 and April 2017, and between April 2017 and December 2018, Jane Doe #4 was imprisoned by Chinese authorities as part of an effort to cause Xu to return to China. On or about April 22, 2019, Jane Doe #3 received a package containing a CD with two “mp4” video files titled “30 Family Letters.mp4” that included a slide show of still photographs depicting her husband’s aged parents, among other family members. Written Chinese text scrolled at the bottom of the video during the presentation. The text, styled as a letter from Jane Doe #4 to Xu, implored him to “come home” to China before his parents died. Among other things, the written text stated that Xu had a “duty as a child” to his parents and much as the letter sent directly to Xu from China, the line was written that “[w]hen parents are alive, you can still call someplace a home; when parents are gone, you can only prepare for your own tomb.” Included among photographs in the video was the same photograph of Xu’s father seated next to a desk featuring Xi’s book, The Governance of China.

The video file “A few words from [Jane Doe #4] to brother.mp4” contained a video of Jane Doe #4. An individual appearing to be her spoke on the video, stating: she was released from Chinese custody on November 4, 2018 after pleading guilty to a crime; Xu’s parents health was deteriorating, and they were suffering; she wanted Xu to return to China; the Chinese government was determined to fight against corruption; Xu should accept responsibility and admit to unspecified crimes; and, Xu should stop defying the Chinese and come back in order to receive leniency. All and all, the “emotional” performances contained in the videos surely would have disappointed Aeschylus.

Seven months after the threats of September 2018, Xu and Liu were sent a package anonymously that contained a DVD. Over a song in Mandarin, a video showed images of their relatives in China, including the elderly father whom Hu’s team had brought to New Jersey. It was another “emotional bomb.” Xu’s father sat next to a desk where a book by Xi entitled, The Governance of China, was displayed. A FBI special agent wrote in the complaint: “I believe that this shot was deliberately staged to make [the son] aware that the Chinese government played a role in taking this picture and creating this video.” The special agent described the photo as a form of implicit coercion demonstrating “the government’s control over [the son’s] aged parents.”

The Way Forward

Fortuna adversa virum magnae sapientiae non terret. (Adverse fortune (adversity) does not frighten (intimidate) a man of great intellect.) An inspirational speech on what US counterintelligence services and law enforcement organizations in the US would likely include expressions to the effect that the time has long passed for them to get off the roundabout concerning Chinese clandestine and covert operations in the US. Beneath it lies a volcano which is being given the chance to erupt turning everything the worst and most destructive direction possible. However, approaching the matter realistically, it appears that a considerable journey lies ahead for law enforcement organizations around the US and US counterintelligence services when it comes to China. Compared to what China may bring on in the near future, what may seem to be a full workout with Chinese operators now will then seem as a mere warm up. The challenge of coping with Chinese operators in the US during a possible conflict was mentioned earlier. Whether they might achieve victories or not, the approaches of law enforcement organizations around the US and US counterintelligence services to China’s malign activities must transition with lessons learned from failures and recognized changes in the opponent’s practices. US counterintelligence services and law enforcement organizations around the US must accept that coping with China successfully will mean accepting the need to be in a state of perpetual evolution. The Chinese intelligence services and other invasive entities are not going to lend a helping hand to law enforcement organizations around the US and US counterintelligence services by waiting for them to catch up. The renowned theoretical physicist Albert Einstein said: Probleme kann man niemals mit derselben Denkweise losen, durch die sie entstanden sind.” (We cannot solve our problems with the same thinking we used to create them.)

The range and rigor of thinking must be widened. There will always be the basics, that which  is foundational, to each job. Still, as averred to earlier, senior executives and managers and field agents should take heed to opportunities that arise to look at situations, facts through a new lens and consider somewhat unorthodox postulations differently, may open eyes to constructive angles and real possibilities that may contribute mightily to fruitful outcomes. Dictum sapienti sat est. (Enough has been said for the wise.)

China’s Operation Fox Hunt: Facts and Theories on How Missions Succeed and Flaws and Delinquencies Ripe for Exploitation (Part 1)

An Air China jet (above) soars upward after take-off on its flight home. On a number of similar flights from the US, a considerable number of For nearly a decade, undercover Chinese identification and repatriation teams, as greatcharlie has dubbed them, at the direct request and under the authority of the Chinese government, have entered the US under false pretenses, enlisted US-based accomplices, stalked hundreds of people, including US citizens and permanent residents, and coerced and cajoled them to return to China to face charges for economic crimes they allegedly committed. This effort is called Operation Fox Hunt. It went on near unhindered by US authorities until a bungled mission to capture a target in New Jersey led to arrests and allowed for the first prosecution involving Operation Fox Hunt in the US. Through an examination of flaws in the development, planning, and execution of that New Jersey mission based on available facts, greatcharlie provides some insights on additional ways to defeat ongoing and future missions by Chinese identification and repatriation teams.

On the intelligence front, the crisis of Chinese espionage in the US and the rest of the West has all of the hallmarks of a sort of ordeal. Chinese intelligence services have unfortunately managed to do their job successfully, collecting mountains of secret and information from the government bureaucracies and research and development sites, private businesses, high-tech firms particularly, academia, and think tanks. It would seem safe to say that Chinese espionage operations are ubiquitous. It is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. The primary conductors of China’s successful espionage operations orchestrated in the US, and globally are the Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, China’s preeminent civilian intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad, and the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology. 

But alas, there are other efforts at penetration and clandestine action undertaken by Chinese operatives in the US as well as other countries that are as insidious and perhaps worse. For nearly a decade, Chinese identification and repatriation teams, as greatcharlie has dubbed them, have absconded not with precious, secret information or property, but rather with people. (Identifying targets was actually one of the most challenging aspects of the teams’ activities. Without the ability to investigate and identify targets, any repatriation effort would be hopeless. In a worst case scenario, the wrong individual might embarrassingly be brought back to China.) Targets have not only been non-residents, but residents and naturalized US citizens. Indeed, incontrovertible proof exists that shows undercover identification and repatriation teams at the direct request and under the authority of the Chinese government have entered the US under false pretenses, stalked hundreds of people, including US citizens and permanent residents, and enlisted US-based accomplices–private investigators and self-styled bounty hunters–and relentlessly hound their targets. Ostensibly, the Chinese operatives have sought out fugitives from justice in China as part of an anti-corruption campaign. 

In a number of operations, Chinese identification and repatriation teams were completely successful in capturing their targets and bringing them back to China to face what the Communist Party of China deemed as justice. Yet, that has not always been the case. There is a great difference between grabbing intellectual property, trade secrets, computer files as well as actual technologies and grabbing people. There is a human element which, particularly under conditions that the Chinese government creates for its “volunteers,” leaves a degree of uncertainty and unpredictability that cannot be assessed until one sees actual results. In identification and repatriation operations, that same uncertainty can exist in the way that the targets may behave, too! That was the case with Chinese identification and repatriation operatives acting in New Jersey beginning in 2016. It was a bungled mission that has allowed for the first prosecution involving Operation Fox Hunt in the US. 

From the New Jersey case, a few insights are drawn by greatcharlie on this particular case of Operation Fox Hunt that may provide a better understanding on what Chinese operatives are doing via the operation and how they are doing what they are doing. With the color and life of the investigative reports greatcharlie found most informative aggregated with the facts laid out plainly in the federal court document, a somewhat definitive account of the event can be constructed. By highlighting flaws in the development, planning, and execution based on available facts of that case, greatcharlie seeks to provide insight on additional ways to defeat ongoing and future Chinese identification and repatriation activities under Operation Fox Hunt or under some new operation launched by Beijing. Just knowing what is wrong is not as great as knowing how to fix the problem. This commentary does not look at the situation only in the end to say everyone appears to be doing their best to halt China’s malign activities and all is peaches-and-cream. Comments and suggestions are offered, leaving it up to readers, think tank scholars, academics, policy analysts, and military and diplomatic officials, journalists, and students, but particularly practitioners who may serve in US counterintelligence, to observe, reflect, and act as they may. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. It would be satisfying enough to know that some of what is presented here might resonate with a few of them. By shedding light on some flaws in the development of plans and the organization of operators for action, as well as delinquencies in the execution of the plan, greatcharlie hopes it can offer something of use to the US, its allies, and friends to combat and to defeat similar malign clandestine and covert operations by China worldwide. If the matter of the identification and repatriation and repatriation operations is not put right, surely it will have an unfortunate effect on US national security now and into the future. Nihil tam difficile est ut non possit studio investigari. (Nothing is so difficult that it is not able to be tracked down by study.)

After People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above) assumed power in 2013, he initiated a sweeping anti-corruption campaign. Xi vowed to hunt down powerful “tigers” as well as lowly “flies” in the campaign to eradicate corruption. The slogan of the campaign became “fight tigers, swat flies and hunt foxes.” Xi warned corruption was so bad that it could threaten the Communist Party of China’s grip on power. That campaign has netted thousands of party leaders and rank-and-file government officials domestically. Indeed, Operations Fox Hunt and Operation Sky Net were part of the effort internationally in that regard. In June 2014, authorities established the International Office of Pursuing Fugitives and Recovering Embezzled Assets–staffed with a composite of personnel seconded from eight government agencies. In the first alone, 3,587 fugitives from over 90 countries had been returned to China.

Overview of Operation Fox Hunt and Operation Sky Net

As alleged in a July 22, 2021 criminal complaint filed in the Eastern District of New York, Criminal Division, defendants participated in an international campaign to threaten, harass, surveil and intimidate John Doe #1 and his family, in order to force John Doe #1 and Jane Doe #1 to return to China as part of “Operation Fox Hunt.” It was revealed in the reports of investigative journalists that John Doe #1 and Jane Doe #2 are Xu Jin and his wife, Liu Fang. The defendants allegedly engaged in clandestine, unsanctioned and illegal conduct within the US and facilitated the travel of Chinese government officials to the US in order to further carry out these illegal acts.  Between 2016 and 2019, multiple Chinese officials directed the defendants, and several others, to engage in efforts to coerce the victims to return to China.

The US Department of Justice has identified Operation Fox Hunt as an initiative by the People’s Republic of China’s Ministry of Public Security to locate and repatriate alleged Chinese “fugitives” who had fled to foreign countries that have committed crimes under Chinese law.  The Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS is an internal and political security and domestic intelligence service. Once back in China, those individuals typically face stiff charges. After  People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping  assumed power in 2013, he initiated a sweeping anti-corruption campaign. Xi vowed to hunt down powerful “tigers” as well as lowly “flies” in the campaign to eradicate corruption. The slogan of the campaign became “fight tigers, swat flies and hunt foxes.” Xi warned corruption was so bad that it could threaten the Communist Party of China’s grip on power. According to Human Rights Watch, that campaign has netted thousands of party leaders and rank-and-file government officials domestically. Operations Fox Hunt and Skynet were part of the effort internationally. In June 2014, authorities established the International Office of Pursuing Fugitives and Recovering Embezzled Assets–staffed with a composite of personnel seconded from eight government agencies. Just three years afterward, 3,587 fugitives from over 90 countries had been returned to China. 

Absent an extradition treaty between the US and China, one might look upon the problem as Chinese authorities taking it upon themselves to bring criminals to justice. However, it is of great concern for US officials that Operation Fox Hunt operatives, rather than working in the US with the approval and coordination of the federal government, instead regularly enter the US without notifying any bureaucracy in Washington relevant to their planned actions and engage in violations of US criminal law. To that extent, the activity has been described not only as “an end-run around the Department of State and the Department of Justice,” but “an end-run around US law.” Even more, it is alleged by US national security officials that despite Beijing’s claims to the contrary, identification and repatriation teams are pursuing certain individuals not due to a business dispute in China or violation of Chinese criminal law. Rather, there is a political purpose to the activity. In addition to tracking down those accused of economic crimes, Chinese identification and repatriation teams travel the world in pursuit of those afoul of the Communist Party of China, to include: Tibetans, Uyghurs, Hong Kongers, and followers of the Falun Gong religious movement. To force them into returning, authorities subject their relatives in China to harassment, jail, torture and other mistreatment, sometimes recording hostage-like videos to send to the US. Somewhat less concerning is Operation Sky Net which is a program that runs concurrently alongside Operation Fox Hunt and augment it by cutting-off the financial flows of citizens who have fled overseas and working to recover any proceeds gained through corruption.

Operation Fox Hunt: A MPS Mission

Although the Chinese citizens sought under Operation Fox Hunt are located overseas, identification and repatriation would be a task intrinsic to the mission of MPS. MPS surely has the most complete, up-to-date records on Chinese citizens and tracking down and identifying citizens its officers have honed and polished over decades. For that reason, MPS may very well be pulled into the mix of overseas espionage activities more often than may be presently conceived in the US and among its allies and partners. That same information about Chinese citizens is certainly of great interest to the Communist Party of China and in its hands via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that its present raison d’être and primary responsibility is to help the Party maintain its tight grip on the population.

To cloak their pursuit of individuals in apparent legality, Beijing has had the International Criminal Police Organization (Interpol), an inter-governmental law enforcement organization, to issue “Red Notices,” enumerating hosts of business crimes allegedly committed by their targets. In April 2015, China published a most-wanted list, called “100 Red Notices” that held the names of 100 officials and business executives accused in major corruption cases. According to government statistics, by December 2017, 51 out of “100 Red Notices” had returned to China. Among them, 10 were reportedly repatriated by foreign governments, while 35 returned “voluntarily” after being “persuaded.”

To cloak its pursuit of individuals in apparent legality, Beijing has had the International Criminal Police Organization (Interpol), an inter-governmental law enforcement organization, to issue “Red Notices,” enumerating hosts of business crimes allegedly committed by their targets. In April 2015, China published a most-wanted list, called “100 Red Notices” that held the names of 100 officials and business executives accused in major corruption cases. According to government statistics, by December 2017, 51 out of “100 Red Notices” had returned to China. Among them, 10 were reportedly repatriated by foreign governments, while 35 returned “voluntarily” after being “persuaded.”

Interestingly, Beijing’s acquisition of Red Notices on the innocent is surely a sinister practice. It has been a human rights concern of considerable importance in US-China relations. Reportedly, there are ongoing efforts by the US and other countries to snuff out Beijing’s Red Notice acquisition activity. One might say that any effort to do that would be near akin to shutting off the lights in the library reading room before closing. The list of “100 Red Notices” and every Red Notice acquired since that list  was posted, long ago should have served as figurative beckoning fingers for those seeking to defeat Operation Fox Hunt as to where the identification and repatriation teams would eventually show up. Countless traps and other tricks should have brought the whole cabaret down. With a proper strategy, officers directly from US counterintelligence services and perhaps truly well-equipped and well-experienced state, county, and municipal law enforcement organizations around the US should have used for good, stealthy, professional reconnaissance and surveillance. That reconnaissance and surveillance would have needed to have been performed unobtrusively and for the sake of those under Beijing’s requested Red Notices, unintrusively. Patience would also have been a main ingredient for success. The 17th century French traveller and jeweller, Jean Baptiste Chardin, (1643 – 1713) in “Voyages en Perse et autres lieux de l’Orient” (1711), wrote: “La patience est amère, mais son fruit est doux.” (Patience is bitter, but its fruit is sweet.) Further, to succeed, no assistance from contractors in the activity should have been allowed. Contractors for the most part can only offer what the young people refer to as “gangstalking,” “Keystone Cop” type choreography, and school-boy pranks. In one way or another they would have ruined anything they touched as they typically do.

Federal Court Documents Versus Investigative Reports as Sources

In an interview with George Plimpton in the Fall 1990 edition of the Paris Review, Maya Angelou said: “The facts can obscure the truth, what it really felt like.” Many might imagine the rudiments of tactics, techniques and procedures, and methods of China’s efforts as presented in the federal court document might serve as a source for guidance. They would be mistaken. Reading through the indictment, the facts of the case on first impression may appear laid out in the federal court document in a somewhat Daedalian manner to the nonlegal scholar, the layman. Not even the sequence of events was not made clear. From what is presented in the federal court indictment, one might believe the case leading to the indictment of Operation Fox Hunt operatives was rather featureless. The ways in which Chinese identification and repatriation teams acted as laid out appear almost predictable, given the nature of their mission and their desire to satisfy the authorities who commissioned the enterprise. There is nothing in the document that would strike a reader as something new, intriguing, or recherché. Much of what is within could hardly serve as a foundation upon which US law enforcement and counterintelligence service might be better enabled to construct new approaches to mitigate them. The whole matter actually took on new meaning for greatcharlie after reading a July 22, 2021 ProPublica article which conveyed the facts of the case in an interesting way stirred greatcharlie’s interest and resulted in a decision to dive deeper into the facts of the case.

 In the reports of investigative journalists of ProPublica and other publications, there is general acceptance of the facts as presented in the federal criminal complaint. Yet, even more important, the investigative reports provide color to the story of the identification and repatriation team’s activities. The investigative journalists’ stories offer assessments of principal actors involved, ascribing traits to them, painting pictures of them as well as locations where specific acts occurred, and aiding readers in understanding how it likely felt to be victimized by such an enterprise. Investigative journalists also present moments of life in a way that allows readers to enter an experience. Indeed, there is much to learn from several impressive articles by investigative journalists. By including that information with facts, the story of the episode provides a structure that allows a sufficient parsing of everything involved. 

Xu Jin (above), a legal permanent resident in the US, formerly directed the development commission of Wuhan, China before he left for the US in 2010. In both 2012 and 2014, the Chinese government caused the International Criminal Police Organization (Interpol) to issue “Red Notices” for Xu and Liu. According to those Red Notices, Xu was wanted by the Chinese government for “embezzlement,” abuse of power, [and] acceptance of bribes,” pursuant to Chinese Criminal Law Articles 383, 385, and 397, which carried a maximum possible penalty of life imprisonment. In 2015, the Chinese government put the couple on its list of 100 most wanted fugitives in Operation Fox Hunt. Chinese authorities have said they made three formal requests for US assistance about the couple, providing evidence about alleged money laundering and immigration crimes that could be prosecuted in the US.

Targets of the New Jersey Mission

As reported in the Wall Street Journal, Xu had directed Wuhan’s development commission before he left for the US in 2010 with his wife, Liu, who is a former insurance company executive. Xu and Liu, both 57 at the time of this writing, had obtained US green cards through a program that grants residency to foreigners who invest more than $500,000 in the US. In the interest of full-disclosure, a California consultant who helped them apply for the green cards later pleaded guilty to immigration fraud, and investigators in that case alleged that the wife’s petition for residency contained false information. But they remain legal residents. Using its standard artifice to tie everything up neatly with a legal bow, in and around 2012 and 2014, the Chinese government caused the International Criminal Police Organization (Interpol), an inter-governmental law enforcement organization to issue “Red Notices” for Xu and Liu. According to those Red Notices, Xu was wanted by the Chinese government for “embezzlement” abuse of power [and] acceptance of bribes,” pursuant to Chinese Criminal Law Articles 383, 385, and 397, which carried a maximum possible penalty of life imprisonment. In 2015, the Chinese government put the couple on its list of 100 most wanted fugitives in Operation Fox Hunt. Chinese authorities have said they made three formal requests for US assistance about the wanted couple, providing evidence about alleged money laundering and immigration crimes that could be prosecuted here. A spokesperson for the US Department of Justice declined to comment on that assertion.

In April 2018, the Chinese privately owned company, Xinba Construction Group Company, filed a lawsuit against the couple in New Jersey state court, accusing Xu of holding up projects to extort money from companies, and due to his actions, those companies still owe Xinba more than $10 million for contracts performed. In court filings, the couple denied Xu extorted or looted any company, calling the litigation an artifice designed to coerce the couple “to return to China and, if not, to harass and attempt to bankrupt” them. Their countersuit also alleged an extensive harassment campaign was being waged against them by Chinese operatives. They also claimed those same operatives had kidnapped Xu’s father living in China and that they had posed as special agents of the US Federal Bureau of Investigation (FBI) to stalk an immediate relative of Xu’s living in the US. Although the endangered couple’s attorney had accurately and clearly laid out the Chinese government’s villany, a judge in September 2019, out of ignorance, rejected their claims, saying they failed to provide sufficient evidence that Xinba was working with the Chinese government. A preceding judge overseeing the case, completely failing to understand the absolute gravity of matter with regard to US national security, remarked: “It’s not your ordinary case you see in the Superior Court in Essex County, but we’re open for all business I guess . . . No herniated discs. No slip and fall in this case.”

Perchance, back in Beijing, dismissive responses as such  from jurists of the US court system were predicted. US judges, unsure when they wanted to be sure, would reject what they did not understand or thought unimaginable. Predicting such behavior would presumably be one among a set of assumptions and predictions made in Beijing on the actions and reactions of those elements in the US whose responsibility and capability would be to present obstacles or prevent Operation Fox Hunt from succeeding. Those elements in the US were apparently no more threatening to senior executives, managers, and planners in MPS than the Maginot Line was to the Oberkommando der Wehrmacht in 1940.

Liu Feng (above), is the wife of Xu Jin. A former insurance company executive, she came to the US with Xu in 2010. According to a Red Notice issued by Interpol, Liu is equally sought for arrest as Xu. In April 2018, the Chinese privately owned company, Xinba Construction Group Company, filed a lawsuit against Xu and Liu in New Jersey state court, accusing Xu of holding up projects to extort money from companies, and due to his actions, those companies still owe Xinba more than $10 million for contracts performed. In court filings, the couple denied Xu extorted or looted any company, calling the litigation an artifice designed to coerce the couple “to return to China and, if not, to harass and attempt to bankrupt” them. Their countersuit also alleged an extensive harassment campaign was being waged against them by Chinese operatives. They also claimed those same operatives had kidnapped Xu’s father living in China and had posed as federal agents to stalk an immediate relative of Liu living in the US.

Preparation for the Mission: What Was likely Raised in Feasibility Studies Done in Advance?

One should never expect China to come charging in with reckless abandon. If it had happened in the past, it surely will happen any more. The efforts of those operating in the US on all levels, espionage, identification and repatriation, and perchance, covert operations, will typically be calibrated, with supposedly every precaution taken into consideration. Vouloir c’est pouvoir. Operation Fox Hunt has been marked by concerted, energetic, and endless activity by China. For the most part, Chinese efforts in the US have been quiet, smooth, and quite sophisticated in nature. Albeit moving into the realm of conjecture, one can imagine how a feasibility study for the rendition operation was constructed and the assessments that led to the project being green-lit. 

MPS in coordination with China’s foreign intelligence services likely studied the situation, and recognized just how open the US was for the theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. To date, there is no indication that they have decided to pare down any aspect of their clandestine and covert operations in the US, and evidently they have encountered nothing to even suggest that they should retreat. Ventis secundis, tene/tenete cursum. (The winds being favorable, hold the course.)

Surely, there were several feasibility studies produced on the possibility of successfully conducting identification and repatriation operations with concern at minimum focused on how under current circumstances, with espionage activities drawing so much attention in the US, the situation has not been made less secure for all teams operating there,  and the pitfalls of conducting such identification and repatriation operations with relations between the two countries at a relative low point. Such studies would likely be put before those assigned to manage the identification and repatriation operations in the US ostensibly  along with the volumes of studies done that provided confidence fhst China’s “espionage tsunami” would meet with considerable success.

Imaginably, information gathered for such feasibility studies would be up-to-date, and perhaps would be thorough enough to include manifests of law enforcement officers and counterintelligence officers within the planned area of operation of the identification and repatriation team, with notes on their working hours, usual movements and daily habits. If that might even remotely be the case, it would also mean China has engaged, and is likely continually engaged, in covert surveillance of many law enforcement and counterintelligence officers in the US who they may have discovered were handling Chinese espionage and identification and repatriation cases. They may have discovered that those investigators often display varied levels of diligence, are often inattentive when visiting site, are rarely thorough and at time outrightly remiss when interviewing individuals of interest, display their insecurities in conversation, prone to bullying their own citizens without any apparent cause, and are unprofessional often in dealing with existing contacts. Despite this perception based on analyses in the abstract or empirical evidence, US counterintelligence and law enforcement organizations around the US are not without count, and it would prove to be a mistake to minimize the threat of their presence altogether.

It is possible that feasibility studies such as those suggested had some influence on the decision on the location, the timing of the operations, and which émigré to pursue from a list of those sought. To this extent, Chinese investigators, as those participating in the identification and repatriation scheme, would be armed and enabled with an abundance of information. They enter the US, clearly equipped, able, and expecting to overcome difficulties foreseen and unforeseen from federal, state, or even municipal law enforcement or US counterintelligence services they may encounter. They have managed to establish, in the venues in which they have operated, freedom of movement so to speak. Of course, certain levels of information deemed “ultra-secret” or however it might be described by Chinese intelligence, would unlikely be shared by intelligence services with the identification and repatriation teams. Perhaps overall, the exchange of information by some organizations would be on a “need to know” basis.

In the abstract, conceivably lessons learned are internalized, studies and observations of law enforcement as much as counterintelligence surely are constantly underway in all the countries by every organization operating in respectively. In turn those studies and observations are doubtlessly shared to mutually support the success of one another. What may be recognized as too risky, ineffective, expected by the adversary through recent experience, would be cut away. What seemed to be a more available path to ends, is given consideration, and will likely find its way in efforts to prepare those going on the next missions. Malum est consilium quod mutari non potest. (Bad (ill-considered) is the plan that cannot be changed.)

Most important to note is that whether the matter is espionage or other malign clandestine and covert activities overseas, there can be no doubt that all are constantly moving through a process of evolution. It appears to be a manifestation of an idea, reflective of what has been dubbed “Xi thought,” that Chinese activities performed by government, Communist Party of China, or irregulars must be driven by an energy to push the country onward and upward into the position of the dominant power of the world and one might imagine perhaps even beyond that stature, whatever designs the Communist Party of China leadership might have in mind for that to be. At first blush, these comments may strike a few readers as being a bit lightweight, but some reasoning behind risking such audacious action in the US should be parsed out and laid out for readers to possibly accept and provide a basis for greatcharlie’s suggestions as to what may have been organized and had transpired beneath the surface.

The Main Operation Fox Hunt Players in This Drama

Once fully operational, the identification and repatriation team for the New Jersey mission grew to at least 19 US and Chinese operatives. Nine of the operatives among the identification and repatriation team members of the Operation Fox Hunt New Jersey operation are part of the case filed in the Eastern District of New York, Criminal Division.

Included in the criminal complaint were the following. Hu Ji was the lead investigator and identification and repatriation team leader.  Hu was at the time of the indictment a 46 year old officer serving in the Wuhan Public Security Bureau, a municipal bureau of MPS. To be a bit more specific, he was a veteran officer of the bureau’s foreign affairs unit. Hu is a man of the world with a natural turn for clandestine action and placing others in trying positions. Hu gained notice after joining an Operation Fox Hunt task force. Reportedly, in early 2016, the Wuhan newsmedia had published glowing profiles about him, describing his imposing height, his travels to 29 countries, and his arrests of eight fugitives.  In the view of the Wuhan newsmedia, Hu est a un autre niveau! In an interview, Hu told the Hubei Daily: “Out of the country does not mean out of the legal system.” He added: “Show your sword and punish even those in faraway lands.” 

Though in photographs Hu looks careworn, they typically present him as a professional, intelligent, well-minded, well-built–about 6-foot-1, well-dressed, well-groomed, handsome, smooth, and confident-looking, Chinese male. Hu is a compound of cunning and audacity, girded with steady nerves. His gift as a cool observer of mankind and an understanding of complicated interpersonal relationships allowed him to successfully carry off the job of team leader. That understanding of people surely aided him in manipulating and exploiting others. Hu’s cases had led from Fiji to France to Mexico, making headlines back home. The work was riskier here; in fact, it was illegal. He acquired dominant knowledge of the territory in which he operated. Hu was not even afraid to be at the elbow of law enforcement personnel to explain his purpose using some tall story, some artifice. Hu would identify himself as a Chinese police officer on his tourist visa. US officials hardly gave him a second glance. Sometimes, it was best to hide in plain sight. Perhaps the best way to express what is discussed here is to state that in his work, Hu could be dashing and audacious, but also honorable and discreet, using wits and memory, acting gradually. He could display a certain gentleness but certainly had the capability to be quite cruel. He had no qualms about exploiting individual weakness. Surely, individuals as Hu often seem far too well-equipped for the world in comparison to people most readers might know, or to themselves. In attempting to ascribe certain traits to Hu given his role as a normal Operation Fox Hunt lead investigator and identification and repatriation team leader, those considered by greatcharlie may appear to be mere abstractions. However, as far as one can tell, these are precisely the traits that assisted Hu in becoming a master at his work.

 At the time the complaint was filed, Zhu Feng, also known as “Johnny Zhu,” was a 34 year old PRC citizen and US lawful permanent resident, and until approximately April 2017, was a resident of Flushing, Queens, in New York City. Zhu had studied in Guam before moving to Flushing, which holds one of largest enclaves of Chinese immigrants in the US. His extended family became legal US residents and appreciated life in their new home. Zhu’s older brother served in the US military and then worked for the Social Security Administration and Customs and Border Protection, according to court documents and public records. Zhu reportedly performed odd jobs: tour guide, selling used cars. On social media, he sported a Yankees cap and a boyish smile and called himself “Endless Johnny.” He was torn from that life to serve as an involuntary clandestine operative for the Chinese government. Zhu Yong, also known as Jason Zhu,” was a 64 year old Chinese citizen and a legal permanent resident in the US. Zhu Yong was the father of co-defendant Zhu Feng. The older Zhu, is divorced and suffers from diabetes and high blood pressure. He did not have a steady job, and divided his time between a home in Connecticut and his older son’s place in Queens. He traveled frequently to China which very likely caught the attention of MPS.

This conscription of families of captured targets is a ruthless and effective tactic. Yet, Chinese authorities find great value in it reportedly because they believe it ensures loyalty and obedience. They also apparently believe that allowing identification and repatriation teams to use local intermediaries enable them to shield Chinese officers from scrutiny by US counterintelligence services and state, county, and municipal law enforcement organizations around the US. The teams are often organized in what has been described as silos to keep operatives unaware of who other team members are or the full details of their mission.

Michael McMahon, a 53 year old US citizen, was a licensed private detective in New Jersey. McMahon came from an Irish-American family of police officers and firefighters. During his 14 years at the New York City Police Department, he worked in narcotics and an elite street crime unit, rising to detective sergeant. He received the Police Combat Cross, the department’s second-highest honor, for his role in a gunfight in the Bronx. In 2003, he retired on partial disability related to ailments caused by his time at Ground Zero after the September 11, 2001 terrorist attacks. His wife, an actress, once had a long-running part on “As the World Turns,” a daytime soap opera. Zheng Congying, a 25 year old Chinese citizen and legal permanent resident, resided in Brooklyn, New York. Investigators believe he was hired muscle. Li Minjun, a 65 year old citizen and resident of China, was a physician formerly of the Hubei Xiangyang Center Hospital in Xiangyang, China. Li had also worked for the MPS. Brought aboard the team as a specialist, her assignment was to escort Xu’s father from China to the US against his will with the hope that he would cause his son to surrender to the identification and repatriation team.

Hu Ji was the lead investigator and identification and repatriation team leader.  Hu was at the time of his indictment was an officer serving in the Wuhan Public Security Bureau, a municipal bureau of MPS. To be a bit more specific, he was a veteran officer of the bureau’s foreign affairs unit. Hu is a man of the world with a natural turn for clandestine action and placing others in trying positions. Hu gained notice after joining an Operation Fox Hunt task force. Reportedly, in early 2016, the Wuhan newsmedia had published glowing profiles about him, describing his imposing height, his travels to 29 countries, and his arrests of eight fugitives. In an interview, Hu told the Hubei Daily: “Out of the country does not mean out of the legal system.” He added: “Show your sword and punish even those in faraway lands.”

PRC Official-2 was at one time an individual whose identity was known only to the Grand Jury. However, PRC Official-2 has since been revealed to be Tu Lan, a 50 year old citizen and resident of China, was employed as a prosecutor with the Hanyang People’s Procuratorate and a leader of a Wuhan Fox Hunt task force. She would eventually direct day-to-day activities of the identification and repatriation team. However, as she did not speak English, Johnny would stick close and be her intermediary between her and Michael McMahon, the US private investigator, who was referred to by the identification and repatriation team members simply as “Mike.” 

Zhai Yongqiang, a 46 year old Chinese citizen, resided in China and California. According to court documents, Tu Lan and Zhai Yongqiang, age 46, were the last of the nine charged in the superseding complaint. The identity of a ninth defendant, named Anonymous by US prosecutors, remains under seal.

Among those also included in the federal court documents but not indicted were PRC Official-1 is an individual whose identity remains known only to the Grand Jury.  PRC Official-1 is said to be a Chinese citizen and a director of the Wuhan prosecution office’s anti-corruption bureau. Note that US prosecutors did not charge or identify PRC Official-1 or PRC Official-2 which frequently occurs for strategic and diplomatic reasons with regard to counterintelligence cases. Rong Jing, a 39 year old permanent resident in the US, was Hu’s point man in California. He was a married businessman, living in Rancho Cucamonga, about 35 miles east of Los Angeles. Court documents state Rong described himself as a bounty hunter for the Chinese government. He apparently enjoyed his “Motherland” and was quite talkative about it. Rong’s discussion of his work as identification and repatriation team member provided investigators with a wealth of information on the insidious nature and ubiquitous presence of the Operation Fox Hunt networks. Co-conspirator #3 was an operative who on or about and between May 15, 2017 and May17, 2017, contacted and hired a private investigator in California–dubbed P1 in the federal court document–for the purpose of surveilling Jane Doe #2. Co-conspirator #3 provided P1 with a picture of a document from the defendant Zhai Yongqiang containing the name and personal identification information belonging to Xu.

Communist Party of China Expectations of the Identification and Repatriation Team 

In 2015, Liu Dong, then deputy director of MPS’s economic crimes division, headed Operation Fox Hunt for the organization. He used interviews with China’s newsmedia to supposedly provide citizens with a rare look into the Operation Fox Hunt teams. He told Xinhua news agency that the work required a young team because members needed the strength to withstand long hours and frequent long-distance travel. Liu also told Xinhua that his team was highly intelligent, tough and nimble, with backgrounds in economics, law, foreign languages and business management. He further stated that team members were selected in part for their “emotional quotient” for dealing with overseas law enforcement, and for their ability to handle adversity.

For those team members indoctrinated in Communist Chinese thought doubtlessly recognizes his or her solemn responsibility to ensure China achieved its maximum potential everyday. Chinese intelligence officers in the various services likely feel that they can outperform their opponents and overcome their efforts to defend targets from espionage and efforts to intercept them. One might postulate in the abstract that Chinese intelligence officers may very well have closely observed, or may have read reports on how the behavior, performance and professionalism of officers of organizations in adversarial countries responsible for investigating and halting China’s espionage and any other activities in them was so negative, self-defeating, and self-destructive that confidence in their own abilities was uplifted. Perhaps this impression or belief grows in certitude with every review of certain adversaries. While there may not exactly be a wide open door there likely appeared to be seemingly endless potential for action and perhaps limitless possibilities.

Imaginably, those operatives from China already associated with the Chinese government who were selected for the identification and repatriation team had no bad habits–such as indulging in alcohol, narcotics, pornograpby, misogyny, and prostitution–that could potentially become amplified in a Western environment. To go a bit further using Chinese intelligence officers as a model, identification and repatriation team members, while deployed in service of their country, would not be expected to take any aspect of their duties lightly. They expectedly would never display any desire to involve themselves with banal amusements to fill time when not active in the field–one could hardly call any time while deployed “outside working hours.”–or entertain themselves on mobile phones while performing work tasks. One might presume that whatever they may most enjoy, they contented themselves with least. In effect, the team was expected to figuratively display the “company culture” of the Communist Party of China and live and act by “company principles.” By engaging in heavy handed actions against family members of the targets, team members certainly could be said to have displayed the “best practices” of the company.

Despite all of the safeguards in place, team members were well-aware that danger in the form of lurking US counterintelligence services. While perhaps highly motivated, on the ground, the hyperbole of China’s domination of the field in the US uttered by senior executives and Communist Party of China leaders is likely obviate in the minds of many operatives due to the very strong desire not to be captured. Presumably, no Chinese intelligence officer or clandestine or covert operative of any kind wants to be caught due to his or her own delinquency, carelessness, or outright stupidity. There is also the matter of punishment they might face back home for their failure. In recent memory, few to none among have been caught and put on trial in a US court. This is surely the standard and the expectation for all of those deployed at the Chinese government’s bidding. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

In 2015, Liu Dong, then deputy director of MPS’s economic crimes division, headed Operation Fox Hunt for the organization. He used interviews with China’s newsmedia to supposedly provide citizens with a rare look into the Operation Fox Hunt teams. He told Xinhua news agency that the work required a young team because members needed the strength to withstand long hours and frequent long-distance travel. Liu also told Xinhua that his team was highly intelligent, tough and nimble, with backgrounds in economics, law, foreign languages and business management. He further stated that team members were selected in part for their “emotional quotient” for dealing with overseas law enforcement, and for their ability to handle adversity.

Stalking and Attempted Repatriation of Xu Ji and Liu Feng

As the story goes, in September 2016, Hu flew to New York to launch the operation. Among his first moves, he went into New Jersey to reconnoiter the house in Short Hills and other locations. Then at Hu’s direction, his bevy of clandestine operatives began building a network. First, they needed a local private investigator, preferably a former police officer with contacts and the skills to track people down. Zhu Yong, together with co-conspirator whose identity is known only to the Grand Jury as “Co-conspirator #1,” hired Michael McMahon to investigate and surveil Xu. McMahon came from a family of police officers and firefighters. As an officer in the New York City Police Department (NYPD) for 14 years, he had served in a narcotics unit and an elite street crime unit. He rose to the rank of detective sergeant. He received the Police Combat Cross for his role in a gunfight in the Bronx. McMahon retired in 2003 on partial disability related to ailments caused by his time at Ground Zero after the September 11, 2001 World Trade Center attack. Reportedly, his wife, an actress, had a long-running part on “As the World Turns,” a daytime soap opera. Imaginably as a security precaution, Hu’s operatives enlisted a woman who presented herself as the New York-based employee of a translation company to contact McMahon. The woman explained to him that she discovered him through a Google search. She then introduced him to Zhu Feng and Zhu Yong, describing them as representatives of a private Chinese company that was trying to recover assets from a former employee who had stolen money.  Zhu Feng identified himself as the nephew of the owner of the Chinese firm, which he allegedly described as a construction company. The following month, Hu traveled to the US to meet with McMahon at a Panera Bread restaurant in Paramus, New Jersey, a suburb about 20 miles from New York City. Reportedly, the MPS officer presented himself as Eric Yan, an executive of the private company, during that meeting and other interactions. Zhu Feng and Zhu Yong also participated in Hu’s meetings with McMahon. Hu provided McMahon with a retainer of $5000 at that first meeting.  The two Zhu’s were reportedly involved with his succeeding payments. McMahon’s attorney claims his client “believed he was meeting company personnel” and never learned the identification and repatriation team’s true mission. “Nothing seemed suspicious at meetings” according to McMahon’s attorney. He also indicates that the identification and repatriation team members that his client met at no point mentioned the Chinese government or that anybody worked in law enforcement in China. He claims the focus of discussions was asset recovery, and they convincingly portrayed themselves as company employees with a vested interest in locating the money. 

Soon after he was hired, McMahon began to investigate Xu and his family, a process which included conducting surveillance on Xu and obtaining his banking information. ProPublica reports that McMahon brought in two more investigators to help stake out a suspected location of Xu and Liu, a house in New Jersey. He took the precaution of alerting local police to the surveillance presumably to prevent any misunderstandings if detected or reported by passers-by. (At that point, McMahon demonstrated the willingness to cooperate with law enforcement. Thereby, ample opportunity existed  for US counterintelligence services and law enforcement to enlist his assistance as an informant or operative. For reasons unknown, the opportunity was passed up.) As indicated by the federal document, McMahon’s activities were initially directed by the defendant Zhu Yong and later directly by Hu and Zhu Feng. McMahon was diligent in providing reports on his progress to Hu. In the Fall of 2016, McMahon sent Hu information regarding Xu and his family. In or about November 2016, McMahon emailed information about Liu’s international travel. Later, around December 2016, McMahon emailed Hu information concerning Liu’s date of birth, Social Security Number, and banking information. In November, Hu, still using the nom de guerre Yang, emailed McMahon to say he had “reported all we found” to his superiors in China

In December 2016, Hu visited New York again. On that occasion, he traveled with his manager. US authorities only identified Hu’s superior only as PRC Official-1, the director of the Wuhan prosecution office’s anti-corruption bureau and a leader of a Wuhan Fox Hunt task force that includes prosecutors and investigators in the Communist Party’s anti-corruption unit. After that visit, Hu and Zhu Feng returned to China. Oddly enough, in a meeting in Wuhan, Hu confided to Zhu that next time they did not plan to come back from the US without the targets.

Following months of investigative work by McMahon, the identification and repatriation team planned a specific operation to stalk and grab Xu via psychological coercion. It was then that the team moved to bring Xu’s elderly father from China to the US in order to communicate a threat on behalf of the Chinese government directly to Xu. As part of the plan, Xu’s father was directed to tell him to the effect that if he did not return to China, his family there would suffer serious harm, including imprisonment. In furtherance of this criminal scheme, team members, Zhu, Tu Lan, and Li Minjun traveled to the US.

Malgré-nous Among the Team’s Members

It has been said that in zealousness, one can usually find some weakness, some hidden doubts. In China, the world is limited to what is seen through the lens of the Communist Party of China and “Xi thought.” For some Chinese citizens, that line of thinking and a will of iron act as blinders, preventing other perspectives from seeping in. From the view of the Communist Party of China, in the New Jersey operation, a team was being sent in under Hu’s leadership whose members’ minds were turned wholly toward bringing John Doe #1 back to China. In no small part, therein lies the causality for the ultimate breakdown of the New Jersey identification and repatriation operation. 

Interestingly, not all team members were members of the Communist Party of China or aspired to be such. One would think Party membership would be sine qua non for a mission of this type as it was actually commissioned by the Party and given that certain exigent circumstances could arise, requiring almost anything of team members, including literal self-sacrifice. Those called upon were indeed not the most dedicated. The teams and their superiors in Beijing erred in presuming without any reliable ability to predict or confirm the fidelity of those non-Party members would gladly follow orders in every circumstance.

With the New Jersey enterprise, it is clear two team members, Zhu Feng and Zhu Yong were called upon presumptively because their loyalty was guaranteed with dangled threats to cause misfortune for their relatives, some of whom had already suffered by the government’s hand. It was certainly an odd type of fidelity. In Zhu Feng’s particular case, in the summer of 2016, he received news from relatives in Wuhan that MPS had brought his uncle, a former accountant, back to China from Houston. Zhu’s relatives also contacted him to say: “The cop who caught your uncle is named Hu Ji. They further explained: “He will contact you about another case. Do what he says.” Team Members of identification and repatriation teams such as Zhu Feng and Zhu Yong are ostensibly China’s version of the French malgré-nous. Malgré-nous were those men of the Alsace-Moselle region who were conscripted against their will into the German Wehrmacht or the Waffen SS during World War II. Chinese citizens were torn from their normal daily lives and pressed into service not simply as a matter of being under the authority and thumb of hostile power that controlled the territory in which they lived, but coping with the threat of harm, even death, of loved ones also living under the regime.

The Initial Effort and the First “Emotional Bomb”

In the spring of 2017, the plan was ready and all team elements were assembled in the US. Hu remained in Wuhan, managing activities, but he sent in a specialist, Tu Lan, a prosecutor for the Hanyang District of Wuhan. She would lead the repatriation team on the ground, but because she did not speak English, Zhu Feng (hereinafter referred to as Zhu as the role of his father, Zhu Yong, was not discussed beyond this point in any sources) would stick close and be her intermediary with McMahon. The other specialist sent into the US, Li Minjun, as aforementioned, was a doctor who had worked for MPS, US officials allege her assignment was to escort an elderly man across the world against his will in order to ambush his son, Xu. Reportedly, Hu hoped the shock would cause the wanted man, Xu Jin, to surrender on the spot. The true age of Xu’s father has not been disclosed, but presumably Hu felt he was frail enough to put Li at his side for the more than 15-hour flight. Interestingly, Zhu Yong, who at the mission’s outset was entrusted to find and establish links with a US-based private investigator with specific characteristics, Tu, Li, and McMahon were ages 64, 50, 65, and 53 respectively. It seems that for MPS managers, age has importance, imaginably equating to experience, capability, reliability, solid judgment, and wisdom among other positive qualities.

Hu told McMahon in an email in March that the plan was to bring the father unannounced to the house in New Jersey and lure him out. Hu also gave him the following instructions: “We just want to recomm[e]nd you trace him to find [his son’s] address.” According to the federal court document, Hu offered to pay McMahon in cash for his assistance. McMahon accepted the offer. Hu later emailed McMahon two photographs, one of which depicted Xu and Liu while the other depicted Xu’s parents. Before returning to the US, Zhu was given the task of overseeing operatives he had hired in the Chinese community in New York. He sent a text message ordering one operative to join Mahon’s  surveillance in New Jersey with instructions to “conduct surveillance there for 5 days. 12 hours on the first day, 10 hours on the second day, and 8 hours on the last three days . . . The compensation is 1800USD.” 

To all appearances, Zhu had Hu’s complete confidence. On first impression, an interesting historical parallel comes to mind with regard to the developing relationship between Zhu as a conscript with his superiors, or more accurately, his captors Hu and Tu. Despite being torn from his former carefree existence and forced to become a player in Operation Fox Hunt, he was nevertheless given key tasks, considerable responsibility, and treated in a rather avuncular manner particularly by Hu. In Ancient Rome, occasionally certain masters would depend upon slaves to perform important duties and provide them with opportunities for growth within the society. A couple of famous examples of that are the relationship that grew between the master Terentius Lucanus and Publius Terentius and that between Carpophorus and Callixtus. Born between 195/185 BC, Roman senator Terentius Lucanus brought Publius Terentius to Rome as a slave. He educated him, and freed him after being impressed by his abilities. Publius Terentius would become a playwright known better today as Terence. Terence’s 6 plays have survived through the centuries. He died young around 159 BC. Callixtus was a young slave from Rome. His master Carpophorus, gave him the responsibility of collecting funds given as alms by other Christians. Callixtus would become a Christian himself. According to Sextus Julius Africanus, Callixtus would become the Bishop of Rome from c. 218 AD, and is known both as Callistus I and Pope Callixtus. He was martyred for his Christian faith in c. 223 AD and is venerated as a saint by the Catholic Church. Perchance Hu was grooming Zhu as a protégé and foresaw a future for him as a full-fledged officer in MPS or some other security service.

Exploitation of Émigré Communities

Clever choices have been made by the identification and repatriation teams based on studies on the practices of law enforcement organizations around the US where Chinese investigators must operate. Aware of the Chinese government’s hostile activities within their own community, it would seem to be grave error to believe law enforcement around the US could possibly know what the Chinese government is doing in the US against émigrés or what it is capable of doing to please or make a good impression with the Communist Party of China. It is not always the case but to an extent, the émigrés, thinking ostensibly in survival mode, will typically see no other way to get by but to remain obedient to Chinese authorities. Unfortunately, there is of course the other reality that not everyone can be or wants to be a noble soul. 

As discussed in the December 13, 2020 greatcharlie post entitled  “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” under Article 9 of the National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress, maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MPS and MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MPS, MSS, or PLA, does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security.

Unable to keep pace with the identification and repatriation teams from the start, naturally the initial hope would be given the gravity of the intrusion on US soil, that while moving about within Chinese émigré communities, the teams would at least act with some measure and would not exceed what is decent. That has not been the case regarding their behavior. Operation Fox Hunt teams have created great fear among the émigré communities. One might toss on top of that an apparent impunity with which hunters from China act against them. True, on paper, members of the Chinese émigré communities have nothing to fear in the US and are welcome to enjoy the benefits of living in a free society. Yet, as the MPS was able to accomplish more than imaginable in the US, displaying its power and capabilities, there remains uneasiness, fear, terror among Chinese émigré communities from something they are thousands of miles from. Chinese émigré communities are for the most part convinced of the ubiquitous nature of the Communist Party of China and China’s security services.

Chineee Émigré Communities and Unshakable Grip of Beijing

Unable to keep pace with the identification and repatriation teams from the start, the initial hope would be given the gravity of the intrusion on US soil, that within Chinese émigré communities, the teams would act with some measure and would not exceed what is decent. Surely, that has not been the case regarding their behavior. Operation Fox Hunt teams have created great fear among the émigré communities. One might toss on top of that an apparent impunity with which hunters from China act against them. True, on paper, members of the Chinese émigré communities have nothing to fear in the US and are welcome to enjoy the benefits of living in a free society. Yet, as the MPS was able to accomplish more than imaginable in the US, displaying its power and capabilities, there remains uneasiness, fear, terror among Chinese émigré communities from something they are thousands of miles from. Chinese émigré communities are for the most part convinced of the ubiquitous nature of the Communist Party of China and China’s security services. Indeed, within the émigré communities, there is an expectation, especially among more recent arrivals that always close by are recruited informants of MPS, Party Members, planted United Front Work Department operatives and informants, planted MSS intelligence officers, operatives, recruited informants. Memories and ways of living to survive in an authoritarian China are not easily shaken off. Quando libertas ceciderit, nemo libere dicere audebit. (When liberty will have fallen (falls/is lost), no one will dare to speak freely.) 

The learning curve for law enforcement organizations around the US may remain steep for some time as the ways and means with which the Chinese government uses to approach Chinese émigré communities on matters such as returning citizens and former citizens to China “to face justice,” is ever evolving. Use of lessons learned by the Operation Fox Hunt identification and repatriation teams will mean for the future more effective use of artifice, more effective collection of information within émigré communities, more effective counter-surveillance, more effective sharing information and data useful for operations among organizations engaged in clandestine and covert operations in the US.

To get Xu’s father into the US without incident, Zhu coached the captive elderly man on responses to standard questions asked by border inspectors at Newark Liberty International Airport. In advance of Xu’s father’s arrival in the US, the defendants Zhu and Tu flew to  Newark Liberty International Airport on or about April 3, 2017. Xu’s father and Li, the doctor, arrived at Newark Liberty International Airport on a flight from Shanghai on April 5, 2017. While in the US, the Tu met with Zhu and an individual known to US prosecutors as Co-conspirator #2 at a hotel in New Jersey. At that meeting, Tu directed Zhu and Co-conspirator #2 to surveil a residence belonging to a relative of Xu and Liu using night vision goggles in advance of bringing Xu’s father to the home. Tu also subsequently communicated with Zhu with regard to the logistics of the operation. On the evening of April 5, 2017, identification and repatriation team members brought Xu’s father to a house in New Jersey that belonged to his wife’s relatives. As that transpired, McMahon performed surveillance in the vicinity of the house belonging to Liu’s relatives to determine the present locations of members of Xu’s family, including Hu himself, which at that time remained unknown to the team.

On April 6, 2017, Xu met his father at a public location before they returned together to his residence. McMahon and other team members monitored the meeting of Xu and his father. That same day, Zhu requested that McMahon run a database check for a license plate number and address associated with Xu. McMahon provided that info. Xu’s father remained with his son for several days. During that time, he explained to Xu that his family in China would be harmed if he did not return to China. Hu’s hopes for a lightning-bolt triumph evaporated. Instead of acquiescence, the family stood fast and contacted law enforcement. The FBI got involved, a move the Operation Hunt team was almost immediately made aware of. According to the federal court document, on April 7, 2017, Zhu sent a text to Tu saying Hu wanted her “and the doctor to come back as soon as possible” to “evade actions by US law enforcement.”  That same day, Tu departed from John F. Kennedy International Airport in Queens, New York on a flight to Beijing. The next day, Li departed from Newark Liberty International Airport on a flight to Beijing.

Identification and Repatriation Team Receives Intriguing Alert

Although executed piecemeal, the departure of key members and leaders of the identification and repatriation team after the alert was sounded may have followed a prearranged course. As it was always possible that such a need to move fast would arise. Nevertheless, a flaw became apparent in that process. it would have made a bit more sense if team lead investigators and their superiors, when selecting team members, had only selected individuals who possessed certain talents, perhaps demonstrated on previous operations maybe in other areas, who would expectedly contribute to the operation’s success. In this particular situation, some identification and repatriation team members who remained in the field as Zhu appeared unsure of how to proceed, were unfamiliar with steps to take, and required supervision. Those next steps that needed to be taken should have been standard operating procedures deeply ingrained through training. In an exigent situation, the team leader also appeared not certain as to how team members might perform. Tu, for instance, appeared to feel the need to be emphatic when issuing instructions. Zhu communicated in a similar way to the operatives that he supervised. This “crack” in the team selection process was to a degree a self-inflicted handicap and vulnerability that could have proved costly if US counterintelligence services and law enforcement organizations around the US were aware of the situation and positioned themselves to take advantage of it. Knowing that this is how the identification and repatriation teams operate, it could allow them to be better prepared and steal a March on their prey on another occasion when they are in their sights. However, this may have been a lesson learned by Operation Fox Hunt managers and it is unlikely that they would not make the necessary changes to avoid dealing with this issue in the future. Surely, there remains a chance the situation will be the same next time, too! Some Operation Fox Hunt managers may feel on ne change pas une équipe qui gagne!

Chinese Countersurveillance Operations in the US

The fact that the identification and repatriation team received an alert that the FBI was fully aware of the effort to coerce Xu by using his father was reported almost as a trifle in the federal court document. Yet, in reality, it was small much in the way that the small movement of a needle on a seismograph can report a giant earthquake. Upon first reading about this particular moment of identification and repatriation operation, there grew an interest in greatcharlie in how Chinese operators engaged in all sorts of activities in the US are seemingly forewarned whenever law enforcement and counterintelligence services draw near them. Of course, one of the counterintelligence organizations might just be a leaky ship. There could be rotten apples in their midst. However, it certainly would not be too fanciful to conceive that Chinese operatives on government sanctioned missions receive more support from unknown entities nestled in the US than may be recognized officially or publicly.

One might postulate that with so many Chinese intelligence officers–there were reports of as many as 25,000 “in country” back in 2017–and their operatives and informants moving furtively throughout the US, there may very well be specialized counterintelligence elements, covert surveillance teams, positioned in numbers deemed sufficient by the powers that be in the PLA CMC Joint Military Staff Intelligence Bureau and MSS counterintelligence that provide overwatch for espionage operations. The PLA teams, rather than come from intelligence units, might instead be formed from PLA Army special operations units primed in the reconnaissance and surveillance operations and to engage in a special reconnaissance mission. Teams from MSS would likely be secounded from the provincial departments and municipal bureaus, Chinese intelligence elements operating in the US would surely appreciate a resource that would allow their officers, operatives, and informants to repeatedly evade intercept. Similar covert surveillance teams may be operating in other countries. It is just a theory.

One might postulate that with so many Chinese intelligence officers–there were reports of as many as 25,000 “in country” a few short years ago–and their operatives and informants moving furtively throughout the US, there may very well be specialized counterintelligence elements, covert surveillance teams, positioned in numbers deemed sufficient by the powers that be in the PLA CMC Joint Military Staff Intelligence Bureau and MSS counterintelligence secounded from the provincial departments and municipal bureaus, that provide overwatch for espionage operations. If providing assistance to them would actually be feasible, it would be counterintuitive not allow identification and repatriation teams to enjoy the overwatch of any theorized covert countersurveillance teams of MSS and PLA operating in close proximity to them. 

If providing assistance to them would actually be feasible, it would be counterintuitive not allow covert countersurveillance teams of MSS and PLA to provide overwatch for other operations ostensibly underway in close proximity to them, perhaps of a variety and number far in excess of espionage. Such would be to the great benefit of the Operation Fox Hunt identification and repatriation teams.

As part of their mission, the theorized covert surveillance teams would very likely shadow any law enforcement or US counterintelligence organizations for the purpose of countersurveillance and early warning. No law enforcement or US counterintelligence organizations would be allowed to surprisingly appear at the site of a meeting between team members and a target ol contracted operative. No law enforcement or US counterintelligence organizations would be allowed to place surveillance teams on any of Chinese operatives without the knowledge of the covert surveillance teams. Any alerts about threatening moves by law enforcement or US counterintelligence organizations would unlikely be relayed through channels from the intelligence element’s headquarters down to those managing the teams as the circumstances would invariably be exigent, and time would be of essence. Communication between intelligence elements and the team would ostensively be confined at the level of the intelligence field managers and the lead investigator of the team. Imaginably, MSS and PLA managers would establish some incognito for their contacts as a security measure in case some catastrophe should befall the identification and repatriation team and through interrogation, the team leader reveals anything about their MSS or PLA counterpart that could identity them.

MSS and PLA intelligence network managers would hardly want some incident with the identification and repatriation team to draw unwanted attention to their province. It would be best to help the team get in and get out rapidly and safely. Additionally, having the opportunity to study and make observations of their opposition’s practices in surveilling suspected foreign operatives or the steps they go through and how they perform and behave while in investigation mode imaginably would be invaluable for MSS or PLA intelligence officers operating in the US. On top of everything, as the identification and repatriation operations are apparently the brainchild of the Communist Party of China, it would be essential for them to accomplish their task. Those able to make that a reality would be expected to do their utmost to assist with all possible precautions taken into consideration. All involved would likely be called to account if it failed. A MSS or PLA field manager who has the identification and repatriation teams operating in their area of operation would have to be considerably indifferent to the wishes of the Communist Party of China to have a clear ability to ensure the success of the team’s effort, and do nothing to assist and actually allow it the flounder.

Much as the MPS organized the identification and repatriation teams, it may very well be that any prospective covert surveillance teams organized for purpose suggested, might be well trained officers of MPS–also an intelligence service with what might be deemed a counterintelligence proclivity, doing what they do best for the Communist Party of China, keeping an iron grip on all Chinese citizens. Covert communications between team lead investigators and the covert countersurveillance teams theorized here would likely be uniquely designed by MPS in China for the operation. If the theorized covert surveillance team discussed in this essay were a creature of MPS, having it take their eyes off what members of the identification and repatriation teams were doing surely would not thrill the powers that be at MPS Headquarters.

Omne ignotum pro magnifico est. (We have great notions of everything unknown.) Of course, it is possible that nothing remotely resembling what has been suggested here exists at all. On the other hand, there may actually be surveillance teams operating around the US in a manner of far greater conception than what has been hinted.

Gnawing Bit More on the Theorized Covert Surveillance Teams 

Conceivably, when not engaged in their patient vigil over Chinese operatives of all kinds, the hypothetical covert surveillance teams maintain a low key, traveled existence wherever they are. What may be viewed as most remarkable about the covert surveillance team members if discovered would be the fact they are by appearance so unremarkable. Anything linked to their activities would hardly be found wherever they might reside or frequent. All in all, they would surely keep themselves to themselves. Yet, perhaps the most troubling aspect of the theorized covert surveillance team is that they would likely be gaining experience and honing their skills with everyday that passes during which they have perhaps been out in the field. As their skills increase, their capabilities and willingness to take on greater challenges would also likely increase. Further, for those trying to cope with Chinese operatives of all kinds in the US, the imagined increase in experience and capabilities among the theorized covert surveillance teams would surely be attended by a marked increase in the degree of difficulty in capturing them. Imaginably some financial support would be provided for the additional expenditures on logistical needs for the supportive surveillance work. As the activity would be in direct support of a Communist Party of China directed operation, a large request would unlikely be made to cover personal service expenses. The honor and privilege of serving the Communist Party of China would expectantly be viewed in Beijing as sufficient reward.

Oddly enough, the identification and repatriation team still did not just pull the shutters down and run off just because FBI agents were onto them. With the specialists safe, the identification and repatriation team members rather audaciously continued to watch Xu’s in-laws home and Xu’s home. Tu joined Hu at the command post back in Wuhan where she continued to direct the identification and repatriation operation while in China. On April 9, 2017, Zhu messaged Tu Lan, inquiring: “Prosecutor Tu [Tu Lan] whose order should I take for now while I am here?” Tu replied: “You communicate with me and Hu [Hu Ji]. I will go to the Commission for Discipline Inspection this afternoon. I will contact you afterwards.” The “Commission for Discipline Inspection,” which was a Chinese government agency responsible for investigating members of the Communist Party for corruption. Tu also wrote to Zhu: “[Y]ou need to confirm that Mike [McMahon] can execute according to our requirement.” According to the federal court document,, on April 9, 2017, Tu  sent an electronic message to the Zhu asking: “Did you tell Hu [Hu Ji] that I still want to confirm [John Doe #1’s ] [Xu’s] father’s status?” Zhu responded, “It seemed that he has reported to the [Chinese Official #1] already,” and added that “I arranged to have me [McMahon] stay there Monday morning.” Zhu told Tu Lan that ” the money I have on hand can only have me [McMahon] to stay there for two days.” On April 11, 2017, McMahon and Zhu discussed–in English–additional steps to intimidate Xu into returning to China. The federal court document specifically quotes McMahon as proposing they “harass” Xu, including by “[p]ark[ing] outside his home and let him know we are there.” Zhu replied that they “can’t harass [John Doe #1] [Xu] like that lol.” The efforts to persuade Xu to return to China were unsuccessful. The emotional bomb fizzled.. On April 12, 2017,  Zhu and Xu’s father departed from Newark Liberty International Airport on a flight to Shanghai.

Discussion will be extended in Part 2, to be published later.

Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020)

China is currently engaged in a very aggressive, massive espionage, cyber, and covert action assault on the US with the goal of catching up with it technologically, militarily, and economically as quickly as possible. China hopes to eventually become the world’s dominant power. Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Victories on the intelligence front have likely most satisfied People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, as under his leadership, China’s intelligence capabilities have been greatly enhanced and have evolved. In his monograph, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that will shock its readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined.

Since the era of the People’s Republic of China’s Second Chairman Deng Xiaoping, from 1976 to 1994, the Communist Party of China’s leadership has lived in optimistic expectation of better fortune for the Chinese people in terms of economics and their standard of living. Party leaders covet the position the US holds as the dominant power in the world. In accordance with that thinking, long range plans were formulated. Such really should have been the expected response of Chinese national leaders who were first and foremost dedicated to a very aggressive revolutionary movement. It was determined in Beijing that espionage offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. At that time, many of China’s largest companies were state owned, or had close linkages to the government. From all accounts, China thereby embarked on what has become a very aggressive and massive espionage, cyber, and covert action assault on the US with the ever-fixed goal of catching up with it technologically, militarily, and economically as quickly as possible.

Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Chinese intelligence officers have experienced innumerable satisfactions in the spy war. According to a former chief of Counterintelligence for the Central Intelligence Agency (CIA), James Olson, in his superb book, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), China is presently in a class by itself in terms of its espionage, covert action, and cyber capabilities. (The January 31, 2021 greatcharlie post is a review of Olson’s To Catch a Spy.) The struggle on the intelligence front impacts the whole climate of the relations with China. Even when China is engaged in bilateral or multilateral talks, whether on trade, security, or the environment, Chinese intelligence services never cease engaging in robust espionage. Imaginably, victories on the intelligence front provide a most satisfying opportunity for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, to cock-a-doodle, about how, under his leadership, China’s intelligence capabilities have evolved to the point at which the intelligence services can carry the battle to the home ground of the US itself and win. Senior executives and managers in US counterintelligence services doubtlessly stand exasperated over regular disappointments.

In A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that, although well-known within the US Intelligence Community and within other intelligence services worldwide, will shock nonpracticioners among his monograph’s readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined. As might be expected, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. The revelation will be that Chinese espionage activity is not the exclusive purview of China’s civilian and military intelligence services. In addition to government organizations, commercial entities, academic institutions, and private individuals, entrepreneurs are heavily engaged in espionage against preferred targets in highly industrialized countries. Chinese firms have proved themselves to be quite capable at performing such work. Surely, if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

Eftimiades examination is based on his study on the nature of Chinese espionage worldwide and in-depth understanding developed through decades of experience in the intelligence field. He reviews intelligence processes, setting objectives and tasking, organizations that engage in espionage, looks at their efforts through case studies and analysis of them. He also discusses how China’s espionage activities worldwide has had an impact on US national security, international security, the international political economy, and geopolitics. Eftimiades delves into the practical matters that concern intelligence officers of government organizations and employees of commercial entities and academic institutions as they engage in espionage, and how the Chinese government manages the hybrid government and “independent” civilian intelligence system it has created. While Series on Chinese Espionage, Vol. I: Operations and Tactics is the actual title of Eftimiades’ monograph, the monograph is listed on Amazon.com as Chinese Espionage Operations and Tactics (Vitruvian Press, 2020). The monograph is heretofore referenced in this essay by the latter title. (It might be best for those who may wish to possess a copy to research the text under the latter title. The publication date is September 3, 2020).

A sidelight, as defined by the Oxford English Dictionary, is a piece of information usually given by accident or in connection with another subject, that helps one to understand somebody or something. The goal of sidelights offered in this essay is to present Eftimiades’ monograph in a way that will give our readers a good sense of both what is in it and sort of ideas and insights they might draw from it. In effect, it is a review. For those who may excavate through the monograph and thoroughly and consider points of exposition concerning specific malign activities conducted by China, his work will prove to be substantially edifying. What is most impressive to greatcharlie about the monograph is the manner in which it stimulates thought on a grave issue concerning China. As stated in prior posts, greatcharlie prefers to review texts that can stir a fire inside a reader, and transmit the author’s passion for a subject. Those writings are the most memorable and most enjoyable to sit with. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

The role of reviewer, an unsolicited intermediary between a text’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a work then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil. It is greatcharlie’s preference to provide reviews, sidelights here, that readers of the blog can enjoy and from which they may edify themselves. Nothing greatcharlie states in this essay is intended to give Eftimiades some stick–perish the thought. In greatcharlie’s view, he is brilliant, and works such as his monograph educate nonpracticioners as greatcharlie. They are very much appreciated. This review is not an inquiry into facts presented. All that is being presented here are insights greatcharlie birthed while parsing out the text. Although important details of Eftimiades monograph are discussed here, not everything is revealed. This is greatcharlie’s hard and fast rule on reviews, whether books, or as in this case a monograph. Plenty is left for readers to discover and draw their own insights upon.

Nicholas Eftimiades, the author (above), among other high level positions in the US government, was formerly the Director of Counterintelligence at the Central Intelligence Agency. He is highly regarded for his expertise on China and national security space issues. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. Eftimiades holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University.

The Author

Eftimiades, among other high level positions in the US government, was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. The Intelligence Community awarded Eftimiades with its highest honors to include the National Intelligence Council Achievement Award and DIA Director’s Intelligence Award. As of this writing, Eftimiades holds appointments on the National Intelligence Council as an Intelligence Community Associate, Homeland Security Advisory Council, Economic Security Subcommittee, and the Defense Science Board. Although he has left the CIA, one does not get the impression that Eftimiades has left the fight yet! Eftimiades has testified before several US Congressional and Presidential Commissions concerning National Security issues, future technology development, and the future of the US space program. 

Among several high level positions, Eftimiades was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University. He has lived and studied in Asia. He once served as a senior research fellow at King’s College, War Studies Department in London. During that period, Eftimiades authored books, reports, and a number of articles on China’s intelligence methodology, national security, technology, and space issues. Currently, Eftimiades is a professor at Pennsylvania State University, Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. 

As Eftimiades possesses such formidable credentials, it seems needless to say that readers should approach all matters of fact presented by Eftimiades as true to the best of his knowledge and belief. Eftimiades spoke truth to power within halls of the US national security bureaucracies and in the White House. He presents the monograph’s discussion essentially in that same mode, discussing only what he knows to be the truth on Chinese Intelligence Operations. His proceeding publication, Chinese Intelligence Operations is regarded as the seminal work in the field. In the period surrounding its publication in 1994, greatcharlie’s editor did not have the pleasure to read Nicholas Eftimiades, Chinese Intelligence Operations (CreateSpace Independent Publishing Platform, 1994) and in fact was not even aware of its existence. Having read through it in preparation for this review, the book impressed as being a damnably good breakdown of the organization departments, the missions, guiding concepts and intent of its leaders, and the tactics, techniques, procedures, and methods of each service of the “Chinese Intelligence Community” during what could now be called a bygone era. 

To the extent that it has relevance other than by mere subject matter with regard to Eftimiades Chinese Espionage Operations and Tactics. The preceding enables one, through comparisons of assessments of the work performed in varied operational and functional areas, to observe how far Chinese intelligence services have evolved, among many things, as organizations, within the country’s foreign and national security policy bureaucracy, and as vital tools in the hands of the leadership of the Communist Party of China. Interestingly, by examining both Chinese Espionage Operations and Tactics and Chinese Intelligence Operations, one is also provided the opportunity to examine an evolution in the experience, education, thinking and type of insights developed on Chinese intelligence services.. Perhaps readers will discover, much as greatcharlie did, that Chinese Espionage Operations and Tactics takes the reader to a higher level of understanding of the topics and raises the level of discourse to a seasoned intelligence analyst on China. For China watchers in particular, the monograph provides a loom from which new understandings and fresh insights can be crafted. Of course, for those who have not read or do not plan to read Eftimiades, Chinese Intelligence Operations, the opportunity still exists to prosper intellectually by plotting Chinese Espionage Operations and Tactics as the start point on the figurative charts of their respective learning curves on Chinese Intelligence.

Make no mistake, Eftimiades worked at the sharp end of intelligence work and knows the true value of each bit, even trifles, emphasizing in the text what is important to know in order to get the counterintelligence job done. Indeed, through his monograph, readers get a small taste of the discourse between intelligence officers within the bureaucracies in which Eftimiades served, and the flavor of its tone. One might as far as to say that by reading Eftimiades monograph, one gets a sense of the thinking within key US national security bureaucracies on Chinese intelligence activities in the US in the current climate.

Previous Reviews

Among reviews of Chinese Espionage Operations and Tactics published on Amazon.com are a few from former and current US senior executives and intelligence officers of the US Intelligence Community. Their glowing expressions of satisfaction and appreciation,reviews attest to the value, positive impact the monograph had on their thinking and their work. One such review was by Maryann Fialdini, Former Chief, Counterintelligence Operations of the US Defense Intelligence Agency (DIA). She explained: “Mr Eftimiades has broken new ground on his closely researched series on Chinese Espionage Operations and Tactics. His work on Chinese espionage spans 30 years in the intelligence community. In the 90’s he sounded the alarm on China’s rising espionage activities directed against US corporate and government entities. His current series on Chinese Espionage identifies for the reader China’s massive “whole of Society” approach to espionage activity and offers the exceedingly rare combination of insight and judgement from a professional who has a wealth of firsthand experience. Eftimiades work fills an important gap in US literature as it relates to Chinese intelligence. I highly recommend this book!” Another fine review was from David Tsai, formerly of the Library of Congress. He stated: “Most up-to-date comprehensive and detailed treatment of the subject based on the author’s objective analysis of close to 600 cases! An intelligence practitioner as well as academic scholar Mr. Eftimiades has given his readers a clear picture of Chinese espionage doctrine and tradecraft, based on a combination of his experience and scholarship. This excellent and insightful book is highly recommended for both professionals and novices who are interested in this subject.” A review from Nicholas Kikis, former Director of the DIA’s Defense Clandestine Service and Chief of East Asia Division, that appears on the back of the monograph, proffers: “A must-read for professionals in Counter intelligence, security and government affairs. The author has crafted the most detailed account ever published on China’s espionage operations and tactics . . . The USA is loosing its secrets and technology to China’s “whole of society” approach . . . Our Nation’s need for good counterintelligence has never been greater . . . Mr. Eftimiades is the real deal, a veteran of the Intelligence Community who describes the challenges and provides recommendations on how to do a better job in protecting America.”

Interestingly, Eftimiades does not mention anything about having to submit his monograph to the Publications Review Board of his former employer, CIA, for review. For security reasons, it is a requirement for officials from the US Intelligence Community with backgrounds as his. One might expect his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any of that information could possibly provide some important bit, some nuance on what the US knows about China’s espionage operations and tactics in the US. Surely, the Publications Review Board stopped anything from going into the text if in its view it even approximated classified information. Hypotheses and arguments are a bit more challenging to judge for security reasons. Certain facts, even if left out hypotheses and arguments, can be assessed as being confirmed by some clever sorts in an adversaries camp seeing that those facts might alone be the sole solid basis upon which a particular inference might logically be made.

Sidelights

Eftimiades’ monograph is divided into 12 sections. They are entitled as follows: Section1: “Preface”; Section 2: “Key Findings”; Section 3: “Introduction”; Section 4: “Analytical Methodology”; Section 5: “China’s Legal Framework for Espionage”; Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; Section 9: “Analysis of Espionage Tradecraft”; Section 10: “Impact”; Section 11: “Summary”; and, Section12: “Link to video Analysis of China’s Economic Espionage Tactics.” Since the monograph is only 56 pages in total, it seemed apropos for this review to condense the discussion of 8 of its 12 sections, highlighting from each what might be its most intriguing elements/aspects for our readers. For 9 of the monographs sections, to include one not précised, greatcharlie provides sidelights.

Section 1: “Preface”

From the outset, Eftimiades makes it clear that the focus of his monograph, although there is some emphasis on espionage activities against the US, is on China’s worldwide human intelligence operations. The monograph does not include a discussion of China’s intelligence analysis capabilities, technology collection, not domestic operations against perceived internal threats. He indicates that cyber espionage is only addressed in select cases which were enabled by humans providing insider access. Eftimiades notes that he brings his own experiences and perceptions into his interpretations of those cases.

Eftimiades also gives notice to readers that the monograph only reflects known Chinese intelligence operations. Even with a review of hundreds of espionage cases, he recognizes that certain matters are left open such as the number of individuals engaged in espionage activities worldwide for China, and whether the cases he analyzed represent as much as 90 percent of the total or as little as 10 percent. (The word “worldwide” qualified the former statement of the two. Perchance the number operating in the US is known!) Eftimiades insists that even the Chinese government does not know the precise number of individuals spying on its behalf. He suggests that uncertainty about that total would be due to China’s decentralized “whole of society” approach to intelligence collection. Still, he felt enabled due to the volume of cases and careful–experienced, astute–analysis of operational details, he could draw certain conclusions about China’s espionage operations and tactics.

Eftimiades’ statement about Chinese intelligence operations and tactics practiced in the US is a very bold one to make starting off from scratch in his “Preface”. Writing in that manner, Eftimiades was sure to create more questions than anything else. Reading what was stated by a number of reviewers of the monograph from outside the US national security bureaucracies, this point could perhaps be deemed as the metaphorical low-hanging fruit for criticism. Given the strength of the mind of a man as Eftimiades, it could be the case that he has dangled this statement on the number of Chinese officers and operatives around the world, aware that it would draw a strong reaction among close readers and light the fire that would ignite a lively discourse within and among them. He is a former director of CIA Counterintelligence, which makes him a member of a rather unique caste of singular individuals who would hardly do anything without considerable forethought. To go a bit further, given Eftimiades background one might think perhaps there is some counterintelligence benefit in refusing to confirm publicly, not allowing an adversary to discover what the accepted size and strength of its espionage operations are. Imaginably that information might aid them in planning around US thinking, potentially finding some advantage if the estimated figures are too high, too low, or spot on. 

The likely first impression of readers resulting from Eftimiades’ “declaration of nescience” on the numbers of would be Eftimiades could not have managed to effectively consider the ends, was, and means of Chinese organizations engaged in espionage if an important leg of the three leg “strategy stool”, means, which includes the resources, size and strength of those organizations, was unknown to him. Unaware of that it was harder to see how he could delve into a more elaborate discussion of their operations and tactics. Curiosity over how Eftimiades managed everything would surely compel the many readers to push forward into the text. However, it would very likely be regularly done with some reservation. To the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US, to be both above board and fair, are only proffered in the abstract.   

Readers looking at the matter on their own might wonder what is the average caseload for a Chinese intelligence officer from either the civilian or military service If it is more than one, let one surmise three or four, then one might begin to believe the espionage crisis is much greater in magnitude. One might consider that given likely number of Chinese intelligence officers and operatives in the field, the true number of Chinese personnel involved increases exponentially when the number likely needed to provide logistical support for such a grand number of officers and operatives in the field and their operations which appear to vary in size and scope, are considered. One might not only infer from the number and size of known operations, their intensity and tempo, and apparent effective level of support for each the totality of Chinese intelligence officers and operatives in the field, but a close approximation of their number might be reached by considering just how much has been stolen, usually detected well after the fact. Later, in the “Summary” section, Eftimiades notes that although he may not be certain of the true number of Chinese intelligence officers that are on the ground in the US but himself surmised it must be in the thousands.

There have been claims that the number of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field. The issue of numbers of Chinese spies in the US is not limited to debate within the US Intelligence Community. It has been widely reported by the mainstream newsmedia in the US that China’s intelligence services have established espionage networks throughout the country. Guo Wengui is a billionaire businessman who claimed to have close ties to China’s civilian and military intelligence services and broke with the regime. Guo revealed in his first interview in the US that those espionage networks reportedly include up to 25,000 Chinese intelligence officers and more than 15,000 recruited operatives. Guo explained that he learned about Chinese spy activities from Ma Jian, a former vice minister of the civilian intelligence service and Ji Shengde, a former military intelligence chief. As that figure, 25,000, was put forward nearly 5 years ago, the number of Chinese intelligence officers who have essentially strolled into the US and are now operating clandestinely and successfully on the ground now may be much higher. Surely, there is an officially estimated number of Chinese intelligence officers and operatives in the US Intelligence Community. Whether it will ever be made public remains to be seen, but surely, even without that figure, there is some general acceptance that what is coming toward the US is à la débandade.

People’s Republic of China Minister of State Security, Chen Wenqing (above). Chen studied Law and Political Science at Southwest University in Chongqing, and joined the Ministry of Public Security in 1984, where he worked for a decade. In 1994, Chen was assigned to the Ministry of State Security (MSS), becoming Deputy Director at the Sichuan provincial state security department. In 1998 Chen took over leadership of the State Security Department in Sichuan. He held that position until 2002, when he was appointed Chief Prosecutor at the Sichuan Provincial People’s Procuratorate. In 2006, Chen transferred to Fujian, serving as Deputy Party Secretary and concurrently head of the provincial Commission for Discipline Inspection (CCDI) until 2012. Following the 18th National Congress of the Communist Party China, Chen was brought to Beijing to serve as a Deputy Secretaries of the CCDI. He was appointed Party Secretary of the MSS in October 2016 and Minister in November 2016.

Section 2: “Key Findings”

In the section, “Key Findings”, Eftimiades provides a list of judgments supported by the information and data in his monograph. For readers, especially students, they may provide some guidance on an academic inquiry concerning Chinese intelligence. Right out of the gate, he notes that his “Key Findings” section is the product of his earlier analysis of 595 documented cases of China’s worldwide collection efforts. Thereby, they stand here independent of, but a primary feature of what is discussed in the monograph. In the monograph’s “Preface”, Eftimiades plainly states that “the focus of this work is on [China’s] worldwide human intelligence (HUMINT) operations.” Yet, in his key findings, he seems to indicate that the true focus of the monograph’s discussion, rather than being the aggregate espionage efforts of government organizations and commercial entities, academic institutions, and independent individuals in the US, is Chinese government civilian and military operations. Imaginably for some, Eftimiades may appear to shortshrift readers on any findings developed through the study of the totality of China’s espionage in the US. Perhaps in Eftimiades’ defense, his omission may very well have been more of an issue of editing and oversight.

To the extent that his key findings are limited to government espionage activities, some might readily assert that rather than opening up new territory, his findings were nearly all well-trodden ground. Indeed, at first blush, one might view what Eftimiades presents as his findings as a somewhat prosaic enumeration of highlights from his examination of the 595 cases. However, greatcharlie assures that they are much more as there are some striking elements among them. Eftimiades 10 key findings were a follows: 1) Chinese espionage activity  has greatly expanded in the past 20 years; 2) Chinese entities conducting espionage include government agencies, the People’s Liberation Army, State Owned Enterprises, private companies, individuals, and several universities; 3) Approximately half of China’s worldwide intelligence collection efforts target military and space technologies; 4) Over 90 percent of China’s espionage activities are performed by ethnic Chinese and males perform more than 80 percent of it; 5) The Ministry of State Security, China’s main civilian intelligence service, exploits social media to target foreigners with access to sensitive information. Those recruitment efforts vary in quality considerably; 6) The Ministry of State Security make use of China’s visa and border control system to identify potential recruitment and manage clandestine assets; 7) Ministry of State Security espionage tradecraft has improved over the last four years, due in part to pressure against it from US counterintelligence services; 8) Nearly half of China’s traditional espionage efforts–pursuing political and military secrets–and covert action campaigns are targeted against Taiwan; 9) China’s foreign science and technology collection efforts correlate closely to the priority technologies identified in government strategic planning documents; and, 10) China’s “whole society approach” to espionage has a harmful effect on the US economy, diplomatic influence, and military capabilities. Furthermore, China’s actions threaten European national and economic security through espionage and coercion against government entities and business decision making.

What sparked greatcharlie’s interest considerably was Eftimiades finding concerning non-ethnic-Chinese recruitment, that more ethnic Chinese recruits are used than nonethnic ones by Chinese government organizations and commercial entities engaged in espionage in the US. Multum in parvo. (Much in little. (Small but significant.))

He makes an impressive statement, but regrettably, he does delve deeper into this issue at any point later in the monograph allowing readers to understand how he got there.  His “Analysis of Espionage Tradecraft” section would have been taken to even greater heights. Useful at some point of the monograph’s discussion also would have been some background on the evolution of Chinese intelligence practices to recruit nonethnic Chinese as well as ethnic Chinese as operatives. With regard to greatcharlie’s aforementioned presumption concerning Eftimiades somewhat likely effort to stoke debate on the monograph, perchance once again he is providing more grist for the mill on this score. Perhaps a set plan regarding the monographs page length did not allow him to expound on the matter.

Perhaps it would be enough for some to say in this case that Chinese intelligence services may have recognized they can achieve their respective goals more efficiently and effectively by working mainly with ethnic Chinese recruits. Yet, surely, Chinese espionage in the West has evolved from pursuing ethnic Chinese sources alone. All things considered, such a limited effort by Chinese government organizations and commercial entities would hardly be the case. It stands to reason that the number of nonethnic recruits with which they have been successful is far higher than the few he has enumerated. To an extent, in Eftimiades own examples there is evidence that a number of nonethnic Chinese operatives were targeted and successfully recruited. Chinese intelligence services clearly have the interest and capabilities to bring in such recruits presumably as would Chinese commercial entities engaged in espionage in the US.

As discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” it was once generally understood in the West that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers, businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections, and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use. However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method.

Guo Wengui, aforementioned here as the billionaire businessman who broke with the regime and revealed information from highly placed sources in the Chinese intelligence services that China’s espionage networks reportedly include up to 25,000 officers and 15,000 operatives, also spoke on the matter of non-ethnic-Chinese recruitment. Guo said Ma Jian, who recall was the vice minister for the civilian intelligence service, told him that a major shift by the Chinese was expanding the scope of agent recruitment from Asians to other ethnic groups.

One might argue that if Chinese government organizations and commercial entities engaged in espionage in the US were running only a few nonethnic operatives in the field, an idea Eftimiades’ statistics would apparently support, those few nonethnic operatives were doing a colossal amount of work alone to collect the loads of information from institutions where ethnic Chinese may not necessarily have been well represented or significant at all. In the abstract, and not to cast aspersions on any employees anywhere in which the erstwhile spies worked, but it may have been the case that other nonethnic Chinese employees were involved in espionage in those same institutions who went undetected and whose work was completely unknown to those who were caught.

Imaginably from a counterintelligence standpoint, if Chinese government organizations and commercial entities engaged in espionage in the US were running merely two or a few more nonethnic operatives in the field, trying intercept so few well-concealed individuals from a field of dozens of potential spies would conceivably be rather challenging. Finding them all during the past few years would be nothing less than spectacular accomplishment. C’est chercher une aiguille dans une botte de foin.

Chinese government organizations and commercial entities engaged in espionage in the US go after whomever might be best suited to meet their needs. For the accomplished services in the intelligence industry, espionage is a results focused business, not an ethnocentric one. It was noted earlier that Eftimiades insists that no one really knows how many officers and operatives working for China are on the beat in the US, but later in his “Summary” section suggests that they may very well number in the thousands. Aforementioned, too, were claims that the numbers of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field would be enormous. If those high numbers are accurate, it would likely mean those officers would be going after greater numbers of recruits. Surely, along with increased ethnic Chinese recruiting, nonethnic Chinese recruiting numbers would see far more than a nominal increase as a result.

Incidentally, Eftimiades mention of the balance between ethnic and nonethnic Chinese recruitment by Chinese government organizations and commercial entities engaged in espionage in the US, determined as a product of his analysis of the 595 cases, somewhat flies in the face of what he boldly asserted earlier in the discussion on the general on the unawareness of numbers of officers and operatives working on the ground there for China. As stated earlier, to the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US is in the abstract.   

People’s Republic of China PLA Major General Chen Guangjun (above), Chief of Central Military Commission (CMC) Joint Staff Department Intelligence Bureau. The 54 year-old Chen currently serves as chief of Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau as well as an Assistant to the Chief of the Joint Staff. Chen joined the Rocket Forces of the PLA in 1984. In the mid-2000s, he earned a Ph.D. from Northwestern Polytechnical University. The PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. Chen achieved some notoriety prior to taking over the Joint Staff Department Intelligence Bureau. Through 2007 and 2008, Chen was the focus of several newsmedia reports chronicling his role in improving levels of education in his unit.

Section 3: “Introduction”

Eftimiades begins his Introduction by stating that while espionage is often employed to support foreign policy, a country’s clandestine activities rarely become the subject of foreign policy. However, despite how rare it might be, he says that is the case for the People’s Republic of China with its massive “whole of society” approach to conducting espionage. Eftimiades believes its approach is creating a new paradigm on how intelligence activities are conducted, viewed, and addressed by countries. He notes that a key element in the US-China trade war and downward spiral in relations–a matter the received much attention from the US newsmedia at the time he penned his monograph–is Washington’s demands that Beijing cease stealing US intellectual property and trade secrets. Despite China’s denials, Eftimiades stressed that “hundreds of recently prosecuted espionage cases” prove otherwise. China’s espionage activities are changing the global balance of power, impacting the US and foreign economies, and providing challenges to domestic, national security, and foreign policy formulation.

Not to be an apologist, but rather, to be fair-minded, Eftimiades notes that there are otger governments, companies, and individual entrepreneurs that violate US laws in the drive to possess or sell US technology, government and corporate secrets. He states: “Violating a country’s laws is common practice in the murky world of espionage. According to Eftimiades, almost every time an intelligence service conducts espionage in another country, it violates that country’s laws, and that includes US intelligence operating overseas.” However, he insists that the difference is that the US and other countries engage in espionage to determine and counter hostile or potentially hostile adversaries. The purpose of espionage is not to develop their countries’ own industries or transfer foreign wealth which is a main focus of China’s activities.

There is little doubt that the public affairs departments of nearly every bureaucracy under the State Council, and Propaganda Department and Foreign Affairs section of the Communist Party of China would chomp at the bit to enthusiastically and gloatingly state in response that the US space program was developed through the employment of scientists and engineers from Occupied Germany. The resettlement of the professionals and all of their research and development was facilitated by intelligence elements of the US national security bureaucracies. The Chinese would doubtlessly assert that US activities on that matter essentially established the model for acquiring foreign capabilities through national security bureaucracies to support their technological needs and channel down to large industries mostly related to defense and intelligence to support their advancement. Chinese public affairs spokespersons would surely go on to state, likely with the pretension of lamenting, that as a result of depriving Germany of its own citizens best efforts in aerospace technologies, the country was denied trillions in revenue from potentially providing the world the fruit of their expertise. Indeed, Germany could have become the epicenter of aerospace technology development and research in the world. (Mind readers this is a presumed argument of the Communist Party of China, not at all the position of greatcharlie.) Mayhap, the counterpunch would be that Werner Von Braun and the other German scientists and engineers sought to to the US and if they were left to their devices in Occupied Germany, the Soviet Union would have surely grabbed them up to use for Soviet Premier Joseph Stalin’s sinister purposes. Germany as a whole benefited immensely from postwar reconstruction due to the US Marshall Program. German industries were given an excellent restart as a result of their rebuilding and retooling under that program.

Section 4: “Analytical Methodology”

Eftimiades explains that for purposes of this study, all of the legal definitions of criminal acts in the statutes and administrative regulations found in the export violations–International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), International Emergency Economic Powers Act (IEEPA), as well as covert action, and research violations, are categorized as espionage. Eftimiades again explains that over a period of 10 years, he compiled and analyzed 595 cases of Chinese espionage that have occurred worldwide. He notes that over 450 of those cases occurred after 2000. He states again that through the analysis of these cases, sufficient evidence provided on espionage by the Chinese government, Beijing’s promotion and support of organizations outside of the government responsible for the same, and the information objectives, determines gaps in their knowledge, and operational “tradecraft” techniques of those organizations.

There is perhaps an argument to be made that once Eftimiades decided upon the definition of espionage mentioned in this section, he shaped his discussion of what Chinese non-government entities, institutions, and individuals would be viewed as engaging in espionage. One could hardly find fault with his decision. After all, his choice was not without precedent as certain bureaucracies of the US government involved in the 595 cases he studied made the same decision based on the law. However, from the lens of the accused Chinese non-government entities, institutions, and individuals, it may be the case that they were stealing trade secrets and intellectual property, but they may not have viewed their actions as espionage, rather just theft and just a part of business. One could imagine individuals of elements involved with such thefts saying with acidulous humor that if those, who possess information that they desired to purloin, really wanted to prevent theft, they would do a far better job at securing that information. Those with such larcenous instincts might go on to insist that those possessing the information would need to look deeper within to find the answer as to why they have so often left themselves wide open to theft. This thought, on the perception of thieving Chinese non-government entities, institutions, and individuals on whether their actions are a matter of espionage or “merely” grand larceny, is developed further in this essay in the “Analysis of Espionage Tradecraft” section.

The monograph’s following four sections on Chinese operations and tactics were meat and drink for greatcharlie and will likely be for like-minded souls. They are: Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; and, Section 9: “Analysis of Espionage Tradecraft”. Only three of the four are fully discussed in this review.

Section 6: “PRC Organizations Conducting Espionage”

The espionage effort by Chinese government organizations and commercial entities, as explained by Eftimiades, has features that are entirely its own. From an analysis of his 595 cases, Eftimiades explains espionage activities correlated to their sponsoring organization (the “customer” receiving the information or technology) showed five distinct clusters of organizations engaging in espionage. The governing Communist Party of China uses government, quasi government, academic, and commercial entities as mechanisms to conduct all forms of espionage abroad. Most interesting of these are China’s “non-traditional collectors”, which include State Owned Enterprises, universities, and private companies. He confirms that the employment of such a broad set of entities for intelligence collection evinces China’s “whole of society” approach to espionage. The list of includes: 1) the Ministry of State Security, the Guojia Anquan Bu, China’s preeminent intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad; 2) the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology; 3) State Owned Enterprises (SOE), include the 50,000 aerospace and defense companies, subordinate research institutions, and technology transfer organizations owned by the central government; 4) Private Chinese companies or individuals acting unilaterally for commercial benefit only were engaged in espionage in approximately 22 percent of cases Eftimiades analyzed, and in nearly 30 percent of those cases, there was a clearly identifiable Chinese government, SOE, or university as the ultimate customer for illegal exports or trade secrets; and, 5) Other Chinese government elements that collect intelligence (information) and technology include the PLA Political Department Liaison Office (targeted against Taiwan), the United Front Work Department (UFWD), and many universities under the State Administration for Science, Technology, and Industry for National Defense (SASTIND). 

Most intriguing to greatcharlie was Eftimiades’ discussion of the PLA Political Department Liaison Office, the UFWD, and SASTIND. Beginning in reverse with SASTIND, Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Clearly put by Eftimiades, as the start point of a virtual wheel of information exchange, SASTIND assigns projects to ministries with military production responsibilities. Those ministries pass the work to the research institutes under their auspices. The associated research institutes send their information and technology gaps back to SASTIND. There are two departments within SASTIND,responsible for developing and tasking technologically related intelligence requirements and for collecting intelligence against those requirements.They are the Comprehensive Planning Department and the International Cooperation Department. The Comprehensive Planning Department tasks collection to the MSS and most likely to the PLA Joint Intelligence Bureau. The International Cooperation Department has its own independent collection capability. Members of this department travel with China’s scientists to collect information against specific requirements.

Eftimiades reports that SASTIND also has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. Some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. That list includes: Beijing Institute of Technology; Beijing University of Aeronautics and Astronautics; Beijing Engineering University; Harbin Engineering University; Harbin Institute of Technology; Northwestern Polytechnical Institution [University]; Nanjing University of Aeronautics and Astronautics; and, Nanjing University of Science and Technology. As of the monograph’s writing, over 35 Chinese universities (or professors from those universities) have been identified in US federal court documents as having some role in China’s overseas espionage cases, according to Eftimiades.

Eftimiades explains that the distribution of Chinese espionage cases worldwide illustrates the magnitude of Communist Party of China controlled businesses, research entities and business organizations involved in espionage activities. Providing superb graphs and charts for readers to examine while following along with his discussion, he shows that there is a near equal distribution of espionage activities between the four major organizational clusters (MSS, PLA, SOEs, and Private Companies). Eftimiades explains that the distribution indicates a concerted effort to use all mechanisms of government and the economy to collect foreign information and technology. To date, the Communist Party of China and the Chinese government have not taken steps to impede illegal activities (according to foreign countries laws) of their state corporations, private businesses, universities, and citizens. Eftimiades says China, referring to it once again as a “digital authoritarian state”, is clearly capable of doing so. He suggests that the Communist Party of China sees the appropriation of foreign innovations and technology as part of a policy aimed at developing domestic technology and increasing production.

In addition, his statistical breakdown of the 595 espionage cases illustrates that Chinese private companies have an aggressive posture in conducting espionage, resulting in 136 cases or approximately 23 percent of all activity worldwide. Similarly, SOEs were surreptitiously examining or collecting information or technology in 121 cases or 20 percent of the total. The SOEs are primarily collecting advanced military technology and associated research. Private companies and individuals primarily pursue commercial technologies, intellectual property and military technologies. Espionage activities conducted by the PLA Joint Intelligence Bureau give primacy to defense information, armaments, and military (or dual use) technology. The PLA was involved in 122 instances of espionage or 19 percent of all cases. Eftimiades reports that the MSS was involved in 95 instances of espionage or 16 percent of all cases. Preferred MSS targets included political or defense information, foreign policy, overseas dissidents, military capabilities, too, and foreign intelligence services. The final category of entities conducting espionage on behalf of China were Chinese universities and the UFWD. The universities generally targeted foreign technology to support advanced military weapons systems development and commercial endeavors.

Regarding the PLA Political Department Liaison Office, Eftimiades, in a markedly  unadorned way, explains that it is targeted against Taiwan. However, some confusion may befall those readers who perhaps may think of the Communist Party of China’s International Liaison Department when they come across the title, International Liaison Office. Among the pertinent facts, as part of Xi’s military reforms, in November 2015 the General Political Department of the Central Military Commission was abolished and was replaced with the Political Work Department. In January 2016, the Political Work Department became official. Its primary role as the chief political organ under the Central Military Commission is to integrate the Communist Party of China and its ideology and propaganda into the People’s Liberation Army. In that role, its responsibilities include: preparing political and economic information for the reference of the Political Bureau; conducting ideological and political work on foreign, particularly adversarial armed forces, by promoting China’s policies among their ranks, and disrupting unit cohesion within adversarial forces by withering their morale. It also has the duty to incite descension and rebellions particularly within the Taiwan army and other foreign armed forces. The Political Work Department’s Liaison Department controls a united front organization called the China Association for International Friendly Contact (CAIFC) that is active in overseas intelligence gathering and influence operations. Reportedly, the International Liaison Office has dispatched agents to infiltrate Chinese-funded companies and private institutions in Hong Kong. Their mission is also counter-espionage, monitoring their own agents, and preventing their recruitment of Chinese personnel by foreign intelligence services.

The International (Liaison) Department of the Communist Party of China is a very different organization. It stands as one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the UFWD, the Chinese People’s Political Consultative Conference (CPPCC), the Propaganda Department. Founded in 1951, International (Liaison) Department is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International Liaison Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as a UFWD bureau before being carved out into an independent entity.

You Quan (above), head of the Communust Party of China’s United Front Work Department (UFWD). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance.

Although he mentions the UFWD, Eftimiades does not provide any discussion of the organization. For readers wholly unfamiliar with it, greatcharlie provides some small treatment here. As discussed in the October 19, 2020 greatcharlie post entitled, “The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department”, within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. Xi has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. United front work is the central element to understanding what the Communist Party of China is doing and why to shape the world outside of itself. In a June 9, 2020 Australian Strategic Policy Institute report, You Quan, the head of the UFWD, is quoted as saying: “The United Front is a political alliance, and united front work is political work. It must maintain the party’s leadership throughout, having the party’s flag as its flag, the party’s direction as its direction, and the party’s will as its will, uniting and gathering members of each part of the United Front around the party.” People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a 1950s CIA paper, united front work was referred to as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the Party.

Perhaps from a publisher’s point of view and with some intimation of what would most interest the monograph’s readers in fields of business and finance, Eftimiades thought it most necessary to place emphasis upon the State Administration for Science, Technology, and Industry for National Defense (SASTIND) over all of the other PRC organizations engaged in espionage. The information presented on SASTIND, for instance, is assuredly not part of regular discourse on Chinese espionage. Eftimiades, in a rather sedate tone but still a quite edifying stream of consciousness, lays out what that government organization’s well-controlled work against the US and other highly industrialized countries worldwide and its stealthy and insidious nature.

It should be expected, and may actually be tacitly accepted by some intelligence analysts in the US and in the services of other highly industrialized countries, that among Chinese government organizations and commercial entities on the ground in the US engaged in espionage, there are understood defined areas of responsibility and much as the clear boundaries already set, and well-known, between PLA HUMINT targets and activities and those of its civilian counterpart, MSS, similar arrangements have been made to avoid unwittingly conducting redundant operations, accidental collision of officers and operatives in the field, and potential interservice competition and quarrels in pursuit of available sources for US secrets. A similar delineation between the MSS and Zhōnghuá Rénmín Gònghéguó Gōng’ānbùthe Ministry of Public Security of the People’s Republic of China (MPS), both a law enforcement and an intelligence and counterintelligence service. Harmony among organizations is doubtlessly desired and required in order for them to succeed and to avoid being caught.

Yet, with so many Chinese government organizations and commercial entities on the ground in the US engaged in espionage, theft, overt collection, hiring operatives, surveilling and studying the opposition, as a reality, on more than one instance an effort to collect a particular type of information might lead more than one organization, for example, one governmental and one commercial, to the same target. One might imagine how chaos could reign without some communication. Officers and operators, perhaps not even immediately aware of each others presence, might literally run into each other, occasionally tread on each other’s work, and might even step on each other’s toes now and then creating some disruption. Some general agreement between organizations and entities in the field would need to exist in order to ensure possible fruitful operations would not face “friendly” challenges and obstacles albeit unintentionally, and to ensure they are enabled to adhere to clearly delineated lanes of action for each organization. On the matter of security, one might imagine how much easier it would be to detect and intercept Chinese espionage operators from the different organizations if they all kept showing up at the same institution trying to contact, recruit, smooze, cajole the same people in them, or one institution were simply bombarded by attempts by individuals to inveigle their way into it with a similar focus on its research and development. Obviously Chinese espionage efforts have been far quieter, smoother, and more sophisticated in nature.

Perhaps the best way to what is discussed here is simply to state that there are likely furtive bridges across organizational lines and areas of responsibilities that allow managers on the ground and officers, old hands in the business who have mastered the job, engaged in intricate operations against similar targets to directly communicate, provide assistance, modest resources, and advice all designed to facilitate security and activities and promote success. It would be a form of unofficial, collegial, furtive modus vivendi established with the requirements for operational security firmly in mind and every imaginable precaution taken. In this section, Eftimiades briefly mentions that in at least two cases, there were actually joint MSS and PLA operations in which individuals inside an aerospace company were recruited as operatives to assist in targeting the company for cyber-attacks. The MSS is so segmented with its many state department’s and provincial bureaus, that the most effective aspect of any effort by the two organizations to work jointly must have occurred between managers in the field. Given the success each espionage element, government or otherwise, has found in the US, the Communist Party of China, which would indubitably be aware of such interorganizational contacts, would likely stay mum about it all but monitor it all the same. After all, Communist Party of China intelligence organs operating sub rosa in diplomatic missions and commercial entities or incognito wherever else, would conceivably benefit too from being tied into the clandestine communications among managers in the field imagined here.

Concerning another point that flows from this discussion, rather than lacking actual knowledge or even a good sense of where everyone was relative to each other among Chinese government organizations and commercial entities engaged in espionage in the US and not having an full account of who was on the ground and stand bereft of paths for the most senior network managers of each organization to liaise, potentially in some extraordinary emergency, in the abstract, surely one could conceive that there would be a least some tacit coordination among their senior leaders, perhaps back in China. Such information would at least be in PLA, MSS, and–as often ordinary Chinese citizens will usually be involved–MPS hands. MPS surely has the most complete, up-to-date records–are perhaps often pulled into the mix of overseas espionage activities to some small degree for that reason. That information would also most likely be in the hands of the Communist Party of China via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that it helps the Party maintain its tight grip on the population.

For the edification of greatcharlie’s readers who may be not so familiar PLA intelligence, as explained in the  January 31, 2021 greatcharlie post entitled Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)”, the PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission. Thereby, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), something similar to the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare are now aggregated into the Strategic Support Force. As with its sister civilian service, the MSS, and intelligence services worldwide, the PLA makes regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. It aggressively uses Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection.

Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Eftimiades reports that SASTIND has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. On that list is Northwestern Polytechnical University of Xian, China, It is ranked number 1 in the discipline Aeronautical and Astronautical Science and Technology, known for producing some of the best brains in China’s defense industry.

Section 7: “Intelligence Collection Objectives”

As promised, greatcharlie has condensed the sections of Eftimiades monograph, providing important details, but it has not revealed everything. Yet, with such a relatively short text, there would naturally arise occasions when little option would appear available than present wholly what is provided in a particularly diminutive section, in order to provide the reader with a full understanding of the author’s thinking. That is the case with the “Intelligence Collection Objectives” section of the monograph. Under what has been whimsically dubbed as “spookspeak” by members of the intelligence industry some time ago, Collection Objectives, also known as Information Objectives or Requirements, identify the specific information or technology that is tasked to intelligence services for collection. Eftimiades stated that requirements can number in the tens-of-thousands, and explains that one can infer from requirements a country’s knowledge and technology gaps for they are a reflection of them. He provides as an example a country that has been continually pursuing information on specific components of turbine engines. The implications and indications for taking that course, says Eftimiades, are that the country most likely lacks the required information or technology on turbine engines for its planned purposes and espionage presents the only immediate way of acquiring it. Non solum eventus hoc docet, iste est magister stultorum, sed etiam ratio. (Not only does the outcome teach (us) this, that is the teacher of fools, but (so) too does reason.)

Regarding China, Eftimiades explains that its strategic collection objectives can be identified through a number of national level strategic planning documents. Listed earlier in the “Key Findings” section in the monograph, they are: Made in China 2025; Space Science and Technology in China; and, A Road Map to 2050, the National Key Technologies R&D Program, and the 13th Five Year Plan. Those national level strategic planning documents can be subdivided into specific technology development programs, are the following: the National Basic Research Program (973 Program); the National High-Tech Research and Development Program (863 Program); the National Key Technologies R&D Program; and, The National S&T Major Projects. Eftimiades offers a subset of those National S&T Major Projects which includes: Advanced Digital Control Machines and Fundamental Manufacturing Equipment; Breeding of New Variety of Transgenic Biology; Core Electronic Devices, High-end General Chips and Fundamental Software; Key New Drug Innovation; Large Scale Development of Oil and Gas Fields and Coal-bed Gas; Megascale Integrated Circuit Manufacturing Technologies; Next Generation of Broad Wireless Mobile Networks; Wastewater Control and  S&T Achievement Industrialization; National New Products Program; and, the National Soft Sciences Research Program. 

Eftimiades says that as one further breaks down the strategic technology objectives, a strong correlation to China’s espionage activity emerges. The Director of National Intelligence report, Foreign Economic Espionage in Cyberspace (2018) identified industries and private technologies that are frequent targets of foreign espionage. Eftimiades’ informs that an even closer correlation between China’s espionage efforts and national requirements can be made when comparing the 595 cases with the 19 key Technologies identified in the Communust Party of China strategic industrial planning documents Made in China 2025. These technology requirements were the primary objectives in the 435 cases. The fact that such a high proportion of espionage activities are correlated in Made in China 2025 Key technology list indicates the Communist Party of China’s role in guiding China’s global espionage effort.

Laying out points on this matter from his case analysis for all readers to understand, avec brio, Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks. Such collection efforts support PLA military aerospace programs and China’s commercial aviation sector. Going further, he states that a review of the 116 cases targeted at aerospace companies identified over 200 specific military and civilian technologies and trade secrets (stolen and attempted stolen). Among the many “Key Technologies” sought, were: Cryogenic pumps for space vehicles, valves, transfer lines, refrigeration equipment, space qualified radiation hardened circuits, components for the storage and use of liquid hydrogen, cryogenic coolers, Ka-band space communications, satellite/missile insulation blankets–germanium coated polyimide film, and multi octave traveling wave tubes used as amplifiers in satellite transponders. Major systems include: the Space Shuttle, Delta IV Rocket, F-15 Fighter, C-17 transport, F-22 Fighter, F-35 Fighter, B-1 Bomber, Ch46/47 Chinook, C-130 training equipment.

China’s Mars rover, the Zhurong (above) rolls off its lander, to begin a mission of seeking out geological discoveries. Was its development the result of espionage? Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks.

Another high priority collection target of Chinese espionage is information technology. Statistically speaking, China’s collection of information technology (113 cases) is second in numbers only to aerospace technology. China has placed strong emphasis on collecting information technology to include semiconductors and manufacturing technology. Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did. The Chinese company Huawei has been under similar export restrictions for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Key information technology related to China’s collection requirements include: microelectronics, microwave integrated circuits, microprocessors, circuit boards, crypto key devices, data and voice transmission systems, semiconductors, and trade secrets such as laser manufacturing techniques. Semiconductor manufacturing is a priority target for Chinese espionage as the US and several other nations still maintain a sizable lead over China in production capabilities. Additional priority targets for collection include biopharma and medical devices, automated machine tools and robotics, energy saving/new energy vehicles, and new materials development. Eftimiades informs that these are often distinct patterns of intelligence activity that correspond to each category of technology. For example, excluding China’s  cyber espionage campaigns, collection on biopharma and medical devices is limited to exploiting research programs (e.g., Thousand Talents Program) or economic espionage using company insiders. The three targets for this category are universities, research institutes, and pharmaceutical companies. Lastly, In the category of energy saving/new energy vehicles, Eftimiades states that most of the collection activity has been economic espionage employing insiders. The two targets for this collection effort have been companies and research laboratories. Eftimiades reveals that the majority of thefts of this technology have occurred through insider threats with cyber espionage as a secondary method.

To be succinct, in many fields, subject areas for analysis, facts are often misused and abused, but on intelligence, it can lead to great failures, and potential national disaster. Facts cannot be nailed down and used to support only what one wishes. To the contrary, facts should take the analysis toward what is authentic. From that judgments and plans must be based. Doing anything otherwise, especially while in pursuit of an opponent, is simply to procrastinate by entertaining oneself with errant deliberations. The opponent, no matter what one might choose to believe, does not procrastinate. As Eftimiades, himself, notes in the “Intelligence Collection Objectives” section of his own text, the Chinese know what they want and go after it at the time, in the way, and with the means they desire. Operatives complete their tasks and off secrets go–and oftentimes actual technologies as well–to China. That is one of the simple and more apparent keys to the opponent’s success.

China has shown little compunction over putting in full view at home, marketing, technologies, and making geopolitical moves that would be suggestive of the fact the information that allowed for those developments and actions was stolen from the US. It is almost as if the Communist Party of China encourages such actions to flaunt their country’s considerable bag of intelligence victories. Of course, government officials in Beijing will normally assert that there have been thefts and declare any evidence presented of such as circumstantial or outright lies.

Given just how much China has poached from the US has been revealed, even paraded in Beijing, one could reasonably conclude–and it is absolutely true–that China has run off with far more than a bale of information and data on classified defense and intelligence related projects, innovative commercial products, trade secrets, intellectual property, and classified foreign and defense policy documents. It is safe to say that an enormous amount is being collected. It might leave some to reasonably accept that a stratospheric level of espionage is being conducted by far greater numbers of intelligence officers and operatives and it has been ongoing.

Eftimiades provides a brilliant account of Chinese intelligence collection requirements. He supports his claims with superb charts. Some are practically signposts pointing to where the adversary is likely to show up next. Some are strong enough to serve as figurative beckoning fingers enticing along with whispered words, “Here they are.”

Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE, now defunct. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did.

Section 8: “Analysis of Espionage Cases”

The dominant activities for China’s overseas espionage are espionage, economic espionage, and export administration regulation (dual use) violations, together comprising 60 percent of all activities. Taken as a whole, statistically speaking, illegal exports (theft of dual use and military technology) make up approximately 47 percent of China’s espionage activities abroad. Eftimiades divides the 595 espionage cases that he analyzed into the following categories: espionage; economic espionage as defined by ITAR, EAR, IEEPA; covert action; and, research violations. China’s illegal export of military and dual use technology, to include IEEPA, EAR, and ITAR violations and other export related violations in the US, comprise 43.7 percent (260) of all cases worldwide. Eftimiades says more than 80 percent of these cases occurred in the US. Reportedly, economic espionage which is mainly conducted by private companies or individuals, account for 25.98 percent (119 total) of cases). The category of “traditional espionage” stands at 22 percent (108 total) of worldwide activities. Eftimiades notes the figure of traditional espionage cases sits at 55 if Taiwan is separated out as a Chinese intelligence target. Of known cases, Taiwan is the single highest priority target for individual espionage.

On a chart provided by Eftimiades, one can observe the distribution of cases to the many venues of Chinese espionage in the US. The distribution pattern reveals concentrations occurring in tech sectors, manufacturing hubs and business centers. In California, “Silicon Valley” is shown to be the number one spot in the US for China’s illegal technology collection efforts. Apparently, more than half of the 140 cases that occurred in California targeted technology firms in that venue. Other cases centered around San Diego and then Los Angeles in the state. Further, collection activity in California was mainly economic espionage (51) cases), EAR violations (30 cases), ITAR violations (25 cases), and IEEPA violations (13 cases). In the economic espionage cases, the predominant form of tradecraft was using insiders (employees) to access restricted technology and trade secrets. Priority collection objectives in California were information technology (46 cases), aerospace and aeronautical equipment (27 cases), and automated machine tools and robotics (20 cases). Nationwide, China’s collection activities cluster around the major educational, research, and manufacturing centers in several states to include Massachusetts, Michigan, New York, Pennsylvania, Florida, New Jersey, and Texas. Victims of China’s espionage efforts in the US include major defense and aerospace companies, pharmaceutical firms, technology research companies, and manufacturers. In cases in Virginia and Florida, Chinese diplomats and citizens were caught trespassing on military facilities to conduct ground photo reconnaissance. Those facilities were associated with US Naval forces and special operations capabilities.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) Eftimiades notes that research universities are clearly primary targets for collection efforts, achieved most often through talent programs such as China’s Thousand Talents Program, Hundreds Talents Program. Eftimiades reports that most estimates suggest there are “at least 200 Chinese talent programs designed to employ academic and professional expertise from the West into serving China’s national development.” He continues further to explain: “This expertise ranges from scientific and engineering fields to business, finance, and social Sciences. These programs are serviced by 600 overseas stations that gather information on foreign scientists and then attempt to recruit them. In numerous cases, professors, graduate students, and PLA researchers have also been arrested for stealing research from overseas universities for use in China.”

Chinese intelligence services apparently studied the situation, and recognized just how open the US was for theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. Surely, the Communist Party of China saw no need to halt commercial entities engaged in their own espionage activities, much as Eftimiades remarks earlier in the section entitled “PRC Organizations Conducting Espionage”. It appears they have seen nothing but opportunities to do a lot of open field running for them with little real risk. To date, it appears that they have all found no reason to pare down their operations, and certainly no reason to retreat. From Eftimiades own data, one can infer their espionage activities have steadily increased. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Though Eftimiades explains in his Preface that “cyber espionage is only addressed in select cases which were enabled by humans providing insider access. However, in discussing how exactly the FBI and DHS have thwarted Chinese espionage efforts later in his “Analysis of Cases” section, the discussion meanders into cases in which they discovered sources within China of cyberattacks into sensitive computer files of the US government, defense related businesses, financial institutions, high-tech and medical research facilities, academia, and anywhere else the hackers apparently believed there was a good opportunity to break-in and seize data. While Eftimiades expressed the intent to focus on HUMINT operations and tactics of Chinese government organizations and commercial entities engaged in espionage in the US, it would seem that he had little choice but to present it if he sought to put some positive face on what US counterintelligence services are doing to thwart China’s efforts. It is the brightest rift which can at present be seen in the clouds,

Readers may recall in Act 1, scene 3 of William Shakespeare’s play, The Life and Death of Julius Caesar, Cassius utters these apposite words to his co-conspirator Brutus: “The fault, dear Brutus, is not in our stars / But in ourselves, . . . .” With the intention of being frank, but by no means beastly, greatcharlie proffers that the fault for China’s success may lie with the US counterintelligence services themselves. It may be less a matter of tactics, techniques, procedures and methods, and rather a problem among US counterintelligence service personnel that the Chinese have recognized that they can exploit. As a matter of professional development, some effort might be made to ensure their cognitive abilities regularly honed through weekly, even daily, exercises and tests to strengthen their thinking skills, their prowess at uncovering all relevant facts, even from trifles, and developing solid insights from those facts, and their effective and correct use of a reliable intuition and intimation. Though this is stated in the abstract, one can almost be certain that the Chinese intelligence services to some degree are doing like-minded things to strengthen their intelligence officers competences. It could be something as simple as the private performance of Tai chi chuan or likely Martial Qigong every morning. (imaginably, both techniques would be performed respectively with a dynamic and free-flowing form and stances that would cause any instructor to weep with delight while observing ) Along with exercise, stretching, and breathing, it would allow their intelligence officers to mediate and attain deep focus and a relaxed state. Such activity would be helpful in any struggles with dépaysement.The Chinese intelligence services surely are quite determined to maintain an edge over their adversaries. So far, they have proved themselves to be competent and accomplished services in the field.

The Chinese company Huawei has been placed under similar export restrictions as ZTE had been, for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Section 9: “Analysis of Espionage Tradecraft”

As stated earlier, a condensed review of Section 9 “Analysis of Espionage Tradecraft” is not included here. The section is left to each reader to enjoy at first blush and perceive and decipher all they can from it. Recall that in November 1922, when excavating the tomb of Tutankamen, the English archeologist and Egyptologist, Howard Carter, pierced a hole enabling him to see inside the actual chamber. He was asked by colleagues if he could see anything, and he simply replied: “Yes! Wonderful things!” Readers will say the same when they read this section.

Having stated that, greatcharlie nevertheless includes some commentary on section, compelled by Eftimiades to mention that among those committing acts of espionage for China are commercial entities, SOEs and private companies, academic institutions, and independent individuals, particularly entrepreneurs. Eftimiades explains that SOEs and commercial entities have been determined to engage in espionage in the US and elsewhere outside of China. Having dubbed them as entities engaged in espionage, they are examined as such and ascribe all of the qualities of an intelligence service. Thereby, one would expect to observe certain traits of an intelligence service such as tradecraft to be performed by their representatives while operating in the field. Yet, unless there is some information collected by US Intelligence Community–and that would unbeknownst to greatcharlie–stating those entities as well as individual business engaged in similar acts, view themselves to be intelligence services or espionage organizations, one may not see them regularly act as such.If they display any tactics, techniques, or methods that resemble tradecraft it should be viewed as exceptional and not an expectation. Imaginably, they, themselves, might be quite surprised anyone might refer to them as espionage organizations. They simply may view themselves as a “collective” Chinese citizens working in the US availing their home companies and country of technologies, hardware, documents or whatever else they might grab from US institutions that may employ them as the opportunities present themselves. To that extent, they may really be nothing more than somewhat organized rings of thieves, nothing more. As for these individuals showing such willingness to respond to the requests and demands of the Chinese intelligence services or other State Council bureaucracies as SASTIND, too much might be made of the fact that they are obedient to the commands and demands of their authoritarian and very often punitive, government. After all, in addition to their own lives, everything that they hold dear, their families, are in the hands and under the awful power of an authoritarian–some might say totalitarian–Communist government in Beijing.

Of course, one must be open-minded. Thus, the door should not be shut completely on the possibility of some deliberate design in the practices of such commercial entities and individuals with regard to their espionage. Note that overall, their practices are not chaotic or haphazard, but rather they are grounded and for the most part accomplished. Aliquis latet error. (Some trickery lies hidden.)

In the abstract, one could imagine their movements and interactions of individuals operating for commercial entities may be intentionally stochastic. Indeed, if the activity is genuine espionage and not simply criminal behavior what greatcharlie supposes should really draw the attention of US counterintelligence is not as much whether it meets a certain expected standard of tactics, techniques, procedures and methods. What should draw that attention is the appearance of control, orchestration, and forceful activity, and that something intense is happening. Something is intended and is being achieved. The fact that there is a professional side to all of that activity must also be considered. The focus, greatcharlie humbly suggests, perhaps should be placed first on the purposefulness of the activities displayed by Chinese commercial entities and individual businesspeople, not its randomness. 

Acting as described, they allow themselves some degree of security without the need to set up resources, set up sites, train in tactics, techniques, procedures and methods to communicate and pass information physically. Keeping their movements randomly determined might leave their efforts open to analysis statistically. One could discern some random probability distribution or pattern. However, it might still be impossible for those movements and interactions to be predicted in a useful way. One might imagine that to rise to a certain level in their companies or institutions, the individuals involved are well-educated or clever enough to consciously plan their activities in a seemingly random way. Surely, anyone in a commercial entity or institution selected for such work will be tested and screened before being sent off. In some welcome back, job well-done session or maybe a torturous debriefing, the employees surely inform their manager what practices worked well in the field and which at the time were determined to be too risky.

What would seem as important, or perhaps even more vital for Chinese commercial entities, would be properly casting each “espionage operative” or “thief.” The absolute right man or woman must be assigned for the right job. Surely, human resources would bring in and spotlight the right people and managers would make selections for such work and overseas deployment. One would hardly find such individuals to be hot-blooded, and wreckless, incompetent in any fashion. They would exude equanimity, sangfroid, graciousness, and professionalism. They apparently work with a mindset that nothing is unattainable. Loosely, one might posit, taking such an attitude and approach to their efforts, might be said to be at the foundation of any “ostensible tradecraft.” Everything they do, choices they make, flows from that line of thinking.

Looking at Eftimiades discussion a tad more it would seem that he gives Chinese commercial entities and individuals engaged in espionage too much and too little credit at the same time. He perhaps gives them too much credit by identifying them as intelligence gathering organizations and thereby assessing their use of tradecraft. He gives them too little credit in that if he believes his presumption as to their status as spies and their “spy-like practices,” correct, then he dismisses the possibility that their actions are disguised, deliberately performed in a way distant from tradecraft as a technique. If their intention was to cause confusion among possible observers by taking that tack, Eftimiades’ expression of some puzzlement over the absence of traditional tradecraft in their practices serves as evidence that to a degree they may have succeeded in that. At the same time, certainly nothing they might do, would be intended to stand out, such as, perhaps in extreme, appearing gargoyle or something of the type, and drawing attention daily.

Some foundational information and thought on Chinese espionage activities in the US has to be established if study and understanding on the subject is to be advanced. The establishment of such a baseline of information, however, should not result conversely in some uncompromising stance toward it. New facts must be collected and an openness must exist to consider alternative analyses of those facts, which may lead to new possibilities and potential successes against such activities. There are likely many unexplored possibilities that perhaps should be considered about all matters concerning the subject. From what has been publicly reported, often in the US national security bureaucracies, perspectives on adversaries have reportedly become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, perhaps most akin to an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with regard to Chinese foreign intelligence activity in the US.

It seems high time that US counterintelligence services ceased looking at Chinese intelligence operations and tactics with a focus on their deficiencies and flaws in practice. Equally or even more important is to consider precisely what they are doing right in order to be successful. A starting point would be an assessment of how Chinese intelligence services and all the other government organizations and commercial entities engaged in espionage in the US view US counterintelligence services and how they are responding to US defenses set up against them. It would seem from Eftimiades text that a burgeoning notion in defense of the current situation in which China is achieving a degree of success is that their numbers in the US are so high that it would naturally be difficult to struggle with them head-to-head. Hopefully, this is not the case. To be frank, the ability of Chinese intelligence services to position so many of their personnel in the US is just a symptom of the conundrum of not being able to stem their activities. Focusing upon that will not yield a cure. There are surely considerable deficiencies and flaws in the way in which US counterintelligence operates that have given Chinese government organizations and commercial entities the confidence to act without much fear. Res ipsa locquitor. (The thing speaks for itself.)

Of the seven universities that have been dubbed the Seven Sons of National Defense, some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. On that list is the Nanjing University Aeronautics and Astronautics (above). Nanjing is also known for providing the MSS with recruits for its corps of intelligence officers.

Section 11: “Summary”

Since what is found in Eftimiades “Summary” section is drawn from his discussion of his analysis of the 595 espionage cases since 2000, it would stand to reason they would serve well as a figurative subset of eight ample bullet points for his “Key Findings” which themselves extracted directly from the facts of those many cases. Of that seeming “subset of findings” in Eftimiades “Summary” section, the “top 5” selected by greatcharlie are the following.

First, Eftimiades explains that the US Intelligence Community is not well-organized to protect the secrets of US industries. It is far better at protecting its own secrets. He says the same holds true for most other technologically advanced [highly industrialized] countries. A problem he points to, calling it obvious, is that commercial industry and scientific research programs, the primary targets for Chinese intelligence collection, are the most vulnerable.

Second, as aforementioned in the discussion of the monograph’s Preface, Eftimiades says the DHS and the FBI are leading the effort in the US “to combat China’s massive intelligence collection campaign.” He again states that both organizations “have done excellent work in reducing Beijing’s relentless efforts,” noting the FBI has made advances since 2018 to assist US industry and academia, and DHS is also working aggressively to curtail illegal exports of advanced technology and those who steal scientific research. However, he declares “there is still much more to be done.” He explains that the work of other government agencies as well as a bipartisan effort in Congress will also be necessary to ensure national and economic security.

Third, Eftimiades proffers that success in thwarting China’s aggressive collection efforts will ultimately rest upon three factors: 1) the ability of US law enforcement and intelligence apparatus to shift organizational culture and support private industry and academia; 2) developing a strategic campaign in the US integrating all the elements of the government and its allies; and, 3) having Congress pass laws to raise the costs of economic espionage to the Communist Party of China. Chinese companies and individuals via visa restrictions, sanctions, investment restrictions, and otherwise. 

Fourth, Eftimiades explains, as he has surely illustrated throughout his monograph by reporting his case analysis, yet does not declare in any vehement way, that China’s “whole of society” approach to espionage has been quite successful thus far in defeating government and private industry organizations. He focuses more on what has been positive about US counterintelligence efforts,

Fifth, Eftimiades reveals that efforts by some countries within the EU, India, and Japan to restrain China’s intelligence activities have been comparatively less apparent in public sources. Although espionage arrests in India, Germany, France, Belgium, and Poland have been low in number, he sees such developments as an indication that those countries now seek to more vigorously counter China’s collection efforts. In addition, Eftimiades asserts that “China’s public image is suffering worldwide as the French and German governments have made statements on China’s aggressive espionage on social media, human rights issues, COVID-19 response, and Beijing’s threats over trade.”

In determining the percentage of Chinese espionage efforts thwarted, it must again be noted that the percentage would need to be calculated based on the entirety of the Chinese espionage effort. If one accepts Eftimiades does not know that number, and there is no reason not to do so, knowing the percentage of thwarted espionage efforts seems impossible and his claim is only a presumption or at best the result of “secret knowledge.”

When writing about the success of the FBI and DHS in thwarting espionage efforts of Chinese government organizations and commercial entities, there was less of an appearance by Eftimiades of reporting facts, and a more apparent effort by him to convince readers on a position tenuously supported in the text that he wants them to accept. To that extent, he actually presents more than anything else, as there is no supportable alternative story to present given the realities of the situation, is a well-supported outline of concerted, energetic, and endless activity to steal US secrets by China.

It would seem that the nature of the situation has already been firmed in the minds of the public based on reports in the newsmedia. It is unlikely that readers of his monograph would be inclined to Eftimiades perspective, despite his remarkable background. It is unlikely that anyone in the US counterintelligence services, particularly among senior executives and managers, is on Cloud 9 over results versus Chinese government organizations and commercial entities engaged in espionage in the US. Somewhere deep inside, some may feel a bit stuck and stagnating, clutching at straws, and listening to the wind, but conceal such concerns from their colleagues. One might imagine their feelings: “Je suis las de toujours faire la même chose.” That would be a multifaceted problem for US counterintelligence services in itself. Perchance in trumpeting FBI and DHS success was an effort to boost morale or at least comfort those from each service who may have had their fill of Chinese success in their country. Eftimiades may have viewed optimism as the best and most available elixir for defeatism, and employed it liberally. Perhaps this line of thinking that drove Eftimiades, who leaves no doubt that he is unwavering in his support and confidence of the FBI and DHS, consciously drifts a tad away from his encomium of their respective work against Chinese espionage moves in the US. As also mentioned in the discussion of the monograph’s Preface, in the “Summary” section, Eftimiades does say “there is still much more to be done.”

Noticeably, in the “Summary” section, as noted in the discussion of the Preface, Eftimiades also relents so to speak from his “declaration of nescience” to say there are very likely thousands of Chinese espionage operators in the US. However, although there is clear evidence that their purpose is to steal US secrets and technologies, one might consider in the abstract whether there may be other interests of the utmost importance to the Chinese intelligence services that require such a labor-intensive effort. That should beat the brain. Going back to the suggested figure of 25,000 intelligence officers, professionals, albeit discrepantly trained and experienced, on the ground–a force one and half times the current size of a US Army armored division, it may be worth considering whether they may be engaged in a bold, cunning reconnaissance and surveillance mission of far greater conception than ever seen in the past or might normally be imagined in the present. Itt might be a mission that could not be performed in any other way than with a large force of professional intelligence officers. To be direct, yet admittedly still a bit Delphic, there must be a clear reason why officers of Chinese Intelligence services operating in the US, in particular, are so successful at not being wherever, whenever US counterintelligence services are looking for them. 

There is a thin line that separates reality from illusion. It must be kept firmly in mind that if one denies or unconsciously suppresses reality, what is left is only an illusion, false reality. Once one begins planning and operating within that, all is lost. If that is or ever would be the case concerning the Chinese conundrum, the situation will become far worse than ever imagined. Further, the more one deals in truths and reality, the more one develops reliable intuition and intimations. The more one entertains fallacies and what is artificial, the farther one moves away from having any real intuition or developing any intimations at all. These skills in the end will prove to be absolutely imperative if endsieg, a final victory against all of the odds stacked against them, is to be achieved by US counterintelligence services in their struggle against Chinese espionage efforts. As the celebrated Spanish novelist, translator, and columnist, Javier Marías remarked during an interview for the Winter 2006 issue of the Paris Review: “One must have courage to see what one does see and not to deny it for convenience.”

Regarding China’s concern about having the image of being a country of thieves and copycats, stealing the best ideas of other countries to support and propel its conspicuous advancements in nearly all sectors, the Communist Party of China absolutely has an interest in global public opinion of China and perceptions of its actions on the world stage. Still, it is unlikely that the Communist Party of China has too much concern about that in that vein. One must remember, the Party insists that at the foundation of all advancements of the Western industrial powers are the years those countries overwhelmed peoples who were defenseless and through a colonial system violently oppressed them and allowed business enterprises of their respective countries to exploit the conquered peoples’ lands for raw materials and mineral wealth for centuries. They will use the experience of China to support that argument. Within their own countries, the Party says down-trodden workers were essentially enslaved by the same business enterprises now called multinational corporations. (Note that greatcharlie asserts in the abstract that this is the Communist Party of China’s perspective; it is by no means greatcharlie’s perspective.)

Still, more salient based on the Party’s mindset would be the overall judgment of the world on the robust energy China displays as it pushes onward and upward into the future and, albeit mistakenly believing, eventually reaching the position at the top as the world’s dominant power. From that perspective, the Communist Party of China would see their country as having a very positive, lasting impact on global perceptions of it everyday. To that extent, the Party leaders and propagandists likely weigh that global perception on “energy” and Western measures of global public opinion ratings, particularly if those ratings are based on reactions to independent events and not the bigger picture. While one might agree that there are some universal truths about our world, still not everyone thinks the same on all issues. China’s view of its future is quite at variance with that held by most in the US best familiar with the issues involved. Fere libenter homines id quod volunt credunt. (In most cases men willingly believe what they wish.)

There will naturally be more that US counterintelligence services would want from the US Congress to appropriate for them in order to pursue adversarial countries’ intelligence services operating without pause, on the ground, in the US. However, the matter must be examined from the lens of Congressional leadership. From their view, US counterintelligence services  presently possess considerable resources to pursue Chinese intelligence officers and operatives. There are no indications Chinese espionage networks are being regularly taken down. Harsh critics and skeptical observers might begin to believe that, unbeknownst to the public, US counterintelligence services are actually being restrained from doing their utmost to defeat opponents here in the US. However, there would hardly be any logic to that. Surely, US counterintelligence services are not flâneurs, in the field simply playing chase games. Even the slightest act in that direction would betray the trust and reliance the US public has in their fidelity and  their belief that they are protecting the country’s sovereignty, its property, its interests and especially its people. As expressed in the February 26, 2021 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, by 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. Sardonically, from a paranormal perspective, one might suggest that although Chinese intelligence officers may be operating in the same spaces in which US counterintelligence services are looking hard, they do so in some other plane existence, undetectable by mortal eye. Sous une surface calme tout se passe.

There has been more than enough talk about how bad the problem with China is. C’est la Bérézina. As it has been discussed so often that, in a way, such talk haa become by the by to some degree for the US public. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and destroy all of its networks. As greatcharlie has mentioned in proceeding posts on the Chinese espionage crisis, It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Eftimiades clearly understands that much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. Fundamental changes may be needed in efforts to halt Chinese espionage operations. There is the possibility that certain apparent aspects of Chinese intelligence operations are not being focused on sufficiently or appropriately. Making the right improvements requires being persistent in one’s search for answers. To continue the pursuit successfully will require a certain boldness in thinking. Although he literally lost his head by guillotine two years later, George Jacques Danton, the 18th century French revolutionary leader, addressed the Legislative Committee of General Defence, September 2, 1792 with words concerning the situation in France which are apposite for counterintelligence organizations dedication protecting their countries against any harm by Chinese intelligence services: “De l’audace, et encore de l’audace, et toujours de l’audace, et la France est sauvee.” (Boldness, more boldness, and always boldness, and France is saved.)

What Eftimiades presents on Chinese espionage operations and tactics represents a stage of those activities existent at the time he wrote the monograph. However, Chinese intelligence operations and tactics appear to be constantly and rapidly evolving, becoming something more effective, more efficient everyday. As their capabilities improve, the possibilities for action also increase. It is difficult to accept but very likely a reality that success has given Chinese intelligence services so far good reason to approach the future with confidence. To that extent, the worst may be yet to come. However, on the other side of the coin, while it may seem counterintuitive to some ears, the success of Chinese government organizations and commercial entities engaged in espionage in the US should not frustrate US counterintelligence officers. Rather, it should embolden officers of US counterintelligence services to struggle even harder to succeed. Hope must still exist in the situation for that. Surely, establishing a pattern of success would go a much longer way in building self-confidence among officers in US counterintelligence services struggling on their own home ground with the Chinese.

What one finds in Chinese Espionage Operations and Tactics is of considerable quality. The book remains a steady flow of information, data, and expressions that well-demonstrates the author’s command of the subject matter, from beginning to end. Without pretension, greatcharlie states that what is presented here represents less than twenty percent of the insights birthed in greatcharlie by Eftimiades monograph. Readers should imagine what insights might be brewed up from within themselves after they have had a chance to read through it. 

It is assured that after the first reading Chinese Espionage Operations and Tactics, one would most likely go back to the book and engage in that stimulating process again and again. The monograph will very likely be regularly consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. Surely, the monograph would be quite useful to an Intelligence Studies instructor who, as a primary part of an assignment, might decide to have students read the monograph, observe the manner in which Eftimiades report is formatted, how information is presented in its sections, and develop insights from its discussion.

Perhaps it is eedless to say at this point, but it is nonetheless stated with absolute conviction and true relish, greatcharlie unequivocally recommends Eftimiades Chinese Espionage Operations and Tactics to its readers.

By Mark Edmond Clark

Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of China’s MSS Vice Minister

People’s Republic of China Vice Minister for counterintelligence of the Ministry of State Security Dong Jingwei (far right), and People Republic of China Minister of Public Security Zhao Kezhi (center), were among five Chinese officials attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. On June 23, 2021, officials of the People’s Republic of China Embassy in Washington presented this photograph of Dong’s very public appearance at the Shanghai meeting as proof that he is in China despite rumors that he had defected to the US four months before. The point at issue is whether the photograph presents the real Dong.

In June 2021, rumors had taken flight concerning the alleged defection of Dong Jingwei, the People’s Republic of China Vice Minister for counterintelligence of Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS–China’s relative equivalent to the Central Intelligence Agency (CIA). Dong was alleged to have defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. After arriving safely into US hands, Dong allegedly provided government officials with information about the Wuhan Institute of Virology that purportedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. However, by late June 2021, US officials began reaching out to the news anonymously to say reports of Dong’s defection were not true. and hinting that he remained in China. The mainstream news magazine Newsweek reported on June 22, 2021 that it was informed by a US government official that reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Although reticent about the rumors for the longest time, on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite claims that he had defected to the US four months before. Curiously, the photograph has not been widely accepted as incontrovertible proof of Dong’s identity, that he still resides in China, or that he did not defect among many independent China-watchers.

Before the controversy of the rumored defection, one would have had great difficulty finding Dong Jingwei’s name anywhere it might even be expected. Two resources for such information that greatcharlie’s will reach for first are: Peter Mattis and Matthew Brazil, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), and I. C. Smith and Nigel West, Historical Dictionary of Chinese Intelligence (Historical Dictionaries of Intelligence and Counterintelligence) (Scarecrow, 2012). Following the blow-up of the defection story, numerous articles online have appeared and online encyclopedias such as Wikipedia and Britannica, have developed enough information to provide decent–though some were not so verifiable–biographies of him. As was noted in greatcharlie’s June 30, 2021 post entitled The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax,” never before has Dong’s name, or any other senior MSS counterintelligence official’s name, been bandied about in the US or global newsmedia in the manner it has been lately.

What would imaginably now be a greater issue for inquiring minds than Dong’s biography, is the matter of his actual image, how he actually looks. A number of photographs of him have cropped up along with the many new articles, but two particular images of Dong have been very popular. As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. If they are photographs of two different men, one may actually be Dong. Here, greatcharlie gives making comparisons between the two images of Dong the old college try.

The June 16, 2021 tweet from the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong Jingwei had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia. Along with Han’s commentary was the popularized photograph allegedly of Dong Jingwei.

The first image mentioned above was made available widely via Twitter on June 16, 2021 as a result of being in a photograph attached to a tweet by the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia.

The second fairly popular image is included with his biography in Wikipedia. The individual in the Wikipedia photograph appears to be the same individual in the photograph that the Chinese government released of Dong attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. He is the same individual in a photograph taken when Dong was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. In the photograph, Dong is first from the left. It is alleged to be the earliest publicly available photograph of Dong after he began serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in April 2018. 

A photograph taken when Dong Jingwei (far left) was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. It is alleged to be the earliest publicly available photograph of Dong serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in the MSS in April 2018.

Si parva licet componere magnis. (If we may compare small things with great.) By placing the photograph of Dong from greatcharlie’s June 30th post beside the photograph from his biography in Wikipedia, using only the naked eye, one can find clear distinctions in at least seven areas of their respective faces. To allow readers to follow along with comparisons of facial features, the June 30, 2021 greatcharlie post photograph is included here as Figure 1. The Wikipedia photograph is included here as Figure 2. A chart that identifies parts of the human face is included here as Figure 3. Readers should refer to that chart to locate points of the face mentioned in Figures 1 and 2. The seven specific points on the face address include: philtrum; philtral columns; philtral dimple; nasolabial grooves; nasal septum; mentolabial sulcus; and, facial marks.

Figure 1 

Dong Jingwei June 16, 2021 Twitter Photograph

Figure 2 

Dong Jingwei Wikipedia Biography Photograph

Figure 3 

Face Chart

Philtrum

The philtrum on the individual in Figure 1 forms a visually straight canal with the philtral columns formed in straight lines from the nasal septum to the top of the lip. They are somewhat thick on both left and right. The canal of the philtrum appears relatively symmetric in its depth and width to the corresponding height and width of each philtral column. On the individual in Figure 2, the philtral columns appear shorter than those of the individual in Figure 1. They are separated enough to form the philtrum into a wider and somewhat deeper canal than that of the individual in Figure 1. 

Philtral columns

Although they are not marked on the chart in Figure 3–greatcharlie apologizes for that omission, the two columns of the philtrum running from the septum of the nose to the top of the upper lip are called the philtral columns. At the point the philtral columns touch the top of the upper lip–known more precisely as the vermilion border–in Figure 1, two delta shaped points form. Those delta shaped points are not present on the upper lip of the individual in Figure 2. On the individual in Figure 2, the philtral columns contact the upper lip in a way to form a horseshoe or “U” shape. The upper lip, itself–as aforementioned, called the vermillion–forms only moderate curves at the points on which the philtral columns contact it.

Philtral dimple

The philtral dimple, not marked in the chart in Figure 3–again, our apologies–is the gap between the two philtral columns where they contact the upper lip. On the individual in Figure 1, the philtral dimple is pronounced between what are visually two triangle shaped points, both left and right at the base of the philtral columns. On the individual in Figure 2, the philtral dimple is a far less pronounced facial feature.

Nasolabial grooves

The nasolabial grooves on the individual in Figure 1 are very pronounced both right and left. They begin at a point above the wings of the nose appearing to make contact with the dorsum of the nose. The nasolabial grooves on the individual do not contact the wings of the nose. They stretch in near straight lines down and to the left and down and to the right, reaching just outside the edge of the angles of the mouth. The nasolabial grooves on the individual in Figure 2 are not as long as that of the individual in Figure 1. They curve inward and contact the top of the wings of the nose of the individual. Although the nasolabial grooves are not as pronounced on the individual in Figure 2 as those of the individual in Figure 1, where they become more apparent is closer to the wings of the nose. They are somewhat deeper and the skin around them appears thicker than that for Figure 1.

Nasal septum

The nasal septum at the point where it contacts the philtrum on the individual in Figure 1 is thin. The point at which the nasal septum contacts the philtrum On the individual in Figure 2 is somewhat thick. The nasal septum also appears shorter to some degree. The individual in Figure 1 appears clean shaven beneath the nasal septum and over the philtrum to the upper lip. The individual in Figure 2, in all photos available publicly, maintains very slight hair growth, perhaps a deliberate, modest “designer stubble,” beneath the nasal septum, covering the philtrum down to the top of the upper lip and across to the angles of the mouth.

Mentolabial sulcus

On the individual in Figure 1, the mentolabial sulcus, the line or furrow formed between the base of the lower lip and the base of the chin, is prominent. There is an apparent blemish–mole, birthmark, scratch, bruise–beneath the mentolabial sulcus along its right edge, at a point just inside “the line.” The mentolabial sulcus on the individual in Figure 2 is barely perceptible. It has a somewhat curved shape. The chin on the individual in Figure 1 appears somewhat “U” shaped. The chin on the individual in Figure 2 appears more “bow” shaped. The length between the base of the lower lip and the base of the chin is shorter on the individual in Figure 2 than on the individual in Figure 1.

Facial marks

On the individual in Figure 1, there is a mole, birthmark, slight injury (scratch or bruise), beneath the mentolabial sulcus, beneath and just inside the right edge of it, not making contact with the line itself. On the individual in Figure 2, there are no similar marks on the face.

Finally, the most obvious difference between the two men is that one in Figure 1 wears eyeglasses. The individual in Figure 2 does not wear eyeglasses. It is possible, however, that the individual in Figure 2 does wear eyeglasses, but simply removes them when taking photographs.

Additional Observations Concerning Photographs

Signs of Aging

Eheu fugaces labuntur anni. (Alas, the fleeting years slip by.) What might be perceived beyond the physical about how two individuals in the photographs projected themselves at the moment their pictures were taken is that they are respectively professional, intelligent, well-minded, well-dressed, well-groomed, Chinese officials. However, from what information is publicly known, and what one may accept as true about Dong is that he is currently 57 years old, reportedly being born on November 18, 1963, one can attempt to correctly perceive aspects of his physical condition, too! To that extent, one might consider how age might impact the appearance of the real Dong.

There are many who really do not begin showing signs of aging until a bit later than 57. (By no means does one become “past one’s prime” or “over the hill” after reaching age 57!) Yet, there are some fairly common, and commonly understood, changes in appearance that normally occur. As one ages, the appearance of the face and neck typically changes. Loss of muscle tone and thinning skin can often give the face a flabby or drooping appearance. The skin also tends to dry out and the underlying layer of fat shrinks so that your face no longer has a plump, smooth surface. To some extent, wrinkles cannot be avoided. If readers would look back at the two photographs of individuals both identified as Dong in Figures 1 and 2, they will notice that the individual in Figure 2 has a rather plump, smooth surface. There are no wrinkles or furrows visible on the face. There is considerable muscle tone in the face in all three photos of him presented here, most prominently along the jaw. The individual in Figure 1, exhibits the more dried skin that comes with age. The visage of the individual is strong but there is no pronounced muscle tone. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, slight furrows can be discerned on his forehead.)

Sun exposure and cigarette smoking are likely to make them develop more quickly. However, there is no way for greatcharlie to determine whether the individual in the photograph is a heavy smoker or is regularly exposed to the sun. There is no way available for greatcharlie to determine whether these factors relate to the individual in Figure 1 either.

In another sign of aging, the number and size of dark spots on the face increase as well. It was noted earlier that there is a blemish on the right side of the face of the individual in Figure 1. However, there is no available way for greatcharlie to determine when that individual acquired the blemish. There are no discernible spots on the face of the individual in Figure 2.

With aging, the loss of bone mass in the jaw reduces the size of the lower face and makes your forehead, nose, and mouth more pronounced. The nose may lengthen slightly. In both Figures 1 and 2, there is no indication of the loss of bone mass in the jaw. The noses of the individuals in Figures 1 and 2 do not appear to have suffered ill-effects of age such lengthening. In fact, the skin on both noses appears rather smooth and plump.

A common transformation due to aging is for the fat from the eyelids to settle into the eye sockets. This can create the appearance of sunken eyes. make. The lower eyelids can slacken and bags can develop under your eyes. The weakening of the muscle that supports the upper eyelid can make the eyelids droop. This may limit vision. There is nothing to indicate any of these aspects have impacted the appearance of either individual in Figure 1 or 2. As the individual in Figure 1 wears eyeglasses, any effects on his eyes may have been influenced by them. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, it appears that there is a hint of bags under the eyes detectable through his eyeglass lenses.)

A most apparent sign of aging is gray hair on the scalp, and gray hair on the scalp, and on the eyebrows and eyelashes as well. One the individual in Figure A, there is no ability to determine whether he has gray hair in his eyebrows or eyelashes. Except for the hair above his forehead, one cannot see the hair on his scalp to determine if there is gray hair. (It must be noted that in a photograph included here below in which the same individual identified as Dong in Figure 1 is seen, his hair parted on the left side of scalp, revealing what appears to be gray hair.) The individual in Figure 2, on the other hand, clearly has no gray hair in his scalp, eyelashes, or eyebrows. In fact, as aforementioned, there is slight hair growth on his upper lip. It is decidedly black giving him a very youthful appearance. To that extent, the individual in Figure 2 appears to be younger than the individual in Figure 1, and perhaps younger than 57-years-old.

Countenance of the Face

Duriora genti corpora, stricti artus, minax vultus et major animi vigor. (Hardy frames, close-knit limbs, fierce countenances, and a peculiarly vigorous courage, mark the tribe.) In addition the changes in the face that come with aging, one’s work can be manifested in the countenance, too! As explained in greatcharlie’s June 30, 2021 post, the primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide to protect China’s citizens, secrets and technology from foreign spies. Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. If progress through interviews or interrogations of the subject of an investigation indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. 

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, speaks to this point in The Secret Pilgrim (Alfred L. Knopf, 1990) when his main character, George Smiley a senior and well experienced intelligence officer for The Circus–MI6 in nearly every respect, tells a group of probationary intelligence officers in the fictional foreign IntellIgence training school in Sarratt that he was the one who debriefed his arch rival from Moscow Center, the headquarters of foreign intelligence service of the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB.  He was known only by the name, Karla, and was captured in Delhi after escaping the US. Explaining to the trainees in general about the nature of interrogations, Smiley says at times they are “communions between damaged souls.” However, when MSS managers have determined the situation demands rough treatment, imaginably compelled by some exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, surely coercive measures will be employed to include forms of torture. That work surely takes its toll, often manifesting its pull on the countenance of those who have engaged in it. The aphorism is quite appropriate here: “L’habit ne fait pas le moine.” Still, perception might lead the reasonable to choose the individual in the photograph of Figure 1 to someone more apparently carrying such a burden based on appearance, and perhaps a bit of intuition. Ut imago est animi voltus sic indices oculi. (The face is a picture of the mind as the eyes are its interpreter.)

An image of Dong Jingwei matching that from the June 16, 2021 Twitter photograph (above). If these popular photographs of Dong in Figures 1 and 2 presented here are actually of two different men so be it. This practice may turn out to be of greater use by China’s intelligence services than anyone outside of the country might have imagined. However, there remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case then in the possible effort to conceal his identity, Dong has done the thing completely.

Concealing an Intelligence Chief’s Identity: Not an Uncommon Practice

The idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.”

Sidelights

If these popular photographs allegedly of Dong in Figures 1 and 2 here are actually of two different men so be it. It may turn out that using decoys may be a practice in greater use by China’s intelligence services than anyone outside of the country might have imagined. Perchance as a result of the Dong defection matter, it has been brought to light to the world all at once. The sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. 

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

A quote from Arthur Conan Doyle cited in greatcharlie’s June 30th post on Dong’s rumored defection might be worth repeating here. In “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in Doyle’s The Adventures of Sherlock Holmes published in the Strand Magazine (1891), his main character, Holmes, states: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

The Way Forward

Omne ignotum pro magnifico. (Everything unknown seems magnificent.) Without pretension, greatcharlie states that it does not have any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causality for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US and other allied intelligence services have doubtlessly examined all of the photographs out there that purportedly include Dong using AI and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how Dong looks, too!

As greatcharlie has noted in previous posts, in our ordered universe, it is expected that everything will follow its design. Order in the human mind is established by patterns that one can decipher. With the smattering of facts, evidence, and insights available, one can still postulate, and see if a theory formulated on what the whole Dong episode was all about can be confirmed by facts through investigation. It may not always be a tidy process. Wary of the moves Chinese intelligence can make, some might contend the matter of the varied images of Dong may actually be part of some recherché plan to create greater mystery around his identity. Imaginably, it would be viewed as a subplot hanging from a greater MSS disinformation plot to foster a bizarre defection rumor. On the other hand, some might go as far as to assert a more fanciful theory such as the leadership of MSS, in an effort to impress Communist Party of China leaders ahead of, and during, the Centennial of the Communist Party of China the decided to provide a modest demonstration of the organization’s capabilities. Thus,, MSS may have decided to have a little fun with US counterintelligence services by “just messing with them” as the saying goes, making certain that Party’s leaders were in on the joke. The whole matter has certainly had quite a meretricious effect worldwide. Of course, such a move would hardly be a schema, and perhaps the last thing one should expect from MSS. Still, though it may be improbable, it is all the same conceivable. One can be assured that similar overimaginative assessments, judgments concerning the Dong defection episode will continue to be made and published primarily online. Their creation will be driven by the fact that for inquiring minds, the curious, the enthusiasts demand more answers on the matter. In Areopagitica (1644), the great 17th century English poet and intellectual, John Milton, explains: “Where there is much desire to learn, there of necessity will be much arguing, much writing, for opinion in good men is but knowledge in the making.”

The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax

People’s Republic of China Vice Minister of State Security Dong Jingwei (above). Beginning in February 2021, Dong became the subject of a rumor alleging that he, along with his daughter, defected to the US. The possible implications of his supposed defection were staggering. It was eventually revealed and proved that the rumor was pure fiction.  Never before has Dong’s name, or any other Chinese counterintelligence official’s name, been bandied about in the US newsmedia or worldwide in the manner it has been lately. An attempt is made by greatcharlie to some degree how this all came about and what was the purpose of it all.

Rumors of the alleged defection of Dong Jingwei, a vice minister of the People’s Republic of China Ministry of State Security–China’s relative equivalent to the Central Intelligence Agency, were the subject of intense discussion in the US newsmedia and social media particularly in June 2021. Allegedly, Dong fled China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, is now highly selective, positively picky, about those who serve in national security positions in his government. Considering what would be the most likely nature of the man or woman who would be able to serve as his Vice Minister at MSS for counterintelligence, it is hard to form a mental picture of where the rumor that Dong had defected to the US with his daughter, or who, or better, what organization, may have actually given it wings. It is harder to understand how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. It is hardest to envision who among those with any knowledge of the Chinese government and the national security apparatus would believe, would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. There is always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong may have been overwhelmed by some cacoethes. Barring that, there was no earthly reason to believe that he would defect, and to the US nonetheless. The puzzle now having been “resolved”–the whole truth is out there somewhere, greatcharlie gives a go at parsing out some of these issues hoping it does not come off as l’esprit de l’escalier. In that process, greatcharlie, albeit, steps out on shaky ground to present some unsolicited–and hopefully not unwanted–suggestions on how similar false reports in the future might be given appropriate consideration. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

Some might conclude after noting the topic of this post that this is one more by greatcharlie on Chinese espionage in the US. Some, perhaps duly, might also grumble to the effect: “Now greatcharlie is all China, all the time!” While greatcharlie approaches the defection that did not happen out of academic interest, this examination, much as those of proceeding posts, is part of an ongoing effort by greatcharlie to give consideration of what it could offer to contribute to development more effective approaches to such hostile intelligence collection efforts against the US. Indeed, with the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. Readers will likely discern facts are interpreted from that perspective. However, no information is skewed or bent with preconceived ideas or bias.

Who Is Dong Jingwei?

Dong was born on November 18, 1963. At the time of this writing, he is presently 57 years old. In China it would be of some significance to note that he is of Han nationality. As for his studies, he has earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, who as part of the defection hoax was said to have allegedly fled China with him. She is the ex-wife of Alibaba executive Jiang Fan, who now heads the company’s powerful e-commerce platforms, Tmall and Taobao. 

Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province from 2006 to 2017. He served as Director of the Pokitical Department of the Ministry of State Security from 2017 to 2018. He eventually became a Member of the Party Committee and Vice Minister of the Ministry of State Security and the Chief of MSS Counterintelligence. It was noted in the July 24, 2015 edition of Intelligence Online that Dong’s heading of the State Security Department in Guo’anbu in the Hebei Province was significant for him as that province has reportedly produced many of Xi’s “securocrats.” Loyalty to superiors, reliability, and regional background apparently put him in good standing with senior party officials under Xi. By 2015, Dong reportedly became part of the “Xi Jinping Clique”, one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles and accolades provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, where Dong is vice minister, is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions.

As noted in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” the primary targets of the MSS hands down are its chief competitor, the US, the Russian Federation, Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes. In the countries of Eastern Europe, China has achieved some prominence in their space. China must equally measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. Taiwan, which Beijing declares is part of China, is a special case and a very important MSS target. The second rung of competitors would include India, Pakistan, Nepal, and Mongolia. India has doubtlessly garnered a bit more attention from MSS due to its ongoing border struggle with China. MSS has stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

In defining counterintelligence, James Olson, the former chief of Counterintelligence for the Central Intelligence Agency and author of To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), which greatcharlie reviewed for its January 2021 post, states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” The primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. MSS shares the counterintelligence role with Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS. MPS is an intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence.

The achievements of MSS in the US have certainly been no mean feat, and should not be underestimated. As discussed in the February 26, 2021 greatcharlie post entitled,”Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts,” the tide of essentially unchallenged Chinese espionage has lapped up so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under-developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating. One might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them.

Dong (above)  once headed the State Security Department in Hebei, a province which has reportedly produced many of Xi’s securocrats.” Loyalty to superiors, age and regional background apparently won him favor with senior party officials under Xi. He then became part of the “Xi Jinping Clique,” one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles held by Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. It stands to reason that in order to be a successful vice minister for MSS counterintelligence. Dong must be a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, the few traits listed here along with a reliable intuition and challenging experiences within his own intelligence organization may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions within adversarial intelligence services. These same traits perhaps have also assisted Dong in successfully navigating the top rung of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

One might first postulate that Dong possesses the traits of clarity, purpose, and focus. Surely, Dong puts his intentions forward for the best outcome possible. Clarity would allow Dong to concentrate with intention on what is ahead, on what needs to be done. One might expect that Dong believes by now that serving in MSS, performing executive duties for counterintelligence is his purpose. To that extent, purpose was likely revealed to Dong when he discovered the ability to use intuition to understand what may not be clear to others. He would be able to focus on what truly matters, and understand what needs to be avoided, such as anything that might frustrate, seriously inconvenience, hamper, or inevitably destroy his organization’s efforts

Dong is an intelligence officer and political leader of great energy, enthusiasm, and creativity. That energy is transmitted through the MSS. In the US, it would be transmitted not only to officers in the field but to errant citizens and Chinese émigrés recruited to serve the purposes of the intelligence service. He would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. He would be able to find unlocked potential in situations and determine ways to uncover what may be hidden away

What Was Reported on Dong’s Alleged Defection

Relate retero. (I tell what I have been told.) Some simple falsehoods went some way to explain and support what was from the outset a questionable story. From what can be gathered about the episode, stories about Dong’s alleged defection initially emanated from conservative websites in the US. Newsweek points decidedly to a June 4, 2021 report from the conservative political commentary website, RedState, as a source of the rumor. Discussion within conservative circles reportedly became even more intense as days passed. There was considerable discourse on Dong’s defection found in Chinese-language, anti-Communist newsmedia outlets in the US and on Twitter.

Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

While preparing a story on the alleged defection, SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations, had sought comment from the State Department last week, however, it did not respond. In the first public clarification put out by the US government on the affair, a US official, speaking anonymously, “reached out” to say reports of Dong’s defection were not true. With regard to Dong’s whereabouts, he stated “We can’t confirm or deny where he is exactly,” but hinted he remained in China. The official refused to go any further. When SpyTalk asked why the Biden-Harris administration sought to knock down rumors of such a high level defection, an ultra-sensitive issue, the official reportedly stated, “that’s more of a policy question”and referred SpyTalk to the White House. Reportedly, the National Security Council did not respond to SpyTalk’s request for comment.

Notably, Newsweek reported on June 22, 2021 it was informed by a US government official that the reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Yet, such reporting still did not cause those insisting on the defection to retreat back, away from the issue. It is always a capital mistake to reach conclusions before having all of the facts on a point at issue.

The Chinese government, itself, delayed publicly addressing the stories about his alleged defection. Then on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite rumors that he had defected to the US four months ago. According to minutes released by the Communist Party’s Central Political and Legal Affairs Commission, Dong was among five Chinese officials who attended the 16th meeting of the Security Council Secretaries of the Shanghai Cooperation Organization (SCO) Member States on June 23, 2021 Reports of the meeting were also shared on Weibo, China’s largest social media service.

Sources of the Hoax: Views on That in the Newsmedia

The Daily Beast quoted Robert Manning, a former top Asia specialist in both Republican and and Democratic administrations for more than 30 years as saying the decision of the Biden-Harris administration’s willingness to address such a normally highly secretive issue was “to excise an unnecessary additional irritant in the still downward-spiraling bilateral relationship” between the US and China. The Daily Beast also reported another possible motive was to beat back a Republican campaign to deflect blame for the COVID-19 pandemic in the US from the erstwhile administration of US President Donald Trump to China’s Wuhan Virology Lab and, by extension, Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases, who has been critical of the former president’s response to the disease. In the same vein that the motivation may be domestic politics, the Daily Beast reported that a leading China watcher suggested the objective was to head off Republican accusations that the Biden-Harris administration was “hiding a defector who has info on the lab leak or [other] embarrassing stuff.” Essentially amplifying what was aforementioned here, the Daily Beast explained reports of Dong’s defection originated in conservative circles here and abroad that have been critical of the scientific consensus that the COVID-19 pandemic was transmitted from animals in Wuhan’s “wet market.”

On June 4, former Fox News reporter Adam Housley tweeted that “US intelligence has a Chinese defector with Wuhan info. and China is trying to produce variants that suggest it came from bats to cover up that coronavirus originally came from a lab.” Housley’s report was referenced by RedState, which alleged that “a person believed to be among the highest-ranking defectors ever to the United States from the People’s Republic of China has been working with the Defense Intelligence Agency (DIA) for months.” Citing anonymous sources “inside the intelligence community,” The Daily Beast further reported that Red State cautiously claimed “the defector has direct knowledge of special weapons programs in China, including bioweapons programs,” and that the alleged information had created “a sudden crisis of confidence in Dr. Anthony Fauci.”

In a June 24, 2021 Washington Times story, it was suggested by a former National Security Agency counterspy that the defection rumors were “part of a Chinese disinformation effort to distract attention from growing international concern over reports the coronavirus pandemic may have originated in a Wuhan laboratory.” If that intriguing possibility is true, it would seem that the other shoe dropped when Dong was seen at a meeting with the head of MPS later in the month. It might be said the some in the US newsmedia are so expectant and desirous of good news for the US on the Chinese espionage front, that some outlets were even ready to jump at a contrived one. he US Intelligence Community did not flinch in response to the defection reports at any point until,  as aforementioned, one US official spoke “just looking to correct the record.” 

Other Suggestions

One can only imagine–if he was actually unaware that the fiction of his defection, would be laid on so thick in the newsmedia worldwide–what Dong’s immediate reaction was when he received news that he was the subject of a farce that put his loyalty and honor in question. Dong was imaginably a little put out. It may have also caused him some embarrassment, some loss of honor. While the truth of Dong’s loyalty to the Communist Party of China and his country would eventually be made very clear, he would surely recognize that once his name was associated with he would indubitably feel was a damnable rumor, that taint would still stick, even if only to some small degree, long afterward. 

 Perchance that the defection rumor was contrived by MSS, then it would be accepted honorably as an unavoidable sacrifice he had to make with the aim of protecting China. Perhaps some monitoring should be done to see if somewhere along the line in the near future, there is some sudden mention of Dong awarded some high honor for his “service” from the Communist Party of China. Perhaps he would receive the award from Xi, himself. That may very well signal, and could help support the idea, that the defection story was indeed part of some nefarious MSS scheme.

Quis custodiet ipsos custodes. (Who watches the watchmen.) Dong has unlikely gotten lost in any hurt. Yet, one might speculate that perhaps somewhere, someone believes Dong pretends to have an inner strength, nerve, that he actually lacks. Though the true source remains publicly unknown, so far to greatcharlie’s knowledge, no one has been denounced at least publicly in China for having responsibility for igniting the rumor against Dong. One could hypothesize that if the source of the rumor was actually in China, it may have been the case that Dong recognized attempting to establish blame among any rivals for the episode would only be corrosive, and trying to reconcile with some sense his own guilt for leaving himself open to the of such a rumor would be self-defeating. In such a hypothetical case, an expression of such acrimony within days of the celebrations of the Centennial of the Communist Party of China taking place in Beijing on July 1, 2021, would unlikely be of any benefit to Dong politically, professionally, or personally. To that extent, in the eyes of Communist Party of China leaders, he likely would do himself much honor by deciding to hold his tongue at this time, if he even needed or desired to speak out at all.

Arthur Conan Doyle in “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in The Adventures of Sherlock Holmes published in the Strand Magazine (1891) had his main character, the damnably good detective Holmes, state the following which is apposite here: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

Xi Jinping’s Counterintelligence Concerns

Xi has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. In his address at the ceremony, Xi lauded the major contributions made by the Chinese police to safeguarding national security, social stability and people’s interests, He called them a mighty force that can be fully trusted by the Party and the people, and spoke highly of the major contributions made by the Chinese security forces to safeguarding national security, social stability and people’s interests. Xi also called upon the security forces to uphold the Party’s absolute leadership.

People’s Republic of China President Xi Jinping (above) has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. Clearly, Dong has been mindful of Xi’s concept and intent and obedient to the new counter-espionage regulation that came into effect in April 2021.

Would Beijing Call It a US Counterintelligence Plot?

As discussed already here by greatcharlie and in previous posts, little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but it seems too few facts have been collected for them to run on to break new ground or produce anything worthwhile. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan US observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage.

Dong’s team and counterintelligence executives and managers of the other Chinese intelligence services surely study the tactics, techniques, procedures, and methods of US foreign intelligence and counterintelligence services. They would seek to better understand and prepare for expectant future attempts to covertly insinuate operatives into the Chinese foreign and national security apparatus, including particularly both the clandestine posts and covert networks of civilian and military Chinese intelligence services and Communist Party of China organs operating overseas.

Dong and his counterintelligence managers at MSS doubtlessly understand the situation the US Intelligence Community has faced, scoring few victories and suffering many defeats in the intelligence struggle with China, and they very likely recognize that US foreign intelligence and services are anxious to turn the situation around and get some things going. They have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. 

To that extent, one might imagine it could plausibly be claimed within MSS headquarters that whole episode was a US counterintelligence artifice, designed to twinkle out Chinese intelligence service officers and operatives based on the their reactions by some the following: movements–attempt to leave US; communications–sending communiques by codes and encryption to provincial departments and municipal bureaus to confirm rumors and see instructions on next actions; contacts–reaching out to network managers in distress or panic; and, email, text, call, and meet other intelligence officers to parse out situation as reported. Alternatively, also with a counterintelligence purpose, the US could be said to have attempted to smoke out prospective defectors among those officers and operatives, attempting to convince them that some “tower moment” for Chinese intelligence service operations in US had occurred and the moment had arrived to choose to remain part of Communist Chinese system or seek refuge in the US. 

Dong and his manager further parsing out the matter might have speculated that beginning in February 2021, he may have been out of pocket for an extended period or on medical leave for some illness. Such speculation could go further to suggest the US Intelligence Community became aware of the situation, which would have been a chilling prospect in itself for MSS counterintelligence, and sought to capitalize on it 

What might cause Dong and his managers some discomfort even though the whole defection story was revealed as a hoax, and if it was the actual source of the hoax, is that for a while at least there appeared to be good news about success against China. Even if proven false, it would be good to have such positive news reach the ears of the US public, and Beijing would not want that. Further, even though the truth is out, the belief may exist among many in the US public that the “super secret” US Intelligence Community may have truly scored the specified success, and now, for reasons unknown, want to conceal it. Among conspiracy theorists in the US, the imagination may have also been given fuel to run wild and the whole matter of the defection will linger for a while. Chinese intelligence services would likely hope that some sense of discouragement might reach into the psyche of the US public over how Chinese espionage in their country appears unstoppable, even though it may be an issue somewhat outside of the average citizen’s day-to-day concerns.

As for the Communist Party of China, propaganda elements might eventually seek to use the whole circumstance to an advantage against the US. The goal would be to embarrass the US by making it appear as if the US Intelligence Community conjured up a story of defection because that has had no real successes at all against China. What would then perhaps be called “the big US lie” or something to that effect would doubtlessly be denigrated by Beijing through declaring it as being too contrived, unsubtle, poorly executed, and further evidence of how little the US Intelligence Community knows about the Chinese intelligence services. Then again, there may just be silence from Beijing.

A Novel MSS Counterintelligence Tactic to Smoke Out “Disloyalty in the Ranks?”

It would appear Dong may have actually been expecting to face something out of the ordinary from US and other foreign counterintelligence services much as discussed here, and it factored into MSS calculations on operations against the US. According to a story in the June 18, 2021 edition of the South China Morning Post, a report on a seminar on a counter-espionage regulation that came into effect in April 2021 was posted on Changanjian, the social media account operated by China’s top law enforcement agency, the Central Political and Legal Affairs Commission of the Communist Party of China. At the seminar, Dong urged the country’s intelligence officers to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces. A read-out from the seminar quoted Dong as explaining: “The promulgation of such regulations provides us, the principal agents responsible for counter-espionage work, with the legal means to prevent, stop and combat criminal activities that would jeopardize our national security.” Dong went on to state: “This will reinforce our responsibility in counter-espionage work, and enable us to do a better job in organising and mobilising all social forces in waging ‘people’s warfare’ against espionage activities.”

In addition to Dong’s expressions on catching foreign spies, the actual report as posted stated that the intelligence officers must also go after “insiders” and “people who bankroll their activities behind the scene.” On that point, the report additionally noted: “At present, infiltration and spying activities by foreign intelligence agencies and hostile forces have increased significantly.” It went on to say, “In particular, there are individuals who have willingly become ‘insiders’ colluding with foreign intelligence agencies and hostile forces and engaging in anti-China activities.” The South China Morning Post story lastly noted the insistence in the report that “All state security agencies must stand firm … deepen and carry out our various counter-espionage work to safeguard our national security.”

Given what was stated by Dong at the June 18th seminar on the counter-espionage regulation that came into effect in April and the report on the event, it may be grotesquely improbable, yet all the same conceivable, that the defection hoax was actually an MSS loyalty test on a grand scale to as was suggested, to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces.

Attempting to look at thinking in MSS from the outside, trying to put moments and trifles from recent events in order and give them a deeper meaning, greatcharlie hypothesizes that Dong and his counterintelligence managers at MSS could not be certain of how the US Intelligence Community, and other foreign intelligence services for that matter, might apply pressure to its officers and operatives. For them, that is always the pinch. To do something more than just study the matter, they may have created a scenario that would likely shock MSS personnel in the field: the defection of the MSS Vice Minister, for counterintelligence nonetheless. That might explain why Dong’s good name was thrown into the mix of something so repugnant. Dong and his managers could test what may have been a working theory on the likely causality of some occurrence, in this case it would have been collusion with anti-China forces, and see if it could be confirmed by facts through investigation. Indeed, Dong and his managers would have wanted to see for themselves how officers and operatives in the field would respond to a very deceptive approach that perchance in their minds could have plausibly been attempted by US counterintelligence.

Many of the MSS foreign intelligence networks and operations in the US, and elsewhere overseas, are run by MSS Provincial departments and municipal bureaus. It would most likely be the case that foreign intelligence and counterintelligence managers of those departments and bureaus would have understood that there would be no reason to leave their locations or try to leave the US in the case of such a defection. It would stand to reason that their identities as spies would likely remain unknown for the time being and everything would be handled by Beijing to prevent their capture and keep them safe. That would likely be instilled in training and before deployments. Expectedly, as a result of training, loyalty and dedication, equanimity and sangfroid would be displayed by officers and operatives. However, through experience one might postulate Dong could have felt that there are patterns one can discern that establish order in the human mind. An unexpected blow to the MSS leadership as a defection of its chief of counterintelligence, which they depended upon for their very lives, might surprisingly elicit inordinate behavior among trained officers and operatives.

Dong might have conceptualized further that if one of his officers or operatives had even considered going over “to the other side” or perhaps might have already been in “friendly contact” with so-called “anti-China” force, the former might fear of being uncovered by an alleged defecting chief of MSS counterintelligence might impel them to act, the latter might want to use the situation to capitalize on the connection already made and go to the other side. (After reading what is presented here, perhaps some may accuse greatcharlie of having too much imagination, others may say, too little.)

A Thought about Future Defections by Foreign Intelligence to the US

As expressed in previous posts by greatcharlie, how the US handles every defection will surely shape decisions by officials to defect in the future.What US counterintelligence services do with defector would certainly have value for MSS to the extent that it could be used to discourage, plant in minds of officers and operatives that turning to the US would not be a wise choice. What prospective defectors might gather from the whole Dong business is that his or her defection could easily become a very public matter, very quickly in the US and eventually worldwide. It could be imagined by them that facts concerning who or what, when, where, how, and why would somehow be leaked to the news media. Rather than a serious concern, their defection might be presented and looked upon at least among some in the US as a banal amusement. Bookmakers in Las Vegas may very well have been taking bets on the outcome of it all: “Did he or did he not defect?, and “Will he stay in the US or be returned to China for one of our spies?” Regardless of the rank or position a prospective defector might be, he or she would hardly get the impression that the way Dong’s name was tossed about was nothing to signify, but rather unseemly. They would perhaps recognize that they would have little cause to expect any better treatment for themselves. None of this should be looked upon as exaggeration or fanciful if the Dong episode might be considered at all instructive. Using the backdrop of this episode as a gauge, one can only imagine what would go through the mind of an intelligence officer of adversarial country, wanting to defect when thinking about the treatment and well-being of his or her family members and himself or herself, how seriously their situation would be taken by the US, and what would be their final disposition. That may not portend well for the US Intelligence Community or prospective defectors. Hopefully, that will not be the case.

The Way Forward

Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.) Despite pronouncements of Communist precepts that are designed to allow the society to evolve socially, economically, and politically, declarations to maintain an orderly society though a system of justice demanding obedience and assurances from the Communist Party of China on the smooth running of the state and conduct of government affairs aimed at supporting a high quality of life for the people, visible and publicly released reports of scientific achievements in the medical field to high-tech, greater endeavor in the vast ocean and into space, and the notices of accomplishments externally on foreign affairs and guaranteed that the country cannot be threatened, bullied, or taken advantage of ever again, China is nonetheless a nontransparent society. What one knows about China is what Beijing says is true. Independent observations that defy its realities are anathema in Beijing, and can be responded to harshly. There is plenty of secrecy. The frugal release of information on the Wuhan virus is the latest best example of that. Beijing, without fail, will double down further in secrecy when it comes to national security. Yet, to discerning eyes, what the world observes China doing also speaks volumes about what is highly likely being decided behind the scene. That was especially true in this case when ostensibly a man viewed widely in the Communist Party of China as one of the country’s most loyal and dedicated servants, was accused of what could be called the unthinkable. 

While Dong’s name has never been bandied about in the US newsmedia or worldwide in any way close to the manner it has been in just days before thus writing. For those somewhat familiar with such matters, greatcharlie’s editor, himself, being simply an enthusiast and nonpracticioner, well-separate from the intelligence world, the notion that that he of all people in Chinese intelligence would defect would be a bombshell neatly as big if Alexander Bortnikov of the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB, was said to have defected instead. That is simply unimaginable. 

Revenons à nos moutons. The hope of US counterintelligence should be “simply” to come into positive contact with an officer, operative, or informant with an albeit some leaning toward an idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. 

Given the peculiarities of the world of intelligence, this analysis should not be considered too extravagant. The desire of greatcharlie is that nothing in this post would be deemed too fanciful by readers and a bit of their curiosity on the topic at hand would be satisfied. Admittedly, it would be doubly satisfying to know what is presented here might  resonate with a few in US counterintelligence services grappling with the Chinese espionage conundrum. However, if greatcharlie has not achieved the latter, the 18th century French Enlightenment writer, historian, and philosopher, François-Marie Arouet, known by his nom de plume Voltaire, sums up its sentiment in Poème sur la Loi naturelle (1756), Quatrième partie: Je n’en dirai pas plus sur ces points délicats. / Le ciel ne m’a point fait pour régir les États, / Pour conseiller les rois, pour enseigner les sages.” (I will not say more on these delicate points./ heaven made me not to govern states, / To counsel kings, to teach wise men. Spero melior. (I hope for better things.)

Food for Thought for US Companies Maintaining Robust Operations in China despite Beijing’s Strained Relations with Washington

The Great Wall of China (above) actually consists of numerous walls built over two millennia across northern China and southern Mongolia. The most extensive version of the wall dates from the Ming dynasty. Despite the Great Wall’s construction, China has always been relatively open to contact and trade with foreigners. The Communist Party of China would explain that due to such openness, in more recent times, China was the victim of Western “imperialist,” “capitalist” countries that reaped huge benefits from it. Many foreign companies currently operate in China, but their host, quite different from the past, is a world power. The Communist Party calls China’s success the vindication of an ancient civilization after a ‘century of humiliation.” China desires to take the title of the dominant power in the world and in its quest has created a challenging situation with the US. US companies in China must closely watch how US-China relations “progress,” and well-consider what prospective outcomes could mean for them.

Many in the US government’s foreign and national security policy bureaucracies and the US Congress with the responsibility to monitor what China is doing apparently do not want to tell too much about its actions and intentions and what its intelligence services are doing against the US, possibly for fear of metaphorically frightening the horses,  the US public. The Communist Party of China has at least demonstrated to itself that it had all the cleverness to outwit, outmaneuver, and surpass some preceding US administrations in its quest to establish the People’s Republic as the world’s dominant power. China’s accomplishments in that direction are now recognized by many policy experts as being far more significant than once realized. Relatively recent, popular books on US-China relations cut to the foundation of that which was perhaps previously satisfying and assuring in US policy circles about Beijing’s actions and intentions. While is far from exhaustive, among list of such books that greatcharlie has read or reread on the matter are: Michael Pillsbury, The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower (Henry Holt and Company, 2015); Steven Mosher, Bully of Asia: Why China’s Dream is the New Threat to World Order (Regnery Publishing, 2017); Robert Spalding, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019); and, Bill Gertz, Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019). Those with a keen interest in what has popularly been called “The China Threat” surely possess copies of one or more of these texts and likely have frequently made a long arm for copies in their libraries for reference. Though recognizing their popularity, greatcharlie would not dare hint at some rank or order of them for it would only open the door to judgments of its choices which is beside the matter. For its April 30, 2021 post, greatcharlie reviewed Gertz’s Deceiving the Sky. Of course, a treasure trove of excellent, recent academic books on US-China relations have been presented by university press and think tank publishers, which includes a few greatcharlie has appreciated and recommends: Michael E. O’Hanlon and James Steinberg, A Glass Half Full?: Rebalance, Reassurance, and Resolve in the U.S.-China Strategic Relationship (Brookings Institution Press, 2017); Elizabeth Economy, The Third Revolution: Xi Jinping and the Chinese State (Oxford University Press, 2018); Clyde Prestowitz, The World Turned Upside Down: America, China, and the Struggle for Global Leadership (Yale University Press, 2021); and, Ryan Hass, Stronger: Adapting America’s China Strategy in an Age of Competitive Interdependence (Yale University Press, 2021).

Despite readily discernible differences of each text, their respective discussions harmonize on the point that China is in the midst of implementing a strategy to supplant the US as the world’s dominant power. Some say the deadline for this takeover is 2049, the one-hundredth anniversary of the founding of the People’s Republic, but others believe it may come earlier. (Some policy circles in the US have assessed dispiritedly that it has happened already.) To that extent, on an additional common point, the authors explain how preceding US administrations, with an apparent tinge of romanticism, misguidedly believed that the US could somehow guide and manage China’s industrialization, trade and overall economic development and thereby impact its political and social development. They also explain how, in some instances, the US government has unwittingly assisted China in achieving its goal of world dominance. In fact, each author essentially declares that China is a national security challenge for the US and its allies. China has made that very clear by building island seabases to secure claims of sovereignty over waters in the South China Sea, conduct overflights of the airspace and naval incursions into the waters of US allies in the region, regularly organize parades of their latest weapon systems, and marches of tens of thousands of men, stupefying to the eyes. The authors by in large suggest that the US should implement a more competitive strategy toward China, as it really is, to get a handle on it, by using all instruments of national power and urging US allies in Asia and outside to do the same. The efforts of the aforementioned authors, and many authors of notable books not discussed here, to expose China for the danger they believe it poses is driven not by antipathy but rather by evidence. There is materiality on the balance of negative probabilities which they have dug up in their research and revealed in their works. 

Given what generally presented, it would appear that China may not be the safest country for US companies to operate in at the present. Being steeped in matters concerning China, and they certainly are, one might presume that senior executives of firms there have already formed positions. Perhaps the best answer for senior executives of US companies is to consider moving their operations to a country that presents no risk or at a minimum, far less risk than China at the moment while the opportunity still exists. Yet, as many US companies are operating robustly in China, clearly moving out is not the course that all senior executives would agree upon. With un fil di voce, greatcharlie, cautiously takes on the task of shining some light on why they would continue operating in China despite problems their firms could face as a result of a collapse in US-China relations or even conflict between the two countries. Some not so subtle changes in attitudes and behaviors of Chinese officials toward the US in recent times are examined to develop insights on specific reactions that should be expected from Beijing. The possibility is considered that Beijing may have plans to make their companies targets of its wrath in the event such dark days come. Simply with the possibility of trouble on the horizon, it would seem their respective companies will soon become targets of China’s public security and intelligence services in very apparent ways. Along with think tank scholars, academics, policy analysts, and military and diplomatic officials, journalists, and students that would hopefully be an interested audience for this essay, greatcharlie would hope that senior executives of US companies with considerable operations in China, might take note as it directly concerns their efforts. Absent from the discussion is any mention of the identities of companies that have placed themselves in, or may have in some way fallen into, a somewhat precarious position in China as greatcharlie believes that information is immaterial, away from the heart of the matter. As for the senior executives of US companies, they are only referred to in the third person as the sole goal here is to touch upon the likely prospective broad range of thinking among them, not to throw the spotlight upon anyone. Make no mistake, greatcharlie is not offering any business advice to anyone. It is stated without pretension that such would be out of its province, and any impressions of the kind caused by this writing should not be given flight. The aim is to provide a look at some important issues from a new angle, provoke thought, and contribute to the greater discourse on the matter at hand. Non enim parum cognosse, sed in parum cognito stulte et diu perseverasse turpe est, propterea quod alterum communi hominum infirmitati alterum singulari cuiusque vitio est attributum. (For it is not having insufficient knowledge, but persisting a long time in insufficient knowledge that is shameful; since the one is assumed to be a disease common to all, but the other is assumed to be a flaw to an individual.)

People’s Liberation Army forces on parade in Beijing (above). In the past, US administrations believed the US could somehow guide and manage China’s industrialization, trade and overall economic development and thereby impact its political and social development. Some scholars assert that in certain instances, the US government unwittingly assisted China in achieving its goal of becoming the world’s dominant power. China is surely a national security challenge for the US and its allies now. It has made that very clear by building island seabases to secure claims of sovereignty over waters in the South China Sea, conduct overflights of the airspace and naval incursions into the waters of US allies in the region, regularly organize, parades of their latest weapon systems, and marches of tens of thousands of men, stupefying to the eyes.

“Perfidious Communist China”

“Perfidious Albion” is the nickname that French Emperor Napoleon Bonaparte would use to acidulously refer to his arch rival Great Britain, which he considered to be treacherous in international affairs, distrustful of foreigners, and had a knack for frustrating his plans. Albion is a literary or poetic term most often used for Britain or England of Ancient or historical times. The term, “Le perfid Albion,” was said to have been first used by Augustin-Louis, Marquis de Ximenès, the 18th century French poet and playwright. In the same vain that the term, “Perfidious Albion,” was used by Napoleon, perhaps the term, “Perfidious Communist China,” could be used in Washington in reference to China as US leaders must remain suspicious and distrustful of it. Leaders of the Communist Party of China do not leave any room for doubt that they are determined to bring down the US in order to claim the title of dominant power in the world. Moreover, they are clearly willing to use whatever jiggery-pokery it takes and use, so far within tolerable limits, the aggression needed to achieve that goal. 

Becoming the world’s dominant power may not seem to some as a worthy pursuit for a developed, industrialized country. The US essentially fell into the role and has held it as a matter of events, fate, and necessity, though arguably some political leaders in the early years of the 20th century, such as President Theodore Roosevelt, envisioned the country reaching the top. Many countries and national leaders in the past two centuries that sought the mantle can now be found upon what former US President Ronald Reagan in 1982 referred to as the “ash heap of history.” Yet, it is the Communist Party of China’s pursuit nonetheless, and Beijing seems to be moving inexorably toward that goal. The strategy to reach its objective apparently from the start was far larger in conception than some in US foreign and defense policy and business circles still appear willing to consider. 

The words of the Chinese officials have begun to reflect the Communist Party of China’s unsheathed antipathy toward the US. The Party, itself, might explain the words of the Chinese officials rightfully manifest the tone of a country once victimized, yet not demoralized by Western “imperialist,” “capitalist” countries that reaped benefits from it. (Truth be told, by the late 1800s, China was “carved up like a melon” by foreign powers competing for spheres of influence over trade and territory.)  The Party line is that China’s success is the vindication of an ancient civilization after a “century of humiliation.” Their words have the flavor of officials from a country that has been executing a clearly defined strategy to unseat the US as the world’s dominant power. It often smacks of something personal for members of the Communist Party of China. With regard to the officials and diplomats of the People’s Republic of China Ministry of Foreign Affairs, this behavior was briefly discussed in the June 30, 2020 greatcharlie post entitled, “Commentary: China’s Coronavirus Tack Includes More Abrupt Officials and Political Warfare; Its Diplomatic Tool Must Endure the Consequences.”

Such qualities in Chinese officials words could be ascribed to those expressed by the People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi at bilateral meeting with a US delegation in Anchorage, Alaska in March 2021. The US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan. Blinken, indeed, started the meeting off by telling the delegation from China that the US intended to address “deep concerns” over the treatment of the Chinese citizens in Xinjiang and Hong Kong and the situation with Taiwan. However, Yang responded boldly, taking a bit of time to express sharp criticism of the US over what he described as its struggling democracy, poor treatment of minorities, and over its foreign and trade policies.

Yang’s words of reproach and his demeanor were completely out of character for an opening statement, particularly a very public one, for a bilateral meeting between industrialized powers. If the matter were not so serious and the prospects for improved relations between the two countries so grim, it might have been characterized as satire and marked down as a response. Needless to say concerning the speeches given by the two senior officials of the Chinese delegation in Anchorage, bon mot, they were not! Previously, there was an apparent Chinese doctrine of moderation in talks with other countries. Calmness and authority was once shown not only in diplomacy but in all circumstances by officials. This more assertive approach as of late has pulled Chinese officials from their more traditional conservative, stolid posture.

Overall, Yang, as well as Wang when he spoke immediately after him, comported themselves with an astringency which some critics would agree uncloaked the true nature of the regime. Certainly, as discussed in greatcharlie’s April 30, 2021 post, one could not help but get the impression by the vexatious words used lately by Chinese negotiators that all talks and perhaps the overall situation with the US, something even more is going on with Beijing’s thinking. It may very well be that leaders of the Communist Party of China have been satisfied enough with its accomplishments and ongoing progress towards surpassing the US that they have approved behavior by officials in interactions with foreign counterparts that would indicate the transition of power has already occurred. In the New American Bible, it is written in Luke 6:45: “A good person out of the store of goodness in his heart produces good, but an evil person out of a store of evil produces evil; for from the fullness of the heart the mouth speaks.”

In its April 30, 2021 post, greatcharlie also postulates that the Chinese officials appear to be presenting themselves as symbols of national resistance to US power. The Chinese officials wanted not just the US delegation, but the world to pay heed to their exhortations concerning the US. Such public behavior is part of what is known as united front work under Communist Party of China. During the current rule of the People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, united front work calls for the never-ending, enthusiastic promotion of the Communust Movement, the Communist Party of China, Xi, and the People’s Republic, and a lot of other things. The Communist Party of China is happy to foster animus toward the US wherever it may be found in the world as well as cause foment over such where it can. James Baldwin, the 20th century US novelist, playwright, essayist, poet, and activist, rightly recognized in his fascinating September 23, 1979 New York Times interview: “The world changes according to the way people see it, and if you alter, even but a millimeter the way people look at reality, then you can change it.”

The future situation is not entirely clear. One might reasonably suspect that while Beijing wants a peaceful resolution to the most stressing geopolitical issues it faces with regard to the US, it is uncertain whether they would even imagine accepting a balanced one. Real success for Beijing may very likely mean achieving some major advantages across issues in contention with the US. Looking at the extreme alternative, measuring what it might lose against what it might gain in some limited use of force, its judgments are likely balanced on perceptions of the will of the US to act and to sacrifice in such a way to actually protect its interests and allies in the region. Another factor included in the forecasts of Beijing’s moves would perhaps be the temperament of Xi. Conflict of any kind would have a dreadful impact on US companies in China. The lead up to any turn for the worse would likely mean problems for their operations and their employees in-country. As would be expected, some US companies have moved out or have expressed plans to move out. Other companies appear to be tiptoeing in the same direction. Still, there are those firms that are not just reluctant, but unwilling to take a new course. 

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above). In an April 30, 2021 post, greatcharlie postulates that the Chinese officials appear to be presenting themselves on the world stage as symbols of national resistance to US power. That was apparent during a bilateral meeting in Anchorage , Alaska in March 2021. Chinese officials wanted not just the US delegation, but the world to pay heed to their exhortations concerning the US. Such public behavior is part of what is known as united front work. Under the current rule of the People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, Chinese officials appear required to engage in a never-ending, enthusiastic promotion of the Communust Movement, the Communist Party of China, Xi, and the People’s Republic, and a lot of other things.

Do Not Rely on Beijing’s Goodwill!

Knowing what is wrong is not as great as knowing how to fix the problem. Moreover, one must accept there is a problem and be willing to fix it. In his philosophical and autobiographical treatise, “Discourse on the Method of Rightly Conducting One’s Reason and of Seeking Truth in the Sciences” (1637), the renowned 17th French philosopher René Descartes wrote: “And thus, the actions of life often not allow any delay, it is a truth very certain that, when it is not in our power to determine the most true opinions we ought to follow the most probable.” In the small hours of the morning, one might imagine US executives look within to find the truest answer to how to proceed given all that they have been informed of respectively. 

What greatcharlie has discovered in its own research and the voluminous scholarly sources that support the view that danger lies ahead is that from the aggregate of respective discussions in recent books and other publications in this vein, this idea can be confidently drawn by business executives in question, too! More so, executives sophisticated enough to create a successful space for their companies in China have sufficient information available to them even beyond what outside experts offer, to include reports from the US government, that would allow them to grasp the potential impact of decisions they might make. Undoubtedly, capable and diligent regional specialists in their own companies have collected and presented similar information on the dangers of remaining in China. Everything asserted about the threat Beijing poses to US companies can be substantiated by a history of necessary commiserations between company senior executives and decision-makers of the Communist Party of China.

Yet, while it is most apparent that China’s recent past clearly is not without stain, that fact appears to be by the by to those senior executives of US companies working robustly in China who choose to remain. They will not allow their minds to be biased by theories and suspicions suggested by those who do not have the type of investment at stake in China as their respective companies. They are unwilling to condescend to what they would call fear mongering about the Communist Party of China. China appears to have won many of them and those in that number will hear nothing against it. In this discussion, greatcharlie leaves aside any suggestion that the continued investment by US companies in China is the result of some urge among their senior executives to act in a knowingly dangerous way, l’appel du vide. What those business executives may believe is that in their own assessments of Beijing, they have the advantage of being well informed through what they might characterize as their own most informative, “regular” contacts and “substantive” conversations with officials of Chinese government bureaucracies and leaders of the Communist Party of China. They may believe their relationships with them are strong, bien entretenue. Many appear willing and some comforted by refusing to look beyond what Beijing presents about itself. In that respect, some have become metaphorically tone deaf to warnings concerning all urgent matters now underway. It was expressed by Aristophanes in Clouds (423 BC): “To invoke solely the weaker arguments and yet triumph is a talent worth more than a hundred thousand drachmae.”

As for Beijing’s guile and maneuvering, some of the senior executives even at this point would doubtlessly declare that the evidence that has publicly presented on its malign actions and intentions as something akin to an albeit a peculiar rag bag of singular happenings. Ironically, they might sarcastically note that some new wrinkle of China’s malevolence comes to light practically “every ten seconds” as the 20th century US humorist Sam Levenson might remark to defuse the tension caused by the subject.

In A Mountain of Crumbs: A Memoir (Simon & Schuster, 2010), Elena Gorokhova recounts growing up under the Communist government of the Soviet Union in the 1960s, and tells of her discovery of the hidden truths about adulthood and her country’s profound, brazen lies. Gorokhova recounts: “The rules are simple: they lie to us, we know they’re lying, they know we know they’re lying but they keep lying anyway, and we keep pretending to believe them.” The regime in Communist China operates in a similar deceitful fashion both at home and abroad. There are doubtlessly many more aspects of Beijing’s thinking and behavior that have not as yet been discerned or at least publicly reported. They may become known only after a situation literally blows up. One might state that within the Communist Party of China, the powers of evil are exalted, anything negative is possible. 

The latest word from the US Intelligence Community is that the US supply chain from China now faces real threat. There are a few normal factors that can affect US supply chains, including production shortages, trade disruptions and natural disasters. However, the US National Counterintelligence and Security Center (NCSC) has warned that “actions by foreign adversaries to exploit vulnerabilities in US supply chains pose unique counterintelligence and security threats.” According to the NCSC, foreign adversaries are increasingly using companies and trusted suppliers as “attack vectors” against the US for espionage, information theft and sabotage. Officials warned that those actions compromise the products and services that “underpin America’s government and industry” and warned of the effects–“lost intellectual property, jobs, economic advantage, and reduced military strength.”

What is shared by the US government on Beijing’s plans and intention toward companies foreign working in China should be fully heeded by US companies. Beijing would of course become indignant claiming Western arrogance would lead accusers to say an idea was stolen. Perhaps Chinese government spokespersons would rely upon words similar to those of Sir Arthur Conan Doyle’s fictional character Sherlock Holmes, who in “The Adventure of the Dancing Men,” the third story of 13 in the The Return of Sherlock Holmes (1905), stated: “What one man can invent, another can discover.” 

Simple facts can go some way to explain what might be recognized as a charitable position. To that extent, distortions of truth from Beijing or other trusted or favored sources are far more satisfying as a result of an infatuation with a present preoccupation. In arguments, the business executives will mistakenly grab the nearest evidence to hand that would uniquely support their perspective. What they might characterize as the “stirring of alarm” would likely be inexplicable to those who have not abandoned the idea that China acts in goodwill. They would likely assert that China’s sense of a rivalry between itself and the US is natural given geopolitical, geostrategic, economic considerations alone. Indeed, among those reluctant to accept what present evidence insists upon, one might find that almost every decision to carry on with their current business plans in China is likely founded upon a mix of reality and imagination.

As reported in the Wall Street Journal on March 26, 2021, in the weeks that surrounded the inauguration of President Joe Biden and Vice President Kamala Harris, Chinese leaders waged an information campaign aimed at the US business community. It included a flurry of speeches, letters and announcements. Of special note was a February 2021 speech by the Communist Party of China’s  foreign policy director, Yang, to a virtual audience of US business leaders and former government officials. Initially laying out a very positive situation for investment and trade opportunities in China, he then offered the stern warning that Tibet, Xinjiang, Hong Kong and Taiwan are “red lines” that anyone from the US should remain silent about. He also made the demand that the business community lobby the new Biden-Harris administration to reverse Trump administration policies toward China which he excoriated. 

Without the intent of being folsom, greatcharlie states that there are highly qualified individuals that serve as senior executives at companies. In their respective fields, these professionals are generally known and admired for their astute judgments, being steady and reliable, and having keen minds and the laudable capacity to reason. Finding answers to such situations were what the executives were hired for. Being incommoded by the regulations of China’s bureaucracies would by no means be new to them and they would expect to find a way to work around any problems. Their thoughts would remain focused on optimizing their respective companies’ investments in China. That would be the vintage way of thinking, so to speak.

One might go as far as to suppose that some US business executives may feel that if accomplishing that meant being under some recherché obligation to Beijing, they would accept that. They doubtlessly would expect to gain additional favor from the Communist Party of China through such loyalty. As a bonus of taking such a step, they might believe they would be taking the steps that would allow them to avoid a serious dilemma in the near future. (Such would hardly be a schema Beijing would feel obligated to follow, and indeed, something one should not plan for.) One might expect to occasionally hear expressions of appreciation from US companies to the most senior leaders of the Communist Party of China and the Chinese people for their “magnanimity.” In fact, they have been heard. Those companies could do no greater service for Beijing than to take such a course. Those in the US outraged by China’s overall behavior toward the US and its allies would very likely call it a perverse allegiance.

Perhaps conditions for some companies were never idyllic to start, and any new circumstances that arise are just one more hurdle to overcome. One might suppose that for senior executives of US companies in China, navigating any problems that have arisen so far has been a bit similar to white water rafting. It is a challenge, but in the end overall satisfying. To speak more in metaphors, senior executives of most US companies still operating in China likely feel that they successfully managed the disturbed sea of those relations by monitoring essential currents and will achieve further success by navigating them intelligently. Indeed, in many cases having spent years inveigling their way into many meetings with Communist Party of China leaders and government officials they likely feel that have created links with them near equal to those that exist between those same Party leaders and officials that the executives of China’s state-run companies. They are likely confident that as a result of those linkages, their companies’ investments In China are to the greatest extent possible shielded from any possible troubles in relations between Beijing and Washington. In corporate conference rooms and meetings with Communist Party of China or other government officials, any dark imaginings of Beijing’s behavior evaporate fastest. Conceivably, ideas and attitudes expressed In those same conference rooms of US companies are very likely encapsulated with the quip: “I will believe it when I see it.” There may very well be companies planning to simply carry on even under the worst circumstances should it come to that. 

Yet, many have doubtlessly assessed that contrary to the reports of experts, they have so far had no reason to regret, nor do they believe they shall have any reason to regret their speculation in China. Until they are caused to accept anything to the contrary, one could imagine certain senior executives of US companies would happily seek to remain in their offices in China. The claim that Beijing could turn against them in some profound way may simply be a counterfactual. Perchance senior executives still engaged in robust operations in China believe Beijing’s intentions are the best and would refer to all of the negative talk of Beijing’s intentions as slander. Presumably, senior executives of US companies, having minimized in their own minds the danger that China presents, might suggest to other senior executives whose companies are similarly invested in China, that no one should get ahead of oneself in reaction to what they may have heard or observed of those companies that have moved out. Perhaps the retention of that mindset, a certain stubbornness among some, may be a prime obstacle in convincing them to open their eyes. Assuming that all have the best intentions at heart, one might believe that differences in thinking among senior executives of US companies are mostly a matter of clarification 

There are situations in which even the most accomplished business executives might find themselves helpless. No US firm should count upon the goodwill of Beijing to help see them through the storm of greatly deteriorated relations, or the catastrophe of a clash, between the US and China. Beijing time and again has proven that it is unworthy of such trust. Most US companies operating in China or have an extremely close relationship with Party leaders and government officials, they should not expect that they would be able to just carry-on as they have been no matter what. By the mere fact that they are Western companies representing Western capitalism, there would be a fairly good chance that they would fall afoul of the Communist regime in Beijing. That has been a reality all along.

To be as frank as possible, the Communist Party of China has no love for them. Without a shadow of doubt, many Party leaders yearn to reach that day in the future when China can show its true colors, declare broad powers over all foreign companies and severely alter terms of any signed agreements to immensely favor its own interests, if a firm is allowed to remain in China at all. Surely they believe there would be more than one parallel Chinese firm of its respective industry to replace just about every foreign entity, except those as the National Basketball Association (NBA), and could take on their markets even in the US.

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi (above). In the weeks that surrounded the inauguration of US President Joe Biden and Vice President Kamala Harris, Chinese leaders waged an information campaign aimed at the US business community. It included a flurry of speeches, letters and announcements. Of special note was a February 2021 speech by the Communist Party of China’s foreign policy director, Yang, to a virtual audience of US business leaders and former government officials. Initially laying out a very positive situation for investment and trade opportunities in China, he then offered the stern warning that Tibet, Xinjiang, Hong Kong and Taiwan are “red lines” that anyone from the US should remain silent about. He also made the demand that the business community lobby the new Biden-Harris administration to reverse Trump administration policies toward China which he excoriated.

Recent Displays of Beijing’s Tactfulness toward Foreign Companies

The renowned English philosopher and physician, John Locke, in An Essay Concerning Human Understanding (1689), wrote: “I have always thought the actions of men the best interpreters of their thoughts.” There have been a few  fresh events in China concerning foreign companies operating there over the grave issue of members of China’s Uyghur ethnic minority from the Xinjiang Uyghur Autonomous Region (XUAR) in China’s far west, being used as forced labor in factories. They may provide some clues as to the sort of subterfuge and sophistry senior executives of US companies still operating in China should expect, and perhaps things even more intense. (In citing news articles concerning these events, greatcharlie felt some reluctance given a few US companies are directly mentioned in them and that information is central to understanding the events that occurred. However, to the extent that these incidents were well-supported in the news media, the sense that anything fresh about the firms was being revealed was mitigated.)

In an extensive new report by the Australian Strategic Policy Institute (ASPI), a think-tank founded by Australia’s government, between 2017 and 2019, the Chinese government relocated at least 80,000 Uyghurs from Xinjiang in western China to factories across the country where they work “under conditions that strongly suggest forced labour.” The report further explains that the manufacturers using these transported Uyghurs supply at least 83 international companies making everything from footwear to electronics. Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.” 

Beijing has denied all of these claims, declaring them to be unjust aspersions. It has stated that rather than running forced labor camps, it is providing vocational training, and that its measures are needed to fight extremism. Recall that Xinjiang was an issue broached by Blinken at the bilateral talks in Anchorage. In January, Washington had banned Xinjiang cotton used widely by clothing producers for Western markets. The US, the European Union, United Kingdom, and Canada have imposed sanctions on Chinese officials for alleged human rights abuses in Xinjiang in March 2020. . China retaliated with sanctions on European lawmakers and institutions.

According to a March 27, 2021 Bloomberg report, Hennes & Mauritz AB (H&M), the Swedish multinational, expressed the view in March 2021 statements that it’s “deeply concerned by reports from civil society organizations and media that include accusations of forced labor and discrimination of ethnoreligious minorities.” It was a risky move for H&M given that China is one of the five biggest markets for the company in terms of revenue with 5.2% of the group’s total sales in 2020. The company had opened 505 stores in China as of November 30, 2020. The company’s access to China, the Communist Party of China, and to customers was put on the line. Almost immediately, H&M encountered what was characterized as backlash over its statements from the company concerning issues surrounding Xinjiang. The company quickly removed its statement on Xinjiang from its website, on a separate link on its homepage expressing the same stance on Xinjiang cotton remained active.

Authors of the news story notably recognized that China’s response to H&M was markedly stronger than its previous pushback when foreign brands crossed political lines. Xi had already set a red line on the issue of China’s human rights record, and foreign companies surely understood at that point that addressing the issue in any way would mean picking a side. In a briefing in Beijing, Gao Feng, a spokesman for the Chinese Commerce Ministry, essentially proscribed H&M’s statements as slanderous ravings. He reportedly said: “We can’t tolerate any forces bringing shame on and tarnishing the pure and flawless Xinjiang cotton.” He went on to state: “Chinese consumers have acted in response to the so-called business decisions made by some companies based on false information. We hope the relevant companies will respect market laws, correct wrong practices, and avoid the politicization of commercial issues.”

As would be expected, H&M’s statement was blasted by organizations such as the Communist Youth League and the People’s Liberation Army (PLA) on social media. However, there was also rising outcry and calls for a boycott on Chinese social media against an undated H&M statement over its website that also expressed concern about reports of forced labor in Xinjiang. At least six stores in the lower-tiered cities of Urumqi, Yinchuan, Changchun and Lianyunang have been shut down by the owners of the properties, according to mall operators in those areas who were contacted by Bloomberg. Local media have reported more closures and pictures showing H&M’s brand billboards being removedThe global clothing retailer’s outlets have also vanished on Apple Maps and Baidu Maps searches.

Adverse effects from the H&M’s statement about forced labor in the contentious region of Xinjiang have spread to other Western brands that have voiced their views on the matter. DW News noted that the Better Cotton Initiative (BCI) declared in October 2020 that it was suspending cotton sourced from Xinjiang for the 2020-2021 fashion season, also citing concerns over that region’s human rights. BCI, formed in 2009 and based in Geneva, Switzerland  states that it was formed to make global cotton production better for the people who produce it, better for the environment it grows in and better for the sector’s future. Its goal is to transform cotton production worldwide by developing Better Cotton as a sustainable mainstream commodity. Members include US-based Nike, Germany-based Adidas, Japan-based Fast Retailing, as well as China-based ANTA. Certainly, BCI members would not comment idly on such a grave matter or any matter for that case.

As foreign companies speak out concerning Xinjiang and forced labor, they are being targeted for treatment. China’s government-aligned English language newspaper the Global Times cited Burberry and New Balance as having made “cutting remarks” about Xinjiang cotton two years ago. It also cited the brand Zara as having expressed a “zero-tolerance approach towards forced labor.” ANTA, a Chinese shoe brand announced it was quitting BCI and would continue buying Xinjiang cotton–prompting a spike in its share prices on Hong Kong’s Han Seng Index.

Chinese social media users expressed umbrage against Western sanctions over alleged abuses of Uyghur Muslims in Xinjiang province by ostracizing further global clothing and footwear brands. DW News quoted one “netizen” as stating: “If you boycott Xinjiang cotton, we’ll boycott you. Either Adidas quits BCI, or get out of China.” Social media posts in China have reportedly also mentioned the Japanese and US brands Uniqlo and Gap but it was unclear whether the people posting messages were private citizens or government plants online. Two popular Chinese television stars, Wang Yibo and Tan Songyun, reportedly said they would end promotional work for Nike over remarks it made in 2020. China’s People’s Daily newspaper began a social media campaign via the microblog Weibo, using a slogan translating as “I support Xinjiang cotton. Citing Reuters, DW News explained many Chinese online users said they would instead support local Asian brands such as Li Ning and ANTA, prompting share price surges in Hong Kong. The US government has called attention to China’s state-run social media campaign and boycott against foreign companies that refuse to use cotton from Xinjiang. State Department deputy spokeswoman Jalina Porter stated that tactic amounts to a state-run “corporate and consumer boycott.”

Taking a closer look at what has been directed at Nike, according Reuters it faces rather a singular social media storm in China over its statement concerning Xinjiang Indeed, anger with Nike reportedly erupted on Chinese social media late immediately after China’s netizens spotted a statement from the sporting goods giant saying it was “concerned” about reports of forced labour in Xinjiang and that it does not use cotton from the region. There is a well-known love affair among the Chinese people and basketball shoes worn by NBA players. It was no small matter. 

Topics around the Nike statement were among the highest trending on China’s Twitter-like social media Weibo the day it was revealed and the social media backlash had a wider fallout. It was in direct response to Nike’s statement concerning Xinjiang and social media criticism on social media, that the agency representing actor Wang Yibo stated on Weibo that he has terminated his contract as a representative for Nike. It was not apparent when exactly Nike had put out the statement. It did not have a date on it. Nike explained in the statement: “We are concerned about reports of forced labor in, and connected to, the Xinjiang Uyghur Autonomous Region (XUAR).” It also stated: “Nike does not source products from the XUAR and we have confirmed with our contract suppliers that they are not using textiles or spun yarn from the region.” To prevent further interference, Hu Xijin, editor-in-chief of the state-run Global Times urged Western companies to be “highly cautious” and not to “suppress China’s Xinjiang” in a social media post. To do so, Hu anticipated, would “undoubtedly arouse the anger of the Chinese public,” he added. He did not single out any companies.

Jean-Jacques Rousseau, the 18th century philosopher, writer, and co)mposer of the then independent Calvinist city-state of Geneva, explained in The Social Contract (1762): “Virtue is a state of war, and to live in it we have always to combat with ourselves.” Naturally, foreign companies operating in China will attempt ameliorate and perhaps resolve Xinjiang controversy or any other with Beijing, senior executives of those companies be assured that the Communist Party of China’s memory of even temporary disrespectful acts and what its leaders may perceive as betrayal through declarations of concerns on what are in reality documented human rights abuses, substantiated by Western government sources, will be long.

A heavily secured industrial park in Xinjiang, China (above). In a report by the Australian Strategic Policy Institute, between 2017 and 2019, the Chinese government relocated at least 80,000 Uyghurs from Xinjiang in western China to factories across the country where they work “under conditions that strongly suggest forced labour.” The report also explains that manufacturers using these transported Uyghurs supply at least 83 international companies making everything from footwear to electronics. The Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps. Beijing has denied such claims.

Experience Speaks?

Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.) As aforementioned, with consideration of a full range of facts on the current situation between the US-China, to include many discussed here, as well as other key business considerations, some US companies have accepted that the risks are too great to remain and rather than wait for a crisis to arise. To the senior executives of those companies, China’s true, malevolent nature appears to be self-evident. Aware of those practices first-hand, they watch likely in horror as other US companies confidently stroll into the Chinese tangles from which they avoided or feel they escaped. Hope undoubtedly remains even among those companies that have already left that Xi and the Communist Party of China are not intending anything tragic. Any positive prospects for their future reinvestment in China surely rest upon what comes next with Xi and the Biden-Harris administration.

Those with a turn of mind to commit themselves to a defense of China’s behavior as a “competitor” of the US, and commit to even greater investment there, may eventually find themselves obliged to be a bit more obedient to Beijing’s wishes if events cause the authoritarian Chinese government to make its true self clear to them. If that day comes, the sense of the scale of its malignant being and purpose will likely be overwhelming. Those dead-enders, though they would hardly see themselves as such, will discover just how masterful Beijing has been at deception, offering satisfying explanations and signing agreements that really had no meaning. 

Some senior executives whose companies remain in China may already fear doing anything to subvert Beijing and incurring its wrath upon their respective interests. Others will perhaps be paralyzed to act in a crisis having been sufficiently instilled with fearfulness over a perception that the Chinese government will become noisy and rough. Even then, reaching a low point but not yet bottom, it would not be too late to accept the loss, as wise business executives sometimes must do, and move out.

Fallaces sunt rerum species. (The appearances of things are deceptive.) The security of US companies, all foreign companies, working in China, is a subject greatcharlie previously broached on the individual employees of those companies might face. Certainly, security offices of any US companies whose executives and staff frequently visit China should have long since arranged opportunities to brief those employees on problems they could possibly face in China. Such briefings might include the discussion of ways to subtly execute defensive measures to defeat Ministry of Public Security (MPS), Ministry of State Security (MSS), PLA Joint Staff Department human intelligence groups, and any Communist Party of China intelligence organs (e.g., the Chinese People’s Political Consultative Conference, the super secret and malignant International (Liaison) Department, the United Front Work Department, and the Propaganda Department) from capturing information that meets their organizations’ immediate intelligence requirements as well as whatever information that managers of those spy organizations may deem useful otherwise.

What was presented in the discussion of the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago” on security precautions employees of foreign companies must take in China seems worthy of review as background. The discussion is preclosed here. Only the more apposite points are presented.

As discussed, the foreign visitor is always a potential target for province and municipal offices of MPS and MSS. The capability of Chinese authorities to use technological means to keep a close eye on foreigners and detect, apprehend, and deal with those who protest and oppose the government has been enhanced immensely. Two sensational articles in the New York Times, “A Surveillance Net Blankets China’s Cities, Giving Police Vast Powers” dated December 17, 2019, and “Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras,” dated July 8, 2018, well lay out the increased use of technology in MPS and MSS surveillance efforts. Reportedly, as part of Xi’s effort to have the security services take on a greater role in China, he has launched a major upgrade of their surveillance capabilities. China, as a result, has become the world’s largest market for security and surveillance technology. It is reported that almost 300 million cameras have been installed in the country. Government contracts are supporting research and development into technologies that track faces, clothing and even a person’s gait. MPS officers on the beat have been observed using experimental gadgets such as facial-recognition glasses. In Zhengzhou, police and security services can use software to create lists of people. They can create virtual alerts when a targeted  individual approaches a specific location. They can acquire updates on people every hour or every day, and monitor anyone with whom those people have met, particularly if there exists a report that one or both individuals have committed an infraction.  Yet, while the new technology may ostensibly provide police and security services with a way to track criminals, it also improves their means to crack down on sympathizers of the protest movement in Hong Kong, critics of the Communist Party of China, and critics of the police and security services, themselves. Worse, it better enables the police and security services to target migrant workers who travel from the countryside to fill China’s factories and ethnic minority groups as the Uyghurs.

On the street, the surveillance of foreigners will typically be relatively light, calibrated to ensure utilization of an optimal number of officers and informants in the role of surveillance operatives in the field. Doing so also facilitates the monitoring process. The more surveillance one uses the more reports that must be reviewed to find one aggregate picture of what occurred. MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. From the reports of informants and technical surveillance, assessments of what type of temptations could be used, if necessary, to bring them to China’s side based on observations of the foreigner’s lifestyle. 

In its December 13th post, greatcharlie additionally cites Articles 9, 11, 12, and 13 of the National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress to explain that for citizens of the People’s Republic of China, the motivations of money ideology, conspiracy, and excitement do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of an intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, and the homeland. Supposedly, revolutionary zeal drives the heart of China as “one beating heart.”

Since that writing, the NCSC provided, on Twitter, three articles from China’s National Intelligence Law of 2017, Cybersecurity Law of 2016, and, National Security Law of 2015. NCSC explained its aim in doing so was to help those entering an agreement with a company based in China better understand the legal landscape and that Chinese companies will provide data they obtain or information stored on their networks to China’s state security apparatus upon request. More directly, the NCSC wants US citizens to better understand by its message that Chinese companies and citizens are required to assist in intelligence efforts against them by law. Under Article 7 of the PRC’s National Intelligence Law (2017), NCSC cites: “All organizations and citizens SHALL support, assist, and cooperate with national intelligence efforts in accordance with the law, and shall protect national work secrets they are aware of.” Under Article 28 of the PRC’s Cybersecurity Law (2016), it cites, “Network operators SHALL provide technical support and assistance to public security and national security organs that are safeguarding and investigating criminal activities in accordance with the law.” Under Article 77 of the PRC’s National Security Law (2015), it cites, “Citizens and organizations SHALL provide the following obligations for safeguarding national security,” and then cites section specifically (5), which instructs: “Provide national security authorities, public security authorities, and military authorities with needed support and assistance.”

The foreign businessman, scientist, engineer, academic or any other type of professional  working closely with a Chinese counterpart in China may not be aware that he or she is being monitored by that same friendly colleague. It should be expected. When told, it may be so emotionally shocking to outsiders  that it may very well be near impossible to believe. Perhaps refusing to accept that reality is the only way a foreigner can continue to function comfortably in China. In any event, it is the responsibility of the Chinese citizen to engage in such activity under the National Security law. To that extent, friendship with Chinese colleagues may never be authentic as there is an element to the interaction between the foreigner and the Chinese citizen that is cloaked. China comes first. The foreigner is inconsequential to that reality. Ordinary people doing a little this and a little that for the MPS as well as the MSS is a norm.

Although it has not as yet become a commonplace problem, if a foreigner visiting China for the purpose of business or tourism, accepts  documents, notebooks, and books, the traveler might discover quite surprisingly that he or she is carrying items that contain sensitive data the possession of which could be considered criminal. Those illicit materials would have been presented to the traveler intentionally, perhaps even by a Chinese citizen with whom the traveler may have a positive personal relationship, almost certainly at the behest of MPS or MSS. It was said somewhere that it is terrible to find an enemy in a friend, but it is much worse not to find a friend in a friend. (Given the uncertainty of what may result from contact with Chinese intelligence and counterintelligence units, ordinary Chinese citizens typically will not seek out contact with them nor independently engage in activity with foreigners outside of the workplace on matters related to their work. They will focus on true personal relationships on personal matters, human interests.)

One must also be very cautious about accepting recording devices or recorded materials, or any devices, thumb drives, dvds, or materials that may include video or audio recordings unless one can be absolutely certain as to their contents. Documents contained in any of these media may prove to be government documents concerning confidential matters, and not any run-of-the-mill confidential matters at that. One must immediately open the documents and read them before those who presented them using a laptop or tablet. The review of the recordings posthaste could be passed off as an affected display of ebullience and appreciation of the gift and wonderment about what it holds. 

As things stand, from year to year, the situation has not gotten better in terms of stability and safety. If troubles between the US and China ever begin to arise with regularity, such as detainments of employees of US companies, one might expect some form of ransom will be discreetly demanded by Chinese officials with a warning not to acknowledge their villainy to the world. More than just an aggressive act, it would be an expression of Beijing’s power over those companies, designed to work in the psyche of the US business executives. If a US companies is resolute about remaining in China, it would to be willing to accept that the situation could change rapidly for the worse, new ground rules could be put in for operating in a flash, and it would know without doubt who is really in charge. They would need to accept that ties back to the US would have little meaning to Beijing. The Communist Party of China would surely delight in exercising such power over Western “capitalist” guests. The door opening in that direction of what is outlined here can already be heard creaking.

President Xi in his People’s Liberation Army uniform on parade (above). It would be more than likely that if a military conflict between the US and China arose on the greater world stage, Beijing would lash out at available US targets right at home such as US companies and their employees. Indeed, when leaders of Communist Party of China are exhausted of tricks and manipulations, they often turn to the cane. If US companies were to face such a situation, the matter would need to be put right by senior executives of those companies at the crisis point, if at all possible.

Prospective Problems Ahead

ata volentem ducunt, nolentem trahunt. (Fate leads the willing, and drags the unwilling.) As US companies, by their own devices, continue to entangle themselves in meshes with Beijing, they may be grooming themselves to become subject to its machinations. An impregnable collection of evidence already indicates that Beijing’s desire to control Western business communities attitudes and behavior toward nearly anything Chinese. Perhaps one day US companies will awaken to the true character of the Communist Party of China and the Chinese government after it is too late. Once any extraordinary conduct is exhibited by Beijing toward one or more US companies  it would be almost impossible for the US government to chuck itself in the mix in a calibrated way that mitigates such steps as opposed to exacerbating the situation.

As it was explained in the 14th century by the English lawyer, author, and statesman, Saint Thomas More, “What is deferred is not avoided.” Caught in such a conundrum, it would be best if US companies had already laid plans to respond to such a contingency well in advance of it. It would be the only way to have a fighting chance of getting some handle on it. Complete consideration of Beijing’s immoral side must be part of that assessment. Exactly how business executives might intend to put the matter right on their side under such circumstances is unknown. In spite of contingency planning, it is hard to see from greatcharlie’s vantage point what cards US business executives could realistically play to sway Beijing in such a crisis. They would be in a weak position to negotiate relief from Beijing. Perhaps it was in the process of planning for such a contingency, that senior executives of such companies along with their security offices recognized that it was time to leave.

Conceivably, the senior executives of some US companies in China might hold the idea that they might serve as “go-betweens,” neutral emissaries, who, while loyal to their US homeland, are also loyal and responsive to their Chinese hosts, and assist in finding some settlement between the US and China during a conflict. The idea would unlikely interest Beijing in wartime. Despite any notions senior executives might have of their ties to China and relationship with leaders of the Communist Party of China, during a war, they would most certainly be tagged as enemy aliens, perhaps dangerous enemy aliens, and handled with due care by MPS and Party security organs. In an atrocious yet very possible scenario, they may be tasked to perform high profile duties against their will for the Party’s Propaganda Department. United Work Department and International Department operatives might force them without compunction to any point resembling a front line of the conflict to demonstrate the senior executives recognition that China was on the correct side of the struggle and any of its actions against the US were righteous. Chinese security services might force them to visit foreign capitals, accompanied of course, to give speeches on how the US allegedly may have wrongfully threatened China’s interest and caused the conflict. One could imagine a hundred possibilities and none of them would be good for the senior executives. At about that point, the business executives will have the truest and fullest understanding of the Communist Party of China.

Interestingly enough, any decision by Beijing  to take steps against one or more US companies would undoubtedly be a measure decided upon in its own contingency planning in the event of a sudden ratcheting up of contentious relations with Washington. To that extent, what might happen to US companies stranded in China in such circumstances would assuredly be a fixed fate. Leaders of the Communist Party of China, under such circumstances, would hardly be inveigled by the platitudes of foreign business executives to be more lenient toward their companies. Any Party leaders would feel both angered and shamed if that perception was created about them within the Party’s membership. It is imaginable that such a bargaining effort would be responded to violently.

Essentially, any breakdown in relations between the US and China, or worse, a military conflict, would have an unfortunate effect upon the position of US companies operating there. More than likely, it would cause Beijing to lash out at available US targets right at home such as those US companies and their employees. Indeed, when the brains of the leadership of Communist Party of China are exhausted of tricks and manipulations, they have often turned to the cane. If US companies were to face such a situation, the matter would need to be put right by senior executives of those companies at the crisis point, if at all possible.

The Way Forward

Aligning the suppositions offered here on thinking over remaining in China with specific senior executives of US companies operating in China undoubtedly would not be too difficult for numerous investigative journalists if they preferred to do so. Yet, as mentioned on the outset of this post, their identities are immaterial with regard to the objective here which was to provide a picture of the challenging circumstances that those business executives face particularly from China’s public security and intelligence services, shed light upon what they are likely discussing among their counsels, and present insights on the decisions they have reached given the paths they have taken.

If credit might be given to their line of thinking of those US business executives resolute about remaining in China, it might be provided by F. Scott Fitzgerald in a February 1936 Esquire magazine essay entitled, “The Crack-Up.” Fitzgerald explains: “the test of a first-rate intelligence is the ability to hold two opposed ideas in the mind at the same time, and still retain the ability to function. One should, for example, be able to see that things are hopeless and yet be determined to make them otherwise. This philosophy fitted on to my early adult life, when I saw the improbable, the implausible, often the “impossible” come true.” However, it cannot be denied that those executives are placing their respective companies’ interests in a vulnerable position by remaining on the ground in China. Some might call that a calculated risk. 

Worrisome is the possibility that some may be unable to fully grasp the effect of their own actions. If placed in a trying position by external events as a collapse in US-China relations or a military conflict between the two, it is hard to imagine how US business executives would preserve their respective companies’ operations in China or more generally, how they would actually act. They may very well be placing themselves in what could become a serious dilemma. Concerning those executives laser focused on the bottomline–some might say they should be, they might do better to employ their minds on the matter of the well-being of their employees and equities in China before there is some tumultuous event. Perhaps some would say greatcharlie is over-egging the pudding here. However, greatcharlie hopes only to be of some material assistance.

The world exists in an ordered universe and one expects everything to follow that design. There are patterns one can discern that establish order in the human mind. Illusion must never be chosen over fact. Any senior executive of a US firm operating in China should have already been sufficiently aware of how Beijing is acting. Sentiment is a poor substitute for true feeling and fact. Ignorance more often than not dissolves into tragedy. While they are in a position to reexamine the facts, they should do so while there is still time available. Qui ipse si sapiens prodesse non quit, nequiquam sapit. (A wise man whose wisdom does not serve him is wise in vain.)

Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago

A most apparent sign of the presence of Chinese intelligence services in Hong Kong is this plaque outside the People’s Republic of China National Security Office there (above). This essay is as a companion piece to greatcharlie’s proceeding essays on Chinese intelligence services. For the scholar who is a regular reader of greatcharlie, the essay will hopefully be an interesting discussion on the function of intelligence services in China with respect to functions of services in the United Kingdom and the US. However, this essay has the additional purpose of serving as a vehicle to assist students. For students, this essay aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels and the development of further insights. Hopefully, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights.

For a one man shop as greatcharlie, reviewing a voluminous quantity of sources in the preparation of the July 31, 2020 and August 31, 2020 posts entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 1 and 2 respectively), was, to a degree, an exercise in large data processing. Yet, while engaging in that consuming, yet satisfying process, the thoughts of greatcharlie’s founder and editor hearken back to an assignment received as an undergraduate at Columbia College, Columbia University in a course “The Politics of Policymaking.” The course instructor, Roger Hilsman (1919-2014), who was also the student advisor and mentor of greatcharlie’s editor, asked students to construct an essay or, as he dubbed it, a “thinkpiece,” in which they were required to present their “observations, meditations, ruminations, assumptions, and hypotheses” that billowed up after reading a primary or secondary source directly related to a foreign and national security policy topic covered in his class. (The source greatcharlie’s editor used, at the suggestion of Hilsman, was Glenn Paige’s The Korea Decision (June 24-30, 1950) (Macmillan, 1968).) However, Hilsman’s goal with the assignment was to encourage students to move away from simply regurgitating what was studied and writing the derivative college essay. Instead, he wanted students to evoke thoughts from their respective sources and lessons but also from personal experience, and their albeit youthful worldview, and draw from them their best insights on the topics they chose. For Hilsman, a phenomenal educator, the assignment was not founded upon some understanding of the requirements of analytical work in international affairs developed in the abstract, but rather, developed upon substantial experience preparing his own analyses and supervising and mentoring subordinates and colleagues in their analytical work in the US military, intelligence, and diplomatic arenas; real world! More specifically, Hilsman’s background included: studying at US Military Academy; service in Merrill’s Marauders and command of an Office of Strategic Services guerilla warfare battalion in Burma in World War II (Hilsman’s valorous service is superbly related in his memoir, American Guerilla: My War Behind Japanese Lines (Brassey’s, 1990)); his work as a military planner for NATO and the Supreme Headquarters Allied Powers Europe; service in the administration of US President John Kennedy as Director of the Bureau of Intelligence and Research for the US Department of State; and, service as Assistant Secretary of State for Far Eastern Affairs in the administration of US President Lyndon Johnson.

Hilsman would not only transmit his sagacity through his “The Politics of Policymaking” course, but through discussions on policymaking and analysis that he had with students during seminars held at his residence were marked not only by the inspiration and encouragement he would give to students in their research and career plans, but also by a frankness and realism that would give them a leg up in future endeavors. The reminiscences Hilsman would share directly with greatcharlie’s founder and editor during office hours were from those periods of his life that are perhaps the most intriguing in his biography. During lectures, he would always provide a riveting anecdote from his experiences during the 1962 Cuban Missile Crisis to accompany his “pearls of wisdom.” The student-teacher relationship between Hilsman and greatcharlie’s founder and editor was mentioned in a March 8, 2016 greatcharlie post entitled, “An Look at Stephen Marrin’s ‘Improving Intelligence Studies as an Academic Discipline’ and Remembering a Professor and Friend, Roger Hilsman.”

For student readers, this essay, divided into three segments, aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels, and to stimulate the development of further insights. Hopefully, by focusing on the topics discussed, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights. The essay also aims to foster conscious critical reading of scholarly works by student readers. Some emphasis is placed on the sources themselves. Hopefully, reading about spies and spying makes this unsolicited bit of mentoring all the more interesting. For scholars who are regular readers of greatcharlie, the aim of the essay is to provide an edifying discussion on the function of intelligence in China relative to intelligence functions in the United Kingdom and the US. This essay also stands as a companion piece to greatcharlie’s preceding essays on Chinese intelligence services. While as a thinkpiece this essay may be limited in scope, greatcharlie surely has not touched bottom of its well of ideas on the subject of Chinese intelligence services. For greatcharlie, this “multipurpose” essay is only a part of its process of worming out the story of Chinese foreign intelligence and counterintelligence. Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.)

MPS officer finger-wags a warning to photographer in Beijing (above). Except for experienced hands on China policy and the Chinese intelligence services and national security via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, is responsible for foreign intelligence, counterintelligence, and internal security as well.

I. MPS and MSS: Keystones of Chinese Intelligence

Two relatively quiet but absolutely key elements of the Chinese government that impact its foreign and national security policies: the Ministry of Public Security (MPS) and the Ministry of State Security (MSS). Except for experienced hands on Chinese foreign and national security policy and Chinese intelligence services via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems firstly through providing consumers in Beijing of analyzed information to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, government ministers, senior executives of relevant ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions. They additionally share what is collected and analyzed with the People’s Liberation Army (PLA). At times, that information is also collected and analyzed with the help of the military. The impact of the MPS and MSS is also demonstrated through contacts their officers and operatives respectively have daily with officials and staff of foreign governments as well as personnel at all levels of Chinese and foreign businesses engaged in international trade, high-tech-firms, defense contractors, financial institutions, academia, and organizations from all fields in China and worldwide.

The true foundations for MPS and MSS were laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Mao Zedong thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces in 1949, a full array of government intelligence organizations were created to supplement Party-based intelligence services such as SAD. CDSA would draw information from foreign news agencies and open sources.

The Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a Deputy Chief of Staff to People’s Liberation Army (PLA) Chief of Staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. According to Xuezhi Guo in China’s Security State: Philosophy, Evolution, and Politics (Cambridge University Press, 2012), it took on the role of a security service in a manner based on Soviet and Eastern Bloc models. It eventually received responsibility for all aspects of security, from regular police work to intelligence, counterintelligence, and the suppression of anti-Communist political and social groups. That led to receiving  official jurisdiction over counter subversion, counterintelligence, and the conduct of espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. 

MPS made its way through the turbulent 1960s with the Cultural Revolution and dynamic changes in politics in the 1970s with the loss of Mao and the coming of Chairman Deng Xiaoping. By 1983, there was considerable frustration within the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to a new organization known as the Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS. The Communist Party of China’s first big mission for MSS was to place focus on students in both China and abroad. Students had left no doubt that there was reason for the Chinese leaders to hold such concern after the Tiananmen Square protests. Chinese leaders struggled to deal with fallout from it. The sense of danger that students posed to the country was promoted with the announcement by Chinese authorities that some 200 Chinese had been accused of spying for the Soviet Union. When the reorganization of MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak.

In the West, certainly the most significant, largest, and most powerful intelligence services reside in the US. However, the foundational intelligence services that was the model upon which the main US intelligence services have been based–as well as the services of many other countries–are those of the United Kingdom, namely the Security Service, known popularly as MI5, and the Secret Intelligence Service, known popularly as MI6. To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. Two prominent works, central to the discussion here, are Christopher Andrew, Defend the Realm (Knopf, 2009) and Stephen Dorril, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000). Both scholars undertook Herculean tasks respectively and managed to fulfill them marvelously and masterfully. Both texts respectively hold richly textured accounts of intelligence activities at home and around the world, the British Empire as it still was for a time in the 20th Century. Both are major contributions to the scholarship on intelligence in the United Kingdom.

A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. Plainly, there is no moral equivalence between MI5 and MI6 and their opposites, MPS and MSS. What the United Kingdom and Chinese intelligence services would call successful operations based on the respective goals of political authorities are quite disparate. Officers of the respective countries’ intelligence services are certainly not birds of a feather. Additionally, and importantly, MI5 and MI6 are the opponents of MPS and MSS, and visa-versa. Enlarging on the point of the political authorities they obey, the respective societies and political authorities, that the intelligence services of the United Kingdom and China serve, are considerably divergent, and founded on disparate philosophies. The United Kingdom is a parliamentary democracy under a constitutional monarchy. Despite having the structure, the veneer, of being a multiparty system at the national level, for all intents and purposes, China is a single party, Communist, police state. 

Quaeritur belli exitus, non causa. (Of war men ask the outcome, not the cause.) At a basic level with regard to intelligence services, moral principle and philosophy, in this case whether recognized as being based on Judeo-Christian values, Liberalism, Capitalism, Communism, Socialism, Maoism, or otherwise, is not method. Method is method. Philosophy is philosophy. Moreover, in the intelligence industry, results are what matter most. To that extent, at the basic level, the work of the two services are going to have sufficient likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here. With this in mind, hopefully scholars will be open to considerations presented.

Two MPS officers operating high-tech optical equipment in Beijing (above). To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. at the basic level, the work of the two services are going to have enough likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here.

Using MI5 as a Yardstick to Gauge MPS and Its Activities

The Security Service, known informally and hereinafter referred to in this essay as MI5, is the United Kingdom’s government agency assigned with managing the country’s internal security. It is authorized to investigate any person or movement that might threaten the country’s security. Although MI5 is responsible for domestic counterespionage, it has no powers of arrest. MI5’s motto is: Regnum Defende (Defend the Realm). The Secret Intelligence Service, known informally and hereinafter referred to in this essay as MI6, is the United Kingdom’s government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. MI5 has only a few thousand employees. It is headquartered in London, at Thames House. MI5 is a component of a vast intelligence apparatus in the United Kingdom. Reportedly, command and control is directed via no less than four entities: the Central Intelligence Machinery, the Ministerial Committee on the Intelligence Services, the Permanent Secretaries’ Committee on the Intelligence Services, and the Joint Intelligence Committee. Communications intelligence is the responsibility of the Government Communications Headquarters (GCHQ), which works closely with the Communications Electronics Security Group, while a number of agencies manage military intelligence under the aegis of the Ministry of Defense. Even London’s Metropolitan Police, or Scotland Yard, has its own Special Branch concerned with intelligence.

While MI5 is the agency responsible for the internal security of the United Kingdom, it primarily provides security services and intelligence operations within England and Wales. Its current role was best expressed by the Crown Minister in 1945, with regard to its postwar raison d’être: “The purpose of the Security Service is defense of the Realm and nothing else.” MI5 reports to the Home Secretary of the Home Office. It may be confused as being a domestic law enforcement organization, but it is far from that. To perform the internal security function, MI5’s activities include: domestic counterintelligence; counterespionage; counterterrorism, counterproliferation, and cyber work within the country and protective details for many top government officials. Its officers do not have authority to arrest citizens. When needed, MI5 will work in close cooperation with London’s Metropolitan Police Service (headquartered at New Scotland Yard) and other local police agencies within England and Wales. This is especially when it concerns their efforts to fight domestic terrorism. MI5 may also interface with MI6 when foreign intelligence and domestic intelligence activities intersect.

It cannot be overemphasized that MI5 is a secretive organization. Well back in 1931, the firm instruction to a new employee was: “No one, not even our own families, should be told where we worked or for whom.”  The existence of MI5 was not acknowledged officially until 1979, when Mrs Thatcher unmasked Sir Anthony Blunt as the Fourth Man in a statement to the House of Commons. Its head was publicly named for the first time in 1991. It was also at that time when some previously classified information about MI5, such as the number of its employees and its organizational structure, was made public. During the past three decades, MI5 worked its way through a number of scandals–to include incessant hunts for apparently nonexistent moles–that further tarnished its reputation in many circles. Reflective of British culture, members of the intelligence services, from top to bottom, were unwilling to display any disappointment or hurt and never looked to cry on anyone’s shoulder. They remained reticent about attitudes toward them and placid, straightforward, as they performed their work. Somewhere along the line, a solution was found. The decision was made to release their stories, not to drain themselves out, but let little bit find its ways into the public marketplace to unmask appearances public relations-wise. Through the use of surrogate voices, a sudden fracture in the marble reveals the interior. The inner life. Studies were commissioned to tell their stories, to the extent possible.

Most relevant in Andrew’s Defend the Realm to the examination of MI5 in this essay, are anecdotes loaded with insights on events that were in their time of the utmost importance. Those cases chronicalized, carefully selected from MI5’s storied past, and detailed the complex nature of MI5’s modern day work is revealed. Additionally, from Andrew’s work, one receives a picture of MI5 as a tightly-knit institution, in which many officers keep body and soul together, and others actually thrive, in its atmosphere of secrecy. Based on what has been made public, in an investigation of a threat to the United Kingdom, MI5 officers will usually seek to gather covert intelligence directly. Often, they operate openly and declare themselves as representatives of foreign intelligence services to their host country. The methods used by MI5 officers vary widely, and are often limited only by their ingenuity. Armed with a suite of the latest high-tech tools for surveillance, they will use it to eavesdrop, tap telephone calls and communicate secretly. Normally, MI5 officers will recruit spies to obtain intelligence on their behalf. 

More formally, a spy working for MI5 is known as a “covert human intelligence source,” but in the United Kingdom, spies are more commonly referred to as agents (Interestingly, in the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), a covert human intelligence source is called an “informant” rather than an “agent.” Such agents have been consistently referred to as operatives by greatcharlie.) MI5 agents will do far more than just inform about people and events. Agents secretly provide private information to which few or no others might have access, as well as classified information to an officer. An agent will probably not be a professional “spy” but an MI5 intelligence officer will usually provide them with some basic instruction in tradecraft, espionage methods. The human relationship between intelligence officers and their agents remains a key element of espionage.

MI5’s earliest precursor was a secret service formed in 1569 by Sir Francis Walsingham, who later became secretary of state to Elizabeth I. What came to be called MI5 was formed in 1909 under the leadership of Vernon Kell, then a captain in the British army, to identify and counteract German spies then working in the United Kingdom. It performed that task with great effect. MI5 originally stood for “Military Intelligence [Department] 5.” (In fact, there were a number of departments within the Directorate of Military Intelligence–MI1 through MI19–which dealt with a range of issues. MI1, for instance, was responsible for code-breaking, and MI2 handled Russian and Scandinavian intelligence. The responsibilities of these departments were either discontinued or absorbed into The War Office, MI5 and MI6 and, later, the Government Communications Headquarters.) After World War I, MI5 remained in place as part of the United Kingdom’s effort to centralize control of intelligence functions. In 1931, MI5 was renamed the Security Service, but was still commonly known as MI5 then as it is today. About the time it was renamed, MI5 was paired with MI6, under the Defence Ministry and functioned with a “combined staff” of only two men. Kell, MI5 founder, remained in charge of the agency until 1940. During World War II, with far more staff, MI5 enjoyed a considerable number of successes. One was the Double-Cross System, which fed disinformation to Nazi Germany. For the most part, however, it is recognizably difficult to measure MI5’s success, since it can only be judged by things which do not happen, such as the prevention of sabotage. 

There was initial period of confusion at the start of World War II as a MI5 was inundated with work and had too few staff at all levels to handle it. Missteps led to “life-saving” reforms with the coming of Sir David Petrie in April 1941. MI5 is better known in the war as having achieved great success in uncovering Nazi agents in the United Kingdom. Captured Nazi records studied after 1945 indicated almost all of the Nazi agents working against the United Kingdom were captured. The exception was ine the committed suicide. MI5 managed to recruit a number of the enemy agents to become counterespionage agents for the service and fed false information to the enemy concerning military strategy during the war. MI5 executed the famous “Double Cross” system which was a deception that supported the success of the D-Day Invasion at Normandy in 1944. A proud episode for MI5 was its defense of Gibraltar from enemy agents and saboteurs throughout the war.

MI5 engaged in a hard fought struggle with Soviet, Eastern Bloc and Chinese espionage efforts in the United Kingdom. The situation was made more difficult was the rise in IRA terrorism during the Troubles. One MI5 renowned victories was its uncovering of Soviet Union’s most valuable agents was exposed. However, MI5’s record during the Cold War, actually was mixed. There were a number of widely publicized blunders during that period. The Soviet Union was found to have deeply penetrated MI5, as well as MI6 which reportedly undermined the public’s confidence in the organization.

Low morale reportedly plagued MI5 after the end of the Cold War and the Good Friday agreement of 1998, which led to massive cutbacks. The agency’s focus would eventually shift after the Cold War from counter-espionage and counter-subversion to counterterrorism. That shift was given greater emphasis following the September 11, 2001 terrorist attacks in the US, and counterterrorism became a role of the utmost importance following the July 7, 2005 and July 11, 2005 terrorist bombings in the United Kingdom. MI5’s ranks were filled out rapidly, and within it was a renewed sense of purpose. Today, counterterrorism operations still account for much of MI5’s activities. 

Not all of the anecdotes that Andrew offers spotlight the valor of its officers. There are some of the rather lurid intrigues. They include a cast of cheats, schemers, supplanters, unsavory allegiances, and unimaginable acquaintances. One dare not imagine the sensibilities of the errant individuals behind them. In the discussion of the work done within the analytical shops of MI5, the finer shades of analysis and deduction are spotlighted. Information was looked upon pathologically as the source of motives, clues, indications, and implications. With that analyzed information, MI5 leaders would speak truth other power, whatever it came upon, no matter how offensive, it was told straight.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

Intelligence Work of MPS

If one placed the history of Chinese intelligence alongside that of the United Kingdom, one would find that the craft of intelligence was studied in China long before the idea of formally organizing intelligence activity was manifested in 16th century England. The most illustrious expressions of intelligence concepts and methods in China was in Chapter 13 of The Art of War, a treatise dating from the 5th century by the Chinese military strategist Sun Tzu. Chapter 13 focused on the importance of developing good information sources, and identified five specific types of intelligence sources along with ways to best manage each. However, the lineage of modern Chinese intelligence services,  as noted earlier, have more recent beginnings in the era of Mao. Similarities between MPS and MI5 exist insomuch that it is the Chinese intelligence service charged with internal security and domestic counterintelligence activities of China. It investigates and acts against any person or movement that might threaten China’s security, but unlike MI5, its officers have the power to arrest. In addition to its performing those standard domestic functions as an intelligence service, MPS is very much tied to the Communist Party of China to maintain control of the population and maintain the Communist order. To that extent, it has remained obedient to the ever shifting requests and requirements the Party issues to it. To be more specific concerning the responsibilities of MPS, they include: preventing, stopping and investigating criminal activities; fighting against terrorist activities; maintaining stability and order; administering to transport, fire fighting and dangerous objects; administering to household registration, identification cards, nationality as well as entry, status and exit of Chinese and foreign nationals; maintaining border security; protecting persons, venues and facilities as designated by the state; managing gatherings, parades and demonstrations; supervising public information networks; supervising security concerning state organizations, social organizations, enterprises, institutions, and large construction sites; and, guiding community security commissions.

The Communist Party of China has hardly proven to be pristine in practicing what it preaches. What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. Normally, finding the truth is sine qua non among intelligence and counterintelligence services, and law enforcement. To fail to find the truth, well-aware that one holds a paucity of facts, information and data, is to fail oneself. Naturally, being aware of the existence of information that contradicts one’s initial hypothesis and doing nothing to dig deeper is counterintuitive.  Having stated that, in the intelligence industry, the slightest deviation from the course ordered on an investigation to satisfy the requirements of the powers that be throw the rules out of the window. However, when tasked directly by the Communist Party of China, the truth lies in what the Party says the truth is. If MPS officers were to present findings from an investigation that held information contradicting the truth as declared by the Communist Party of China, they would unlikely garner understanding from their respective national provincial, or municipal senior executives and managers. In the best case scenario, the ironic admonition might come from on high to stick with the primary problem instead of rooting around at “extraneous matters.” That is the type of relationship that Chinese intelligence services have had with the Communist Party from their very beginning. They are charged with the responsibility for ensuring the tranquility of order. From outside of China, one can freely call the well-experienced intelligence officers who fill the ranks of MPS as tragedians, specializing in a very tragic role for their country.

Manifestations of Political Pushes from Behind in MI5’s Past

In examining MPS, it cannot be stressed enough that it is a political creature of the Communist Party of China. MI5’s circumstances are not remotely similar. MI5 is not an organization designed intrinsically to service the political interests of political authorities. However, there have been occasions when political authorities have misused the vital security arm by using pressure to influence its actions, for purposes that were questionable. Shockingly, the MI5 carried out secret surveillance of the colonial delegations which came to London to discuss terms for independence in the 1950s and 1960s. Andrew gives a disturbing account of the stealthy gathering of intelligence on the delegates attending conferences which negotiated the independence of Cyprus and Kenya. The Home Secretary, Rab Butler, cynically condoned these operations on the grounds that “obviously the product was of great importance and of great value to the government negotiators”.

In most of the British Empire, claims Andrew, MI5 contributed to a smooth transfer of power through the work of its liaison officers. However in Guyana, where United Kingdom Prime Minister Sir Winston Churchill wanted to “break the Communist teeth,” a shameful exception was witnessed. MI5 obediently provided support for the United Kingdom and US covert action to oust the democratically-elected Cheddi Jagan from power. Andrew claims that the dominant intelligence agency in the years leading up to Guyana’s independence in 1966 was the Central Intelligence Agency (CIA). However,  MI5, and thereby the government of the United Kingdom, nevertheless had a hand in the affair. 

In the present day, such outcomes are certainly not intended in MI5, an organization tasked and trusted to protect and serve the United Kingdom. To ensure that remains so, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. The Home Secretary oversees MI5, as well as the National Criminal Intelligence Service and Scotland Yard. To the extent that there is always the need for such a degree of oversight from above, one must never overlook the shadowy side of the business. It is at the core of intelligence work. There is a reality that by doing the dirty work, the people of the United Kingdom are allowed to sleep peacefully at night. When the situation is dire and urgent enough, use has been made of agent provocateurs who may take direct action to maintain their bona fides within their groups for the organization’s purposes.

Today, officers join and serve MI5 with the belief that its work has much to do with the wider good. As the targets of MI5 efforts are the terrorists or the war criminals or the nuclear proliferators. There is an understanding how the need to approach a matter of the utmost importance with the most effective method available can subordinate all else. Whether or not exigent circumstances permit, there at least exists the earnest aim among them to defend the values of the United Kingdom’s liberal democracy. Unlike its counterpart in the Chinese intelligence services, MPS, causing harm to the free people of their own country, who are living within the law, is never the intended purpose of MI5. Indeed, while also ostensibly tasked and trusted to protect and serve the people of their country. MPS keeps a boot not only to the neck of criminals and true threats within China, but of groups of innocent citizens labeled as undesirable by the Communist Party of China, and doing that appalling work at the Party’s behest, to be frank, could be ascribed as an essential part of their raison d’etre.

Other Ugly Truths

As long as humans are involved in an organization and its plans and activities, rarely will outcomes be perfect. It could be expected to be imperfect shaped by mistakes, misjudgments, biases, and emotions. To that extent, there is no purpose here to establish MI5 as a paragon of moral behavior. In its history, mistakes were made. Pointing to them means admitting to the truth. (Interestingly, the historical record indicates the nearly contemporary national intelligence service has suffered from its share of mistakes.) What can be greatly appreciated in Defend the Realm is that Andrew tells the MI5 story straight. The ugly truth as told, creates some disappointment, yet from it, lessons were certainly made available that would allow for the organization’s improvement. According to Andrew, recruitment within MI5 was perhaps the most outward expression of inward thinking in the organization. It was surely not acceptable by today’s standards intellectually, morally, ethically, and professionally. Indeed, within the organization itself, MI5, a public service, did not advertise openly for recruits before 1997. Up to that point, recruitment was based on personal recommendation. This was a narrow social group, many of whom had served in India or elsewhere in the Empire. To that extent, the organization was sure to recruit “from good Anglo-Saxon stock.” Reportedly, male officers listed their recreations as cricket and hunting, while female officers were graduates of elite schools and universities

Right up to the mid-1970s, the post-war Security Service refused to recruit Jews on the grounds that a dual loyalty to both Israel and the United Kingdom might create a conflict of interest. This was “inexcusable,” Andrew rightly observes. There was also a very disturbing attitude taken toward Blacks interested in joining the Security Service. In 1949, then Deputy Director General Guy Liddell told the Joint Intelligence Committee: “It was true that niggers coming here often went to the C[ommunist] P[arty].” That fact that he held such appalling racist views were reinforced when he explained there was no doubt in his mind that “West African natives are wholly unfitted for self-rule.” There was a sour spirit to it all. Yet, that was the spirit of the moment. A sort of “pigs in clover” self-satisfaction influenced and distorted thinking in the world of that past era.

While MI5 was busy keeping some citizens out of its intelligence service, its rank and file was surprised to discover who they had let in. In 1951, as the result of the decrypted telegram of the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, that any of the Cambridge Five–then current or former all MI5 or MI6 employees, who were recruited as spies by the Soviets in the 1930s when they were young misguided Communists at Cambridge University–were identified. The bombshell revelation sent shock waves through the halls of MI5. In response, MI5 initiated an investigation that lasted 30 years in order to get to the bottom of the matter.

Among other unfortunate episodes for MI5 was the “Wilson plot” of the 1970s in which United Kingdom Prime Minister Harold Wilson was accused of being a Soviet agent–the information came from the CIA’s Counterintelligence Division, James Jesus Angleton based on claims of questionable source. MI5 investigated the claims and found them to be false. There was also the “Death on the Rock” case in 1988 in which MI5 with Spanish authorities were alarmed about three members of the Provisional Irish Republican Army (IRA) Belfast Brigade who travelled to Spain. It was presumed that they planned an attack against British troops in Gibraltar. MI5 intended to capture the IRA members with the assistance of the British Army’s Special Air Service Regiment cooperation of Spanish Authorities, but all three were killed in the process.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

The Communist Party of China’s Political Manipulation of the MPS Today

It would appear that the leadership of the Communist Party of China is usually distressed exceedingly when even the mere suggestion is made that some underlying evil is present in the decisions and actions of the Chinese government towards its own people. There is the insistence by the Communist Party of China that it acts only in their best interests and the thinking behind each choice is gifted by what their Western counterparts would call scruple. Thus, when any reports, photos, or videos of the actual treatment of ethnic and religious minorities in China are secreted out of the country and headlined in the West or anywhere else in the world, it is nothing less than an absolute disaster. The belief among Communist Party of China’s leadership and members that China’s Communust society is near perfect and would be best for the world is a belief in a false reality. The prospect of any citizen or any foreigner, unmasking the appearance created by Beijing of China being an advanced industrialized society and superior culture truly seems to terrify the Communist Party of China. Burned rotten by somewhat regular investigative reports and exposé documentaries, written and produced in the West, they, without fail, will attempt to cover their traces rather than spill it out. Government and Party spokespeople will roar about China’s innocence and the false and bizarre nature of what is reported. Trying to figuratively get the toothpaste back into the tube has never worked though. Focusing on what it can control, the Communist Party of China engages continuously in an effort to grease the wheels of citizens thinking to ensure that it always slides in its favor and toward appreciation of the Communist Revolution. To stanch the thickening of misgivings among the Chinese people toward its actions, ever present are warnings to citizens to guard themselves against foreign agents, look upon foreigners with some suspicion, and be cognizant of the possibility of unwittingly giving cause for foreign agents to trace them and spot them as potential recruits as spies and informants through seemingly innocuous contact.

The Communist Party of China has long acknowledged that there is always a threat that could arise from the “unsuccessful” education of Chinese citizens. A symptom of that would be the attraction to materialistic symbols of success for the former bourgeoisie class apparatus of success: business success, homes, cars, things constructed around people. It was what identified them as being above the proletariat, the working class. In China, given its relative prosperity, there exists the fear among leaders of the Communist Party and government bureaucracies that the bourgeoisie existence of the West would insinuate itself in the thinking of Chinese citizens and become a preference in their minds. Any aspiration created for what the West has to offer not under controlled circumstances could figuratively spread among the people much as a virus, infecting the proletariat, potentially creating some mass disaffection toward the system. Perhaps such sensibilities reveal a secret doubt that Chinese citizens could see that so-called ideals of Maoist Thought and Marxist-Leninism had been betrayed or perhaps were simply Utopian, and that they would desire great changes. Communist Party of China leaders determined long ago that the response to this threat needed to be strong enough to match “the severity of the disease.” 

As part of its efforts at population control, the Chinese government insists that the people keep a watchful eye over threats to the new system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema. It was in the performance of the mission to discourage, punish and obliterate that threat that the MPS earned a reputation for being the horrifically oppressive cats paw of the authoritarian regime. The MPS has interfered in interactions and relationships between citizens, ordered citizens to spy on their fellow citizens, demanded that they betray one another, regularly performed intrusive and demeaning searches of citizens’ person, homes, and workplaces. There have been arrests of many innocent citizens, accompanied by abusive and endless interrogations. The shadow of sudden death hangs over the head of any individual in MPS custody.

As of late, what should be of greatest concern is the approach the MPS has been taking toward foreign visitors. (The matter is elaborated upon later in this essay.) As a practice, foreigners, especially, Westerners, are closely observed and often investigated by provincial offices and local MPS stations. Under such circumstances, there is always a real possibility that one might be arrested or “briefly” detained for questioning, would be created. Foreign visitors who have faced such treatment have almost immediately become the center of a frightful international incidents, which is actually the goal of Chinese authorities. Regardless of one’s status in the US, it can happen in China. Reportedly, the attempt has been made with some foreigners to persuade with the pressure of interviews, interrogation, and detainment or use certain manipulations to convince them to let themselves go and reveal “the truth.” Telling the truth would mean copping to preconceived ideas held by their interrogators about their alleged wicked missions against the People’s Republic of China. The treatment of Chinese citizens detained by the MPS for even lesser “offenses,” is always decidedly worse.

The Beijing Municipal Public Safety Bureau Office Building (above) MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. Assessments of what type of temptations could be used to bring them to China’s side will be based on observations of the foreigner’s lifestyle. MPS officers have no qualms about exploiting individual weaknesses.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) Spin concerning the maltreatment of ethnic and religious groups is propagated through narratives in the state-run news media of how much the Communist Party of China is doing to protect China from enemies, domestic and foreign, at the hands of which the Chinese people have suffered for so long. Nevertheless, a good number of Chinese people are aware that one cannot know with certainty what is real from what one hears from the government. However, holding a secret doubt about the system in China can lead to a solitary despair. The secret doubt becomes dissatisfaction with one’s work and one’s situation which can become a full-blown loathing of the system. Soon after may come the rejection of authorities. In response to conditions forced upon them, being subjected to humiliations, Chinese citizens of some ethnic and religious minorities have acted in protest, releasing a sense of frustration. Becoming vocal may relieve his sense of frustration for the moment will only open the door to far greater problems. To Chinese government authorities, it represents nothing less than a social dissembling within those groups.

Loyal Communist Party members can hardly understand that any other citizen’s disillusionment or disappointment in government efforts to respond to their needs could be based in logic. Thereby, the attitudes of those citizens are irrational and reactionary. Surely, those approached by MPS display intense emotions, very likely overwhelmed by great fear and sheer terror, given an expectation the worst will befall them given the organization’s reputation, would avail themselves to be apprehended and held indefinitely as their situation would immediately be converted into a psychiatric issue. After all, any charge will do. The goal is to cull the so-called threatening population by plausibly arresting benign citizens and warehousing them away from their homes. One can only imagine that it would mean for those declared to have psychiatric issues to be placed in the hands of medical professionals linked to the MPS. MPS officers are apparently not timid to draw very false, aberrant, far-fetched inferences from fact collected during investigations. Of course, no professional ethics, no moral principles founded upon religion, and no less spiritually based philosophy of humanism could not obstruct such actions. Ethnic and religious minorities must feel akin to big chickens in a world of foxes.

A principle is a precise standard, a course of conduct you are committed to, a way of life that you live by. Adherence to principles, has little meaning to the Communist Party of China unless the principles adhered to are those of the Party. Publicly available sources show that Beijing considers Falungong, Tibetans, Uyghur Muslims, democracy activists and pro-independence Taiwanese undesirables as they adhere to principles and a way of life adverse to that insisted upon by the Communist Party of China. They have been named the “five poisons” that constitute the greatest threat to Beijing’s rule. Tibetans, Uyghur Muslims, in particular, are essentially looked upon as vindictive ill-balanced creatures of China’s hinterland.

As noted here MI5 unfortunately has a record of past mistakes and poor judgment, too, and fortunately from that history, lessons have certainly been learned. Yet still, making mistakes and misjudgments is a far cry different from being deliberately bad, acting the name of injustice and engaging in cruelty, based on a contrived motive and without any reasonable provocation. MPS currently engages in activities which, not to apportion wickedness, manifest just how different the two intelligence services really are. MPS, as an organization, espouses great anger about ethnic and religious minorities, dubbing them activists, reactionaries, counterrevolutionaries, and terrorists, and for the sake of the Communist Party of China and the Communist Revolution, has done what it does best, acted aggressively toward such “threats.” If one is of a ethnic group or religious groups at variance with the Communist Party of China, and consequently under the thumb of the MPS, one will have the sense of being in contact with an evil of an exceptional nature. In recent years, egregious abuses have increased through government policies under the pretext and justification of fighting the “three evils” of “ethnic separatism, religious extremism, and violent terrorism.” 

Tibet is an autonomous region in the People’s Republic of China. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability. Omnis enim ex infirmitate feritas est. (All savageness is a sign of weakness.)

Tibetans detained by MPS officers facing judgment in court (above). China has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability

Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.” A commonality among the homelands of the different ethnic and religious groups in China is the fact that they are depressed regions with unemployment, poor infrastructure and many structures tumbled down. Interdum volgus rectum videt, est ubi peccat. (At times the world sees straight, but many times the world goes astray.)

Regarding religious minorities, during the first thirty years of its existence, the Communist Party of China committed itself to making atheist Marxism the fundamental ideology of the country. depriving the Chinese people of their constitutional right of religious liberty. There is a clarity and certainty that comes from being able to know another’s origins. One place to look to identify, research, is to study a the  of culture, history, customs, that may shape the subject’s attitudes and behaviors, worldview. Adherence to religion, culture and identity as well, stiffens resistance to authoritarian pressures and coercion, and girds uncommon perseverance. To that extent, the Communist Party of China surely fears citizens’ adherence to their religions and cultures, and the rejection of Communism. In response to that threat, Beijing has formulated and implemented new policies, regulations, and legislation impacting religious freedom have been created and implemented, particularly since 1979. The idea of it all being to surgically strip citizens of their ethnicity, culture, and religion, thereby smother the individual’s identity, leaving the individual with nothing to grab onto, except Mao’s teachings on Chinese Communism. In the report of the US Congressional Executive Commission on China (CECC), 2017 Annual Report 127 (October 5, 2017), it is noted that Chinese authorities commonly prosecute Falun Gong practitioners under article 300 of the People’s Republic of China Criminal Law. That information was found on the official Chinese government “anti-cult website.” In February 2018, a woman in Beijing was convicted of “using cult organizations to obstruct the enforcement of laws” under article 300 of the Criminal Law. The woman was sentenced to one and half years in prison and a fine for publicly advocating “the evil cult Falun Gong.” Falungong, essentially an anti-Communist China spiritual group, was banned by Beijing in 1999, having been labeled an “evil cult.”  In 2014, a leader of the Church of Almighty God, a quasi-Christian group also known as Eastern Lightning, was also convicted of “using cult organizations to obstruct the enforcement of laws” and sentenced to four years in prison. That church is now officially banned.

Reportedly, MPS has detained or otherwise restricted the freedom of Catholic leaders in both the underground and official churches. The government has reportedly pushed for Chinese Catholic bishops to be selected through the patriotic religious organizations and then ordained by Chinese bishops without the involvement of the Holy See. Chinese officials have also reportedly subjected Protestant Christian beliefs and practices to a wide range of restrictions. Beijing reportedly pressured unregistered house churches to join the officially recognized religious organization, the Three-Self Patriotic Movement. Protestant house churches faced raids during church gatherings, eviction from meeting spaces, and official bans on worship. Martin Luther King, Jr. said that “The moral arc of the universe bends toward justice.” While that may be true, it surely has not bent so much in China’s direction yet. Iniqua nunquam regna perpetuo manent. (Unjust rule never abides continually.)

Uyghur citizens seated in formation in a detention center (above). Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.”

II. The Role of the MSS in China’s National Security Bureaucracy

As aforementioned, Chinese intelligence services, in terms of task and purpose, work within an authoritarian government and must be viewed as a different kettle of fish than the services of the United Kingdom. Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, MSS senior executives and managers have now figuratively declared “game on” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. By conventional wisdom, one might proffer those are its priorities. It is surely what Beijing wants now and it is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined than ever before. As previously mentioned, Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. That was a mistake. Central to greatcharlie’s understanding of China’s intelligence services and their activities are the writings of Peter Mattis. Since leaving the CIA where he was a highly-regarded analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis’ writings evince an appreciation of the depth of thought, organization, and planning Chinese intelligence services have put into building up their organizations and conducting operations in all areas. To that extent, he proffers that the West as of late has been facing very modern, competitive Chinese intelligence services that make use of tactics, techniques, procedures, and methods at a level equal and in some cases far more competitive than those of Western intelligence services. As he explained in a September 2012 article in Studies in Intelligence entitled, “The Analytical Challenge of Understanding Chinese Intelligence Services,” Chinese writings on intelligence bear remarkable similarity to familiar US definitions of intelligence functions and goals. He reminds that Sun Tzu taught that “foreknowledge” (xianzhi) allowed commanders to outmaneuver opponents. However, he notes more modern definitions range from “activating [catalytic] knowledge” (jihuo zhi-shi) to information to protect national security, domestic stability, or corporate interests in a competitive environment. Mattis goes on to state that Chinese military scholars today frame intelligence as a distinct subset of knowledge, defined by its relevance to decision makers and a competitive environment. Specifically, intelligence is transmittable (chuandi xing) and is knowledge that satisfactorily (manzu xing) resolves a specific decisionmaking problem. He further asserts that empirically, Chinese intelligence officers consistently have demonstrated the use of widely practiced professional tradecraft, having successfully exploited for political and military intelligence purposes agents with vulnerabilities familiar to anyone who follows the subject.

The Minister of State Security, Chen Wenqing (above). Chinese intelligence services target a broad range of national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities of the United Kingdom, the US, and other advanced industrialized countries. Lately, the chief feature of the intelligence war between those countries and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims.

Using MI6 as a Yardstick to Gauge the MSS and Its Activities

Everyone on the outside has their own version of what MI6 is and does. Looking at MI6 as a yardstick to understand the MSS, the two organizations pair up to the degree that both are foreign intelligence services. The United Kingdom’s MI6, formally the Secret Intelligence Service as mentioned previously, is the government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. It is also charged specifically with the conduct of espionage activities outside of the United Kingdom’s territory. The MI6 motto is Semper Occultus (Always Secret), but the organization states as its mission: “We work overseas to help make the UK a safer and more prosperous place.” Much as MI5, MI6 has only a few thousand employees. It is headquartered in London, at Vauxhall Cross. It is a component of the same intelligence apparatus in the United Kingdom as MI5. 

MI6’s four main areas of focus are: countering international terrorism, combating weapons proliferation, supporting stability overseas and securing the United Kingdom’s cyber advantage. Countering international terrorism means exactly that, protecting the United Kingdom from terrorists. Performing that task entails: gathering and assessing intelligence; conducting investigations and disrupting terrorist activity; preventing people from becoming terrorists; and, protecting critical national infrastructure and crowded places. Through gathering intelligence and disrupting operations, MI6 plays an indispensable role in the United Kingdom’s counter weapons proliferation efforts directed at combatting the international proliferation of chemical, biological, radiological and nuclear weapons. Working in cooperation with key national and international partners as the US, MI6 also helps to ensure that the United Kingdom’s weapons exports never fall into the hands of terrorists. Instability and conflict overseas leads to weak governments and poor national security, and nurtures a fertile environment in which terrorists and organized crime groups can thrive. Using agents, the MI6 provides intelligence to government policymakers and decisionmakers and provides early warning indications of potentially hostile threats. Most often that information can lead to early political intervention to prevent prolonged instability. Cyber threats are a key security risk to the United Kingdom, as they have the potential to disastrously impact individuals, organizations and governments. Global and ever becoming increasingly complex, cybercrime has the unusual characteristic of having the potential to rear its ugly head and reach out from anywhere in the world. The MI6 provides secret intelligence to help protect the UK from current and emerging cyber threats across a range of adversaries such as hostile countries, terrorists and criminals. Additionally, MI6 conducts counterintelligence operations via a furtive counterintelligence section, but it is generally understood that the organization shares that work with MI5.

In order to meet the challenges of their work, MI6 officers are highly trained in the tactics, techniques, procedures, and methods of their profession. Within intelligence services, as noted earlier, it is referred to as tradecraft. High on the list skills learned and honed are espionage techniques and the use of agents. Often MI6 officers may operate openly in their host country, declaring themselves as representatives of the United Kingdom’s foreign intelligence services. Otherwise they will work covertly under the cover of other official positions such as diplomatic staff or trade delegates. Some MI6 officers may operate under non-official cover to conceal the fact that they work for an intelligence service. That usually entails posing as a business person, student or journalist for example. In some cases MI6 officers will operate under “deep cover,” meaning they will use false names and nationalities. In the intelligence industry, such officers operating under such cover are referred to as “illegals.” They operate without any of the protections offered by diplomatic immunity. MI6 officers typically seek to establish networks of agents whom they can use over a sustained period of time, so that they can obtain a reliable flow of information. As it was stated in the aforementioned discussion on MI5 agents, MI6 agents operate by exploiting trusted relationships and positions to obtain sensitive information. They may also look for vulnerabilities among those handling secrets. They may be aware of flaws in their organization’s security that they can exploit. Recruiting agents, both foreign and domestic, who can provide intelligence on terrorist plans and organizations is of the utmost importance to MI6 officers.

MI6 was constituted in its present form in 1912 by Commander (later Sir) Mansfield Cumming as part of the United Kingdom’s attempt to coordinate intelligence activities prior to the outbreak of World War I. In the 1930s and ’40s it was considered the most effective intelligence service in the world. Following the rise to power of Adolf Hitler in Germany, MI6 conducted espionage operations in Europe, Latin America, and much of Asia. When the US entered World War II, MI6 helped to train personnel of the US Office of Strategic Services (OSS). As mentioned, it was the organization in which Hilsman served. Much of OSS’ foreign intelligence and counterintelligence tradecraft was adopted from MI6. Indeed, the CIA still uses much of it today. Reportedly, many “old boys,” veterans of the OSS are fond  of saying, “The Brits taught us everything that we know, but certainly not everything that they know.” The two organizations worked closely during the war. MI6 has since cooperated extensively with the OSS’s successor, the CIA. MI6 senior executives, managers, and officers refer to the US intelligence organization the “American cousins.” Details of MI6 operations and relationships have rarely appeared in the press. In the mid-1950s, the public reacted with consternation when it was revealed that MI6 had been penetrated by double agents who had served the Soviet Union since the 1930s. It was not until the 1990s, that the head of MI6 was publicly named for the first time. Still, information about MI6 is still much more closely guarded than that about MI5, which carries out internal security and domestic counterintelligence activities. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. MI6 reports to the Foreign Office.

Stephen Dorril’s work, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service, is a true reflection of the organization, its people and its history, what it has done and where it has been most influential . Dorril, a meticulous observer and chronicler of the security services, demonstrates an understanding of everything one might have thought about MI6. Through the text, readers learn that MI6’s postwar activities were mired in prewar attitudes and practices. Many in the United Kingdom imagined the foreign policy task dividing up the world with US and other global powers. Instead, the preoccupation was the Soviet Union and the Cold War. In chronicalizing the Cold War segment of MI6’s history, Dorril fills the pages with anecdotes of its most spectacular failures, stirring successes, unsavory plots and bizarre missions, the real-life cloak-and-dagger world is exposed. There is a discussion of Operation Stalin, which exploited the Russian dictator’s paranoia and led to the execution of thousands. There is another about the tunnel MI6 dug beneath the Berlin Wall. During the Cold War, in the intelligence war, it seems that there was no opportunity, in the midst of his work against the Eastern Bloc and more the Soviet Empire, to view matters from a broader or humane perspective. Surely, with the benefit of hindsight, it is easy to enumerate all of the mistakes, poor choices that were made. By 1992, influence abroad had been lost in the Middle East, most of Africa and large swathes of Asia. The United Kingdom was not exiled and isolated as some might suggest. It was then and remains a key partner to the US with its superpower status, and often takes lead from the US, the main push was to abrogate the world’s resources. In the post-Cold War era, there was once again a sense, particularly in the administration of US President Bill Clinton of the West’s entitlement to the world’s spoils. That rush to take what was available was intensified by the need to get to what was out there before the People’s Republic of China did. Political power seemed to embrace corporate power. As a consequence, there was the appearance that corporate power was supported by government power. MI6, one of the great information-gathering organizations of the world, was put to that task, placing some strains on the service.

The book presents a well of extraordinary characters. As alluded to earlier, the lion’s share of what was told is meat and drink for those who enjoy spy novels, but it is all real. Yet, in addition the book presents the similitudes of the intelligence industry with profoundly human stories. The world of the intelligence officer is often a dank and grey one, visceral, boring at times. There is a drudgery about agent running. Doing chores in the analytical shops can be tedious. One is invited to understand the suffering and sacrifices of MI6 officers. Prerogatives are surrendered, loves, passions, moral ambiguities, moral compromise. Many officers fall off, finding satisfaction in other professions and pursuits, others engaged in betrayal, a few entered the device with the objective of spying. As with MI5, MI6, as a dynamic, intelligence service, operating worldwide, has a history riddled with complexity. Stories of unpleasantness are even found in Dorril’s authorized study, too! The more counterintuitive these acts are from the past, the more puzzling they are. In such an old, but odd profession, if one finds oneself doing odd things, the hope would be to catch oneself out when one is so far out of bounds that nothing good is being accomplished.

The People’s Republic of China Embassy in Washington, DC (above), home to the MSS resident in the US. Much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness, nevertheless, it is happening. In the recent case of an New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats.

Present Day Focus and Operations of MSS

MSS, as well as other Chinese intelligence services, target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Lately, the chief feature of a defacto intelligence war between West and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims. To understand the intelligence efforts of MSS, one must understand how guIding concepts from Deng Xiaoping led to a decision by Chinese intelligence to make economic espionage an even greater emphasis. Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves. To get an idea of how well the MSS operates, one only needs to consider its ongoing activities in the US. Without the intention of tarnishing or being beastly toward US intelligence and  counterintelligence services, and law enforcement, they have been unable to prosecute a successful, fruitful, and victorious campaign against Chinese intelligence services operating in the US and against US interests globally. Readers might recall from previous posts on the subject, greatcharlie noted that Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. Further, in previous US administrations, particularly in the administration of US President Barack Obama, a somewhat relaxed attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology. The burgeoning threat was apparently not fully discerned or appreciated. 

In response to past US missteps, Chinese intelligence services presumably placed a laser focus upon enhancing and adjusting their approaches to US targets. As a product of their success in recruiting officers and contractors from the US intelligence services, Chinese intelligence services have apparently managed to better understand what the US has been doing to try to recruit Chinese intelligence officers, operatives, and informants is prioritized. To the extent, US intelligence officers and contractors recruited as spies are typically tasked with actions to support Chinese counterintelligence requirements. Doubtlessly, the collection of information on what MSS foreign intelligence has been doing has been insufficiently analyzed in light of information collected on US counterintelligence surveillance strategies and technological capabilities would inspire audits in Chinese intelligence services to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, one must become reconciled with the fact that Chinese spies do not go astray so often.

Foreign Intelligence Operations of MSS

Successful multifaceted activities of Chinese Intelligence services have included: conventional espionage; outright intellectual property theft via corporate and academic institutions worldwide, and cyber attacks. For a good idea of how MSS conducts conventional espionage today, Ryan Clarke, a senior fellow at the East Asia Institute, a Singapore-based think tank, boils it down well in a July 31, 2020 Asia Times article entitled, “The Face of Chinese Spying in Singapore.” Curiously using MSS efforts primarily in the US primarily as an example, Clarke asserts its intelligence operations are highly targeted and tethered to specific state goals. He explains: “These types of operations are quite simple with relatively few moving parts, which is why they are replicable at scale.” To illustrate the variety of targets attacked by MSS, Clarke says: “We’ve seen operations against a range of American targets, from Covid-19 vaccine research to the F-35 fighter jet program.” With regard to the collection effort, Clarke goes on to propound: “The general approach is to establish target priorities and then proceed to collect what appear to be rather innocuous inputs with relatively limited value when viewed in isolation. Sometimes the information may not even be classified. This is done on a massive scale in-country with a parallel synthesis-fusion operation in China itself.” Putting such a massive and energetic effort into perspective, Clarke maintains: “The strategic logic is that, in the aggregate, this massive collection and synthesis-fusion effort will yield unique findings and insights which the Chinese Communist Party can leverage across a range of domains.” The Idea that a massive synthesis-fusion operation exists to mine useful intelligence from piles of information collected was also proferred and the analytical operation was conceptualized in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).”

So far as is known publicly, counterintelligence services of the countries Chinese intelligence services have struck, to include the US, have yet to get to the bottom of their business in their countries in order to put an appreciable dent in their work. One might imagine that trying to spot, intercept, neutralize, and recruit significant numbers of Chinese intelligence officers, operatives, and informants has become an exercise in chasing shadows. This has likely left senior executives and managers of many counterintelligence services in a mute frenzy. For the US, in particular, long gone are the opportunities such as the relatively facile recruitment of the MSS officer Yu Zhengsan back in 1985. Then, when MSS was barely up and running for two years, Yu Zhengsan, a mid-level MSS officer from a well-connected political family, was allegedly aided by the CIA allegedly in escaping China and defecting to the US. Once in US hands, Yu provided investigative leads for US counterintelligence services to capture Larry Wu-Tai Chin, a retired CIA language analyst, who had spied for China since the 1940s. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, US counterintelligence services must become reconciled with the fact that, today, Chinese spies do not go astray so often. That is, there must be nothing so creative that US counterintelligence services are doing or offering to encourage them to do so.

Prior to the coming of the administration of US President Donald Trump, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with defeating China’s operations had no real effect on the course of the administration of US President Barack Obama and Chinese intelligence activities steadily intensified. In response to counterintelligence and cyber defense missteps, Chinese intelligence services seem to have placed a laser focus upon enhancing and adjusting their approaches to US targets.

It is important to note that much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness. However, while it is madness, it is happening. Clearly, the Communist Party of China must think it makes sense or they would be acting in this way. In the recent case of a New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats. To be more precise, they will twist the tails of émigrés by threading to harm family members still living in China if cooperation was not provided.

The People’s Republic of China National Security Office in Hong Kong (above). MSS counterintelligence certainly would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations.

MSS Counterintelligence

MSS shares the counterintelligence role with MPS. The primary mission of organic MSS counterintelligence elements is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. Its primary targets hands down are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

A Difficult Comparison with MI6 Counterintelligence

Making a proper comparison between MSS counterintelligence operations and those of MI6 is difficult due to the fact there are only soupçons to go on with regard to that United Kingdom intelligence service. One aspect of that work already noted here is that counterintelligence responsibilities among the United Kingdom’s intelligence services have been divided between MI5 and MI6. In Nigel West’s Historical Dictionary of British Intelligence (Scarecrow Press, 2014), one of his many superlative reference books on the subject of intelligence, not surprisingly one can find at least some reference to the work of MI6 in that province. As explained in the Historical Dictionary of British Intelligence, in the United Kingdom, counterintelligence is the discipline devoted to penetrating the adversary’s intelligence structure and protecting one’s own organization. (This is significant for a number of other intelligence services take a different approach to the matter. In the CIA and the FBI in the US and in the erstwhile Soviet Union’s KGB and the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, for instance, counterespionage operations are organic to the work of their organizations’ counterintelligence sections.)  West notes that during World War II, the MI6 counterintelligence section was designated Section V, the romance numeral five being the cause of considerable misunderstanding and confusion for outsiders.

With regard to counterespionage, in the Historical Dictionary of British Intelligence, West notes that responsibility for such operations lies primarily with MI5, although inevitably the Secret Intelligence Service and Government Communications Headquarters as well occasionally encounter evidence of hostile activity and investigate it. During World War II, counterespionage was acknowledged as an interagency discipline that overlapped different organizations and in 1942, was the motive for an attempt at amalgamation, which was ultimately rejected. Following the collapse of the Soviet Union, MI5’s commitments were reevaluated periodically, and the counterespionage branch, designated K in 1968, was absorbed to a new D Branch in 1994 

To elaborate further on MSS counterintelligence, certainly it would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Shifting a bit from United Kingdom intelligence efforts to elaborate more effectively on this point, federal indictments and criminal complaints against MSS foreign intelligence operatives and informants caught in the US indicate that they are generally tasked, as most field operatives and informants of any intelligence service, as intelligence collection requirements demand. As noted in greatcharlie’s August 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” from what can be learned from indictments and criminal complaints about such cases that are made public, in almost all of the MSS taskings of those intercepted operatives and informants, certain counterintelligence aspects can be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In order to develop ways to counter the efforts of US counterintelligence services against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding the surveillance strategies of US counterintelligence services, particularly the FBI, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along US counterintelligence services have had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. (If one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. The particulars of those real possibilities will not be delved into here. Not one case has been a “wilderness of mirrors.” It is hard to know what to make of how things are currently transpiring.)

FBI wanted poster for hackers Zhu Hua (left) and Zhang Shilong (right) of the Advanced Persistent Threats 10 (APT 10 Group) which acted in association with the MSS Tianjin State Security Bureau. In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy.

MSS Electronic Intelligence

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy. If human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome. Cyber collection complements all other forms of attack well. Typically, Chinese spokespersons from the People’s Republic of China Ministry of Foreign Affairs or the Communist Party of China, itself, will issue declarations seemingly designed to create the false impression that China was engaged in a lex talionis of allegations with the US on cyber espionage. Perchance the aim in doing so was to distract the world from the reality of its one-way abusive and criminal cyber attacks to obtain classified information from the federal government, intellectual property from private firms, and research from academic institutions in the US.

When GCHQ Was Part of MI6

For a time, MI6 also enjoyed having an organic technical surveillance capability. That technical surveillance capability today resides in an independent intelligence agency known as the Government Communications Headquarters (GCHQ). GCHQ grew out of the Government Code and Cypher School (GC&CS), established in November 1919. During the 1920s and 1930s, GC&CS had considerable success in its efforts to decipher German and Soviet transmissions. Once Nazi Germany acquired the Enigma machine, with its apparently unbreakable ciphers, in the late 1930s, GC&CS greatly stepped up its efforts. In August 1939, just before war broke out in Europe, it moved its headquarters to Bletchley Park outside London. There its cryptanalysts undertook Operation Ultra, the breaking of the Enigma cipher—a project whose details remained classified until the 1970s. Renamed the Government Communications Headquarters in 1942 to conceal its activities, this leading communications intelligence agency of the United Kingdom. Through GCHQ, MI6 enjoyed a number of successes during World War II, most notable among them being the Ultra program to break German Enigma ciphers. Today GCHQ functions similarly to the US National Security Agency (NSA) Working in coordination with the NSA during the Cold War, it greatly escalated its efforts. Reportedly, it participates in the Echelon global surveillance network. Much of what is known about how GCHQ is organized was provided publicly in James Bamford’s famous 1982 book on NSA, The Puzzle Palace (Houghton Miflin Harcourt, 1982). Knowing how GCHQ is organized allows one to infer with at least some degree accuracy, how it functions. According to Bamford, GCHQ at that time had six directorates. Among these were the Composite Signals Organization, dedicated to radio intercepts; the Directorate of Organization and Establishment, whose functions were chiefly administrative; the Directorate of Signals Intelligence Plans, concerned with long-range planning and management; and the Joint Technical Language Service, which intercepted foreign communications. Bamford stated that the largest and most secretive directorate, the Directorate of Signals Intelligence Operations and Requirements oversaw codebreaking activities. 

Returning to the discussion of MSS technical collection, it can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decisionmaking processes.

MI6 in the Political Realm: A Bad Mix

There is much beyond the controlled bearing, composure of MI6 officers and the organization itself. From what has been revealed, their efforts have been defined by hard work, establishing solid foundations, diligence and forethought, practicality and organization, determination and dependability, passion and drive. Creativity is combined with thoughtful effort and hard work to manifest positive energies, opportunities and results. 

As aforementioned, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. MI6 answers to the Foreign and Commonwealth Secretary. The Foreign Secretary receives assistance from the Permanent Secretaries’ Committee on the Intelligence Services. Finally, the Joint Intelligence Committee draws up general intelligence needs to be met by MI6. It also prepares National Intelligence Estimates.

As with officers in MI5, speaking truth to power is also the charge entrusted to leaders of MI6. Yet circumstances have often been complicated enough to spoil adherence to that. One might say how MI6 has performed, has really boiled down to leadership. Indeed, the intelligence services may have figuratively been wonderful horses but the chief or key senior executives–no names here–may have been less-than-perfect jockeys in matters of high policy. Admittedly short on specifics of such cases here, yet with all conspiracy theories aside, it may be enough to say the resources and capabilities of MI6 allegedly have reportedly  on certain occasion been used by political leaders to turn a situation that might not necessarily stand in their favor due to interests beyond those urgent and important to the United Kingdom. Some believe it was really seen during the Iraq War when the United Kingdom followed the US into the whole affair which was unfortunately founded on false intentions,  namely weapons of mass destruction were being produced by the regime of the erstwhile Iraqi President Saddam Hussein. Tragically, MI6 became the alleged coauthor and signatories to misleading information

When misgivings and disfavor might have been expressed what may have been proposed from the top, it may have been the case that  the powers that be would brook no denial. Those too concerned of their position or being politically indebted, might have seen themselves with little option but to follow orders. Those who see themselves as pragmatists, may explain away a decision to go along thoroughly with a suggestion from on high as an effort to simply adapt in a shifting world. They may not have seen themselves as keepers of some sacred flame. The fatal mistake occurs when the choice is made to play along thoroughly. No proper MI6 or MI5 officer would be expected to shrink at the last. If the organization’s leadership had decided to disappoint the political leadership, they might not only have been forced to surrender the coveted privilege to serve their country in the intelligence services. To many in the intelligence service, that idea would be anathema. Such thoughts likely broke through any defenses their minds raised against them. Additionally, after their departure they might find the whole force of the state on his or her back. L’homme c’est rien—l’oeuvre c’est tout.

Assuredly, Parliament, which provides oversight of MI6, has a process for ascertaining the truth about such matters. The principal oversight committee for British intelligence is the Central Intelligence Machinery, based in the Prime Minister’s Cabinet Office. It oversees the coordination of security and intelligence agencies. It also acts as a mechanism for assessment and accountability, observing and reporting on the performance of specific agencies. Further, it more directly intelligence operations as it is also concerned with tasking and the allocation of resources.

To discuss such issues concerning MI6, even if it is just a part of a mere commentary on MSS, is to walk out on shaky ground given many who may read this post may be invested in maintaining the image of the organization and may have previously been invested heart and soul in its work. While admittedly greatcharlie has sought to be sensitive to the concerns of those readers, doubtlessly, the soupçons discussed here will still be an issue of contention in some quarters and there will surely be those disposed to quarrel most bitterly over it. All the same, what is opined here is only what has been publicly discussed by those familiar with the issue. To that extent, not being aware first-hand of it all, greatcharlie would not like to swear by it.

There is no legal “right to know” what is undertaken abroad in the name of the United Kingdom’s security, what it costs or how it is run. Reportedly, beyond mere concerns exposing any classified information about MI6, to write about MI6, even today, risks harassment and prosecution. Former members and current commentators are fully aware of this and have complied thereby allowing the organization to remain beyond any educated public scrutiny. In the past, any dissident reports of its operations were effectively snuffed out. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. As one might imagine, this reality does not sit well with the citizens of the United Kingdom. There is a perception among many in the United Kingdom that such behavior brings the organization more closely in sync with that of MSS, an organ of an authoritarian government, than it should in a free society. Civil rights groups and average citizens argue that the policy of total should be reconsidered and scrapped, should not be disparaged as rubbish in any quarter.

Meeting of the Politburo of the Communist Party of China (above). Changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. One change was the decision of the Communist Party of China wanted MSS looking further abroad than minority groups on China’s periphery. Another change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence.

MSS in the Political Realm

MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. With its inception, MSS added new dimensions to China’s foreign intelligence scheme while freeing MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the intelligence game so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. MSS also represented the tidying up of old ways of conducting its business, and a modernization of Chinese intelligence that was long overdue. The MSS generally appears to have adhered to the non-politicization  of the service. This is not to say that occasionally shifts away from that position by some senior executives has not impacted the organization. MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. However, the Ministry rarely appears connected to any elite political maneuvering or purges. Since 1983, only the purges of Beijing Party secretary Chen Xitong (1995) and Shanghai Party secretary Chen Liangyu (2006) were rumored to involve the ministry. In the wholesale purges after the fall of Bo Xi laid and Zhou Yongkang, the Beijing State Security Bureau chief Fangfoss Kent and Vice Minister Qiu Jin were ousted precisely because they exploited MSS resources to back particular leaders in their political struggles against each other.

Of course, the foreign policy influence of intelligence services depends on the quality of their inputs and their leadership’s influence with key policymakers. If an intelligence chief is not influential, then his service’s influence depends on performance. The MSS’s role in policymaking could be rising as China’s overseas interests expand. When China entered the World Trade Organization (WTO) in 2001, the thought was that there would be an influx of foreign business into China. That was a concern. At the time, the response was to make greater use of MPS. However, changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. When direct political power is absent, influence usually relates to merit and necessity. Senior foreign policymakers would eventually want the MSS in the room, contributing to the discussion. The Communist Party of China’s leadership wanted an MSS looking further abroad than minority groups on China’s periphery. The MSS’ foreign intelligence service is now more similar to the CIA. Another major change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Indeed, MSS has managed to move from backstage, second to MPS, to frontstage, up from behind its bureaucratic competitor in internal security.

The Way Forward

As indicated in its introduction, this post serves as an expatiation of a technique learned long ago for directing one’s thoughts upon developing ideas and insights on issues in international affairs and other subjects of interest. Given its subject matter, it hopefully managed to satisfy the experienced scholar, academic, and policy analyst. By showcasing the generation of ideas and insights on subjects, hopefully it satisfied the desire of students to see examples and will become a subject of inquiry for some. 

By their very nature, insights are inherent to the writer, unique in that way. At least, they should be. No truer are the words, “everyone is entitled to an opinion.” The ideas and insights of the novice writer have a right to be aired equal to that of experienced, published authors in the various fields. Note, however, that eccentric, whimsical, and outlandish ideas are seldom useful and never desirable. In some respect, the process of generating ideas and insights is a form of self-exploration. One’s mind must be open to all reasonable considerations and all plausible possibilities. Nontraditional students should try to apply sensibilities shaped by a multitude of experiences. The length and breadth of their knowledge and experience may allow for a broader understanding of humanity. That is what the world will most appreciate reading.

Saepe stilum vertas, iterum quae digna legi sint scripturus. (Often must you turn your pencil to erase, if you hope to write something worth a second reading.) It is perfectly in order to feel a bit timid about drawing inferences and sharing them for others to review. Accept those awkward feelings, but write down all of the ideas and insight that may develop inside anyway. Have at it! To enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. Ruminate on events in relation to those that proceed them and meditate on what the future may bring. Build on that thinking. Strive to forecast decisions that may shape what might come and proof one’s efforts by watching events unfold in the news. Some of the best ideas and insights may come at inopportune times. Whether one is struck with a coruscating flash of logic, or has a nagging thought on an issue that builds throughout the day, notes must be kept of it all. At one’s earliest convenience, write those ideas and insights down in a notebook, on a pad, or on the back of an envelope. If one can, type them up on an electronic device. Organize them as bullet points if that is easier, however, one must make certain that enough is recorded to ensure that actual ideas are being expressed and that they “feel” compelling. Avoid simply jotting down statements of fact, or worse, simple fragments of your thoughts. State your conclusions about matter! Each expression can be fleshed out and tidied up with editing later. Sticking to this course may not be easy at first. After a time and with honest effort, one should become accustomed to it. Optimally, a writer will effectively generate enough ideas and insights to allow for the selection of more reasoned, potent, and eloquent among them for inclusion in a draft essay. The ability to increase quantity and improve the quality of ideas and insights produced will come with practice. Plus novisti quid faciendum sit. (You have learned more what has to be.)

China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2)

The Headquarters of the Ministry of State Security (above). The primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of advanced technologies from the US. This essay’s focus is not the political warfare effort by MSS. Rather, it provides a few insights on this topic from outside the box on MSS tactics, techniques, procedures, and methods used to keep its ears to the ground and to collect what it needs to improve China’s capabilities and capacity to compete and struggle with the US.

This post should be considered a direct continuation of the preceding one. The complete essay focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. “Part 1,” published on July 31, 2020, provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. This section, “Part 2,” completes discussion begun in “Part 1,” and then it calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China President Xi Jinping (above). President Xi Jinping is the man in charge, the top decisionmaker in China, therefore he has ultimate responsibility for what China has done, is doing, and will do. How China has responded to the crisis turned pandemic so far has been a source of curiosity and absolute outrage globally. The Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. They became particularly warm toward US President Donald Trump. It seems as if China’s leadership will continue to assail the global media with waves of distortions. In the meantime, around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, Chinese President Xi Jinping is genuinely aware of what is transpiring and has set some type of guidance on just how far this whole cabaret should go.

MSS Counterintelligence

A primary mission of the MSS counterintelligence service is the infiltration of all the foreign special service operations: intelligence, counter-intelligence, police forces all over the world. Its primary targets assuredly are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

Certainly, counterintelligence would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Chinese intelligence services are capable of constructing a sophisticated profile of the online activities of individuals. It does not appear, however, that the MSS and supporting agencies have established the capability to identify espionage in the offing. Every now and then, though, they are lucky enough to identify espionage underfoot with hum shoe detective work, online. In an excellent essay published May 7, 2014 on Jamestown, Mattis relays that in May 2014, Guangdong State Security Department (GSSD) of the MSS revealed brief details of an espionage case in which the chief suspect received a ten-year prison sentence. An unnamed foreign intelligence service reportedly recruited the suspect, dubbed “Mr. Li,” in an online chat room. Electronic prowling led him to documents of immense value, a variety of classified military documents and publications. Recognizing that a long price could be had for what he might acquire, “Mr. Li” turned to an online contact “Feige.” GSSD counterintelligence discovered that “Feige” had more than 40 other contacts—12 in Guangdong—spread over 20 provinces and provincial-level cities. Additionally, “Feige” had been an active online persona since 2007, collecting information off of military enthusiast (junmi) discussion boards and using services such as QQ to meet others like “Mr Li.” Those who “Feige” recruited collected military information through friends and contacts, subscribed to sensitive and internal military publications, and even took pictures of local military installations. Although a long price could surely have been had for what he had collected and provided the foreign intelligence service, “Mr. Li” was paid only a few hundred renminbi per month. Chinese authorities did not identify the foreign intelligence service behind the theft of the military secrets. Nevertheless, the case compounded an apparent sense of siege in Beijing over what then called US Internet hegemony, and the prevalence of foreign-made communications technology in sensitive Chinese systems. There were also allegations that the US had managed to exploit Huawei’s equipment, a concern that has since flipped the other way. For a state known to be as controlling of information as China, the reality is that an incredible amount of sensitive information was publicly accessible. It was all overwhelming for China which was well-aware of that its counterintelligence services could not stem figurative waves of attempts to penetrate its systems. The MSS will always want Chinese citizens to believe its elements such as the GSSD are as present as “air and water” with “information on everyone.” However, contradicting that, Chinese security officials were also reported at the time that more than 70 percent of state secrets cases involve information being leaked or passed to a foreign intelligence service online It led to changes.

It goes without saying that Chinese military and civilian intelligence services have immensely improved their cyber capabilities. Efforts by the, have tormented advanced industrialized countries. However, lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. One might venture to say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Staff burning massive bundles of documents within the compound of the People’s Republic of China Consulate in Houston, Texas (above). Lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. The transition back to paper would be the best answer. One might say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints against those caught indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun, a Chinese-born naturalized US citizen, pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.” Chun’s Chinese intelligence contacts provided him with financial payments and partially paid for a trip to Italy and France, during which he met with a Chinese intelligence officer.

In order to develop ways to counter FBI efforts against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding FBI surveillance strategies, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along the FBI has had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight.

Kun Shan “Joey” Chun, (above). Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.”

In the case of former CIA case officer, Jerry Chun Shing Lee, who, in November 2019, was sentenced to 19 years in prison last year after pleading guilty to conspiring with MSS intelligence officers after he left the agency in 2010. According to the US Department of Justice, Lee had created a document including “certain locations to which the CIA would assign officers with certain identified experience, as well as the particular location and timeframe of a sensitive CIA operation.” Lee also possessed an address book that “contained handwritten notes” related to his work as a CIA case officer prior to 2004. These notes included “intelligence provided by CIA assets, true names of assets, operational meeting locations and phone numbers, and information about covert facilities.” Allegedly, Chun’s espionage activities led to the deaths of a number of the CIA’s Chinese informants.

The damage done to CIA networks and at least one ongoing operation in China, accompanied by the tragic loss of any operatives or informants as suggested by news media reports would create a sense of immeasurable anger and betrayal within CIA. However, the Agency has been through similar situations before with notables such as Edward Howard, Aldrich Ames, and Harold Nicholson. MSS counterintelligence would capitalize on Lee’s efforts by creating an active template based on how its case officers operated, the types of operatives and informants targeted and methods of their recruitment. Further, typical locations for meetings could be plotted and ways and means to surveil new operations and collection efforts could be developed. Most importantly, the information could allow for the conceptualization of the potential moves that CIA might make to resurrect lost networks and activities against China. Countermeasures would put in place to potentially thwart new recruitments and stymie new technologies that could support operations in the field and run alongside human intelligence collection.

Much ado was made in the US Intelligence Community about the espionage case of Ron Hansen. In a May 2019 guilty plea and plea agreement, Ron Hansen acknowledged attempting to communicate, deliver, or transmit to MSS intelligence officers, information concerning US national defense with intent or reason to believe that information would be used to harm the US and provide advantages to China. Hansen was a retired US Army Warrant Officer with experience in signals intelligence and human intelligence and former Defense Intelligence Agency civilian intelligence case officer, fluent in Mandarin as well as Russian, with top secret security clearance, In early 2014, the MSS targeted Hansen for recruitment and he began meeting with them regularly in China. During those meetings, the MSS intelligence officers described the type of information that would interest them. One of the most important taskings Hansen received was collecting  forensic software and sending it to the operatives in Beijing without first obtaining the license from the US Department of Commerce which constituted a crime. As Hansen described events, he partnered with two Chinese nationals, to whom he identified “Amy” and “Robert,” via an office he maintained for his company, H-11 in Beijing. Amy and Robert operated Beijing Hua Heng (Infosec) which partnered with H-11 to sell computer forensic products in their company. Robert informed Hansen that he maintained close connections to several contacts in Chinese intelligence. In November 2016, Amy instructed Hansen to purchase and send to her in China, Recon software from Sumuri LLC, a Delaware based firm. She specifically requested the Recon Mac OS X Forensics with Paladin 6 software, which contained cryptographic capability. Despite being aware of US laws forbidding the export, Hansen did so despite being aware of US laws forbidding the export. In December 2016, Arny instructed Hansen to purchase the Intella 100 software from Vound LLC, a US company that provided products related to forensic search, e-discovery, and information governance. He obediently bought it and had it shipped it to her in China in January 2017. Again, he did so, despite being aware of US laws forbidding the export.

Tasking Hansen to grab forensic software could surely have served a counterintelligence requirement. Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. Advanced forensic software could allow MSS counterintelligence officers to conduct in depth analysis of user files to collect evidence such as documents, pictures, internet history and more. MSS counterintelligence could use the software to monitor communications and collect information on dissidents, ethnic groups, suspected foreign intelligence operatives and informants, even foreign intelligence officers of some countries, visiting foreign officials, businessmen, and tourists alike. It could support the theft of intellectual property and trade secrets.

Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. A MSS counterintelligence officer was not supposed to be the same as his internal security service or law enforcement counterpart. Unlike such, displeasure and frustration over denials of intercepted foreign intelligence officers and agents in interrogations generally should not manifest in violence.

There is no reason for frustration over denials of intercepted intelligence officers, operatives, or informants to result in violence. If progress through interviews indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. When MSS managers have determined the situation demands rough treatment, typically some sort of exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, coercive measures are employed to include forms of torture. Expectedly, “good managers” will be ill at ease with that. Much to the grief of foreign intelligence officers, foreign agents, and Chinese citizens, it is that style of pursuit which has been honed and polished over the years by MSS counterintelligence officers.

Sensation seekers might believe that being involved in authentic espionage would be thrilling. However, there is plenty of real danger involved. Once the MSS officer is in the ground working in a foreign land, there is always the chance of arrest while carrying out one’s duties or expulsion of the officer persona non grata. From what has been observed, when US counterintelligence and law enforcement ensure that such interceptions of Chinese intelligence officers, operatives, and informants receive high profile reporting, to include conducting press conferences and widely disseminating press releases, it is akin to hanging out MSS’ dirty laundry for all to see.

MSS counterintelligence officers surely caution their counterparts in MSS foreign intelligence to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. Experienced hands will take counsel not from their fears, but from their intimations. They know when to seize up and walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio. Belgian authorities provided significant assistance with the arrest and extradition of Xu to the US. Among Xu’s tasks as a MSS foreign intelligence officer in the US was to obtain technical information, including trade secrets, from aviation and aerospace companies not only in the US but throughout Europe. Xu often cloaked the true nature of his employment, by representing that he was associated with Jiangsu Science & Technology Promotion Association. From December 2013 to October 2018, Xu worked, traveled, and communicated with individuals associated with or employed by MSS and a number of Chinese universities and institutions, particularly Nanjing University of Aeronautics and Astronautics. Xu also actively targeted specific companies in the US and overseas that were acknowledged to be leaders in the field of aviation and aerospace technology, design, and manufacturing. Within these aviation companies, Xu and other individuals, some of whom were already known to law enforcement, would spot individuals who they deemed to be “experts” in those aviation companies, and who could potentially be targeted and recruited to travel to China, manipulated under the belief that they were traveling to China merely for “an exchange” of ideas and to give a presentation at a university. Xu and others would pay the “experts” stipends and would arrange for and pay expenses associated with their travel to China. To achieve their objective of collecting specific aviation technology documents and information, Xu and others exchanged messages concerning the types of information that they desired, and actively discussed methods for obtaining the desired information. That effort would include the use of codes and series of letters in place of the technology being discussed and the name of the company targeted. The arrest of Xu, who handled both Ji Chaoqun and Weiyun Huang, (whose circumstances were discussed in “Part 1” of this essay) preceded their arrests.

Xudong Yao, also known as Yan Jun Xu ( above). MSS counterintelligence officers surely caution their MSS foreign intelligence counterparts to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. They must know when to seize up and when to walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio.

Doubtlessly, if MSS officers are caught they will be told what they can say if “pressure” is severe enough. The information would likely be designed as an active measure to help distort a foreign counterintelligence services understanding of MSS tactics, techniques, procedures, and methods. Given estimates by experts on the potential volume of their intelligence activities in the US, a casual observer might expect the impact of a loss here and there would likely be viewed as nominal with respect to the overall picture. However, intercepted MSS officers, who stumble due to poor tradecraft, a simple misstep, or for reasons unknown to MSS counterintelligence, may not recover beautifully if returned to China. To start, the MSS would not at all like having its officers identified in China, identified in the US, or even worse, see them apprehended by US counterintelligence services or law enforcement. Further, it would not appreciate having an entire operation or network in the US detected and effectively neutralized

For the MSS officer, Commandment 11, “Thou shall not get caught!”, applies. Being caught while on the beat will never be chalked up as a sword scratch or a badge of courage. Yet, the greatest problem would be the embarrassment that it would cause the MSS as an organization, the Chinese government, and the Communist Party of China. The intercepted officer would have to face the reality that he failed at his task. Facetious managers and colleagues would likely say he or she was not up to the job. If there was  some error in judgment, failure to do things by the book, or wilful dereliction for failing to attain proper authorization before acting, the size of the failure would grow exponentially. Doubtlessly, the officer would be held out as an example of how an MSS officer should not operate. Concerning the situation of the hypothetical errant MSS officer, Il a foutu la merde dans sa vie.

The manner in which the Communist Party of China might come down on the officer for the failure would likely depend upon the political temperature at the time in Beijing. One could use the Party’s response to the bad news of the coronavirus outbreak as a yardstick. There would be no way to conceal the matter from the Communist Party of China. Even if the attempt was made to do so, informants inside the organization would likely report the matter up to Party leaders, making them familiar with the case before the matter even moved through MSS channels and managers and senior executives there were read-in on everything. The Communist Party of China would be especially interested if it concerns the US. One could only imagine the reaction of Party leaders if they were to find out about the arrest or PNG of a MSS officer via the US news media before hearing from its own government.

Putting aside the reality that a vital MSS intelligence operation may have been disrupted or destroyed and putting aside the potential negative reaction by the Communist Party of China, one might consider that for MSS senior executives and managers at headquarters, the saving grace would be that if the US counterintelligence were doing so, it meant attempts recruit the officer and compel him or her to play the double-game against their former colleagues and bosses as a counterespionage operative for the US failed. To advance a step further on this point, MSS managers would also recognize that burning the MSS offficer would be a palliative step and the only “constructive” option left for US counterintelligence. Holding a captured MSS officer in prison instead of putting them out of the US, PNG, would almost ensure some type of retaliation against an US intelligence officer or merely a suspected officer would be taken in China. In effect, a de facto modus vivendi exists. As for the future of the MSS officer caught, by burning him or her with heavy news media coverage of his or her identification or arrest could possibly destroy the officer’s prospects for receiving another overseas posting or participating in future intelligence operations leaving them in a solitary despair. MSS can always hire and train another.

A considerable concern for any counterintelligence service regarding foreign intelligence officers and their operatives and informants functioning in foreign territory is the threat of betrayal. Indeed, intelligence organizations in general spend much time and energy hunting among their own ranks for foreign spies. Of course, concerns are always raised among Chinese citizens when anyone with whom they may have just met or were in contact for other reasons, suddenly showed what could be considered under the circumstances as an eccentric interest in them. They could imagine that such inquires could be a trick perpetrated by the security services to test their loyalty. That surely causes the most fear. Defections from the MSS do happen, but as aforementioned, they are somewhat rare. Nevertheless, it is guarded against as surely not all MSS officers are gun barrel straight. At least, this would be the most likely presumption of Chinese counterintelligence officers. Certainly, all intelligence services have their share of problems with errant officers. Some, such as MSS, likely have less problems than most. However, even the clean, loyal, and obedient will occasionally look over their shoulders because of that. Bent intelligence can serve any preconceptions, and it often does in many intelligence services; sometimes purposefully and wrongfully to destroy an innocent officer’s career.

MSS counterintelligence managers with practiced hands know the first step of a breakdown in a officer’s sense of duty to China and the Communist Revolution can take place as far back as when an individual is hired who might manifest reactions such as jealousy and envy over the success of others faithfully operating in the field and achieving many victories. The second step of that breakdown usually happens when those less-than qualified hires are placed in a position to monitor, audit, and evaluate the work of those in the field. Those inner rumblings are often more than just a matter of maturity or being uptight. They are character issues that should have been resolved long before those particular individuals met their MSS recruiters. Their varied emotional disorders subsequently became most apparent after they began working.

A satellite image of the imposing MSS Headquarters in Beijing (above). In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the hypothetical advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, ministers, and MSS senior executives the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not within the depths of the massive Beijing Headquarters of the MSS, itself.

MSS Large Data Processing of Technologies Stolen from US Conceptualized

Facilius per partes in cognitionem todus adducimur. (We are more easily led part by part to an understanding of the whole.) With dozens of operatives moving about the US with their eyes wide open and ears pinned back attempting to obey instructions from MSS officers either back in China or on the ground in the US, a backlog of information collected would be expected. The volume might be seen as problematic by experts in the US. However, MSS senior executives and managers, much as the MPS and all the parallel PLA and Communist Party of China intelligence services and units and all of the iterations of Chinese intelligence services that came before them, would apply reason to find a way to handle bundles of reports from intelligence operatives and informants. It stands to reason that a division exists which is engaged in piecing together information and data stolen from the US to advance its own technologies. China would hardly vouchsafe such.

In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the prospective advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, its minister and deputy ministers, and senior executives, the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not some inner sanctum of the massive Headquarters of the MSS in Beijing, itself. Visualize, in some edifice in China, several MSS analysts, all of whom are experts on US and other advanced industrialized countries’ military, scientific, medical or artificial intelligence technologies, engaged daily in an intelligence practice of uncovering the latest, most advanced, and most desired information of foreign technologies from collected intelligence. In an intelligence tradition from the earliest days of CDSA, they can be imagined mining through foreign sources in a time consuming process akin to sifting through dust, yet enjoying the hunt so to speak.

One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II in the United Kingdom, yet they are isolated from the conditions of the past. That art, as with many aspects of intelligence collection, has become electronic. The label analyst should be interpreted widely to include researchers who regularly use secret intelligence. Individuals drawn to and hired for such work would have an acumen for being able to work on what are essentially puzzles. Solving puzzles is actually a science dubbed enigmatology. The analysts turned “enigmatologists,” or visa-versa, would most likely be elated to keep their brains on edge. They would have little difficulty remaining occupied forever long it takes to put together pieces of information to create the picture of a new technology or new research and development project. When such a figurative puzzle is cracked, new ones would very likely be immediately placed before analysts.

Bletchley Park, a country house in Buckinghamshire, was bought by the Secret Intelligence Service (MI6) in 1938 as a site to which the Government Code & Cypher School and MI6 could be evacuated when war came. However, Bletchley Park’s great success was as a result of the mechanization of the decryption process keeping pace with the mechanization of encryption. Although the decryption of Enigma is the best known of Bletchley Park’s exploits, other successes, such as the decryption of Luftwaffe hand ciphers, and the development of Colossus, the world’s first computer which solved the enciphered German teleprinter, made a significant contribution to the Allied victory. One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, has become electronic.

While the supposition may sound a bit ordinary, perchance there would be some sort of analytical triage by the most experienced analyst. After some possible sorting and collating through the use of artificial intelligence given the volume of what is collected, perhaps senior leaders and best experts from the analytical team might gather weekly or daily to perform that task. It would also give the supervisors a good sense of what might be coming down the pike for examination. The areas of expertise of participating supervisors, themselves, would reflect countries from which the technologies would be stolen and would be proficient in the respective languages of the industrialized countries from which the reports, plans, schematics, charts, and other data would originate. The final sorting would be done by supervisors intimately familiar with at least one area of the technologies stolen. There may be information gathered on a new US technology or ongoing research and development project that is already in sufficient quality and quality to send up to higher levels of management to create additional collection requirements for MSS officers and operatives in the field to help complete the picture. Even if there is a relative paucity of information on a foreign technology, if it is a technology discovered that is so advanced that it would have the potential to be a game changer in terms of the development of Chinese technologies or might be of the utmost importance regarding China’s defense and national security, it would very likely be brought up to senior executives who would decide how to pursue it. Counterintelligence would also likely be involved to make certain that any miracles are not simply sophisticated material dangled as bait for some elaborate trap. The supervisors speculated upon here would also be the ones to deliver information in formal reports or as presentations and desk-level briefings to customers in government.

After they receive a batch of information, the emphasis of the analysts’ search through it will be to identify and consider new discoveries, as well as determine whether the information is simply interesting or can be given higher meaning. Much as case officers may run more than operative in the field, each analyst or team would likely work on, not many, but very likely more than one puzzle at a time. The foundation of the puzzle would most likely be formed by a pattern of information. Each bit of new information may be a possible missing piece. Each new piece gives one an idea of what the next piece might look like. In a mosaic, stone fragments are cut to for a particular image the artist has in mind, a preconception. With a puzzle, the image is created  with each new piece. There is something to learn every time the image is developed. Eventually the image figuratively begins looking back at the one working on the puzzle telling its story. Priority is likely given to those puzzles closest to solution or those that begin releasing information about some new exquisite US technology that MSS senior executives, and thereby the Communist Party of China wants to get its hands on. As a next logical step, the collection of pieces for the remaining parts of the puzzle by operations departments from Beijing or the provinces can be directed through collection requirements. Perhaps the same analyst or analytical team or a group of troubleshooting technological experts would take over the case at that point.

One exercise would be to find commonalities among reports on a US research and development project. The likely thinking in each unit would be that there is always something in what has been collected, it just needs to be fully twinkled out. Imaginably, instead of having too few clues, in some cases there would be too many. To pull out a particular strand from a mass of information requires a very clear sense of priority. Doing that would also serve a counterintelligence purpose. The analysts would likely be trained to know there are patterns in reporting. A new technology will rarely simply emanate from  a single source, with no other references to it and no communication about it.

When pieces of information might be missing, there would always be the possibility that the next batch of reports from the US might help to do that. If that telling piece of information is not in the next batch, it may be in the batch after that. There are no blind alleys. If a report says something is there then it is there. The analysts would be fully cognizant that a considerable effort is being made within the US to conceal secret projects. Success at their work is likely invigorating, and likely impel more strenuous efforts. No matter how slowly any puzzle would develop, there would unlikely be any case regulated to something akin to a cold case file. If any information exists on a technological project, MSS managers know that there is metaphorically something cooking in the US. With several civilian informants working inside and around technological development centers, the day might come at any time when pieces of puzzle take on greater meaning and the puzzle starts telling the analysts something considerable.

While the image that the puzzle presents may not yet be completely in focus, the most experienced, knowledgeable, and resourceful eyes, masters in the business of sorting these puzzles out will be put on the matter. Such a case would likely become a collaborative focus. After a while of that, the newly discovered technology would very likely come into focus and resources of operations would be directed to the effort to hunt down the remaining elements and get them to China. In some cases, the few stray pieces of the puzzle could be conceptualized and reproduced by technology experts in China. What one can invent, another can surely reproduce.

Students of Nanjing University of Aeronautics and Astronautics studying in the library (above). One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, have become electronic. Chinese colleges and universities graduate a near endless list of qualified candidates for every year. The Nanjing University of Aeronautics and Astronautics in particular is a happy hunting ground for MSS recruiters. Given in part to the availability of a highly qualified pool of potentials, Chinese intelligence services surely have the personnel capacity to handle the loads of stolen information coming in from the US and other advanced industrialized countries. The two female students at the bottom right of the photo are apparently taking a short break from all of their serious academic work with a little diversion.

There must be a balance in all of their analyses without a smidge of bias. In their analytical product, they would need to guard against apophenia, seeing patterns in unrelated things. Engaging in informal speculation would be appreciated, some US technologies would possibly seem so advanced as to be called exotic. However, assessing any to have a potential bordering on science fiction would face disapproval. No one would be allowed to attach importance to anything purely arbitrary. Latching on to something definitively trivial will be proven when nothing ever follows to assist in solving the matter.

Reports that the analysts received would unlikely solely focus on technologies although that information would have primacy. Reports that identify government agencies, offices, supporting specific cutting-edge research and development of technologies. Where those government agencies are, that is where the MSS will very likely be prowling. Names of experts from US government departments and agencies or from private organization experts that came up related to a particular technology may among other things help to understand the project’s importance. Reports on how information is kept secure would certainly be useful. Information on security officers associated with protecting a project may be important for operational purposes. It may become necessary to know who they are, what they are doing, what they are saying, and what their routines, interests, habits and health are, particularly if it is determined that the door should be left open to possibly conducting a covert collection effort against the office or facility for which he or she might be responsible.

Assumably, morale would be high in such a foreign technology assessment office given its victories. In terms of supervising performance and ensuring a quality work product, there would very likely be a nose to the grindstone, deadly serious, scholarly approach demanded of analysts in their work. One would unlikely hear much jolly chatter in the workplace. Imaginably, there would unlikely be any of the peculiar infernal squabbling in morning meetings and weekly reviews that has been dubbed part of a creative process within certain Western intelligence and counterintelligence services. It is unlikely that competitive urges, ego and ambition impell the work of the MSS enigmatologist. Again, as they are only human, there may be some elements of each that pushes each to be their best. While there is an urgency to the work, getting things right would be most important and to that extent accuracy would equate to speed. There would surely be one-to-one mentoring, with more experienced team colleagues who offer support, in addition to that offered by line managers. Nearly everyone appreciates acknowledgement for a job well-done and pat on the back from colleagues and managers, coaches and mentors. Respectful, motivated, and dedicated, younger members of teams usually want to make a good impression upon older, more experienced ones, and typically thrive on recognition, attention, guidance, approval, and praise from them. (Supervisors must reinforce good work, extinguish bad habits and that sort of thing.) If Beijing would even discuss the existence of such an analytical group, it undoubtedly has the world believing that the desire to do a good job for China and the Communist Revolution provides all of the impetus needed.

Unlike other analysts who might rotate between operational, analytical and managerial duties, analysts would essentially work in a professional closed shop. Successful analytical work of this kind would require unbroken contact with information on new technologies as it arrives to avoid gaps in specific knowledge and assessment capabilities that would naturally occur if the analysts most familiar with the technology were moved out and replaced with analysts from some other area such as foreign military operational analysis, counternarcotics, or organized crime. Technology assessment would be a high priority specialization and any advancement would take place within it.

Provincial and local departments and bureaus of the MSS often use cover names inside China such as “Shanghai Municipal Government Office number seven.” It could be the case for Shanghai State Security Bureau (SSSB) that Municipal Government Office number seven is actually the Shanghai State Municipal building (above). Two satellite dishes are often found on office building roofs of MSS departments and bureaus. (See the satellite dishes on the left and right sides of the municipal building roof. In a photo in Part 1 of this essay, notice two similar model satellite dishes atop the roof of the Wuhan Hubei National Security Office which is the home of the Ministry of State Security Bureau.) Going out on a rather slender thread, greatcharlie ventures to say the fact that two “MSS-style” satellite dishes sit atop Shanghai State Municipal building, makes it a candidate for being where SSSB resides or at least some shop of the active spy organization resides.

An Ugly Truth the MSS Surely Knows About the US Counterintelligence Services

MSS senior executives and managers have much with which they can be satisfied regarding their organization’s performance against the US. Certainly, their enthusiasm over the performance of their personnel has been ineffectual within the organization. MSS foreign intelligence officers, operatives and informants have amassed a record of considerable success in the US and continue to plow ahead. Some analysts of Chinese intelligence might say the extraordinary success of MSS was partly founded on luck. The organization was smart enough to ratchet up its operations at a time when US concerns over the capabilities and capacity of Chinese intelligence were astonishingly lax especially in person contacts. Employees at lower levels, drivers, housekeepers, managed to insinuate themselves into the offices and homes of US Senators, US Representatives, hotels, resorts, military bases, government departments and agencies, and important offices of major US industries. Needless to say, that is the kind of luck that tends to follow those who usually become pre-eminent in their field. However, MSS managers are comfortable enough to operate so boldly in the US not because they feel their officers, operatives, and informants are so superb. Its managers feel less threatened because, as aforementioned, it recognizes US counterintelligence services have allowed themselves to deteriorate to some degree in nearly all areas, but especially concerning personnel, over recent years.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) US intelligence, counterintelligence, and law enforcement have all but admitted that they are somewhat baffled by what the MSS and its sister Chinese intelligence services are doing. They literally advertise their limitations. Surely, US counterintelligence knows all of this is a part of the reason why it is somewhat in the woods regarding Chinese intelligence operations in the US. They are happy that very few are aware as to why, too! There has been a never-ending rosy US news media narrative about US intelligence and counterintelligence services and law enforcement which has influenced the US public’s understanding of how well the counterintelligence job is being done. That new media narrative intensified immediately after the September 11, 2001 terrorist attack on the US. The US public’s impression of US counterintelligence work has also been shaped for decades by Hollywood via bedazzling images of near supermen and superwoman catching wretched enemy intelligence agents, terrorists, and international organized crime figures. Even greatcharlie must accept some responsibility for creating a certain image of US intelligence and counterintelligence services and law enforcement by typically referring to the “somber and astute” professionals among them.

True, the majority of officers within the civilian US counterintelligence services, energetically and earnestly do all they can to thwart and defeat the activities of foreign intelligence services operating in the US. Those proper US counterintelligence officers indeed have their eyes on the MSS and other Chinese intelligence services. The presence of such professionals in US counterintelligence should have been enough to cause concern and caution for the MSS as they ventured into the US. MSS officers should literally tremble as they approach, and as they begin to move about on the beat, they should be constantly and carefully looking over their shoulders. Unfortunately, in the larger world of US intelligence and counterintelligence there are other officers who could hardly be characterized as such.

Fate would have it that there are a number of US counterintelligence officers who do not perform in such a praise worthy way.  While the type of errant officer identified here may not be present in every office of a US counterintelligence organization. The errant officers described do not move around much as gremlins doing wrong at every turn, breaking every rule. Their numbers are still sufficient enough that they are noticeable to their adversaries as much as they are to their colleagues. What the MSS doubtlessly picks up about the errant officers that arguably presents much hope and perhaps even joy when MSS senior executives and managers in charge of US operations. MSS managers have very likely observed the errant officers thinking and behavior either rising to insanity or sinking to imbecility. They have likely heard all of their tales of woe. Most are distraught by the denial of overtime, reductions in allowances for expenses, and relatively modest salary. Some feel benefits such as medical and dental insurance are insufficient. Others are angered not only by those factors, but also by having to distribute significant payments to informants and multiple operatives greatly in excess of their salaries. Trouble really begins when a case or cases allow the errant officers access to funds for the payments to operatives and informants. As it is done under the honor system, the door is opened wide for embezzlement. (The details of the varied devilish artifices used to embezzle are too hefty to detail here. The decision to allow case officers of US intelligence and counterintelligence services access to such considerable amounts of taxpayer dollars in this day and age without the strictest forms of oversight is of questionable judgment.)

MSS managers surely have noticed that when engaged in investigations against their intelligence officers, operatives, and informants, such errant US counterintelligence officers are satisfied in performing poorly and being incompetent. Indeed, when it comes down to identifying, intercepting, neutralizing, and recruiting foreign intelligence officers and operatives, the errant officers are hardly game for the trudge. Typically, a history of rarely being able to get anything started in a recruitment will fill the performance records of their sort. Even when given an opportunity to bring in a foreign intelligence officer or operative, the whole case is usually muffed. It is the practice of most US counterintelligence services to give officers full control of their cases, with supervision from other special agents or case officers on a management track–often with less experience on the field than themselves. Having been given the authority from managers and those novice supervisors, the have no reservations about chasing down a false lead regardless of the fact that they have been read-in on all that indicates there is nothing at all to follow. Interestingly, money somehow never seems to be short for their cases. Bringing a case to resolution would not allow for the use of varied tricks to enrich themselves as the continued reconnaissance and surveillance of a target and use of informants without having any real counterintelligence goals. The operatives or informants in contact with the adversary are kept active enough and encouraged enough to hold their interest and to compel them to stay involved. In some cases, everything might abruptly stop if some change in the office, some feeling–call it intuition–causes the errant officers to be concerned. Most of the time, however, the errant officers become so comforted by the ease with which they managed to collect their ill-gotten gains, they become slow to notice any nuanced changes that may happen around them. Supervisors may push for results but they typically become accustomed to getting nothing from the errant officers. At best, they will push to shut down the case, but the damage will already have been done to the effort against the foreign intelligence service. In some rare exception, the errant officers will collect enough on an innocent citizen to secure an indictment. An offhand remark or joke made to a clandestine contact or false statements signed by the errant officers’ operatives tied to arbitrary evidence wrongfully cooked to take on higher meaning may be enough to prompt eager prosecutors to move against the innocent.

Bewildering to MSS managers but perhaps the most noticeable of the errant officers behaviors that immediately benefits not just the MSS, but all foreign intelligence services operating in the US, is the employment contractors who will bizarrely hire untutored surveillance operatives right off the street even for an intended clandestine operation that is supposed to be finely calibrated. In most foreign intelligence services, great care is placed in the selection of operatives for a task as important as surveillance. Due to the heavy reliance on the competence of observers, reports they produce, and even their immediate impressions. All of that information will impact data extrapolated and inferences made. Nevertheless, money hungry contractors to whom those services often outsource such work could apparently careless about such matters. If one were to put a good spin on the practice, the grand thought behind the practice would ostensibly be that placing more eyes, even nonprofessional, untrained eyes, on the target allows for better coverage of the targets activities, better. Yet, the real result is simply the accumulation of several observations, varied in accuracy and quality. False observation can often be provided by nonprofessionals in an ordinary case seeking to puff themselves up, as if to say: “Hey, look at me! I am a real spy!” Indeed, this lesser form of “spying” may bestow a certain dignity to the mixed bag engaged in it. However, the real magic behind the practice is the potential for dishonor that it creates. Since the hires are essentially transient, not all names on a list of impromptu operatives may be genuine. Errant officers can benefit themselves by collecting the recompense of  nonexistent operatives added to the list. Experienced counterintelligence hands are well-aware that repeated, considerable hiring for surveillance, especially in massive bundles for any case could be a beckoning initial indicia of someone trying “to give themselves a pension.” When that surveillance and investigation results in nothing, it is a red flag.

How MSS has likely benefited from this is obvious. MSS operatives would only need to put themselves in a position to be hired in any more formal process of becoming a surveillance operative for a contractor for US intelligence and counterintelligence services and law enforcement. As some will tend to seek a diverse pool of operatives, they will usually consider all applications with scant vetting in part to accelerate the hiring process but mostly to avoid the expense. After making certain they have presented themselves as qualified candidates, the MSS operative is very likely hired. If they can situate themselves in the vicinity of a diplomatic installation of the Chinese government or the proximity of a site in which MSS or another Chinese intelligence service might be operating, like a canary in a coal mine, a call or text from a US counterintelligence contractor request the operative participate in a surveillance nearby will notify the MSS that their people may be under observation. In addition, the MSS operatives can make a few extra dollars courtesy of the US taxpayer. (While it may strike one as daylight madness, one can rest assured that it is actually happening daily!)

What may be shocking and surprising to MSS managers are those occasions when errant officers, in an effort to manufacture a case, will submit knowingly false information to the Foreign Intelligence Surveillance Court (FISA Court) to secure warrants and authorizations for warrantless searches and surveillance against a wrongly targeted citizen. It happens more than the average US citizen could imagine. The bigger the lie that they tell about the innocent citizen, the more significant the case will be. That means greater resources will be alloted for it. In the process of obtaining FISA Court warrants and. authorizations, administrative personnel in the errant officers’ counterintelligence organization, particularly attorneys, who have the responsibility to oversee the correctness of applications to the court, have been known to simply rubber-stamp them. As for FISA Court judges, they tend to simply accept whatever is in the applications as valid.

A counterintelligence focus on the innocent US citizen will always be at the errant officers instigation. On one end of the chain are errant officers focused on enriching themselves with taxpayers dollars on the other end is some poor chap, knowing by God that he is innocent, who is nevertheless having his life turned upside down wrongfully. The errant officers will not hesitate to manufacture false information to submit to include tutoring so-called informants in preparing false statements for them. Sadly enough, as mentioned earlier, the errant officers can pick out informants who would be willing to prepare such statements and they will be handsomely paid. To paraphrase a recent remark by US Senator Charles Schumer of New York on the tactics, techniques, procedures, and methods of the US Intelligence Community, they can come at you six ways from Sunday. Indeed, under the incredible weight of the US intelligence and counterintelligence services and federal law enforcement, some of the innocent are unable to survive without being harmed psychologically and physically. To enlarge on the point of damage done by errant US counterintelligence officers who misused and abused power and the tools provided them to protect the US, there are more than a few cases that are well-known to those who have worked in the intelligence industry. Rest assured, MSS managers have kept track of US news media reporting and collected information about those cases. Among the high-profile cases is that of Wen Ho Lee.

Wen Ho Lee leaving a Washington, DC courthouse in 2000 (above). In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. The FBI investigation into the case erroneously pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI later eventually determined that Lee could not plausibly have been the source of information on the W88 to China. Still, the FBI moved forward with its investigation of Lee. Lee was charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Lee would file and win a lawsuit against the US government and five news organizations for leaking information that violated his privacy.

Circumstances concerning Wen Ho Lee were complicated, but not so much as to evolve into an episode so tragic and regrettable. Boiled down, his life, liberty, his ability to go on quietly pursuing what made him happy as a US citizen was torn to shreds based on a rush to judgment and the wrongful use of the awesome powers provided to the US intelligence and counterintelligence services and law enforcement to protect the US public. In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. Allegedly due to certain pieces of evidence, the FBI investigation into the case, Operation Kindred Spirit, pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI was made aware that Lee, a US citizen and University of California at Los Angeles (UCLA) scientist at the Los Alamos National Laboratory, travelled twice to China in the 1980s to meet with scientists. During a interview with the FBI, Lee admitted that he had been asked by them to supply information that would assist China in developing a nuclear missile force. On a polygraph test administered by the FBI, it was indicated that Lee was not always being truthful in his responses. An examination of his computer revealed that he had transferred classified documents to an unsecured network and in the process deleted the security classification in the material. Reportedly, the information was accessed 40 times on a computer at the UCLA student union by an unknown user.

As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by UCLA on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 to China. The normative hope, yet perhaps a bit optimistic one given the players involved, would be that once exculpatory information existed that should prove one’s innocence, a FBI investigation would be halted. Nevertheless, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy. In August 2004, a US District Court judge in held reporters from four of the news organizations in contempt for not revealing the source that identified Lee as a spy. The government would pay over $895,000 to cover Lee’s legal fees and taxes. The news organizations paid Lee $750,000.

From the ostensible professional side of what occurred, one might say FBI investigators may have measured the impact of what they were doing in terms how they looked before managers and whether their case at least had the appearance of being viable. They did not measure their impact in terms of the population of which he was part, Chinese-American professionals working in national security areas, many of whom were left fearful of being looked at or pursued whenever an espionage case had a China nexus. Indeed, Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men hiding behind the shadows who possessed a little brief authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

For the MSS, the Wen Ho Lee case undoubtedly provided considerable lessons and the possible makings for a countermeasure to thwart efforts by US counterintelligence against its foreign intelligence operations inside and outside of the US. MSS managers would know better than anyone that Wen Ho Lee was not functioning as an intelligence operative for their organization or any other Chinese intelligence service. Given that Lee’s visits to China, professional discussions with scientists, and conversations with MSS, which its officers furtively initiated and to which he did not respond to positively, apparently served as indicia that he was a Chinese operative, US counterintelligence services, in this case the FBI, made the decision to act aggressively toward him. Doubtlessly, repeated authorizations for searches and surveillance were secured from the FISA Court and the pressure placed on Lee was intense. MSS managers surely from a distance, and at times likely up close, monitored how US counterintelligence resources were poured into Lee’s case. Meanwhile, they would smile as MSS officers, operatives, and informants, on the ground in the US, perhaps in the very locations in which US counterintelligence officers were surveiling and investigating Lee, were functioning with seeming impunity. What shrewd MSS managers likely reasoned from the episode was that calling more Chinese-American scientists, engineers, academics, and other scholars to China for conversations with their counterparts, would allow for the creation of dozens of potential decoys, or, to use the parlance of the intelligence industry, unwitting “dangles” out of those visiting experts which US counterintelligence services perchance would chase around whenever true MSS officers, operatives, or informants stole highly-prized information and data from the US. The tactic would be relatively low cost, low risk, and US counterintelligence services would really do all the work to make the effort successful. There would likely also be the hope among MSS managers that US counterintelligence would even chase Chinese-Americans that the MSS had no contact with whatsoever. What is presented here is by no means an unwarranted extrapolation. The question that should really pique interest is whether the MSS had such a countermeasure in place long before Lee first visited China to speak with scientist counterparts. While one might expect they have been interviewed regarding such a possibility, defectors, whose own foreign intelligence activities were likely compartmentalized, would unlikely know about a secret Chinese counterintelligence program such as the one hypothesized.

Robert Mueller (above). Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump to prove that he and his campaign colluded with the Russian Federation. In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authrizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decided to take on the US President and give some new tactics a try. Every step taken against Trump’s campaign and administration was undoubtedly well-rehearsed in prior cases. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017.

Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump for collusion with the Russian Federation and the subsequent investigation of the administration of US President Donald Trump. Investigative journalists and concerned Members of the US Congress have informed that the wrongful, ghastly spying was conducted under the name, “Operation Crossfire Hurricane.” In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authorizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. Incontrovertibly, the activities of US counterintelligence officers, themselves, ironically could have impacted the outcome of the 2016 US Presidential Election. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decide to take on the US President and give these tactics a try. Every step they took against Trump’s campaign and administration was undoubtedly well-rehearsed in a great number of prior counterintelligence cases. The conspirators were seemingly absolutely confident in the prospects for their success. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017. Mueller’s office has issued more than 100 criminal counts against 32 people. Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit gulit to lying to the FBI about his contacts with the Russian Federation ambassador to the US.

As of this writing, much attention is being given to senior executives and managers involved in the illegal activity against both President-Elect Trump and then President Trump. However, the willingness of a number of line officers in US counterintelligence to commit wrongful acts, and failing to report malfeasance and illegal actions of their superiors leaves no doubt about the complicity of more line officers than at least publicly acknowledged on the matter. They operated against a trusting presidential candidate, and that candidate became president, and members of his administration. Hands down, the evidence points to an overarching culture within the US counterintelligence service that it’s members were above the law. It is always far easier for one to betray those who give one their trust. It was the impressive intuition and intimations of Trump over what was happening around him which provided the initial faint signal, largely dismissed by friend and foe alike, that something wrong was going on.

Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that the only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens. Further, as long as their organization is considered a trusted, reliable government source, and few would accept the word of an innocent US citizen accused of espionage or worse over their organizations, they tend to behave as if the problem will take care of itself. Much damage has been done to US counterintelligence capabilities today as a result of their delinquency. (Given some of the publicly known facts of the counterintelligence operation against Trump, senior executives and managers of counterintelligence organizations involved actually pushed the case forward despite lacking an authentic legal cause for doing so. That lack of obedience to the law and procedure could lead one to believe they knew that the opportunity would be created for all types of wrongdoing as described to transpire in the field, but senior executives and managers showed little concern over that. The whole enterprise was scandalous. Nemo repente fuit turpissimus. (No one suddenly becomes bad.))

Michael Flynn (above). Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit guilt to lying to the FBI about his contacts with the Russian Federation ambassador to the US. Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens.

MSS intelligence and counterintelligence officers have had ample opportunities over the years to get an even closer look at personnel and performance of US counterintelligence organizations. Certainly, in planning meetings, strategy and operational reviews, as well as in debriefings of MSS officers upon their return home, much time is spent collecting information that will allow for the construction of an outline of the psychological foundation of adversarial counterintelligence services and law enforcement organizations. However, one could imagine that information most prized is that acquired through passive collection by operatives and agents quietly placed where the counterintelligence officer could easily make the mistake of dismissing them. Surely, that elucidating information, most likely sent directly to Beijing from the US, from an intelligence perspective, would be among the most important collected. It could be counted among the bread and butter operations in the US, having undoubtedly been going on for years. Interestingly, few to none of the fellow case officers or special agents in the errant officers respective offices or organizations ever report them to superiors. MSS managers undoubtedly view that as supportive of the Communist Party of China line about the moral and ethical weaknesses of the US system, and evidence of the figurative cracks that will lead to its eventual collapse.

When MSS managers consider what makes these errant officers tick, collected information would undoubtedly support possible answers as varied as their behaviors. The mindset that makes engaging in corruption so comfortable that may perchance be the result of being exposed to the mindset of senior officers in their organizations who came of age the free-wielding era of War on Terror and wars in Iraq and Afghanistan in which the manual was often tossed aside by members of the US Intelligence Community. There was a go get ’em mentality in place in which procedures were ignored, wrongful short-cuts were taken, and countless rules were broken. Billions in taxpayer dollars remain unaccounted for. Authority that many legal experts still insist went far beyond what any Member of Congress would normally countenance under the US Constitution were granted under the USA Patriot Act. One might suppose that the exposure of recent generations of counterintelligence officers to such thinking has allowed such negative behavior to become inculcated among those in the field. The thirst to control the lives of others negatively becomes unquenchable. Perhaps the uneven thinking, and aberrant attitudes and behavior of these misplaced errant officers is stimulated by the unique responsibilities, authority, activities, and stressors of intelligence work. Stoicus noster, “Vitium,” inquit, “non est in rebus sed in animo.” (Our Stoic philosopher said, “Vice is not merely in one’s actions but in the mind itself.”)

The misfortune of having such misanthropes as the errant officers in what should be an elite organization is something with which MSS officers are somewhat familiar. Indeed, the corruption of those sworn to protect their nation, and in China’s particular case, those sworn to uphold the values and ideals of the Communist Movement, and obey the edicts of the Communist Party of China, is a deficiency that has been dealt with in China on occasion. by MSS, sometimes at the very top of the organization. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs, to include the MSS. At the end of a closed door trial that began on May 2015 in the Tianjin No.1 Intermediate People’s Court, it was ruled that Zhou and his family had taken bribes totaling 129.7 million yuan (approximately $18,835, 317) from his close allies. The court declared that Zhou abused his power by requesting Jiang Jiemin, the former head of the State-owned Assets Supervision and Administration Commission and former chairman of the state-run China National Petroleum Corporation (CNPC), where Zhou was a top official for 10 years. Li Chuncheng, former Sichuan deputy party chief, directed more than 2.13 billion yuan of illegal gains to his son and other businessmen, causing a loss of 1.48 billion yuan to the Chinese economy. Zhou also provided Cao Yongzheng, who is a “qigong (ancient Chinese exercise and healing technique) master,” six classified documents, of which five were top secret. Since some evidence of his crimes involved state secrets, the trial was not open to the public. The maximum punishment for bribery is death; both the abuse of power and the state-secret charges each carry up to seven years in prison. However, the court stated that although Zhou had accepted a “huge” amount of bribes, but given the mitigating circumstances that he had confessed his crimes, pleaded guilty, and most of the bribes had been taken by his relatives, he had asked them to hand back the money, and all the money had been confiscated, he was given a “lenient” punishment. On the charge of abuse of power, he received seven years’ imprisonment. For the charge of leaking state secrets, he received four years’ imprisonment. Zhou, 74 at the time, was essentially sentenced to life imprisonment by the court. Further, Zhou was stripped of all political rights for life and all his personal assets were confiscated.

Former Secretary of the Central Political and Legal Affairs Commission, Zhou Yongkang, in court (above). The misfortune of having such misanthropes as the errant US counterintelligence officers in one ranks is something with which MSS officers are familiar. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs.

Returning to the matter of errant officers in US counterintelligence, make no mistake, however, the errant officers’ disregard of the counterintelligence mission are characteristics doubtlessly most favored among MSS senior executives, managers, and officers in the field. MSS would surely try to collect concrete information on them such as their education and employment experience, financial reports, family relations, friends, personal habits, tastes, and dislikes. MSS would very likely possess some of the most thorough studies prepared on the capabilities and capacity of US intelligence, counterintelligence, and law enforcement, and put enough faith in what they have amassed and know, given it has committed such enormous numbers of officers to the great intelligence game being played inside the US.

MSS managers, while still cautious, may have deduced that due to the presence of so many bad apples in the US counterintelligence services, they cannot pose any real threat to their operations. Any portion of the figurative noose US counterintelligence organizations might try to put around the neck of MSS officers, operatives, informants, or overall operations would surely be frayed because of the errant officers presence. To go an adage further, a chain is only as strong as its weakest link. Certainly, in planning meetings, strategy and operational reviews, as well as debriefings of MSS officers when they return home, time is spent attempting to outline the psychological foundation for US counterintelligence officers that opposed them and the nuance of tradecraft they observed being used against them. MSS would likely make assessments of the extent to which any of the errant officers encountered might allow for small gaps or gaping holes in the US defense and how they deplete morale. Perhaps they are even familiar with their names and postings. Assumably, they would want to be familiar with those among that sort of errant officer who have actually moved up to become managers.

MSS managers may determine that the errant officers display all the telltale signs of being misanthropes. There is a palpable bitterness of spirit in their hearts. They loathe their organizations. Everyday, they condescend in order to even sit with the other officers in their organization. They likely feel an aberrant sense of sacrifice. Professionalism, collegiality, gentleness seen in supervisors is viewed as a weakness. They look upon their adversaries with disdain, too! That sensibility would not be expressed with gymnasium locker room joviality, but rather a red hot mean spirit. They typically are unwilling to respect their adversaries capabilities. They do not try to understand their adversaries. They certainly never attempt to learn from their adversaries. In their offices, a MSS operative or informant might also passively hear them speak poorly of operatives and informants. One might ponder when seeking to insult, ridicule, humiliate, and bully, ever become required aspects of counterintelligence work. Officers of such stripes will typically speak far worse of subjects of investigations. Perhaps they spend so much effort doing down their adversaries, operatives, and informants in order to make up for their own lack of self-esteem.

Ralph Waldo Emerson has been misquoted as stating: “What lies behind us and what lies before us are tiny matters compared to what lies within us.” The correct provenance is Henry S. Haskins in his book, Meditations in Wall Street (William Morrow & Company, 1940). Nonetheless, the adage holds true. Since the errant counterintelligence officers have already proven themselves willing to go so far in the wrong direction for such things, imaginably the affections of a few could still change. Uncovering the nucleus of the wrongful behavior is not the goal, or should not be. The chief feature to be found is some aspect or aspects of the errant officers’ character that can be capitalized upon for MSS purposes. On this particular point, it could be imagined that MSS counterintelligence officers will never cease keeping their eyes open and ears perked up for opportunities. It would be a dereliction of their duty not to do so. From one perspective, it might be assumed that although they have recruited US counterintelligence officers, albeit paltry numbers, they would not bank on catching such breaks on some regular basis. They understand that a usual part of the errant officer’s line of thinking is to have more and to have something better, not to have something different somewhere else. On the other hand, the temptation of easily acquired wealth could be too difficult for some errant officers to resist. Semper avarus eget. (A greedy man is always in need.)

While there is no public evidence that would allow one to allege either engaged in the behavior ascribed to errant officers discussed here while they worked in their respective US intelligence services, the cases of both Kevin Mallory and Rob Hansen provide further support to the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Mallory’s case was outlined in “Part 1” of this essay. However, adding to what was already relayed from the US Department of Justice criminal complaint stating on May 5, 2017 is the fact that Mallory used a special phone that he received from his MSS handler. With it, he sent the message: “Your object is to gain information, and my object is to be paid for.” In the case of Ron Hansen, mentioned earlier here, prosecutors claim he was paid as much as $800,000 over several years.

Former MSS operative Ron Hansen (above). There is no public evidence that would allow one to allege he engaged in the behavior ascribed to errant officers discussed here when he worked in the Defense Intelligence Agency. However, the case of Rob Hansen, mentioned earlier here, provides further support for the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Prosecutors claim Hansen was paid as much as $800,000 over several years.

In the case of errant officers, MSS managers may deduce that the pursuit of money would certainly be a weakness to exploit, considering how secure most of them likely feel after being allowed for so long to pursue cunning schemes to acquire personal gain through the system wrongfully. A clever MSS manager could potentially devise a scheme to make them anxiously grab for more. MSS may even apply patience, and decide to approach the errant officer after retirement. In retirement, the money and gifts might have greater meaning for them. For MSS counterintelligence, recruitment of US intelligence and counterintelligence officers, active or retired, with access is always the matter at hand when specifically conducting research on a US counterintelligence officer. Bringing in a US counterintelligence officer is always a huge victory for the MSS and for China. Note that MSS would hardly be the only foreign intelligence service aware of problems in the US apparatus.  However, circumstances may be worse than leaders, senior executives, and managers in some US counterintelligence services might imagine or care about. Again, the caveat must be expressed that the ugly characteristics discussed cannot be attributed to all US counterintelligence officers in the field. However, the point is being made that they have likely been observed enough to convince decision makers in the MSS that officers deployed in the US may act boldly, ubiquitously, voraciously, and with greater intensity everyday in their efforts to collect all technologies China lacks as well as any other information demanded by their masters in Beijing.

The Desultory Pursuit of the MSS by US Counterintelligence

Quidquid dicendum est, libere dicem. (Whatever must be said, I shall say freely.) As noted earlier, the trickle of successes publicly announced are perhaps soothing to an unknowing public, creating the appearance that the US is pushing back on Chinese intelligence operations. However, everything that has been announced has hardly been enough to put the US on track to defeat, disrupt, the networks of the Chinese Intelligence services relative their size and strength in the US.  It would seem that senior executives in the US intelligence, counterintelligence services and law enforcement have not expended much time on pondering the unanswered question of why MSS has proceeded with such confidence in the US. When leaders of civilian US counterintelligence services and law enforcement go as far as to publicly admit lacking a knowledge of how severe an adversaries efforts and successful penetration has been, it almost seems as if they try to convince all that their adversaries were using some sort of witchcraft to accomplish all that they have. However, they are really only discussing symptoms of an illness that is making their organizations sickly and may eventually incapacitate them.

The preceding discussion on errant US counterintelligence officers does not depend upon any detailed inside story. While there will doubtlessly be endless knee-jerk reactions rebuking the expression of this reality, it is nevertheless a reality sufficiently known in the intelligence industry inside and outside the US. The US might have a better chance defeating MSS operations with Chaldean Numerology as long as enough errant counterintelligence officers are discussed here within the system. What has been happening so far concerning leaders, senior executives, and managers of US counterintelligence services is that they usually satisfy themselves by striking a happy medium between stellar work by those officers who are determined to do their jobs right and bring down adversaries’ intelligence operations in the US and the poor performance of others for reasons unknown. Indeed, while problems as those emphasized here concern day-to-day performance in the ranks, leaders, senior executives, and managers will more often look at the overall performance of officers in the organization statistically, by which everything likely evens out nicely.

Where there is some indication of problems being caused by errant officers, supervisors and managers will often compound the wrongdoing of errant officers not only by sitting on their hands on the matter, but by denying and covering it up. Such responses have had their impact. One might imagine colleagues, officers working the same shop, or close, at a workstation neighboring that of the errant officers, passively acquiring information about what they are doing, observing attitudes and behavior might become aware that unseemly and illegitimate activities are afoot in their cases. However, it is also hard to imagine them coming to supervisors or over their managers’ heads knowing how little is actually done to deal with such situations. There is also the potential threat of finding themselves being investigated for being too interested in the work of a fellow officer or in retaliation for trying to make the supervisors, the managers, the office and perhaps even the counterintelligence organization look bad. One might imagine that officers of other counterintelligence services, working the same area of operation, against the same target country, might occasionally get wind of something foul going on in a sister service in activities against an US adversary. However, if not an inquisitive officer’s supervisor, perchance managers would become dismissive or even angered at the news, and express the view that it is neither their organization’s job to point out deficiencies in, nor to investigate, sister organizations. With regard to innocent US citizens being targeted by errant officers, few to none of the fellow case officers or special agents in their respective offices or organizations, upon discovering what is transpiring, will make even the slightest effort to establish the wrongfully targeted citizen’s innocence. The climate is never really right in US counterintelligence organizations to report any wrongdoing. The miracle of the citizen’s rescue will need to come from an external source if that rescue comes at all.

One might imagine that local police departments in large cities in which counterintelligence activity may be taking place might come across some stories of aberrant federal activities given their ears are closer to ground listening to everything than anyone else. It may actually be the case that an innocent US citizen may go into the local police department to complain about odd surveillance activities or the harm of “dirty tricks” being played on them as part of the errant officers false counterintelligence effort. Typically, the local police officers, much as officers of sister counterintelligence organizations, will not desire to get involved, pointing to fact that it is not the responsibility of the local police department to point out deficiencies in, or investigate, federal counterintelligence organizations. In fact, those officers in local police departments, not so worldly wise that they would know to keep their distance from such wrongful activities, might find themselves sucked into them after some convincing by the errant officers. They would perhaps unwittingly make themselves co-conspirators and place their own careers in local law enforcement in jeopardy. Sed quis custodiet ipsos custodes? (But who will guard the guards?)

Each one of these typical and expected responses will with some certainty aid adversaries operating in the US more than one might imagine. The type of counterintelligence officer described here will be stopped by higher authority only if somehow someone shines a great light on their activity that might be seen by the news media or the US Congress. However, no one should count on that as a means to curb such wrongful, wasteful behavior.

The French Emperor Napoleon Bonaparte explained, “In war, three-quarters turns on personal character and relations; the balance of manpower and materials counts only for the remaining quarter.” One must recognize that in any organization, when elements such as good oversight, employee satisfaction, dedication, and motivation, comradeship, an overarching esprit de corps, and mentoring and encouragement from senior leaders who are present on the line, just to name a few, some employees may begin to fall out of step, not in the form of lateness and absenteeism, but drift away from rules and regulations, practices and procedures. Very often, that reality about employee performance can remain unknown to managers and senior executives of the organization. They may only know what is reported on paper and what little they may see. The choice of what to believe is often limited to the most convenient answer. Performance reports, even if read, may contain anything glaring depending on the nature of relationships between line employees and the supervisors; levels of performance may likely be evaluated as nominal generally. In some cases, levels of performance might even exceed expectations. (That was the case with a number of prominent US pharmaceutical companies recently.) After enough time passes, the organization’s policies on how employees are to perform their tasks, that have been crafted with due consideration of how to respond to a variety of seen and unforeseen contingencies, may be matter-of-factly ignored, supplanted by a collection of employee-styled practices that hardly reflect what managers and senior executives originally put in place, want, or should expect. When the organization’s situation looks good enough, and work is certainly getting done to some acceptable degree, a complacency can set in at the top and performance problems can continue to persist for an unimaginably long time until there is some sort of breakdown, perhaps catastrophic. The employee-styled approach, based on what looks good rather than what is good, may offer no answers, no solutions when a crisis ensues at that organization.

The honor system does not work so well in today’s world. Ambition and the need for immediate gratification turn one’s mind to taking short-cuts, bending the rules, to get what is desired quickly. In today’s intelligence industry, which exists in today’s world, too, the threat to the system is not simply disloyalty and defection, founded on corrupted thinking and moral ambiguity similar to that lately found in civilian businesses. There will be those case officers and special agents who, after a time in service, may not want to accept what they are given but take what they believe they deserve. Certainly, not all embody maturity and secure, friendly, unflappable authority as one might expect. Even if those few errant case officers and special agents are able feign the possession of such qualities by emulating their betters. Given enough time, they will find the way back down to their true “Animal House”-level, and disappoint to the fullest. If you take away their gas allowance, stipend for use of privately owned vehicles and other property they may take something else. If you cut reimbursement levels for meals with informants and operatives, they may take something else. If they are not allowed overtime for late night work as meetings with informants and operatives, they may skim off payments to informants and operatives for services rendered. (This particular wrongful practice, embezzlement, has been called “making a extra pension for oneself!”) Certainly, the human mind tends to struggle with the incomprehensible.  However, that should not be the case. Again as mentioned not all civilian US counterintelligence are the same. Others are in cracking form, and work diligently and professionally.

As it directly concerns relations between rank and file with senior executives and managers, much as a virus, those on the beat who begin to act on contemptuous feelings may soon find others to take down the same destructive path. The “us-them” mentality that can develop among those in the field toward managers and bureaucrats in the upper echelons makes the decision of errant, dishonorable officers and special agents to engage in and conceal malfeasance easier, more comfortable. Not to offer an excuse, but such insouciance toward right and wrong at the lower levels may actually be learned by errant officers in their respective organizations. It very likely became inculcated in their organizations perhaps because managers as a practice for years may have turned a blind eye to wrongdoings.

As witnessed during the years of the repugnant US counterintelligence attacks against Presidential Candidate and President-Elect Trump as well as during the attack against Wen Ho Lee, both aforementioned, a private citizen is typically falsely accused and made a subject for investigation with little real evidence except surmisal, animus, or worse bigotry. Management must keep an eye out for that sort of thing. Admonishment from managers and supervisors in both cases expectedly should have been to stick with the primary problem instead of rooting around at extraneous matters. Nothing was done. Apparently, nothing out of the ordinary was happening. Attendant to having a counterintelligence investigation levelled against them, the innocent citizen can become a target for dirty tricks by US counterintelligence organizations and their contractors as well. Further added to the citizen’s problems is the willingness of federal, state, and local counterparts working as a task force on other matters as counterterrorism will usually make their manpower and other resources available to support the efforts of the counterintelligence organization. Regarding the federal case against Carter Page, which was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. (Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.) Once a single individual’s freedom is trodden on, everyone’s freedom is lost! When all of this wrongdoing occurs, every employee’s work in a US counterintelligence organization has less value, meaning, purpose. The organization ceases being a force for good and simply becomes a pit of evil.

Carter Page (above). In the federal case against Carter Page that was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and inside the US!

When leaders are delinquent in cracking down on such “malfeasance,” or actual criminality, the dishonorable act as if dishonor is sanctioned. The errant officers engaged in odious behavior would only feel protected by the belief that no one wants to find out whether they are doing their jobs right, and no one will know as long as they keep their activities concealed. When a Procrustean bed of standards and practices exists, deviation from the correct path is essentially assured. Sadly, much damage has been done to US counterintelligence capabilities today as a result of the delinquency of many senior executives and managers over the years. As a result of these ugly situations, counterintelligence organizations have suffered, too, albeit not remotely to the degree of the innocent citizen.

Virtus est vitium fugere, et sapienta prima stultitia caruisse. (To flee vice is the beginning of virtue, and the beginning of wisdom is to have gotten rid of folly.) It is essential that senior executives and managers ensure that all of their line officers are performing their duties correctly at all times and the system is working optimally. They must travel to field offices of their organizations and find out what is really going on. That does not mean going to the offices of the organization to skylark, taking a cursory glance at everything, asking prosaic questions, merely accepting glowing reports of how great every is and being satisfied. That sort of desultory examination would serve no purpose. Instead, with whatever powers they may possess, they must engage in gumshoe detective work to see what they can see. Usually, where there is smoke, there is fire. Embers can serve as evidence of some activity hastily halted or What leaders and senior executives cannot see or confirm with their own eyes during such tours of their respective organization’s field offices, they must use all concrete indicia to conceptualize what may be happening. When everything is right, everything will be gun barrel straight. To be successful in an intelligence or counterintelligence service, a leader must know a lot about humanity. The leader must especially know a lot about human relationships. The leaders have got to know “how people tick.” There are said to be certain secrets and knowledge of human existence, human circumstance. Whatever knowledge a leader of such an organization might possess, full use of it must be made, too, along the lines of excellence. Visits “downstairs” by leaders should not be allowed to devolve into self-serving investigations into their own popularity among line officers and administrative personnel.

As a suggestion, leaders might look through files of officers in search of exorbitant numbers of payouts, massive distributions of gifts, and relatively excessive expenditures on contractors surveillance activities for cases that ended up being marked failed and closed. The errant officers often provide a cloak of legitimacy for unsuspecting eyes is the establishment of cooperative arrangements between their organization and counterintelligence elements of sister organizations to pursue their cases. The fact that money would be coming in from an additional source and that there were managers of other organizations who saw value in the case, would usually be enough to confirm for errant officers’ managers that the decisions, activities, and expenditures by them were viable. Another place for auditors to look in the errant officers files would be code names for both the subjects of investigations as well as informants and surveillance operatives. With the intent of being discreet and not providing a tutorial, suffice it to say that often there will be multiple code names used for one informant or operative. Payments secured for the multiple code names from finance offices may be deposited in multiple personal bank accounts.

Ad mores natura damnatas fixa et mutori nescia. (Human nature ever reverts to its depraved courses, fixed and immutable.) During the Cold War, it was the case in the US Intelligence Community that a highly suspicious senior CIA official, James Jesus Angleton, reigned as the figurative high priest of counterintelligence. He conducted vigorous and plentiful internal investigations against case officers, defectors, and informants, creating a frightful degree of apprehension and insecurity within the rank and file of intelligence and counterintelligence services. This is certainly not a call for a return to those days.

Many members of US intelligence and counterintelligence services and law enforcement would very likely be touchy if they came across the meditations of greatcharlie presented here. However, far more than anything else, those feelings would be due to an emotional response. A manifestation of the thinking that has prevented those organizations from finding what is wrong and being satisfied with the 1870 attitude similar to that of the Supreme Command of the French Imperial Army on the eve of the Franco-Prussian War of debrouillez-vous (“We’ll muddle through somehow”). Those leaders of those organizations are too comfortable living a superficial existence, underestimating their own destiny, dignity, and nature. Ideally, they would be able to put their pride in their pockets and properly see it all as an opportunity to make use of an examination from outside the box as presented by this essay to make real, positive change to greatly improve their capabilities.

Taking simple steps as those mentioned here will do more than anything else to help close the distance between US counterintelligence and the MSS to allow for the leveling of more successful and decisive blows against their networks and operations. Given half the chance, US counterintelligence would perform far better. Given the unforgivable, illegal treatment and great harm civilian US intelligence and counterintelligence services have caused Trump, one would reasonably think that they would attempt to do as much as possible, perform well beyond expectations in the right way, to make amends for their sins. One should not be able to presume comfortably that such thinking is a degree of humanity that may be lacking within the heads and hearts of leaders of the respective organizations. Plus novisti quid faciendum sit. (You have learned more what has to be done.)

The Way Forward

Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.) As stated earlier, the fact that the Chinese government initiated all of the ongoing difficulties cannot be credibly argued against. However, very sadly, Beijing so far has not demonstrated any interest in acting voraciously concerning the present matter of the coronavirus. Surely, the two countries are not at a point yet when the dark waters of despair have overwhelmed their leaders. When diplomats from both sides meet, they must approach each other with a certain buoyancy and hope. In the face of that the US, as the true dominant power in the world must maintain its poise. There remains a plethora of bilateral and some multilateral issues of great importance between the US and China that are seemingly distanced enough from all that is happening in the forefront and are in the process of being resolved. There are the issues of: trade, intermediate nuclear weapons, North Korea denuclearization, the border dispute with India, Hong Kong, Taiwan, international terrorism, transnational organized crime, counternarcotics policy, and space. Of course, there are adverse matters that may arise related to the coronavirus that cannot be ignored. The US must not react to them. It must always act in a measured way using effective means, at a time and place of its choosing. For the US Intelligence Community, the political warfare effort tied to the coronavirus being pressed on the US from the Chinese intelligence services may hold primacy on the agenda given the diplomatic and political importance given to it. However, for it, defeating and displacing the networks and operations of Chinese intelligence services in the US, as permanently as possible, is job one.

The world is not always as one would have it. What is required is seeing beyond appearances to what is truth. No one is making a mountain out of a molehill here. Leaders, senior executives of US counterintelligence services might really want to take a deeper look, perform their own empirical studies of the actions of their respective organizations, to discover how other organizations with which they should be cooperating, such as military ones, and how adversaries of the US, likely see their organization. Perhaps the combined sense of sadness, anguish, betrayal, and anger might coalesce to prompt questions about what is really going on in the rank and file.

Reading federal indictments, criminal complaints, and judgments of those caught engaging in espionage for MSS over the past decade, one develops a picture of US counterintelligence having some success intercepting those who had already delivered a considerable amount of classified information concerning US national security equities, projects, strategies, operations, and policies, US tactics, techniques, procedures, and methods and US defenses against foreign intelligence penetration, and of course, cutting-edge technologies had been put in MSS officers’ hands. One can discern US counterintelligence has had great difficulty in devising ways to deter, disrupt, and destroy the intelligence efforts of MSS and other Chinese intelligence services before any secret government information or intellectual property of private firms and academic institutions that is the product of intense and gifted research and development work is lost. What should really be happening is MSS recruitment efforts should be leading over and over to traps. Information to which very costly, devious maneuvers might capture should prove to be cooked and valueless. MSS networks should be regularly penetrated by US counterintelligence, they should be rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. These tacks have been successfully performed to defeat the efforts of foreign intelligence services operating in the US going as far back as World War II.

Perchance the notion of setting out to attain such goals may seem pie in the sky, even Quixotic to those in US counterintelligence who may albeit be tired and uninspired, but such can be accomplished. Such things have been accomplished in the past against other foreign intelligence services under a similar set of circumstances. Smart people are known for being able to find answers to very difficult problems. An immediate thought is that new ideas for achieving such goals might be acquired from new types of sources. A reality about any system is that dogma exists, it can color the thinking of members of an organization, and it can insinuate itself into analysis. Additionally, supervisors in the analytical departments, knowingly and occasionally unknowingly because it would only be human, may place limitations on what directions, albeit even reasonable and logical ones, that analyses can move along. New thinkers may rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Outside the box thinking would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. Well-worn thinking would still have its place in other simpler issues. Hiring individuals for such out of the box assistance should be done with delicacy. There should be a certain exactness about the selection process. Those sought should be already known and possess the ability to present what may be unorthodox innovative, forward-looking perspectives. Hiring eccentric, whimsical, and outlandish thinkers would be unhelpful and undesirable. The projects on which the individuals would work on would be very compartmentalized and limited in scope and duration. The worst possible outcome would be to create some dreadful security problems. (Not that anyone would ask, but alas, greatcharlie’s editor is now a bit too long in the tooth to provide such outside the box assistance.) The actions of the MSS and other Chinese intelligence services, stealing away cutting-edge technologies and research and development, if left unchecked, could cause the US to face a difficult and reduced future. It is not just a scare story, designed to terrify US citizens. That is reality. The choice is to allow a set of unfortunate circumstances against US interests to slowly take shape or act now and begin to shape events in a manner that will ensure the US will retain its place as the world’s leader as time goes on. Deus hæc fortasse benigna reducet in sedem vice. (Perhaps God by some gracious change, will restore things to their proper place.)