China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2)

The Headquarters of the Ministry of State Security (above). The primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of advanced technologies from the US. This essay’s focus is not the political warfare effort by MSS. Rather, it provides a few insights on this topic from outside the box on MSS tactics, techniques, procedures, and methods used to keep its ears to the ground and to collect what it needs to improve China’s capabilities and capacity to compete and struggle with the US.

This post should be considered a direct continuation of the preceding one. The complete essay focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. “Part 1,” published on July 31, 2020, provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. This section, “Part 2,” completes discussion begun in “Part 1,” and then it calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China President Xi Jinping (above). President Xi Jinping is the man in charge, the top decisionmaker in China, therefore he has ultimate responsibility for what China has done, is doing, and will do. How China has responded to the crisis turned pandemic so far has been a source of curiosity and absolute outrage globally. The Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. They became particularly warm toward US President Donald Trump. It seems as if China’s leadership will continue to assail the global media with waves of distortions. In the meantime, around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, Chinese President Xi Jinping is genuinely aware of what is transpiring and has set some type of guidance on just how far this whole cabaret should go.

MSS Counterintelligence

A primary mission of the MSS counterintelligence service is the infiltration of all the foreign special service operations: intelligence, counter-intelligence, police forces all over the world. Its primary targets assuredly are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

Certainly, counterintelligence would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Chinese intelligence services are capable of constructing a sophisticated profile of the online activities of individuals. It does not appear, however, that the MSS and supporting agencies have established the capability to identify espionage in the offing. Every now and then, though, they are lucky enough to identify espionage underfoot with hum shoe detective work, online. In an excellent essay published May 7, 2014 on Jamestown, Mattis relays that in May 2014, Guangdong State Security Department (GSSD) of the MSS revealed brief details of an espionage case in which the chief suspect received a ten-year prison sentence. An unnamed foreign intelligence service reportedly recruited the suspect, dubbed “Mr. Li,” in an online chat room. Electronic prowling led him to documents of immense value, a variety of classified military documents and publications. Recognizing that a long price could be had for what he might acquire, “Mr. Li” turned to an online contact “Feige.” GSSD counterintelligence discovered that “Feige” had more than 40 other contacts—12 in Guangdong—spread over 20 provinces and provincial-level cities. Additionally, “Feige” had been an active online persona since 2007, collecting information off of military enthusiast (junmi) discussion boards and using services such as QQ to meet others like “Mr Li.” Those who “Feige” recruited collected military information through friends and contacts, subscribed to sensitive and internal military publications, and even took pictures of local military installations. Although a long price could surely have been had for what he had collected and provided the foreign intelligence service, “Mr. Li” was paid only a few hundred renminbi per month. Chinese authorities did not identify the foreign intelligence service behind the theft of the military secrets. Nevertheless, the case compounded an apparent sense of siege in Beijing over what then called US Internet hegemony, and the prevalence of foreign-made communications technology in sensitive Chinese systems. There were also allegations that the US had managed to exploit Huawei’s equipment, a concern that has since flipped the other way. For a state known to be as controlling of information as China, the reality is that an incredible amount of sensitive information was publicly accessible. It was all overwhelming for China which was well-aware of that its counterintelligence services could not stem figurative waves of attempts to penetrate its systems. The MSS will always want Chinese citizens to believe its elements such as the GSSD are as present as “air and water” with “information on everyone.” However, contradicting that, Chinese security officials were also reported at the time that more than 70 percent of state secrets cases involve information being leaked or passed to a foreign intelligence service online It led to changes.

It goes without saying that Chinese military and civilian intelligence services have immensely improved their cyber capabilities. Efforts by the, have tormented advanced industrialized countries. However, lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. One might venture to say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Staff burning massive bundles of documents within the compound of the People’s Republic of China Consulate in Houston, Texas (above). Lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. The transition back to paper would be the best answer. One might say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints against those caught indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun, a Chinese-born naturalized US citizen, pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.” Chun’s Chinese intelligence contacts provided him with financial payments and partially paid for a trip to Italy and France, during which he met with a Chinese intelligence officer.

In order to develop ways to counter FBI efforts against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding FBI surveillance strategies, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along the FBI has had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight.

Kun Shan “Joey” Chun, (above). Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.”

In the case of former CIA case officer, Jerry Chun Shing Lee, who, in November 2019, was sentenced to 19 years in prison last year after pleading guilty to conspiring with MSS intelligence officers after he left the agency in 2010. According to the US Department of Justice, Lee had created a document including “certain locations to which the CIA would assign officers with certain identified experience, as well as the particular location and timeframe of a sensitive CIA operation.” Lee also possessed an address book that “contained handwritten notes” related to his work as a CIA case officer prior to 2004. These notes included “intelligence provided by CIA assets, true names of assets, operational meeting locations and phone numbers, and information about covert facilities.” Allegedly, Chun’s espionage activities led to the deaths of a number of the CIA’s Chinese informants.

The damage done to CIA networks and at least one ongoing operation in China, accompanied by the tragic loss of any operatives or informants as suggested by news media reports would create a sense of immeasurable anger and betrayal within CIA. However, the Agency has been through similar situations before with notables such as Edward Howard, Aldrich Ames, and Harold Nicholson. MSS counterintelligence would capitalize on Lee’s efforts by creating an active template based on how its case officers operated, the types of operatives and informants targeted and methods of their recruitment. Further, typical locations for meetings could be plotted and ways and means to surveil new operations and collection efforts could be developed. Most importantly, the information could allow for the conceptualization of the potential moves that CIA might make to resurrect lost networks and activities against China. Countermeasures would put in place to potentially thwart new recruitments and stymie new technologies that could support operations in the field and run alongside human intelligence collection.

Much ado was made in the US Intelligence Community about the espionage case of Ron Hansen. In a May 2019 guilty plea and plea agreement, Ron Hansen acknowledged attempting to communicate, deliver, or transmit to MSS intelligence officers, information concerning US national defense with intent or reason to believe that information would be used to harm the US and provide advantages to China. Hansen was a retired US Army Warrant Officer with experience in signals intelligence and human intelligence and former Defense Intelligence Agency civilian intelligence case officer, fluent in Mandarin as well as Russian, with top secret security clearance, In early 2014, the MSS targeted Hansen for recruitment and he began meeting with them regularly in China. During those meetings, the MSS intelligence officers described the type of information that would interest them. One of the most important taskings Hansen received was collecting  forensic software and sending it to the operatives in Beijing without first obtaining the license from the US Department of Commerce which constituted a crime. As Hansen described events, he partnered with two Chinese nationals, to whom he identified “Amy” and “Robert,” via an office he maintained for his company, H-11 in Beijing. Amy and Robert operated Beijing Hua Heng (Infosec) which partnered with H-11 to sell computer forensic products in their company. Robert informed Hansen that he maintained close connections to several contacts in Chinese intelligence. In November 2016, Amy instructed Hansen to purchase and send to her in China, Recon software from Sumuri LLC, a Delaware based firm. She specifically requested the Recon Mac OS X Forensics with Paladin 6 software, which contained cryptographic capability. Despite being aware of US laws forbidding the export, Hansen did so despite being aware of US laws forbidding the export. In December 2016, Arny instructed Hansen to purchase the Intella 100 software from Vound LLC, a US company that provided products related to forensic search, e-discovery, and information governance. He obediently bought it and had it shipped it to her in China in January 2017. Again, he did so, despite being aware of US laws forbidding the export.

Tasking Hansen to grab forensic software could surely have served a counterintelligence requirement. Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. Advanced forensic software could allow MSS counterintelligence officers to conduct in depth analysis of user files to collect evidence such as documents, pictures, internet history and more. MSS counterintelligence could use the software to monitor communications and collect information on dissidents, ethnic groups, suspected foreign intelligence operatives and informants, even foreign intelligence officers of some countries, visiting foreign officials, businessmen, and tourists alike. It could support the theft of intellectual property and trade secrets.

Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. A MSS counterintelligence officer was not supposed to be the same as his internal security service or law enforcement counterpart. Unlike such, displeasure and frustration over denials of intercepted foreign intelligence officers and agents in interrogations generally should not manifest in violence.

There is no reason for frustration over denials of intercepted intelligence officers, operatives, or informants to result in violence. If progress through interviews indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. When MSS managers have determined the situation demands rough treatment, typically some sort of exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, coercive measures are employed to include forms of torture. Expectedly, “good managers” will be ill at ease with that. Much to the grief of foreign intelligence officers, foreign agents, and Chinese citizens, it is that style of pursuit which has been honed and polished over the years by MSS counterintelligence officers.

Sensation seekers might believe that being involved in authentic espionage would be thrilling. However, there is plenty of real danger involved. Once the MSS officer is in the ground working in a foreign land, there is always the chance of arrest while carrying out one’s duties or expulsion of the officer persona non grata. From what has been observed, when US counterintelligence and law enforcement ensure that such interceptions of Chinese intelligence officers, operatives, and informants receive high profile reporting, to include conducting press conferences and widely disseminating press releases, it is akin to hanging out MSS’ dirty laundry for all to see.

MSS counterintelligence officers surely caution their counterparts in MSS foreign intelligence to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. Experienced hands will take counsel not from their fears, but from their intimations. They know when to seize up and walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio. Belgian authorities provided significant assistance with the arrest and extradition of Xu to the US. Among Xu’s tasks as a MSS foreign intelligence officer in the US was to obtain technical information, including trade secrets, from aviation and aerospace companies not only in the US but throughout Europe. Xu often cloaked the true nature of his employment, by representing that he was associated with Jiangsu Science & Technology Promotion Association. From December 2013 to October 2018, Xu worked, traveled, and communicated with individuals associated with or employed by MSS and a number of Chinese universities and institutions, particularly Nanjing University of Aeronautics and Astronautics. Xu also actively targeted specific companies in the US and overseas that were acknowledged to be leaders in the field of aviation and aerospace technology, design, and manufacturing. Within these aviation companies, Xu and other individuals, some of whom were already known to law enforcement, would spot individuals who they deemed to be “experts” in those aviation companies, and who could potentially be targeted and recruited to travel to China, manipulated under the belief that they were traveling to China merely for “an exchange” of ideas and to give a presentation at a university. Xu and others would pay the “experts” stipends and would arrange for and pay expenses associated with their travel to China. To achieve their objective of collecting specific aviation technology documents and information, Xu and others exchanged messages concerning the types of information that they desired, and actively discussed methods for obtaining the desired information. That effort would include the use of codes and series of letters in place of the technology being discussed and the name of the company targeted. The arrest of Xu, who handled both Ji Chaoqun and Weiyun Huang, (whose circumstances were discussed in “Part 1” of this essay) preceded their arrests.

Xudong Yao, also known as Yan Jun Xu ( above). MSS counterintelligence officers surely caution their MSS foreign intelligence counterparts to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. They must know when to seize up and when to walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio.

Doubtlessly, if MSS officers are caught they will be told what they can say if “pressure” is severe enough. The information would likely be designed as an active measure to help distort a foreign counterintelligence services understanding of MSS tactics, techniques, procedures, and methods. Given estimates by experts on the potential volume of their intelligence activities in the US, a casual observer might expect the impact of a loss here and there would likely be viewed as nominal with respect to the overall picture. However, intercepted MSS officers, who stumble due to poor tradecraft, a simple misstep, or for reasons unknown to MSS counterintelligence, may not recover beautifully if returned to China. To start, the MSS would not at all like having its officers identified in China, identified in the US, or even worse, see them apprehended by US counterintelligence services or law enforcement. Further, it would not appreciate having an entire operation or network in the US detected and effectively neutralized

For the MSS officer, Commandment 11, “Thou shall not get caught!”, applies. Being caught while on the beat will never be chalked up as a sword scratch or a badge of courage. Yet, the greatest problem would be the embarrassment that it would cause the MSS as an organization, the Chinese government, and the Communist Party of China. The intercepted officer would have to face the reality that he failed at his task. Facetious managers and colleagues would likely say he or she was not up to the job. If there was  some error in judgment, failure to do things by the book, or wilful dereliction for failing to attain proper authorization before acting, the size of the failure would grow exponentially. Doubtlessly, the officer would be held out as an example of how an MSS officer should not operate. Concerning the situation of the hypothetical errant MSS officer, Il a foutu la merde dans sa vie.

The manner in which the Communist Party of China might come down on the officer for the failure would likely depend upon the political temperature at the time in Beijing. One could use the Party’s response to the bad news of the coronavirus outbreak as a yardstick. There would be no way to conceal the matter from the Communist Party of China. Even if the attempt was made to do so, informants inside the organization would likely report the matter up to Party leaders, making them familiar with the case before the matter even moved through MSS channels and managers and senior executives there were read-in on everything. The Communist Party of China would be especially interested if it concerns the US. One could only imagine the reaction of Party leaders if they were to find out about the arrest or PNG of a MSS officer via the US news media before hearing from its own government.

Putting aside the reality that a vital MSS intelligence operation may have been disrupted or destroyed and putting aside the potential negative reaction by the Communist Party of China, one might consider that for MSS senior executives and managers at headquarters, the saving grace would be that if the US counterintelligence were doing so, it meant attempts recruit the officer and compel him or her to play the double-game against their former colleagues and bosses as a counterespionage operative for the US failed. To advance a step further on this point, MSS managers would also recognize that burning the MSS offficer would be a palliative step and the only “constructive” option left for US counterintelligence. Holding a captured MSS officer in prison instead of putting them out of the US, PNG, would almost ensure some type of retaliation against an US intelligence officer or merely a suspected officer would be taken in China. In effect, a de facto modus vivendi exists. As for the future of the MSS officer caught, by burning him or her with heavy news media coverage of his or her identification or arrest could possibly destroy the officer’s prospects for receiving another overseas posting or participating in future intelligence operations leaving them in a solitary despair. MSS can always hire and train another.

A considerable concern for any counterintelligence service regarding foreign intelligence officers and their operatives and informants functioning in foreign territory is the threat of betrayal. Indeed, intelligence organizations in general spend much time and energy hunting among their own ranks for foreign spies. Of course, concerns are always raised among Chinese citizens when anyone with whom they may have just met or were in contact for other reasons, suddenly showed what could be considered under the circumstances as an eccentric interest in them. They could imagine that such inquires could be a trick perpetrated by the security services to test their loyalty. That surely causes the most fear. Defections from the MSS do happen, but as aforementioned, they are somewhat rare. Nevertheless, it is guarded against as surely not all MSS officers are gun barrel straight. At least, this would be the most likely presumption of Chinese counterintelligence officers. Certainly, all intelligence services have their share of problems with errant officers. Some, such as MSS, likely have less problems than most. However, even the clean, loyal, and obedient will occasionally look over their shoulders because of that. Bent intelligence can serve any preconceptions, and it often does in many intelligence services; sometimes purposefully and wrongfully to destroy an innocent officer’s career.

MSS counterintelligence managers with practiced hands know the first step of a breakdown in a officer’s sense of duty to China and the Communist Revolution can take place as far back as when an individual is hired who might manifest reactions such as jealousy and envy over the success of others faithfully operating in the field and achieving many victories. The second step of that breakdown usually happens when those less-than qualified hires are placed in a position to monitor, audit, and evaluate the work of those in the field. Those inner rumblings are often more than just a matter of maturity or being uptight. They are character issues that should have been resolved long before those particular individuals met their MSS recruiters. Their varied emotional disorders subsequently became most apparent after they began working.

A satellite image of the imposing MSS Headquarters in Beijing (above). In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the hypothetical advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, ministers, and MSS senior executives the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not within the depths of the massive Beijing Headquarters of the MSS, itself.

MSS Large Data Processing of Technologies Stolen from US Conceptualized

Facilius per partes in cognitionem todus adducimur. (We are more easily led part by part to an understanding of the whole.) With dozens of operatives moving about the US with their eyes wide open and ears pinned back attempting to obey instructions from MSS officers either back in China or on the ground in the US, a backlog of information collected would be expected. The volume might be seen as problematic by experts in the US. However, MSS senior executives and managers, much as the MPS and all the parallel PLA and Communist Party of China intelligence services and units and all of the iterations of Chinese intelligence services that came before them, would apply reason to find a way to handle bundles of reports from intelligence operatives and informants. It stands to reason that a division exists which is engaged in piecing together information and data stolen from the US to advance its own technologies. China would hardly vouchsafe such.

In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the prospective advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, its minister and deputy ministers, and senior executives, the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not some inner sanctum of the massive Headquarters of the MSS in Beijing, itself. Visualize, in some edifice in China, several MSS analysts, all of whom are experts on US and other advanced industrialized countries’ military, scientific, medical or artificial intelligence technologies, engaged daily in an intelligence practice of uncovering the latest, most advanced, and most desired information of foreign technologies from collected intelligence. In an intelligence tradition from the earliest days of CDSA, they can be imagined mining through foreign sources in a time consuming process akin to sifting through dust, yet enjoying the hunt so to speak.

One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II in the United Kingdom, yet they are isolated from the conditions of the past. That art, as with many aspects of intelligence collection, has become electronic. The label analyst should be interpreted widely to include researchers who regularly use secret intelligence. Individuals drawn to and hired for such work would have an acumen for being able to work on what are essentially puzzles. Solving puzzles is actually a science dubbed enigmatology. The analysts turned “enigmatologists,” or visa-versa, would most likely be elated to keep their brains on edge. They would have little difficulty remaining occupied forever long it takes to put together pieces of information to create the picture of a new technology or new research and development project. When such a figurative puzzle is cracked, new ones would very likely be immediately placed before analysts.

Bletchley Park, a country house in Buckinghamshire, was bought by the Secret Intelligence Service (MI6) in 1938 as a site to which the Government Code & Cypher School and MI6 could be evacuated when war came. However, Bletchley Park’s great success was as a result of the mechanization of the decryption process keeping pace with the mechanization of encryption. Although the decryption of Enigma is the best known of Bletchley Park’s exploits, other successes, such as the decryption of Luftwaffe hand ciphers, and the development of Colossus, the world’s first computer which solved the enciphered German teleprinter, made a significant contribution to the Allied victory. One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, has become electronic.

While the supposition may sound a bit ordinary, perchance there would be some sort of analytical triage by the most experienced analyst, perhaps senior leaders and best experts from the analytical team might gather weekly or daily to perform that task. It would also give the supervisors a good sense of what might be coming down the pike for examination. The participating supervisors, themselves, would reflect countries from which the technologies would be stolen and would be proficient in the respective languages of the industrialized countries from which the reports, plans, schematics, charts, and other data would originate. The final sorting would be done by supervisors intimately familiar with at least one area of the technologies stolen. There may be information gathered on a new US technology or ongoing research and development project that is already in sufficient quality and quality to send up to higher levels of management to create additional collection requirements for MSS officers and operatives in the field to help complete the picture. Even if there is a relative paucity of information on a foreign technology, if it is a technology discovered that is so advanced that it would have the potential to be a game changer in terms of the development of Chinese technologies or might be of the utmost importance regarding China’s defense and national security, it would very likely be brought up to senior executives who would decide how to pursue it. Counterintelligence would also likely be involved to make certain that any miracles are not simply sophisticated material dangled as bait for some elaborate trap. The supervisors speculated upon here would also be the ones to deliver information in formal reports or as presentations and desk-level briefings to customers in government.

After they receive a batch of information, the emphasis of the analysts’ search through it will be to identify and consider new discoveries, as well as determine whether the information is simply interesting or can be given higher meaning. Much as case officers may run more than operative in the field, each analyst or team would likely work on, not many, but very likely more than one puzzle at a time. The foundation of the puzzle would most likely be formed by a pattern of information. Each bit of new information may be a possible missing piece. Each new piece gives one an idea of what the next piece might look like. In a mosaic, stone fragments are cut to for a particular image the artist has in mind, a preconception. With a puzzle, the image is created  with each new piece. There is something to learn every time the image is developed. Eventually the image figuratively begins looking back at the one working on the puzzle telling its story. Priority is likely given to those puzzles closest to solution or those that begin releasing information about some new exquisite US technology that MSS senior executives, and thereby the Communist Party of China wants to get its hands on. As a next logical step, the collection of pieces for the remaining parts of the puzzle by operations departments from Beijing or the provinces can be directed through collection requirements. Perhaps the same analyst or analytical team or a group of troubleshooting technological experts would take over the case at that point.

One exercise would be to find commonalities among reports on a US research and development project. The likely thinking in each unit would be that there is always something in what has been collected, it just needs to be fully twinkled out. Imaginably, instead of having too few clues, in some cases there would be too many. To pull out a particular strand from a mass of information requires a very clear sense of priority. Doing that would also serve a counterintelligence purpose. The analysts would likely be trained to know there are patterns in reporting. A new technology will rarely simply emanate from  a single source, with no other references to it and no communication about it.

When pieces of information might be missing, there would always be the possibility that the next batch of reports from the US might help to do that. If that telling piece of information is not in the next batch, it may be in the batch after that. There are no blind alleys. If a report says something is there then it is there. The analysts would be fully cognizant that a considerable effort is being made within the US to conceal secret projects. Success at their work is likely invigorating, and likely impel more strenuous efforts. No matter how slowly any puzzle would develop, there would unlikely be any case regulated to something akin to a cold case file. If any information exists on a technological project, MSS managers know that there is metaphorically something cooking in the US. With several civilian informants working inside and around technological development centers, the day might come at any time when pieces of puzzle take on greater meaning and the puzzle starts telling the analysts something considerable.

While the image that the puzzle presents may not yet be completely in focus, the most experienced, knowledgeable, and resourceful eyes, masters in the business of sorting these puzzles out will be put on the matter. Such a case would likely become a collaborative focus. After a while of that, the newly discovered technology would very likely come into focus and resources of operations would be directed to the effort to hunt down the remaining elements and get them to China. In some cases, the few stray pieces of the puzzle could be conceptualized and reproduced by technology experts in China. What one can invent, another can surely reproduce.

Students of Nanjing University of Aeronautics and Astronautics studying in the library (above). One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, have become electronic. Chinese colleges and universities graduate a near endless list of qualified candidates for every year. The Nanjing University of Aeronautics and Astronautics in particular is a happy hunting ground for MSS recruiters. Given in part to the availability of a highly qualified pool of potentials, Chinese intelligence services surely have the personnel capacity to handle the loads of stolen information coming in from the US and other advanced industrialized countries. The two female students at the bottom right of the photo are apparently taking a short break from all of their serious academic work with a little diversion.

There must be a balance in all of their analyses without a smidge of bias. In their analytical product, they would need to guard against apophenia, seeing patterns in unrelated things. Engaging in informal speculation would be appreciated, some US technologies would possibly seem so advanced as to be called exotic. However, assessing any to have a potential bordering on science fiction would face disapproval. No one would be allowed to attach importance to anything purely arbitrary. Latching on to something definitively trivial will be proven when nothing ever follows to assist in solving the matter.

Reports that the analysts received would unlikely solely focus on technologies although that information would have primacy. Reports that identify government agencies, offices, supporting specific cutting-edge research and development of technologies. Where those government agencies are, that is where the MSS will very likely be prowling. Names of experts from US government departments and agencies or from private organization experts that came up related to a particular technology may among other things help to understand the project’s importance. Reports on how information is kept secure would certainly be useful. Information on security officers associated with protecting a project may be important for operational purposes. It may become necessary to know who they are, what they are doing, what they are saying, and what their routines, interests, habits and health are, particularly if it is determined that the door should be left open to possibly conducting a covert collection effort against the office or facility for which he or she might be responsible.

Assumably, morale would be high in such a foreign technology assessment office given its victories. In terms of supervising performance and ensuring a quality work product, there would very likely be a nose to the grindstone, deadly serious, scholarly approach demanded of analysts in their work. One would unlikely hear much jolly chatter in the workplace. Imaginably, there would unlikely be any of the peculiar infernal squabbling in morning meetings and weekly reviews that has been dubbed part of a creative process within certain Western intelligence and counterintelligence services. It is unlikely that competitive urges, ego and ambition impell the work of the MSS enigmatologist. Again, as they are only human, there may be some elements of each that pushes each to be their best. While there is an urgency to the work, getting things right would be most important and to that extent accuracy would equate to speed. There would surely be one-to-one mentoring, with more experienced team colleagues who offer support, in addition to that offered by line managers. Nearly everyone appreciates acknowledgement for a job well-done and pat on the back from colleagues and managers, coaches and mentors. Respectful, motivated, and dedicated, younger members of teams usually want to make a good impression upon older, more experienced ones, and typically thrive on recognition, attention, guidance, approval, and praise from them. (Supervisors must reinforce good work, extinguish bad habits and that sort of thing.) If Beijing would even discuss the existence of such an analytical group, it undoubtedly has the world believing that the desire to do a good job for China and the Communist Revolution provides all of the impetus needed.

Unlike other analysts who might rotate between operational, analytical and managerial duties, analysts would essentially work in a professional closed shop. Successful analytical work of this kind would require unbroken contact with information on new technologies as it arrives to avoid gaps in specific knowledge and assessment capabilities that would naturally occur if the analysts most familiar with the technology were moved out and replaced with analysts from some other area such as foreign military operational analysis, counternarcotics, or organized crime. Technology assessment would be a high priority specialization and any advancement would take place within it.

Provincial and local departments and bureaus of the MSS often use cover names inside China such as “Shanghai Municipal Government Office number seven.” It could be the case for Shanghai State Security Bureau (SSSB) that Municipal Government Office number seven is actually the Shanghai State Municipal building (above). Two satellite dishes are often found on office building roofs of MSS departments and bureaus. (See the satellite dishes on the left and right sides of the municipal building roof. In a photo in Part 1 of this essay, notice two similar model satellite dishes atop the roof of the Wuhan Hubei National Security Office which is the home of the Ministry of State Security Bureau.) Going out on a rather slender thread, greatcharlie ventures to say the fact that two “MSS-style” satellite dishes sit atop Shanghai State Municipal building, makes it a candidate for being where SSSB resides or at least some shop of the active spy organization resides.

An Ugly Truth the MSS Surely Knows About the US Counterintelligence Services

MSS senior executives and managers have much with which they can be satisfied regarding their organization’s performance against the US. Certainly, their enthusiasm over the performance of their personnel has been ineffectual within the organization. MSS foreign intelligence officers, operatives and informants have amassed a record of considerable success in the US and continue to plow ahead. Some analysts of Chinese intelligence might say the extraordinary success of MSS was partly founded on luck. The organization was smart enough to ratchet up its operations at a time when US concerns over the capabilities and capacity of Chinese intelligence were astonishingly lax especially in person contacts. Employees at lower levels, drivers, housekeepers, managed to insinuate themselves into the offices and homes of US Senators, US Representatives, hotels, resorts, military bases, government departments and agencies, and important offices of major US industries. Needless to say, that is the kind of luck that tends to follow those who usually become pre-eminent in their field. However, MSS managers are comfortable enough to operate so boldly in the US not because they feel their officers, operatives, and informants are so superb. Its managers feel less threatened because, as aforementioned, it recognizes US counterintelligence services have allowed themselves to deteriorate to some degree in nearly all areas, but especially concerning personnel, over recent years.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) US intelligence, counterintelligence, and law enforcement have all but admitted that they are somewhat baffled by what the MSS and its sister Chinese intelligence services are doing. They literally advertise their limitations. Surely, US counterintelligence knows all of this is a part of the reason why it is somewhat in the woods regarding Chinese intelligence operations in the US. They are happy that very few are aware as to why, too! There has been a never-ending rosy US news media narrative about US intelligence and counterintelligence services and law enforcement which has influenced the US public’s understanding of how well the counterintelligence job is being done. That new media narrative intensified immediately after the September 11, 2001 terrorist attack on the US. The US public’s impression of US counterintelligence work has also been shaped for decades by Hollywood via bedazzling images of near supermen and superwoman catching wretched enemy intelligence agents, terrorists, and international organized crime figures. Even greatcharlie must accept some responsibility for creating a certain image of US intelligence and counterintelligence services and law enforcement by typically referring to the “somber and astute” professionals among them.

True, the majority of officers within the civilian US counterintelligence services, energetically and earnestly do all they can to thwart and defeat the activities of foreign intelligence services operating in the US. Those proper US counterintelligence officers indeed have their eyes on the MSS and other Chinese intelligence services. Expectantly, the presence of such professionals in US counterintelligence should have been enough to cause concern and caution for the MSS as they ventured into the US. MSS officers should literally tremble as they approach, and as they begin to move about on the beat, they should be constantly and carefully looking over their shoulders. Unfortunately, in the larger world of US intelligence and counterintelligence there are other officers who could hardly be characterized as such.

Fate would have it that there are a number of US counterintelligence officers who do not perform in such a praise worthy way.  While the type of errant officer identified here may not be present in every office of a US counterintelligence organization. The errant officers described do not move around much as gremlins doing wrong at every turn, breaking every rule. Their numbers are still sufficient enough that they are noticeable to their adversaries as much as they are to their colleagues. What the MSS doubtlessly picks up about the errant officers that arguably presents much hope and perhaps even joy when MSS senior executives and managers in charge of US operations. MSS managers have very likely observed the errant officers thinking and behavior either rising to insanity or sinking to imbecility. They have likely heard all of their tales of woe. Most are distraught by the denial of overtime, reductions in allowances for expenses, and relatively modest salary. Some feel benefits such as medical and dental insurance are insufficient. Others are angered not only by those factors, but also by having to distribute significant payments to informants and multiple operatives greatly in excess of their salaries. Trouble really begins when a case or cases allow the errant officers access to funds for the payments to operatives and informants. As it is done under the honor system, the door is opened wide for embezzlement. (The details of the varied devilish artifices used to embezzle are too hefty to detail here. The decision to allow case officers of US intelligence and counterintelligence services access to such considerable amounts of taxpayer dollars in this day and age without the strictest forms of oversight is of questionable judgment.)

MSS managers surely have noticed that when engaged in investigations against their intelligence officers, operatives, and informants, such errant US counterintelligence officers are satisfied in performing poorly and being incompetent. Indeed, when it comes down to identifying, intercepting, neutralizing, and recruiting foreign intelligence officers and operatives, the errant officers are hardly game for the trudge. Typically, a history of rarely being able to get anything started in a recruitment will fill the performance records of their sort. Even when given an opportunity to bring in a foreign intelligence officer or operative, the whole case is usually muffed. It is the practice of most US counterintelligence services to give officers full control of their cases, with supervision from other special agents or case officers on a management track–often with less experience on the field than themselves. Having been given the authority from managers and those novice supervisors, the have no reservations about chasing down a false lead regardless of the fact that they have been read-in on all that indicates there is nothing at all to follow. Interestingly, money somehow never seems to be short for their cases. Bringing a case to resolution would not allow for the use of varied tricks to enrich themselves as the continued reconnaissance and surveillance of a target and use of informants without having any real counterintelligence goals. The operatives or informants in contact with the adversary are kept active enough and encouraged enough to hold their interest and to compel them to stay involved. In some cases, everything might abruptly stop if some change in the office, some feeling–call it intuition–causes the errant officers to be concerned. Most of the time, however, the errant officers become so comforted by the ease with which they managed to collect their ill-gotten gains, they become slow to notice any nuanced changes that may happen around them. Supervisors may push for results but they typically become accustomed to getting nothing from the errant officers. At best, they will push to shut down the case, but the damage will already have been done to the effort against the foreign intelligence service. In some rare exception, the errant officers will collect enough on an innocent citizen to secure an indictment. An offhand remark or joke made to a clandestine contact or false statements signed by the errant officers’ operatives tied to arbitrary evidence wrongfully cooked to take on higher meaning may be enough to prompt eager prosecutors to move against the innocent.

Bewildering to MSS managers but perhaps the most noticeable of the errant officers behaviors that immediately benefits not just the MSS, but all foreign intelligence services operating in the US, is the employment contractors who will bizarrely hire untutored surveillance operatives right off the street even for an intended clandestine operation that is supposed to be finely calibrated. In most foreign intelligence services, great care is placed in the selection of operatives for a task as important as surveillance. Due to the heavy reliance on the competence of observers, reports they produce, and even their immediate impressions. All of that information will impact data extrapolated and inferences made. Nevertheless, money hungry contractors to whom those services often outsource such work could apparently careless about such matters. If one were to put a good spin on the practice, the grand thought behind the practice would ostensibly be that placing more eyes, even nonprofessional, untrained eyes, on the target allows for better coverage of the targets activities, better. Yet, the real result is simply the accumulation of several observations, varied in accuracy and quality. False observation can often be provided by nonprofessionals in an ordinary case seeking to puff themselves up, as if to say: “Hey, look at me! I am a real spy!” Indeed, this lesser form of “spying” may bestow a certain dignity to the mixed bag engaged in it. However, the real magic behind the practice is the potential for dishonor that it creates. Since the hires are essentially transient, not all names on a list of impromptu operatives may be genuine. Errant officers can benefit themselves by collecting the recompense of  nonexistent operatives added to the list. Experienced counterintelligence hands are well-aware that repeated, considerable hiring for surveillance, especially in massive bundles for any case could be a beckoning initial indicia of someone trying “to give themselves a pension.” When that surveillance and investigation results in nothing, it is a red flag.

How MSS has likely benefited from this is obvious. MSS operatives would only need to put themselves in a position to be hired in any more formal process of becoming a surveillance operative for a contractor for US intelligence and counterintelligence services and law enforcement. As some will tend to seek a diverse pool of operatives, they will usually consider all applications with scant vetting in part to accelerate the hiring process but mostly to avoid the expense. After making certain they have presented themselves as qualified candidates, the MSS operative is very likely hired. If they can situate themselves in the vicinity of a diplomatic installation of the Chinese government or the proximity of a site in which MSS or another Chinese intelligence service might be operating, like a canary in a coal mine, a call or text from a US counterintelligence contractor request the operative participate in a surveillance nearby will notify the MSS that their people may be under observation. In addition, the MSS operatives can make a few extra dollars courtesy of the US taxpayer. (While it may strike one as daylight madness, one can rest assured that it is actually happening daily!)

What may be shocking and surprising to MSS managers are those occasions when errant officers, in an effort to manufacture a case, will submit knowingly false information to the Foreign Intelligence Surveillance Court (FISA Court) to secure warrants and authorizations for warrantless searches and surveillance against a wrongly targeted citizen. It happens more than the average US citizen could imagine. The bigger the lie that they tell about the innocent citizen, the more significant the case will be. That means greater resources will be alloted for it. In the process of obtaining FISA Court warrants and. authorizations, administrative personnel in the errant officers’ counterintelligence organization, particularly attorneys, who have the responsibility to oversee the correctness of applications to the court, have been known to simply rubber-stamp them. As for FISA Court judges, they tend to simply accept whatever is in the applications as valid.

A counterintelligence focus on the innocent US citizen will always be at the errant officers instigation. On one end of the chain are errant officers focused on enriching themselves with taxpayers dollars on the other end is some poor chap, knowing by God that he is innocent, who is nevertheless having his life turned upside down wrongfully. The errant officers will not hesitate to manufacture false information to submit to include tutoring so-called informants in preparing false statements for them. Sadly enough, as mentioned earlier, the errant officers can pick out informants who would be willing to prepare such statements and they will be handsomely paid. To paraphrase a recent remark by US Senator Charles Schumer of New York on the tactics, techniques, procedures, and methods of the US Intelligence Community, they can come at you six ways to Sunday. Indeed, under the incredible weight of the US intelligence and counterintelligence services and federal law enforcement, some of the innocent are unable to survive without being harmed psychologically and physically. To enlarge on the point of damage done by errant US counterintelligence officers who misused and abused power and the tools provided them to protect the US, there are more than a few cases that are well-known to those who have worked in the intelligence industry. Rest assured, MSS managers have kept track of US news media reporting and collected information about those cases. Among the high-profile cases is that of Wen Ho Lee.

Wen Ho Lee leaving a Washington, DC courthouse in 2000 (above). In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. The FBI investigation into the case erroneously pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI later eventually determined that Lee could not plausibly have been the source of information on the W88 to China. Still, the FBI moved forward with its investigation of Lee. Lee was charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Lee would file and win a lawsuit against the US government and five news organizations for leaking information that violated his privacy.

Circumstances concerning Wen Ho Lee were complicated, but not so much as to evolve into an episode so tragic and regrettable. Boiled down, his life, liberty, his ability to go one quietly pursuing what made him happy as a US citizen was torn to shreds based on a rush to judgment and the wrongful use of the awesome powers provided to the US intelligence and counterintelligence services and law enforcement to protect the US public. In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. Allegedly due to certain pieces of evidence, the FBI investigation into the case, Operation Kindred Spirit, pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI was made aware that Lee, a US citizen and University of California at Los Angeles (UCLA) scientist at the Los Alamos National Laboratory, travelled twice to China in the 1980s to meet with scientists. During a interview with the FBI, Lee admitted that he had been asked by them to supply information that would assist China in developing a nuclear missile force. On a polygraph test administered by the FBI, it was indicated that Lee was not always being truthful in his responses. An examination of his computer revealed that he had transferred classified documents to an unsecured network and in the process deleted the security classification in the material. Reportedly, the information was accessed 40 times on a computer at the UCLA student union by an unknown user.

As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by UCLA on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 to China. The normative hope, yet perhaps a bit optimistic one given the players involved, would be that once exculpatory information existed that should prove one’s innocence, a FBI investigation would be halted. Nevertheless, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy. In August 2004, a US District Court judge in held reporters from four of the news organizations in contempt for not revealing the source that identified Lee as a spy. The government would pay over $895,000 to cover Lee’s legal fees and taxes. The news organizations paid Lee $750,000.

From the ostensible professional side to what occurred, one might say FBI investigators may have measured the impact of what they were doing in terms how they looked before managers and whether their case at least had the appearance of being viable. individual, Lee. They did not measure their impact in terms of the population of which he was part, Chinese-American professionals working in national security areas, many of whom were left fearful of being looked at or pursued whenever an espionage case had a China nexus. Indeed, Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men hiding behind the shadows who possessed a little brief authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

For the MSS, the Wen Ho Lee case undoubtedly provided considerable lessons and the possible makings for a countermeasure to thwart efforts by US counterintelligence against its foreign intelligence operations inside and outside of the US. MSS managers would know better than anyone that Wen Ho Lee was not functioning as an intelligence operative for their organization or any other Chinese intelligence service. Given that Lee’s visits to China, professional discussions with scientists, and conversations with MSS, which its officers furtively initiated and to which he did not respond to positively, apparently served as indicia that he was a Chinese operative, US counterintelligence services, in this case the FBI, made the decision to act aggressively toward him. Doubtlessly, repeated authorizations for searches and surveillance were secured from the FISA Court and the pressure placed on Lee was intense. MSS managers surely from a distance, and at times likely up close, monitored how US counterintelligence resources were poured into Lee’s case. Meanwhile, they would smile as MSS officers, operatives, and informants, on the ground in the US, perhaps in the very locations in which US counterintelligence officers were surveiling and investigating Lee, were functioning with seeming impunity. What shrewd MSS managers likely reasoned from the episode was that calling more Chinese-American scientists, engineers, academics, and other scholars to China for conversations with their counterparts, would allow for the creation of dozens of potential decoys, or, to use the parlance of the intelligence industry, unwitting “dangles” out of those visiting experts which US counterintelligence services perchance would chase around whenever true MSS officers, operatives, or informants stole highly-prized information and data from the US. The tactic would be relatively low cost, low risk, and US counterintelligence services would really do all the work to make the effort successful. There would likely also be the hope among MSS managers that US counterintelligence would even chase Chinese-Americans that the MSS had no contact with whatsoever. What is presented here is by no means an unwarranted extrapolation. The question that should really pique interest is whether the MSS had such a countermeasure in place long before Lee first visited China to speak with scientist counterparts. While one might expect they have been interviewed regarding such a possibility, defectors, whose own foreign intelligence activities were likely compartmentalized, would unlikely know about a secret Chinese counterintelligence program such as the one hypothesized.

Robert Mueller (above). Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump to prove that he and his campaign colluded with the Russian Federation. In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authrizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decided to take on the US President and give some new tactics a try. Every step taken against Trump’s campaign and administration was undoubtedly well-rehearsed in prior cases. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017.

Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump for collusion with the Russian Federation and the subsequent investigation of the administration of US President Donald Trump. Investigative journalists and concerned Members of the US Congress have informed that the wrongful, ghastly spying was conducted under the name, “Operation Crossfire Hurricane.” In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authorizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. Incontrovertibly, the activities of US counterintelligence officers, themselves, ironically could have impacted the outcome of the 2016 US Presidential Election. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decide to take on the US President and give these tactics a try. Every step they took against Trump’s campaign and administration was undoubtedly well-rehearsed in a great number of prior counterintelligence cases. The conspirators were seemingly absolutely confident in the prospects for their success. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017. Mueller’s office has issued more than 100 criminal counts against 32 people. Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit gulit to lying to the FBI about his contacts with the Russian Federation ambassador to the US.

As of this writing, much attention is being given to senior executives and managers involved in the illegal activity against both President-Elect Trump and then President Trump. However, the willingness of a number of line officers in US counterintelligence to commit wrongful acts, and failing to report malfeasance and illegal actions of their superiors leaves no doubt about the complicity of more line officers than at least publicly acknowledged on the matter. They operated against a trusting presidential candidate, and that candidate became president, and members of his administration. Hands down, the evidence points to an overarching culture within the US counterintelligence service that it’s members were above the law. It is always far easier for one to betray those who give one their trust. It was the impressive intuition and intimations of Trump over what was happening around him which provided the initial faint signal, largely dismissed by friend and foe alike, that something wrong was going on.

Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens. Further, as long as their organization is considered a trusted, reliable government source, and few would accept the word of an innocent US citizen accused of espionage or worse over their organizations, they tend to behave as if the problem will take care of itself. Much damage has been done to US counterintelligence capabilities today as a result of their delinquency. (Given some of the publicly known facts of the counterintelligence operation against Trump, senior executives and managers of counterintelligence organizations involved actually pushed the case forward despite lacking an authentic legal cause for doing so. That lack of obedience to the law and procedure could lead one to believe they knew that the opportunity would be created for all types of wrongdoing as described to transpire in the field, but senior executives and managers showed little concern over that. The whole enterprise was scandalous. Nemo repente fuit turpissimus. (No one suddenly becomes bad.))

Michael Flynn (above). Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit guilt to lying to the FBI about his contacts with the Russian Federation ambassador to the US. Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens.

MSS intelligence and counterintelligence officers have had ample opportunities over the years to get an even closer look at personnel and performance of US counterintelligence organizations. Certainly, in planning meetings, strategy and operational reviews, as well as in debriefings of MSS officers upon their return home, much time is spent collecting information that will allow for the construction of an outline of the psychological foundation of adversarial counterintelligence services and law enforcement organizations. However, one could imagine that information most prized is that acquired through passive collection by operatives and agents quietly placed where the counterintelligence officer could easily make the mistake of dismissing them. Surely, that elucidating information, most likely sent directly to Beijing from the US, from an intelligence perspective, would be among the most important collected. It could be counted among the bread and butter operations in the US, having undoubtedly been going on for years. Interestingly, few to none of the fellow case officers or special agents in the errant officers respective offices or organizations ever report them to superiors. MSS managers undoubtedly view that as supportive of the Communist Party of China line about the moral and ethical weaknesses of the US system, and evidence of the figurative cracks that will lead to its eventual collapse.

When MSS managers consider what makes these errant officers tick, collected information would undoubtedly support possible answers as varied as their behaviors. The mindset that makes engaging in corruption so comfortable that may perchance be the result of being exposed to the mindset of senior officers in their organizations who came of age the free-wielding era of War on Terror and wars in Iraq and Afghanistan in which the manual was often tossed aside by members of the US Intelligence Community. There was a go get ’em mentality in place in which procedures were ignored, wrongful short-cuts were taken, and countless rules were broken. Billions in taxpayer dollars remain unaccounted for. Authority that many legal experts still insist went far beyond what any Member of Congress would normally countenance under the US Constitution were granted under the USA Patriot Act. One might suppose that the exposure of recent generations of counterintelligence officers to such thinking has allowed such negative behavior to become inculcated among those in the field. The thirst to control the lives of others negatively becomes unquenchable. Perhaps the uneven thinking, and aberrant attitudes and behavior of these misplaced errant officers is stimulated by the unique responsibilities, authority, activities, and stressors of intelligence work. Stoicus noster, “Vitium,” inquit, “non est in rebus sed in animo.” (Our Stoic philosopher said, “Vice is not merely in one’s actions but in the mind itself.”)

The misfortune of having such misanthropes as the errant officers in what should be an elite organization is something with which MSS officers are somewhat familiar. Indeed, the corruption of those sworn to protect their nation, and in China’s particular case, those sworn to uphold the values and ideals of the Communist Movement, and obey the edicts of the Communist Party of China, is a deficiency that has been dealt with in China on occasion. by MSS, sometimes at the very top of the organization. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs, to include the MSS. At the end of a closed door trial that began on May 2015 in the Tianjin No.1 Intermediate People’s Court, it was ruled that Zhou and his family had taken bribes totaling 129.7 million yuan (approximately $18,835, 317) from his close allies. The court declared that Zhou abused his power by requesting Jiang Jiemin, the former head of the State-owned Assets Supervision and Administration Commission and former chairman of the state-run China National Petroleum Corporation (CNPC), where Zhou was a top official for 10 years. Li Chuncheng, former Sichuan deputy party chief, directed more than 2.13 billion yuan of illegal gains to his son and other businessmen, causing a loss of 1.48 billion yuan to the Chinese economy. Zhou also provided Cao Yongzheng, who is a “qigong (ancient Chinese exercise and healing technique) master,” six classified documents, of which five were top secret. Since some evidence of his crimes involved state secrets, the trial was not open to the public. The maximum punishment for bribery is death; both the abuse of power and the state-secret charges each carry up to seven years in prison. However, the court stated that although Zhou had accepted a “huge” amount of bribes, but given the mitigating circumstances that he had confessed his crimes, pleaded guilty, and most of the bribes had been taken by his relatives, he had asked them to hand back the money, and all the money had been confiscated, he was given a “lenient” punishment. On the charge of abuse of power, he received seven years’ imprisonment. For the charge of leaking state secrets, he received four years’ imprisonment. Zhou, 74 at the time, was essentially sentenced to life imprisonment by the court. Further, Zhou was stripped of all political rights for life and all his personal assets were confiscated.

Former Secretary of the Central Political and Legal Affairs Commission, Zhou Yongkang, in court (above). The misfortune of having such misanthropes as the errant US counterintelligence officers in one ranks is something with which MSS officers are familiar. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs.

Returning to the matter of errant officers in US counterintelligence, make no mistake, however, the errant officers’ disregard of the counterintelligence mission are characteristics doubtlessly most favored among MSS senior executives, managers, and officers in the field. MSS would surely try to collect concrete information on them such as their education and employment experience, financial reports, family relations, friends, personal habits, tastes, and dislikes. MSS would very likely possess some of the most thorough studies prepared on the capabilities and capacity of US intelligence, counterintelligence, and law enforcement, and put enough faith in what they have amassed and know, given it has committed such enormous numbers of officers to the great intelligence game being played inside the US.

MSS managers, while still cautious, may have deduced that due to the presence of so many bad apples in the US counterintelligence services, they cannot pose any real threat to their operations. Any portion of the figurative noose US counterintelligence organizations might try to put around the neck of MSS officers, operatives, informants, or overall operations would surely be frayed because of the errant officers presence. To go an adage further, a chain is only as strong as its weakest link. Certainly, in planning meetings, strategy and operational reviews, as well as debriefings of MSS officers when they return home, time is spent attempting to outline the psychological foundation for US counterintelligence officers that opposed them and the nuance of tradecraft they observed being used against them. MSS would likely make assessments of the extent to which any of the errant officers encountered might allow for small gaps or gaping holes in the US defense and how they deplete morale. Perhaps they are even familiar with their names and postings. Assumably, they would want to be familiar with those among that sort of errant officer who have actually moved up to become managers.

MSS managers may determine that the errant officers display all the telltale signs of being misanthropes. There is a palpable bitterness of spirit in their hearts. They loathe their organizations. Everyday, they condescend in order to even sit with the other officers in their organization. They likely feel an aberrant sense of sacrifice. Professionalism, collegiality, gentleness seen in supervisors is viewed as a weakness. They look upon their adversaries with disdain, too! That sensibility would not be expressed with gymnasium locker room joviality, but rather a red hot mean spirit. They typically are unwilling to respect their adversaries capabilities. They do not try to understand their adversaries. They certainly never attempt to learn from their adversaries. In their offices, a MSS operative or informant might also passively hear them speak poorly of operatives and informants. One might ponder when seeking to insult, ridicule, humiliate, and bully, ever become required aspects of counterintelligence work. Officers of such stripes will typically speak far worse of subjects of investigations. Perhaps they spend so much effort doing down their adversaries, operatives, and informants in order to make up for their own lack of self-esteem.

Ralph Waldo Emerson has been misquoted as stating: “What lies behind us and what lies before us are tiny matters compared to what lies within us.” The correct provenance is Henry S. Haskins in his book, Meditations in Wall Street (William Morrow & Company, 1940). Nonetheless, the adage holds true. Since the errant counterintelligence officers have already proven themselves willing to go so far in the wrong direction for such things, imaginably the affections of a few could still change. Uncovering the nucleus of the wrongful behavior is not the goal, or should not be. The chief feature to be found is some aspect or aspects of the errant officers’ character that can be capitalized upon for MSS purposes. On this particular point, it could be imagined that MSS counterintelligence officers will never cease keeping their eyes open and ears perked up for opportunities. It would be a dereliction of their duty not to do so. From one perspective, it might be assumed that although they have recruited US counterintelligence officers, albeit paltry numbers, they would not bank on catching such breaks on some regular basis. They understand that a usual part of the errant officer’s line of thinking is to have more and to have something better, not to have something different somewhere else. On the other hand, the temptation of easily acquired wealth could be too difficult for some errant officers to resist. Semper avarus eget. (A greedy man is always in need.)

While there is no public evidence that would allow one to allege either engaged in the behavior ascribed to errant officers discussed here while they worked in their respective US intelligence services, the cases of both Kevin Mallory and Rob Hansen provide further support to the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Mallory’s case was outlined in “Part 1” of this essay. However, adding to what was already relayed from the US Department of Justice criminal complaint stating on May 5, 2017 is the fact that Mallory used a special phone that he received from his MSS handler. With it, he sent the message: “Your object is to gain information, and my object is to be paid for.” In the case of Ron Hansen, mentioned earlier here, prosecutors claim he was paid as much as $800,000 over several years.

Former MSS operative Ron Hansen (above). There is no public evidence that would allow one to allege he engaged in the behavior ascribed to errant officers discussed here when he worked in the Defense Intelligence Agency. However, the case of Rob Hansen, mentioned earlier here, provides further support for the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Prosecutors claim Hansen was paid as much as $800,000 over several years.

In the case of errant officers, MSS managers may deduce that the pursuit of money would certainly be a weakness to exploit, considering how secure most of them likely feel after being allowed for so long to pursue cunning schemes to acquire personal gain through the system wrongfully. A clever MSS manager could potentially devise a scheme to make them anxiously grab for more. MSS may even apply patience, and decide to approach the errant officer after retirement. In retirement, the money and gifts might have greater meaning for them. For MSS counterintelligence, recruitment of US intelligence and counterintelligence officers, active or retired, with access is always the matter at hand when specifically conducting research on a US counterintelligence officer. Bringing in a US counterintelligence officer is always a huge victory for the MSS and for China. Note that MSS would hardly be the only foreign intelligence service aware of problems in the US apparatus.  However, circumstances may be worse than leaders, senior executives, and managers in some US counterintelligence services might imagine or care about. Again, the caveat must be expressed that the ugly characteristics discussed cannot be attributed to all US counterintelligence officers in the field. However, the point is being made that they have likely been observed enough to convince decision makers in the MSS that officers deployed in the US may act boldly, ubiquitously, voraciously, and with greater intensity everyday in their efforts to collect all technologies China lacks as well as any other information demanded by their masters in Beijing.

The Desultory Pursuit of the MSS by US Counterintelligence

Quidquid dicendum est, libere dicem. (Whatever must be said, I shall say freely.) As noted earlier, the trickle of successes publicly announced are perhaps soothing to an unknowing public, creating the appearance that the US is pushing back on Chinese intelligence operations. However, everything that has been announced has hardly been enough to put the US on track to defeat, disrupt, the networks of the Chinese Intelligence services relative their size and strength in the US.  It would seem that senior executives in the US intelligence, counterintelligence services and law enforcement have not expended much time on pondering the unanswered question of why MSS has proceeded with such confidence in the US. When leaders of civilian US counterintelligence services and law enforcement go as far as to publicly admit lacking a knowledge of how severe an adversaries efforts and successful penetration has been, it almost seems as if they try to convince all that their adversaries were using some sort of witchcraft to accomplish all that they have. However, they are really only discussing symptoms of an illness that is making their organizations sickly and may eventually incapacitate them.

The preceding discussion on errant US counterintelligence officers does not depend upon any detailed inside story. While there will doubtlessly be endless knee-jerk reactions rebuking the expression of this reality, it is nevertheless a reality sufficiently known in the intelligence industry inside and outside the US. The US might have a better chance defeating MSS operations with Chaldean Numerology as long as enough errant counterintelligence officers are discussed here within the system. What has been happening so far concerning leaders, senior executives, and managers of US counterintelligence services is that they usually satisfy themselves by striking a happy medium between stellar work by those officers who are determined to do their jobs right and bring down adversaries’ intelligence operations in the US and the poor performance of others for reasons unknown. Indeed, while problems as those emphasized here concern day-to-day performance in the ranks, leaders, senior executives, and managers will more often look at the overall performance of officers in the organization statistically, by which everything likely evens out nicely.

Where there is some indication of problems being caused by errant officers, supervisors and managers will often compound the wrongdoing of errant officers not only by sitting on their hands on the matter, but by denying and covering it up. Such responses have had their impact. One might imagine colleagues, officers working the same shop, or close, at a workstation neighboring that of the errant officers, passively acquiring information about what they are doing, observing attitudes and behavior might become aware that unseemly and illegitimate activities are afoot in their cases. However, it is also hard to imagine them coming to supervisors or over their managers’ heads knowing how little is actually done to deal with such situations. There is also the potential threat of finding themselves being investigated for being too interested in the work of a fellow officer or in retaliation for trying to make the supervisors, the managers, the office and perhaps even the counterintelligence organization look bad. One might imagine that officers of other counterintelligence services, working the same area of operation, against the same target country, might occasionally get wind of something foul going on in a sister service in activities against an US adversary. However, if not an inquisitive officer’s supervisor, perchance managers would become dismissive or even angered at the news, and express the view that it is neither their organization’s job to point out deficiencies in, nor to investigate, sister organizations. With regard to innocent US citizens being targeted by errant officers, few to none of the fellow case officers or special agents in their respective offices or organizations, upon discovering what is transpiring, will make even the slightest effort to establish the wrongfully targeted citizen’s innocence. The climate is never really right in US counterintelligence organizations to report any wrongdoing. The miracle of the citizen’s rescue will need to come from an external source if that rescue comes at all.

One might imagine that local police departments in large cities in which counterintelligence activity may be taking place might come across some stories of aberrant federal activities given their ears are closer to ground listening to everything than anyone else. It may actually be the case that an innocent US citizen may go into the local police department to complain about odd surveillance activities or the harm of “dirty tricks” being played on them as part of the errant officers false counterintelligence effort. Typically, the local police officers, much as officers of sister counterintelligence organizations, will not desire to get involved, pointing to fact that it is not the responsibility of the local police department to point out deficiencies in, or investigate, federal counterintelligence organizations. In fact, those officers in local police departments, not so worldly wise that they would know to keep their distance from such wrongful activities, might find themselves sucked into them after some convincing by the errant officers. They would perhaps unwittingly make themselves co-conspirators and place their own careers in local law enforcement in jeopardy. Sed quis custodiet ipsos custodes? (But who will guard the guards?)

Each one of these typical and expected responses will with some certainty aid adversaries operating in the US more than one might imagine. The type of counterintelligence officer described here will be stopped by higher authority only if somehow someone shines a great light on their activity that might be seen by the news media or the US Congress. However, no one should count on that as a means to curb such wrongful, wasteful behavior.

The French Emperor Napoleon Bonaparte explained, “In war, three-quarters turns on personal character and relations; the balance of manpower and materials counts only for the remaining quarter.” One must recognize that in any organization, when elements such as good oversight, employee satisfaction, dedication, and motivation, comradeship, an overarching esprit de corps, and mentoring and encouragement from senior leaders who are present on the line, just to name a few, some employees may begin to fall out of step, not in the form of lateness and absenteeism, but drift away from rules and regulations, practices and procedures. Very often, that reality about employee performance can remain unknown to managers and senior executives of the organization. They may only know what is reported on paper and what little they may see. The choice of what to believe is often limited to the most convenient answer. Performance reports, even if read, may contain anything glaring depending on the nature of relationships between line employees and the supervisors; levels of performance may likely be evaluated as nominal generally. In some cases, levels of performance might even exceed expectations. (That was the case with a number of prominent US pharmaceutical companies recently.) After enough time passes, the organization’s policies on how employees are to perform their tasks, that have been crafted with due consideration of how to respond to a variety of seen and unforeseen contingencies, may be matter-of-factly ignored, supplanted by a collection of employee-styled practices that hardly reflect what managers and senior executives originally put in place, want, or should expect. When the organization’s situation looks good enough, and work is certainly getting done to some acceptable degree, a complacency can set in at the top and performance problems can continue to persist for an unimaginably long time until there is some sort of breakdown, perhaps catastrophic. The employee-styled approach, based on what looks good rather than what is good, may offer no answers, no solutions when a crisis ensues at that organization.

The honor system does not work so well in today’s world. Ambition and the need for immediate gratification turn one’s mind to taking short-cuts, bending the rules, to get what is desired quickly. In today’s intelligence industry, which exists in today’s world, too, the threat to the system is not simply disloyalty and defection, founded on corrupted thinking and moral ambiguity similar to that lately found in civilian businesses. There will be those case officers and special agents who, after a time in service, may not want to accept what they are given but take what they believe they deserve. Certainly, not all embody maturity and secure, friendly, unflappable authority as one might expect. Even if those few errant case officers and special agents are able feign the possession of such qualities by emulating their betters. Given enough time, they will find the way back down to their true “Animal House”-level, and disappoint to the fullest. If you take away their gas allowance, stipend for use of privately owned vehicles and other property they may take something else. If you cut reimbursement levels for meals with informants and operatives, they may take something else. If they are not allowed overtime for late night work as meetings with informants and operatives, they may skim off payments to informants and operatives for services rendered. (This particular wrongful practice, embezzlement, has been called “making a extra pension for oneself!”) Certainly, the human mind tends to struggle with the incomprehensible.  However, that should not be the case. Again as mentioned not all civilian US counterintelligence are the same. Others are in cracking form, and work diligently and professionally.

As it directly concerns relations between rank and file with senior executives and managers, much as a virus, those on the beat who begin to act on contemptuous feelings may soon find others to take down the same destructive path. The “us-them” mentality that can develop among those in the field toward managers and bureaucrats in the upper echelons makes the decision of errant, dishonorable officers and special agents to engage in and conceal malfeasance easier, more comfortable. Not to offer an excuse, but such insouciance toward right and wrong at the lower levels may actually be learned by errant officers in their respective organizations. It very likely became inculcated in their organizations perhaps because managers as a practice for years may have turned a blind eye to wrongdoings.

As witnessed during the years of the repugnant US counterintelligence attacks against Presidential Candidate and President-Elect Trump as well as during the attack against Wen Ho Lee, both aforementioned, a private citizen is typically falsely accused and made a subject for investigation with little real evidence except surmisal, animus, or worse bigotry. Management must keep an eye out for that sort of thing. Admonishment from managers and supervisors in both cases expectedly should have been to stick with the primary problem instead of rooting around at extraneous matters. Nothing was done. Apparently, nothing out of the ordinary was happening. Attendant to having a counterintelligence investigation levelled against them, the innocent citizen can become a target for dirty tricks by US counterintelligence organizations and their contractors as well. Further added to the citizen’s problems is the willingness of federal, state, and local counterparts working as a task force on other matters as counterterrorism will usually make their manpower and other resources available to support the efforts of the counterintelligence organization. Regarding the federal case against Carter Page, which was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. (Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.) Once a single individual’s freedom is trodden on, everyone’s freedom is lost! When all of this wrongdoing occurs, every employee’s work in a US counterintelligence organization has less value, meaning, purpose. The organization ceases being a force for good and simply becomes a pit of evil.

Carter Page (above). In the federal case against Carter Page that was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and inside the US!

When leaders are delinquent in cracking down on such “malfeasance,” or actual criminality, the dishonorable act as if dishonor is sanctioned. The errant officers engaged in odious behavior would only feel protected by the belief that no one wants to find out whether they are doing their jobs right, and no one will know as long as they keep their activities concealed. When a Procrustean bed of standards and practices exists, deviation from the correct path is essentially assured. Sadly, much damage has been done to US counterintelligence capabilities today as a result of the delinquency of many senior executives and managers over the years. As a result of these ugly situations, counterintelligence organizations have suffered, too, albeit not remotely to the degree of the innocent citizen.

Virtus est vitium fugere, et sapienta prima stultitia caruisse. (To flee vice is the beginning of virtue, and the beginning of wisdom is to have gotten rid of folly.) It is essential that senior executives and managers ensure that all of their line officers are performing their duties correctly at all times and the system is working optimally. They must travel to field offices of their organizations and find out what is really going on. That does not mean going to the offices of the organization to skylark, taking a cursory glance at everything, asking prosaic questions, merely accepting glowing reports of how great every is and being satisfied. That sort of desultory examination would serve no purpose. Instead, with whatever powers they may possess, they must engage in gumshoe detective work to see what they can see. Usually, where there is smoke, there is fire. Embers can serve as evidence of some activity hastily halted or What leaders and senior executives cannot see or confirm with their own eyes during such tours of their respective organization’s field offices, they must use all concrete indicia to conceptualize what may be happening. When everything is right, everything will be gun barrel straight. To be successful in an intelligence or counterintelligence service, a leader must know a lot about humanity. The leader must especially know a lot about human relationships. The leaders have got to know “how people tick.” There are said to be certain secrets and knowledge of human existence, human circumstance. Whatever knowledge a leader of such an organization might possess, full use of it must be made, too, along the lines of excellence. Visits “downstairs” by leaders should not be allowed to devolve into self-serving investigations into their own popularity among line officers and administrative personnel.

As a suggestion, leaders might look through files of officers in search of exorbitant numbers of payouts, massive distributions of gifts, and relatively excessive expenditures on contractors surveillance activities for cases that ended up being marked failed and closed. The errant officers often provide a cloak of legitimacy for unsuspecting eyes is the establishment of cooperative arrangements between their organization and counterintelligence elements of sister organizations to pursue their cases. The fact that money would be coming in from an additional source and that there were managers of other organizations who saw value in the case, would usually be enough to confirm for errant officers’ managers that the decisions, activities, and expenditures by them were viable. Another place for auditors to look in the errant officers files would be code names for both the subjects of investigations as well as informants and surveillance operatives. With the intent of being discreet and not providing a tutorial, suffice it to say that often there will be multiple code names used for one informant or operative. Payments secured for the multiple code names from finance offices may be deposited in multiple personal bank accounts.

Ad mores natura damnatas fixa et mutori nescia. (Human nature ever reverts to its depraved courses, fixed and immutable.) During the Cold War, it was the case in the US Intelligence Community that a highly suspicious senior CIA official, James Jesus Angleton, reigned as the figurative high priest of counterintelligence. He conducted vigorous and plentiful internal investigations against case officers, defectors, and informants, creating a frightful degree of apprehension and insecurity within the rank and file of intelligence and counterintelligence services. This is certainly not a call for a return to those days.

Many members of US intelligence and counterintelligence services and law enforcement would very likely be touchy if they came across the meditations of greatcharlie presented here. However, far more than anything else, those feelings would be due to an emotional response. A manifestation of the thinking that has prevented those organizations from finding what is wrong and being satisfied with the 1870 attitude similar to that of the Supreme Command of the French Imperial Army on the eve of the Franco-Prussian War of debrouillez-vous (“We’ll muddle through somehow”). Those leaders of those organizations are too comfortable living a superficial existence, underestimating their own destiny, dignity, and nature. Ideally, they would be able to put their pride in their pockets and properly see it all as an opportunity to make use of an examination from outside the box as presented by this essay to make real, positive change to greatly improve their capabilities.

Taking simple steps as those mentioned here will do more than anything else to help close the distance between US counterintelligence and the MSS to allow for the leveling of more successful and decisive blows against their networks and operations. Given half the chance, US counterintelligence would perform far better. Given the unforgivable, illegal treatment and great harm civilian US intelligence and counterintelligence services have caused Trump, one would reasonably think that they would attempt to do as much as possible, perform well beyond expectations in the right way, to make amends for their sins. One should not be able to presume comfortably that such thinking is a degree of humanity that may be lacking within the heads and hearts of leaders of the respective organizations. Plus novisti quid faciendum sit. (You have learned more what has to be done.)

The Way Forward

Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.) As stated earlier, the fact that the Chinese government initiated all of the ongoing difficulties cannot be credibly argued against. However, very sadly, Beijing so far has not demonstrated any interest in acting voraciously concerning the present matter of the coronavirus. Surely, the two countries are not at a point yet when the dark waters of despair have overwhelmed their leaders. When diplomats from both sides meet, they must approach each other with a certain buoyancy and hope. In the face of that the US, as the true dominant power in the world must maintain its poise. There remains a plethora of bilateral and some multilateral issues of great importance between the US and China that are seemingly distanced enough from all that is happening in the forefront and are in the process of being resolved. There are the issues of: trade, intermediate nuclear weapons, North Korea denuclearization, the border dispute with India, Hong Kong, Taiwan, international terrorism, transnational organized crime, counternarcotics policy, and space. Of course, there are adverse matters that may arise related to the coronavirus that cannot be ignored. The US must not react to them. It must always act in a measured way using effective means, at a time and place of its choosing. For the US Intelligence Community, the political warfare effort tied to the coronavirus being pressed on the US from the Chinese intelligence services may hold primacy on the agenda given the diplomatic and political importance given to it. However, for it, defeating and displacing the networks and operations of Chinese intelligence services in the US, as permanently as possible, is job one.

When unexpected and unfamiliar things are explained the romantic sense of mystery stirred in readers about their nature can be smothered. The world is not always as one would have it. What is required is seeing beyond appearances to what is truth. No one is making a mountain out of a molehill here. Leaders, senior executives of US counterintelligence services might really want to take a deeper look, perform their own empirical studies of the actions of their respective organizations, to discover how other organizations with which they should be cooperating, such as military ones, and how adversaries of the US, likely see their organization. Perhaps the combined sense of sadness, anguish, betrayal, and anger might coalesce to prompt questions about what is really going on in the rank and file.

Reading federal indictments, criminal complaints, and judgments of those caught engaging in espionage for MSS over the past decade, one develops a picture of US counterintelligence having some success intercepting those who had already delivered a considerable amount of classified information concerning US national security equities, projects, strategies, operations, and policies, US tactics, techniques, procedures, and methods and US defenses against foreign intelligence penetration, and of course, cutting-edge technologies had been put in MSS officers’ hands. One can discern US counterintelligence has had great difficulty in devising ways to deter, disrupt, and destroy the intelligence efforts of MSS and other Chinese intelligence services before any secret government information or intellectual property of private firms and academic institutions that is the product of intense and gifted research and development work is lost. What should really be happening is MSS recruitment efforts should be leading over and over to traps. Information to which very costly, devious maneuvers might capture should prove to be cooked and valueless. MSS networks should be regularly penetrated by US counterintelligence, they should be rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. These tacks have been successfully performed to defeat the efforts of foreign intelligence services operating in the US going as far back as World War II.

Perchance the notion of setting out to attain such goals may seem pie in the sky, even Quixotic to those in US counterintelligence who may albeit be tired and uninspired, but such can be accomplished. Such things have been accomplished in the past against other foreign intelligence services under a similar set of circumstances. Smart people are known for being able to find answers to very difficult problems. An immediate thought is that new ideas for achieving such goals might be acquired from new types of sources. A reality about any system is that dogma exists, it can color the thinking of members of an organization, and it can insinuate itself into analysis. Additionally, supervisors in the analytical departments, knowingly and occasionally unknowingly because it would only be human, may place limitations on what directions, albeit even reasonable and logical ones, that analyses can move along. New thinkers may rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Outside the box thinking would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. Well-worn thinking would still have its place in other simpler issues. Hiring individuals for such out of the box assistance should be done with delicacy. There should be a certain exactness about the selection process. Those sought should be already known and possess the ability to present what may be unorthodox innovative, forward-looking perspectives. Hiring eccentric, whimsical, and outlandish thinkers would be unhelpful and undesirable. The projects on which the individuals would work on would be very compartmentalized and limited in scope and duration. The worst possible outcome would be to create some dreadful security problems. (Not that anyone would ask, but alas, greatcharlie’s editor is now a bit too long in the tooth to provide such outside the box assistance.) The actions of the MSS and other Chinese intelligence services, stealing away cutting-edge technologies and research and development, if left unchecked, could cause the US to face a difficult and reduced future. It is not just a scare story, designed to terrify US citizens. That is reality. The choice is to allow a set of unfortunate circumstances against US interests to slowly take shape or act now and begin to shape events in a manner that will ensure the US will retain its place as the world’s leader as time goes on. Deus hæc fortasse benigna reducet in sedem vice. (Perhaps God by some gracious change, will restore things to their proper place.)

As greatcharlie has stated in previous posts, poetry and song provide an emotional vocabulary, putting into words what one may be sensing. When thinking about the out of the box thinkers, but the innocent US civilians and an innocent US President, who have been attacked by errant US counterintelligence officers’ wrongful and detestable investigations, the song “Die Gedanken sind frei” (Thoughts are free) comes to mind. The most popular version was rendered by Hoffmann von Fallersleben in his Schlesische Volkslieder mit Melodien (Silesian folk songs with melodies) collection published in 1842 by Breitkopf & Härtel:

Die Gedanken sind frei, wer kann sie erraten,
sie fliegen vorbei wie nächtliche Schatten.
Kein Mensch kann sie wissen, kein Jäger sie schießen
mit Pulver und Blei: Die Gedanken sind frei!

Ich denke was ich will und was mich beglücket,
doch alles in der Still’, und wie es sich schicket.
Mein Wunsch und Begehren kann niemand verwehren,
es bleibet dabei: Die Gedanken sind frei!

Und sperrt man mich ein im finsteren Kerker,
das alles sind rein vergebliche Werke.
Denn meine Gedanken zerreißen die Schranken
und Mauern entzwei: Die Gedanken sind frei!

Drum will ich auf immer den Sorgen entsagen
und will mich auch nimmer mit Grillen mehr plagen.
Man kann ja im Herzen stets lachen und scherzen
und denken dabei: Die Gedanken sind frei!

Ich liebe den Wein, mein Mädchen vor allen,
sie tut mir allein am besten gefallen.
Ich sitz nicht alleine bei meinem Glas Weine,
mein Mädchen dabei: Die Gedanken sind frei!

(English Translation)

Thoughts are free, who can guess them?
They fly by like nocturnal shadows.
No person can know them, no hunter can shoot them
with powder and lead: Thoughts are free!

I think what I want, and what delights me,
still always reticent, and as it is suitable.
My wish and desire, no one can deny me
and so it will always be: Thoughts are free!

And if I am thrown into the darkest dungeon,
all these are futile works,
because my thoughts tear all gates
and walls apart: Thoughts are free!

So I will renounce my sorrows forever,
and never again will torture myself with whimsies.
In one’s heart, one can always laugh and joke
and think at the same time: Thoughts are free!

I love wine, and my girl even more,
Only her I like best of all.
I’m not alone with my glass of wine,
my girl is with me: Thoughts are free!

China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1)

The Headquarters of the Ministry of State Security (above). China’s primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of cutting-edge technologies from the US. This essay provides a few insights from outside the box on the MSS, the tactics, techniques, procedures, and methods, it believes, help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US.

There was a time not so long ago when discussion in US foreign policy circles concerning China centered on issues such as trade, Hong Kong, Taiwan, the South China Sea, North Korean denuclearization, and human rights. Now the primary focus of discussion is the coronavirus. China is where the virus originated and was surely ineptly handled, setting the stage for the current pandemic. How China has responded to the crisis turned pandemic has been a source of curiosity and absolute outrage globally. Despite preening about its own advances in science and medicine, China proved not to be up to the task of handling the outbreak that most experts agree more than likely began disastrously in a Wuhan laboratory. It is difficult to fully comprehend what on Earth went on in the minds of China’s leadership upon learning about their country’s coronavirus epidemic. Shutting down cities and restricting travel was among the means to control the spread among their own citizens but China’s government was quite derelict in ensuring the virus would not break out around the rest of the world. Worse, the Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. China very quickly became exercised with the US over the matter. They became particularly warm toward US President Donald Trump. The words of official spokespeople were certainly not seasoned in grace. Although it has found itself in an unpleasant, contentious relationship with the US as a result of its own doing, Beijing has nevertheless effectively doubled-down on the behavior that exacerbated the situation. China’s government spokespeople will most likely continue to assail the global media with waves of distortions. At the same time around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, People’s Republic of China President Xi Jinping is well-aware of what is transpiring and has set some type of guidance on just how far this whole cabaret put on by Beijing should go. Numquam enim temeritas cum sapienta commiscetur. (For rashness is never mixed together with wisdom.)

The figurative hammer of the foreign and national security policy apparatus swung by the arm of the Communist Party of China against the US is China’s intelligence services. They are the ones on the front lines of the political warfare struggle. Among those intelligence services, the primary element engaged is the Ministry of State Security (MSS). The Ministry of State Security is the embodiment of the logic that created the Chinese system’s intimidating, authoritarian order and for years has choreographed events to accomplish the Communist Party’s purposes. To that extent, the Communist Party of China has entrusted the defense of “their creation,” the modern Communist Chinese state, to this complex government organization. China has only offered soupçons about the MSS, and even less than that lately. Unless one is engaged in diplomatic, intelligence, defense, military, or law enforcement work, MSS is an elements of the Chinese government with which most outsiders when engaged in their normal business related to China, whether inside the country, in a country near by, or even at home, will have contact, but will often be completely unaware. The ostensible purpose and task of MSS is to defend China against external as well as internal threats. By performing its mission of collecting vital information about China’s friends, allies, competitors and adversaries MSS gives the leadership of the Communist Party of China time to make decisions and space to take action. To that extent, the MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. However, it has also robustly enhanced another mission of collecting intellectual property and an array of cutting-edge technologies from the US. The Communist Party of China is surely counting upon it to successfully take on China’s adversaries in a large way with a small footprint. Interestingly though, there has been far greater discernment worldwide of MSS political warfare activities than Beijing might have imagined. The immediate implication of that has been the infliction of considerable damage to China’s reputation as a world leader. Veritas nimis saepe laborat; exstinguitur numquam. (The truth too often labors (is too often hard pressed); it is never extinguished.)

This essay does not focus on the political warfare effort by MSS, the nuts and bolts of which are somewhat straight forward, and compressed into summary form in the March 31, 2020 greatcharlie post entitled, “Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic”. It focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. This section, “Part 1,” provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. “Part 2” continues that discussion and, without an ax to grind, greatcharlie calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China Chairman Mao Zedong (left) and Kang Sheng (right). After the defeat of Imperial Japanese forces in China and prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations that were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

Chinese Intelligence Under the Communist Party: The Beginning

The foundation of the Chinese intelligence services was laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Maoist thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communist Party of China’s main intelligence institution was the Central Department of Social Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

The Ministry of Public Security was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a deputy chief of staff to People’s Liberation Army (PLA) chief of staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. However, as time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the violent mentality of its initial leader, Kang. Despite his alleged romance with Mao’s wife, Kang was far from a charming man. Rather, he was known for being an absolute brute. He would move on to become a member of the Communist Party of China Political Bureau, and Li Kenong moved up to take command there. In 1962, the decision was made to move Ministry of Public Security counterespionage functions over to the CID.

The 1960s were a volatile time for Chinese intelligence services as with all military institutions in China. Li Kenong died in 1962 and in 1966 he was succeeded by Luo Quinchang, who had been adopted by Kang in 1958 and ushered into the MPS. However, the MPS became involved in the power struggles that embroiled the Communist Party during the Cultural Revolution. Mao, feeling his power base was threatened mainly as a result of his failed Great Leap Forward, implemented the “Four Cleans Movement,” with the objective of purifying politics, economics, ideas, and organization of reactionaries, led by a one time ally, Luo Quinchang of MPS. His staff files were seized and mined for candidates for criticism and banishment to the lao jiao prison system.

Kang Sheng (above). The Ministry of Public Security (MPS) was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. As time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the mentality of Kang, who was known for being an absolute brute.

Most of the leadership of the CID was sent to the countryside for reeducation and the organization, itself, was abolished for a time. Its activities and assets were absorbed by the Second Department of the PLA’s general staff taking over its duties. The Second Department oversaw human intelligence collection to include military attachés at Chinese embassies overseas clandestine collection agents sent to other countries to collect military information, and the analysis of overt sources of information. Mao turned to Kang to ensure that his ideological and security directives were implemented. Kang, Mao’s wife Jiang, Wang Hongwen, Yao Wenyuan, Zhang Chunqiao, dubbed the “Gang of Four,” worked together in a campaign to renew China’s revolutionary spirit. With the assistance of the Red Guards, a mass student led paramilitary movement mobilized and guided by Mao from 1996 to 1967, the Gang of Four set out to destroy the “Four Olds” of society: old customs, old culture, old habits, old ideas. The Red Guards were particularly disruptive. Apparent moral confusion caused the base student army to rise and nearly wreck China by attacking senior Communist Party leaders such as Deng Xiaoping and by conducting mass executions. There were reports that the Red Guards cadres had engaged in cannibalism, eating students. They destroyed approximately 66 percent of China’s famous temples, shrines, and heritage sites. These included nearly 7,000 priceless works of art in the Temple of Confucius alone. The Red Guards would face resistance in major cities. Often the PLA was forced to violently put down their destructive attacks. The organization having fully flown off the rails, Mao instructed leaders of the Red Guards to end their movement.

Meanwhile, Kang had returned to the intelligence service from on high to assume responsibility for the CID cadres that remained left in limbo. Eventually, a new organization, the Central Case Examination Group, composed of CID cadres under Kang was created. That organization was instrumental in the removal of Deng Xiaoping from power. The CID was reestablished in 1971 following the death of Lin Biao and then again became entangled in another power struggle as Hua Kuo-feng and Deng Xiaoping vied for control of the party. By then, Kang had receded into the distance, viewed as too connected to the untidiness of the Cultural Revolution.

Following Mao’s death in 1976, the new leadership under Hua Guofeng initially tried to return to the pre-Cultural Revolution years and strengthen the CID. When Hua Kuo-feng and Wang Dongxing assumed power in 1977, they tried to enlarge the CID and expand the Communist Party of China intelligence work as part of their more general effort to consolidate their leadership positions. However, their hopes and dreams met their fate. Deng Xiaoping, having steadily ascended within the leadership ranks of the Communist Party of China, was uncertain of CID loyalties and his opinion of it was unfavorable. Circumstances indicated that he should order the shut down of all Investigation Offices in Chinese embassies. Although it remained part of the Chinese intelligence services, the CID was officially downgraded. According to Anne-Marie Brady in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the impact of the CID’s downgrade was softened by the fact that its intelligence efforts  were being paralleled and to some degree occasionally outmatched by the extraordinarily secret International Liaison Department of the Communist Party of China, which became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies worldwide.

The emblem of the Ministry of State Security (above). In 1983, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the new Ministry of State Security (MSS). Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up in July 1983 to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus.

The Inception of the Ministry of State Security

The story of the Ministry of State Security (MSS) began thoroughly in July 1983. That year, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the MSS. Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. When the reorganization of the MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak. With its inception, MSS added new dimensions to China’s foreign intelligence scheme while freeing MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the intelligence game so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. The cleaning up of old ways of conducting its business, and a modernization of Chinese intelligence that was long overdue.

At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with PLA and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was to perform as police. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. Tiananmen Square, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them to remain greatly concerned over a possible follow on move by students. That concern was thoroughly evinced when Chinese authorities announced that some 200 Chinese had been accused of spying for the Soviet Union. One might say that the counterintelligence purpose of the assignment made giving it to the MSS plausible. However, MPS had the domestic counterintelligence mission covered. Redundantly taking on the assignment concerning the student–surely MPS was on it–was a turn in a wrong direction. The MSS would eventually develop into an authentic foreign intelligence service, but it would take time. It would be an evolutionary process.

An ocean of student protesters in Tiananmen Square in May 1989 (above). At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with People’s Liberation Army and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was police work. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. The protests, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them great concern regarding a possible follow-on move by students.

As aforementioned, a paucity of quality information exists publicly from the Chinese government about the present-day MSS in primary or secondary sources. No official Chinese government website exists for the intelligence organization. There have been no press releases distributed or press conferences held by the organization’s public relations department. Access to information from the organization is essentially nonexistent. No significant writings have been published  by security scholars in China on the MSS. Precious few defections from MSS have occurred, so little has been provided from an insider’s view. What is best known generally about MSS in the US has been superbly relayed in I.G. Smith’s and Nigel West’s celebrated Historical Dictionary of Chinese Intelligence (Rowman & Littlefield, 2012).

The MSS headquarters is located in Beijing in a large compound in Xiyuan, on Eastern Chiang’an Avenue, close to Tiananmen Square. Within the security perimeter is snowing apartment block, Qian Men, where many of the MSS staff and their families live. The MSS is a civilian intelligence service and operates independently from the People’s Liberation Army General Staff Second and Third Departments, which also conduct military intelligence and counterintelligence operations. Although it has a central headquarters, the MSS actually was not built up as a centralized organization. It is composed of national, provincial, and local branches much as the MPS from which it sprang. Even the initial CDSA and later CID units of the MPS operated domestically under a decentralized and autonomous structure throughout China that was supported by the Communist Party of China. Their structure somewhat resembles that of the erstwhile regional and Soviet republic KGB bureaus. The provincial, and local branches receive directives from headquarters in Beijing and are financed by National Security Special Funds. Yet, only to the extent that provincial and local branches receive “administrative expenses,” could they be considered accountable to headquarters. They are largely autonomous in reality, reportedly acting as essential adjuncts to the local administration. The formal chief of the MSS holds the title Minister of State Security. As of this writing, the minister is Chen Wenqing. However, from the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of Communist Party of China leaders. Initially, the most important of these was the Political-Legal Commission (Zhongyang Guoja Anquan Weiyuanhui). The Political-Legal Commission was chaired by a Politburo member at the Central level with the title Secretary, who serves essentially as China’s security czar. There are Deputy Party Secretaries at the lower levels. The lower-level commissions oversee all state security, public security, prisons, and procuratorate (judicial) elements for their levels. Currently, there is a Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) who oversees China’s security apparatus and law enforcement institutions, also with power reaching into the courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs  Xi announced the creation of the Central State Security Commission (CSSC) in the Third Plenary Session of the Eighteenth Party Congress in November 2013. The CSSC held its first meeting on April 15, 2014. The purpose of this new commission was twofold. First, it was intended to balance internal political power created by the expansion of the security services and their capabilities in the 2000s. Second, the commission orient’s the MSS and other security forces toward planning and preempting threats to the party-state. At lower levels, provinces, counties, and municipalities have state security leading small groups (Guoja Anquan Lingdao Xiaozu). The political-legal Commissions and State Security leading small groups overlap in personnel but not perfectly. They combine with defense mobilizations committees and 610 offices to create a kind of system of systems that oversees local security and intelligence work. Headquarters is surely kept apprised of what the provincial and local branches are doing. Each level reports to the next MSS level up and the Political-Legal Committee at that level. This florid arrangement of horizontal and vertical relationships often creates bureaucratic competition that encourages pushing decisions upward while hiding information from elements of equal protocol rank.

Intellect, will, and hard earned experience drove MSS leaders forward as they molded the MSS into a truly effective intelligence organization. What compelled the domestic focus of its initial work is further apparent in that process. The first two ministers, Ling Yun and Jia Chunwang, faced the challenge of turning a small Ministry with only a handful of outlying provincial departments into a nationwide security apparatus. The expansion occurred in four waves. In the first wave during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments exoanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. The MSS policy of expanding representative offices in most major towns and cities was reversed in 1997. Nevertheless, when MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level. Presently, the MSS’ thirty-one major provincial and municipal sub-elements. Interestingly, as MSS moved through each growth spurt, it did not ignite efforts to rename the organization, to divide it into pieces and parcel out some of its departments among other Chinese intelligence services, or to disband it altogether in the way CDSA and MPS suffered in the two previous decades. There seemed to be an understanding system wide that the need existed for a solid civilian foreign intelligence as well as counterintelligence capability.

The Wuhan Hubei National Security Office in China, home of the provincial Ministry of State Security Bureau (above). The expansion of MSS provincial departments occurred in four waves.  In the first wave, during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, creating the Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang bureaus. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments expanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. Presently, the MSS has thirty-one major provincial and municipal sub-elements.

As relayed previously, MSS was initially staffed with personnel drawn largely from the MPS. Many local MPS officers transitioned overnight from being police to MSS officers. The MSS foreign intelligence capability was built up when intelligence cadres from the Communist Party of China were brought into its ranks. The new MSS was also funded in part by the MPS. The fact that MSS, in a similar way to MPS, established provincial offices, which operated under cover names, such as “Unit 8475,” has been completely uncloaked and was made fairly well-known courtesy of the Historical Dictionary of Chinese Intelligence. To help MSS take on its mission, MPS passed some networks to the new organization. Yet, with some uncertainty that existed as to the political nature of MSS, MPS was reportedly reluctant to make such transfers. Weariness and disappointment was also apparently felt among some of the old MPS professionals who opted to move to the MSS. While there were far greater opportunities for foreign travel, the financial side-benefits of working closely with industry were no longer available to them.

Employment on the MSS staff continues to hold considerable social status and is generally thought of as a desirable career. MSS intelligence officers are usually recruited before or during their university education, and a large proportion are graduates of the China Institutes of Contemporary International Relations (CICIR), the Beijing Institute of International Relations, the Jiangnan Social University, or the Zhejiang Police College. Those requiring technical skills usually attend the Beijing Electronic Specialist School. These establishments provide training for MSS recruits, who usually come from families with MSS links or otherwise are influential and beneficiaries of guanxi. Nevertheless, however well connected the candidates are, they will have to be dedicated and disciplined although not yet necessarily Party members. Guanxi is often exercised to facilitate entry into the MSS.

Promotions aee endorsed at both the bureau and headquarters levels. Senior branch positions require the approval of the local administration, although, in practice, the will of headquarters usually goes unchallenged. The quality of performance during the information war over the coronavirus pandemic will also likely play a considerable part in future promotion. Interestingly, although thoroughly part of the MSS, branch personnel are regarded as employees of the local government. More than half the MSS staff recruitment takes place in the region’s where the officers will be posted for the breath of their careers and where they have family links. Those family links are quite important. This structure enables the MSS to fulfill the increasingly large responsibility of ensuring social stability, considered a significant operational priority. There is no equivalent to this system in the West. Training takes place in the branches. There are no centralized, formal training academies, and new personnel are expected to learn their profession on the job by reading old and current operational files, by working with mentors, and attending occasional lecturers and conferences. Expectedly in the Communist country, during training, a heavy emphasis is placed on political indoctrination, and although probably less than 15 percent of MSS staff are women, they tend to be almost entirely Communist Party of China members. Internal transfers, and secondments are routine and occur mainly from the law and political departments of local government. There a tacit understanding that one could find a home in the MSS with all of the care and comfort imaginable during and after active service.

Mao (left) and Soviet Premier Joseph Stalin (right). Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people. Despite reservations, Mao welcomed assistance from Moscow in the form of physical aid but experts and advisers. Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country, with hope of exploiting it to the greatest degree possible. However, cooperation that was established between Chinese and Soviet intelligence services ended with the split between Chinese and Soviet leaders.

Residual Impact of Soviet Intelligence Upon Chinese Intelligence?

Naturally, the once significant impact and influence of the Soviet intelligence service on Chinese intelligence has faded more and more with the coming of each new generation into the system. Yet, fragments from that past past still remain. Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people, and to that extent was only interested in formulating the best path to Socialism for China. Mao had held reservations about overlaying China with the Soviet model, but nonetheless welcomed assistance from Moscow in the form of physical aid but experts and advisers. Nevertheless, an agreement was established between Mao and Stalin to have a Soviet advisory mission providing physical aid and significant guidance and advice on nearly all aspects of government. Concerning intelligence, Chinese and Soviet services liaised significantly and comfortably. Soviet advisers used their own service as a model to structure the organization, staffing, training, intelligence operations, and resources of Chinese intelligence services. In the end, Chinese intelligence services mirrored those of the Soviets. It became an effective tool for China’s security. What happened with the Chinese also happened with intelligence services of Eastern Bloc and other Communist governments’ intelligence services in the late 1950s. However, also much as in the Eastern Bloc, Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country that Soviet intelligence could exploit to the greatest degree possible.

Consequently, for decades after World War II, the Chinese intelligence service, even without Soviet direction, evinced some organizational and operational aspects similar to those of the Soviet intelligence services of the past. To that extent, the KGB has remained a fully useful yardstick from which one could measure, understand, and conceptualize the structure and functions of the Chinese intelligence services as they evolved. Interestingly, the period in which Chinese intelligence services received advice and closely liaised the Soviet counterparts was also a period of evolution of Soviet intelligence. As soon as one intelligence organization was opened for business in the Soviet Union, it was replaced by another with added responsibilities. Those organizations included: Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKVD; 1938-1946, Narodnyi Komissariat Gosudarstvennoe Bezopasnosti (People’s Commissariat for State Security) and Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKGB-NKVD, placing police and security functions under one chief; and, 1946-1953, Ministerstvo Vnuirennikh Del (Ministry for Internal Affairs) and Ministerstvh Gosudarstvennoe Bezopasnosti (Ministry for State Security) or MVD-MGB. Eventually, in 1954, all of the non-military security functions were organized in what was dubbed the Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or the KGB. It was under odd circumstances that Soviet intelligence services would identify themselves as models for those of other countries to follow. Interestingly enough, there was a lesson for the Chinese to take away from that period of the growing pains felt by Soviet intelligence services. In effect, the evolution of the Chinese intelligence services was inevitable if it was to meet the evolving needs of the leadership in a changing world. Without wanting to declare or insinuate some causality, or proffering that there was some curious act of imitation, it must be noted that Chinese intelligence services, following the years of close contacts with the Soviet counterparts, went through a similar period of near continuous organizational and name change.

Cooperation that was established between Chinese intelligence services and Soviet intelligence services could not survive the split between Chinese and Soviet leaders. The cause was gaping differences in outlook. Mao’s perception of the right relationship between the Soviet and Chinese Revolutions was influenced by his profound identification with the Chinese national tradition, which led him to reject conceptions and political lines not sufficiently suited to the mentality of the Chinese people and to their originality and creativity. Such were the sensibilities behind the “Great Leap Forward.” Not even quiet liaison through a virtual cross border masonry between field officers of the two intelligence services would have been allowed.  

Unlike its sister civilian intelligence service, the MPS, the MSS generally appears to have adhered to the non-politicization  of the service. MSS senior executives have evinced an acumen for being clever with politics. Occasionally, they have not been pristine in avoiding any mix up between their true task and purpose and extraneous political matters. Indeed, MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. The purges of Beijing Party secretary Chen Xitong in 1995 and Shanghai Party secretary Chen Liangyu in 2006 were understood to have involved the ministry. Following the fall of Bo Xilai and Zhou Yongkang, the Beijing State Security Bureau chief Fang Ke and Vice Minister Qiu Jin were ousted in rather widespread purges as a consequence of their use of MSS resources to support certain leaders in their political tussles.

How MSS Is Organized

In terms of operations and functional (administrative) duties, a common understanding has been that MSS is divided into bureaus, each assigned to a division with a broad directive and each bureau is given a specific task. On a Weibo account, reportedly associated with the MSS, a suitable outline of the first 11 bureaus was posted in November 2016. A description of that organizational structure of the MSS is easy enough to find online. The bureaus on that list, along with an additional six bureaus, was discovered on the common yet only moderately reliable source, the online encyclopedia, Wikipedia: Confidential Communication Division: Responsible for the management and administration of confidential communications; International Intelligence Division: Responsible for strategic international intelligence collection; Political and Economic Intelligence Division: Responsible for gathering political, economic, and scientific intelligence from various countries; Taiwan, Hong Kong, and Macau Division: Responsible for intelligence work in Taiwan, Hong Kong, and Macau; Intelligence Analysis Division: Responsible for analysing and reporting on intelligence and collecting guidance on how to handle intelligence matters; Operational Guidance Division: Responsible for directing and supervising the activities of provincial level MSS offices; Counterintelligence Division: Responsible for gathering counterintelligence information; Counterintelligence Division: Responsible for monitoring, investigating, and potentially detaining foreigners suspected of counterintelligence activities. This Bureau is reported to primarily cover and investigate diplomats, businessmen, and reporters; Internal Security and Anti-Reconnaissance Division: Responsible for protecting the MSS from infiltration by foreign entities by monitoring domestic reactionary organizations and foreign institutions; External Security and Anti-Reconnaissance Division: Responsible for monitoring students and institutions abroad in order to investigate international anti-communist activities; Information and Auditing Division: Responsible for the collection and management of intelligence materials; Social Research Division: Responsible for conducting public opinion polling and surveying the population; Science and Technology Investigative Division: Responsible for managing science and technology projects and conducting research and development; Science and Technology Investigative Division: Responsible for inspecting mail and telecommunications; Comprehensive Intelligence Analysis Division: Responsible for the analysis and interpretation of intelligence materials; Imaging Intelligence Division: Responsible for collecting and interpreting images of political, economic, and military targets in various countries through both traditional practices and through incorporation of satellite imagery technologies; and, Enterprises Division: Responsible for the operation and management of MSS owned front companies, enterprises, and other institutions. (Additionally, In 2009, the MSS was reported by a former official to have a Counterterrorism Bureau.)

Since leaving the Central Intelligence Agency (CIA) where he was a highly-regarding analyst on China, Peter Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Among a number of issues, Mattis expressed a view compatible with greatcharlie’s here in a 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” Studies in Intelligence Vol. 56, No. 3 (September 2012) 47, that “Protecting the integrity of US intelligence and policy processes is an important task for the US Intelligence Community, but clear understanding of Chinese intelligence serves more than the CI [counterintelligence] mission. At the core, analysis of Beijing’s intelligence institutions is about trying to understand systematically how the Chinese government uses information to inform its policy formulation, guidance to diplomats and security officials, and the execution of its policies.” Along with a former military intelligence officer and diplomat, Matthew Brazil, Mattis published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant. In covering the web of Chinese intelligence services that engage in intelligence operations, Mattis and Brazil present a great deal about the super secret MSS which one can be sure is cutting edge stuff. For many analysts in defense, foreign affairs, and intelligence worldwide, it presents nothing less than a treasure trove and should find a permanent place in syllabi in college and university courses worldwide for years to come. (Regular reference is made to Mattis’ writings in this essay.)

Mattis and Brazil share the view that MSS headquarters is organized into numbered bureaus. They further explain that it is spread across at least four compounds in Beijing. However, in their assessment, they believe MSS is organized a bit differently than in the outline of its departments aforementioned. They state that at the present, the MSS is believed to possess at least eighteen bureaus. Unlike the People’s Liberation Army  (PLA) where military unit cover designators offer a way to track units, MSS elements, they explain, are not so readily identified. In Mattis’ and Brazil’s own words, “The following designations are ones in which we possess a modicum of confidence”: First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations; Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers; Third Bureau: unknown; Fourth Bureau: Taiwan, Hong Kong, and Macau Bureau; Fifth Bureau: Report Analysis and Dissemination Bureau; Sixth Bureau: unknown; Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside of China; Eighth Bureau: Counterespionage Investigation,  runs investigations to detect and apprehend foreign spies in China; Ninth Bureau: Internal Protection and Reconnaissance bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage; Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates activities of reactionary organizations abroad; Eleventh Bureau: China Institutes of Contemporary International Relations,  performs open source research, translation, and analysis. It’s analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows; Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the United front work system; Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluations Center (Zhongguo Xinxi Anquan Ceping Zhongxin) may manage the research and development of other investigative equipment; Fourteenth Bureau: Technical Reconnaissance Bureau conducts mail inspection and telecommunications inspection and control; Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. It’s public face in the Institute of Taiwan Studies at the China Academy of Social Sciences; Sixteenth Bureau: unknown; Seventeenth Bureau: unknown; and, Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the US.

Chairman Deng Xiaoping (above). Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Chinese industry needed to retain a competitive edge. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government. They receive intelligence collected by Chinese intelligence services. They undertake commercial espionage for their own benefit as well.

Intelligence Targets of Today’s MSS

Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, it would seem MSS senior executives and managers have now figuratively declared “game on!” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. That is primarily what Beijing wants and that is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined. By conventional wisdom, one would proffer that as a priority, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Infiltration of these operations by an adversary as China would certainly have far-reaching implications for US national security. Although the PLA would most interested in US military equities in its region and elsewhere in and around Asia, the MSS would expectedly support that work by collecting what it could on the instruments that the US uses to make conventional war and nuclear war. The intelligence threat China has posed to US national security further extends overseas, as China’s foreign intelligence service seeks to infiltrate the systems of US allies and partners. This particular aspect is seen as potentially having grave implications for US alliance stability and the security of US national defense information. Lately, the chief feature of the intelligence war between the US and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its victims.

Deng Xiaoping and the Emphasis on Economic Espionage

Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves.

During the administration of US President Barack Obama, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with China’s operations had no real effect on the Obama administration’s course and Chinese intelligence activities steadily intensified. The leadership of the Communist Party of China has not concealed the fact that they recognize the link between economic and national security, and its commercial and national security espionage efforts function in tandem to exploit it.

US Attorney General William Barr (above). The present US Attorney General William Barr is both troubled and angered by China’s espionage efforts against the US and he intended to defeat those efforts. Barr insists China is working to supplant the US as the leader in technology in all areas, by literally stealing away the future of the US. He explains that to accomplish that, China has continuously sought, through a variety of clandestine ways, to grab whatever about US technologies,  developmental practices, and manufacturing practices. Barr wants the US business community to accept these realities and become part of the answer. In making deals with China, US businesses are often selling out their own long-term viability of us companies sold out for short term gain. As dangerous, China has been able to cultivate relationships with their employees and recruit them for spying.

US Attorney General William Barr, in a June 21, 2020 interview on FOX NEWS “Sunday Morning Futures,” proffered that the US for decades has been a leader in technology. China would like to overcome US dominance in the field. To that end, China has been stealing all us technologies developmental practices, manufacturing practices. Barr stated: “The way I look at is, this is a fundamental challenge to the United States. Since the late 19th century, our opportunity and our growth, our prosperity as a country has come from our technological leadership. We have been the technological leader of the world. In the last decade or so, China has been putting on a great push to supplant us, explicitly. They want to be the leader in all the future technologies that are going to dominate the economy. And so what’s at stake is the economic opportunity of our children and our grandchildren, whether we can continue to be the technological leader of the world. The Chinese have embarked on a very aggressive program during this time of stealing and cheating in order to overtake us. They have stolen our intellectual property. When they steal our secrets about future technology, they’re stealing the future of the American people.”

Barr left no doubt that China was quite some distance from competing fairly. He insisted that it was the intention of the Trump administration to put a halt to China’s very open efforts at robbery. Barr explained: “The Chinese efforts run the gamut from more traditional espionage of recruiting people to work for them, explicitly, to cultivating relationships that they are then able to use. And the people frequently are not completely attuned to the fact that they are being used as essentially stooges for the Chinese. So, it runs the gamut of things. And, sometimes, some of these programs, high-sounding programs, are used to the advantage of the Chinese.” Barr expressed concern over how educational programs have been used by Chinese intelligence services to penetrate US academic institutions and take away the knowledge, training, and research offered for use in China’s efforts to overwhelm the competitive edge the US possesses. Barr explained: “We are clearly cracking down on researchers and others that are sent over here to get involved in our key technological programs. And, by the way, this is not just weapons systems. This is agriculture. This is medicine. This is robotics. This is artificial intelligence and so forth. It’s the whole gamut of important technologies going forward.”

Dimensions of MSS Intelligence Collection

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three more apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Assuredly, the illicit procurement of specific technology by MSS is executed through the use of Chinese front companies. It is a relatively soft approach to intelligence collection, but it has had a devastating impact. According to Mattis in his 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” cited earlier here, FBI analysts reported that over 3,200 such companies had been quietly set up as fronts for intelligence collection purposes. Other relative short-cuts in espionage included tasking scholars, and scientists to purchase information before they travelled to countries that possessed targeted technologies. MSS has also encouraged Chinese firms to buy up entire companies that already possessed the desired technology.

With regard to the cyber attack, it is perhaps the most prolific type of attack against industry in the US, EU, and within other advanced industrialized countries. This dimension of Chinese intelligence collection is perhaps the most aggressive, and hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running human agents. It is simply another dimension of China’s campaign. Moreover, countries such as the US provide such a target rich environment for the MSS, if human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome.

By far, the most complex and risky dimension of MSS intelligence collection are its human intelligence operations. Least challenging are MSS operations in China. No resource constraints hinder the MSS in terms of both manpower to use against foreigners there. The efforts of foreign counterintelligence services typically face great limitations in terms of ways and resources to stem Chinese efforts against their foreign intelligence colleagues on the ground. The close proximity of other countries in the Far East would appear to make operating in these countries easier, too! Difficulties begin when tries to take a bite out of more advanced industrialized countries in the region. Japan, for example, has historically been a difficult country for Chinese intelligence services to operate within. Against Japanese targets, attempts to cultivate operatives and informants still occur, but a greater reliance is surely placed on technical collection by MSS. Outside of its region, in target rich US, EU Member States, and other advanced industrialized countries, even the Russian Federation, Chinese intelligence services as a whole initially some difficulty figuring out how to go about approaching a target using officers. They would also naturally be concerned over facing considerably stiffer resistance from more adept counterintelligence services such as those of Japan. Interestingly, as time went on, they managed to find a number of sweet spots from which, and methods with which, they could conduct human intelligence collection operations with some degree of success. Lately, it seems to have been easy enough for Chinese intelligence services to establish networks of operatives and informants, and reportedly even sleeper agents, in the US, placing them in locations from which they could do considerable harm.

Collection through Front Companies and Operatives

As mentioned, a very quiet approach to intelligence collection is ubiquitous and pernicious form of inteloigence collection operations in the US. Most US citizen can look direct at the activities of what appear to be benign companies and not observe or discern that it is firm of foreign attack against their country. With little threat of being discovered, Chinese front companies set up where they can best acquire companies, technologies, brain power in the form of students, and even intelligence operatives and informants. Some US firms that have unwittingly linked themselves to seemingly innocuous, but actually nefarious institutions in China, business, academic, scholarly, or otherwise, that are tied to the government, particularly the Chinese intelligence services, may often have Chinese intelligence operatives working out of them, thus providing a convenient cover for their activities. In July 2019, a federal grand jury in Chicago indicted Weiyun “Kelly” Huang, a Chinese citizen, on fraud charges, charging her with providing fake employment verifications. A grand jury indicted her two companies, Findream and Sinocontech, on charges of conspiracy to commit visa fraud. The two companies incorporated by Huang did not exist, except on paper. Federal authorities allege the Findream and Sinocontech were front companies used to provide false employment verification for Chinese students, convincing immigration officials that they were here legally. Huang made use of a website based in China, chineselookingforjob.com, and the China-based “WeChat” platform, as well as Job Hunters of North America, to recruit for her companies. Court records explain that over 2,600 Chinese students declared themselves as employees for either Findream or Sinocontech from September 2013 to April 2019. In a bungling oversight Huang claimed to have employed so many young people that according to a 2017 US Immigration and Customs Enforcement list, Findream and Sincocontech ranked among the top US-based companies that hired students under the federal Optional Practical Training program. Findream ranked number 10, just behind Facebook. Sinocontech ranked number 25, just behind Bank of America. Surely, that served to call some attention from US counterintelligence services to its activities. Tragically, on LinkedIn, it is indicated that great numbers of graduates from schools from around the country wrote in their online biographies that they were employed by either Findream or Sinocontech as data analysts, web developers, consultants and software engineers. Huang compiled approximately $2 million from the alleged fraud scheme. Prosecutors state that the citizen of the Communist China indulged herself lavishly in Neiman Marcus, Louis Vuitton, Prada, Chanel, Hermes, and other luxury retail stores.

In a September 2018 criminal complaint from the US Department of Justice, Ji Chaoqun, a Chinese citizen, was charged with one count of knowingly acting as an agent of a foreign power, China. While Ji was still in school in China, an intelligence officer from the Jiangsu State Security Department, a provincial bureau of the MSS, approached him at a recruitment fair. They recruited Ji and tasked him with gathering biographical information on eight naturalized, ethinc-Chinese, US citizens after he arrived in Chicago to begin his studies. Reportedly, Chinese intelligence wanted to recruit those individuals, most of whom “worked in or were recently retired from a career in the science and technology industry, including several individuals specializing in aerospace fields.” Ji performed the task of collecting the information. After graduating with a master’s degree in electrical engineering from the Illinois Institute of Technology in 2015, he remained in the US through a temporary work program known as Optional Practical Training. That program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. After Ji graduated with a master’s degree in electrical engineering in 2015, he remained in the US through a temporary work program known as Optional Practical Training. The program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. Ji stated that he was employeed as a software engineer for a company called Findream LLC. According to court records, Ji’s responsibilities included writing “well designed, testable, efficient code by using best software development practices.” Although Findream was advertised as a startup technology company based in Mountain View, California, the company did not exist, except on paper. In April and May of 2018, the FBI made clandestine contact with Ji via an undercover agent. During the May meeting, Ji revealed that he was first approached by the MSS. In October 2017, email and MSS messages exchanged between the MSS officer and Ji were uncovered by the FBI.

Technical Intelligence Collection and Cyber Attacks

MSS technical collection can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decision making processes. Several instances of such cyber attacks have been made public, among them: in 2010, China reportedly attempted to infiltrate the email accounts of top US national security officials, including then Chairman of the Joint Chiefs of Staff Admiral Mike Mullen and then Chief of Naval Operations Admiral Gary Roughead; in July 2015, the US Office of Personnel Management announced that hackers had extracted personnel records of roughly 22 million US citizens. The hackers were reportedly affiliated with the MSS. Some of the stolen files contained detailed personal information of federal workers and contractors who have applied for security clearances. Among the information extracted were the fingerprints of 5.6 million people, some of which could be used to identify undercover US government agents or to create duplicates of biometric data to obtain access to classified areas; and, in May 2016, the then Director of National Intelligence James Clapper stated there was indicia supporting a concern that foreign actors had targeted the 2016 US Presidential Campaigns with cyber operations. Those foreign actors plausibly included Chinese intelligence services, as well as actors in the Russian Federation and other countries. During the 2008 US Presidential Election, evidence existed that indicated China infiltrated information systems of the campaigns of then Senator Barack Obama and Senator John McCain. The experience gained and the lessons learned by MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game. An indictment unsealed in October 2018 revealed that US was made aware of at least a portion of MSS directed cyber operations aimed at swallowing up technologies researched and developed by firms in the US and other advanced industrialized countries.

In October 2018, the US Department of Justice unsealed charges leveled on 10 Chinese nationals, alleging a persistent campaign by Chinese intelligence officers and their recruits to steal aerospace technology from companies in the US and France. In a thoroughly complex operation, from January 2010 to May 2015 a provincial bureau of the MSS, the Jiangsu Province Ministry of State Security (‘JSSD”), headquartered in Nanjing, China, conspired to steal sensitive commercial technological, aviation, and aerospace data by hacking into computers in the US and other advanced industrialized countries. According the indictment, MSS officers managing the operation included Zha Rong, a Division Director in the JSSD, Chai Meng, a JSSD Section Chief, and other MSS officers who were not named. Both Zha and Chai supervised and directed human intelligence and activities by one or more members of the conspiracy aimed at hacking into the computers of targeted firms that were used in and affecting interstate and foreign commerce and communications, and steal information, to includie intellectual property and confidential business data, and to use these companies’ computers to facilitate further computer intrusions into other companies.

As for their computer savvy MSS operatives, Zhang Zhang-Gui, a computer hacker who operated at the direction of the JSSD, tested spear phishing messages and established and maintained infrastructure used in multiple intrusions. Zhang also coordinated hacking activities and shared infrastructure with Liu Chunliang, a fellow computer hacker who operated at the direction of the JSSD, and coordinated the activities of other computer hackers and malware developers, including Gao Hong Kun, Ma Zhiqi, and an identified unindicted co-conspirator (‘UCC-1″). Among his activities, Liu established, maintained and paid for infrastructure used in multiple intrusions, deployed malware, and engaged in domain hijacking in connection with the intrusion of a San Diego-based technology company. The hacker Gao Hong, who operated at the direction of Liu and was an associate of Zhang, engaged in the computer intrusions into Capstone Turblne, a Los Angeles-based gas turbine manufacturer and an Arizona-based aerospace company. Ma Zhiqi, also mentioned, a computer hacker who operated at the direction of LIU, was a personal acquaintance of Liu and UCC-1 as well. Zhuang Xtaowei, a computer hacker and malware developer, who also operated at the direction of Liu, managed malware on an Oregon-based aerospace supplier’s systems and stole the firm’s data from no earlier than September 26, 2014, through May 1, 2015. On February 19, 2013, one or more members of the conspiracy hacked into a second French aerospace company’s server affiliated with Liu, using credentials Liu had provided to Ma on December 14, 20L2. Gu Gen, the Information Technology Infrastructure and Security Manager at the French aerospace manufacturer with an office in Suzhou initially mentioned, provided information to JSSD concerning the firm’s internal investigation into the computer intrusions carried out by members of the conspiracy while under the direction of an identified JSSD intelligence officer. Tjan Xi, an employee of the same French firm who also worked in its Suzhou office as a product manager, unlawfully installed Sakula malware on a computer of the firm at the behest of the same unidentified JSSD Intelligence Officer.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi (above), for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide. Experience gained and the lessons learned by the MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi, for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide, stealing terabytes of weapons designs, pharmaceutical research, software source code, and personal data from targets that included dissidents and Chinese opposition figures. The 27-page indictment alleges that both Li and Dong were contractors for the Guangdong State Security Department of the MSS. Prosecutors also allege that the MSS, prosecutors said, supplied the hackers with information into critical software vulnerabilities to penetrate targets and collect intelligence. The indictment mostly did not name any companies or individual targets, but The indictment indicated that as early as January 2020, the hackers sought to steal highly-valued COVID-19 vaccine research from a Massachusetts biotech firm. Officials said the probe was triggered when the hackers broke into a network belonging to the Hanford Site, a decommissioned US nuclear complex in eastern Washington state, in 2015. US Attorney William Hyslop in public statement on July 21, 2020 emphasized that there were “hundreds and hundreds of victims in the United States and worldwide.” Indeed, their victims were also located in Australia, Belgium, Germany, Japan, Lithuania, Netherlands, South Korea, Spain, Sweden and the United Kingdom. The MSS has been known to utilize contractors for its cyber espionage operations. Clearly, MSS is not adverse to putting its faith in the young hackers to compromise security and deeply penetrate US systems to steal untold amounts of information. Integrating contractors in its cyber espionage operations allows the MSS access a much desired wider pool of talent. Under China’s National Security Security Law, they obligated to serve the needs of the government of course with some remuneration, a point which will explained later in this essay. To some degree, it provides some plausible deniability of the hackers work against some countries, but as demonstrated by this case it provides MSS a limited shield from US capabilities. Li and Dong both studied computer application technologies at the University of Electronic Science and Technology of China, in Chengdu. As a modus operandi, Dong would research victims and find potential methods of remotely breaking into computer systems. Li would then compromise the networks and steal the information. The truth is rarely pure and never simple in the intelligence arena, so it remains uclear whether US counterintelligence, following the indentification of these hackers and their activities, has managed to neutralize them and set up satisfactory defenses to prevent further Interference by MSS hackers. Oddly enough, there was some benefit gained by Beijing, knowing or unknowningly the Communist Party of China, to the extent that the hackers are young and ingenious, making them relatable to contemporaries and even younger people fascinated by Internet technology inside and outside of China. Presumably, Li and Dong still reside safely in China.

MSS Human Intelligence Collection

As human intelligence collection in the field is perhaps the most complex dimension of MSS operations, it is presented here in greater detail than those aforementioned. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma (above), a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of technology and data. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma, a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. According to court documents, twelve years after he retired from the CIA in 1989, Ma met with at least five MSS officers in a Hong Kong hotel room, where he “disclosed a substantial amount of highly classified national defense information,” including facts about the CIA’s internal organization, methods for communicating covertly, and the identities of CIA officers and human assets. After providing that information to MSS officers in March 2001, Ma and a relative that assisted him, also worked for the CIA, were paid $50,000. Prosecutors were not full aware of how much Ma was paid the MSS following the initial payment. They are aware, however, that Ma returned from one trip to China with $20,000 and a new set of golf clubs. In an effort to gain access additional sensitive information, Ma secured a position in 2004 as a contract Chinese linguist for the FBI. He used his new position and security clearance to copy or photograph classified documents related to guided missile and weapons systems and other US secrets and passed the information to his Chinese intelligence handlers. In 2006, Ma arranged for his wife to travel to Shanghai to meet with his MSS contacts and pass a laptop to them. (Interestingly, Mao’s wife was not named in the criminal complaint.) The FBI eventually saw Ma straight and according to court documents, special agents intercepted Ma using an undercover FBI employee posing an MSS officer conducting an audit of his case. The undercover operative also claimed to be tasked with looking “into how Ma had been treated, including the amount he had been compensated.” In a clandestine video recording a of a meeting with the FBI undercover operative, Ma is seen counting $2,000 in cash the operative gave his supposedly to acknowledge his work on behalf of China. Ma, who was born in Hong Kong, is recorded saying that he “wanted ‘the motherland’ to succeed” and admitted that he provided classified information to the MSS and that he continued to work with some of the same intelligence officers who were at the 2001 meeting. Prosecutors stated that the relative of Ma, who assisted him, is now 85-years-old and suffers from “an advanced an debilitating cognitive disease.” Given that mitigating circumstance, he was not charged.

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student, however, the record of his activities indicates that the young operative was not in the US to just brush up his English. When Zhao was actually arrested in September 2018, investigators discovered photos and videos of government buildings and an antenna field on his digital camera and smartphone. Eyewitnesses saw Zhao ignore a sign clearly indicating the area was restricted and walk directly toward the antenna field and take photos. Although Zhao had actually studied in a summer exchange program that ended in September 2018, his is visa had already expired when he was arrested. In his defense, Zhao alleged that he was just a tourist who got lost. By successfully denying that he was engaging in espionage, Zhao avoided being expelled from the US, persona non grata, but that did not prevent his prosecution for taking photos in a prohibited place. Court documents indicate none of the photos and videos found on his cell phone and digital cameras were of any tourist attraction sites in Key West. Reportedly, Zhao was in touch with Chinese intelligence officers inside the US before he took photographs at the base. During his interrogation, Zhao told the FBI that he was the son of a high-ranking Chinese military officer and that his mother worked for the Chinese government. The fact that the young spy was tasked to take photographs at an extremely high security location with the great risk of being detained perhaps meant that there was a certain urgency to collect the information. (With so many internal political squabbles remaining largely unknown, it seems odd that the young man would be sent on a near Kamikaze mission into the figurative dragon’s lair, knowing that there was better chance than not that he would be caught, very likely causing some embarrassment for his father and mother.)

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Particularly with regard to students, Chinese intelligence agencies often use the “flying swallow” plan, whereby overseas Chinese students who serve as spies work with a single contact in China—just as swallows pick up only one piece of mud at a time to build their nests. The students do not have their personal files inside China’s intelligence system, so if they are caught, there is little information to be revealed.

As this approach has resulted in a reasonable degree of success, and MSS officers could continue to capitalize on a cultural and language affinity, a preconception had actually developed in the minds of interested parties in the US that the MSS would continue to take that course. Support could also found for that view looking at the success of MSS in Taiwan, with its ethnic Chinese population. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles. Reported, Chinese intelligence officers recruited Hsieh’s comrade  Hsin with all of stops out while he was in China, leading a Taiwanese tour group. Hsin, a former colleague, allegedly first approached Hsieh about working for Chinese intelligence. According to the prosecutors, Hsieh traveled to Malaysia and Thailand to meet his handlers. The indications and implications of Hsieh’s pattern of travel are that he may have been working for Chinese intelligence since 2009 or 2010. In addition to collecting and passing classified materials, both Hsieh and Hsin agreed to assist Chinese intelligence in spotting and recruiting other sources.

In March 2010, Wang Hung-ju, who was arrested because of his connections to an espionage case. Wang was a former official in the Special Service Command Center in the National Security Bureau, and served for a short period as the bodyguard for Taiwanese Vice President Annette Lu before retiring in 2003. The Taiwanese press repeatedly reported that Wang was uncovered as part of the investigation of a Taiwanese businessman, Ho Chih-chiang. MSS intelligence officers, plausibly from the MSS bureau in Tianjin, recruited Ho in 2007 and used him to approach Taiwanese intelligence officials. Ho’s handlers instructed and empowered him to offer money and other inducements to recruit serving officials. Supposedly, Ho was in contact with Wang, which led to his travelling to China where he was recruited by the Tianjin State Security Bureau. Wang reportedly attempted to recruit two friends into his intelligence network, including an officer in the Military Police Command. While the shift to recruiting a broad base of foreign recruits in China was an important step in the evolution of Chinese intelligence, the process still had its limitations. Nearly all foreign-born operatives were recruited within China, rather than their home countries or elsewhere.

Retired Taiwanese Major General Hsieh Chia-kang (center) MSS officers continue to capitalize on a cultural and language affinity in the recruitment of ethnic Chinese worldwide. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles.

However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method. One can better estimate how active and well MSS officers and operatives are performing by who has been recently caught among their recruits and what they have been discovered doing.

In April 2020, Candace Claiborne, a former US Department of State employee, pleaded guilty to conspiracy to defraud the US. The criminal complaint against her alleges that Claiborne, having served in a number of posts overseas including China and having held a top-secret security clearance, failed to report contacts with suspected intelligence officers from a bureau of the MSS. Claiborne’s MSS handler used the cover of operating an import-export company with a spa and restaurant on the side. The MSS tasked with collecting and passing information on US economy policy deliberations and internal State Department reactions to talks with China. They more specifically told Clairborne that her reporting on US economic policy was “useful but it is also on the Internet. What they are looking for is what they cannot find on the Internet.” In accord with her instructions, prosecutors claim Claiborne provided copies of State Department documents and analysis. In return, Claiborne and a co-conspirator received “tens of thousands of dollars in gifts and benefits,” including New Year’s gifts, international travel and vacations, fashion-school tuition, rent, and cash payments.

In May 2019, Kevin Mallory was charged under the Espionage Act with selling US secrets to China and convicted by a jury last spring. In May 2020, sentenced to 20 years in prison; his lawyers plan to appeal the conviction. Mallory’s troubles began in 2017 when his consulting business was failing and he was struggling financially. In early 2017, prosecutors said, he received a message on LinkedIn, where he had more than 500 connections. It had come from a Chinese recruiter with whom Mallory had five mutual connections. That recruiter, Michael Yang, according to the LinkedIn message, worked for a think tank in China, the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. Mallory was deployed to China for part of his career and was fluent Mandarin. The message led to a phone call which led to Mallory boarding a plane for Shanghai to meet Yang. Mallory would later tell the FBI he suspected that Yang was not a think-tank employee, but a Chinese intelligence officer, which apparently was okay by him. Yang was an MSS intelligence officer. Mallory’s visit to China initiated an espionage relationship with the MSS by which he received $25,000 over two months in exchange for handing over government secrets. Reportedly, the FBI eventually caught him with a digital memory card containing eight secret and top-secret documents that held details of a still-classified spying operation.

Kevin Mallory (above). Mallory was charged in May 2019 under the Espionage Act with selling US secrets to China. In targeting ethnic-Chinese for recruitment, MSS found itself simply working on the margins. The method was too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. In early 2017, prosecutors said,  Mallory received a message on Linkedin from a Chinese recruiter, who allegedly worked for the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. He was actually an MSS intelligence officer. Other communications led to Mallory’s visit to China and the creation of an espionage relationship with MSS. When the FBI eventually caught him, he possessed a digital memory card containing eight secret and top-secret documents with details of a still-classified spying operation.

In the wild kingdom, ambush predation, a behavior displayed by MSS officers in the instances just presented, works well instinctively for many animals, but it requires possessing an innate patience. The prey must enter a well-set trap of some kind. The haul of victories will be determined by how target rich the environment in which the trap set is with the prey the predator wants. Increasing the number of those targets would mean becoming proactive, going out a hunting that desired prey down. Thus, in the third and most recent step in the evolution of Chinese intelligence, MSS officers have become willing to recruit agents while abroad. The risk was greater, but the potential fruits would be greater, too! According to Mattis, the new approach was first identified by Sweden in 2008, when its intelligence services and law enforcement determined Chinese intelligence officers operating out of the Embassy of the People’s Republic of China in Stockholm, had recruited a Uyghur émigré to spy on fellow émigrés inside as well as outside of Europe. German intelligence and counterintelligence services identified a second instance in 2009, alleging the existence of a spy ring controlled by a Chinese intelligence officer operating out of the Consulate of the People’s Republic of China in Munich.

Once determined to go after even a broader pool, MSS naturally thought strongly about collecting intelligence with might and main throughout the US. A smattering of examples MSS operations a decade later uncovered by US intelligence and counterintelligence services and law enforcement provides an ample sense of that. Fast forward three years and one will discover how successful Chinese human intelligence penetration has been at some of the finest academic institutions in the US: in January 2020, the chair of Harvard’s Department of Chemistry and Chemical Biology, Charles Lieber, was alleged to have violated federal law by failing to disclose his involvement in China’s Thousand Talents Plan to Harvard administrators, who allegedly then passed along false information to the federal government. Lieber was reportedly paid more than $1 million by China in exchange for agreeing to publish articles, organize international conferences and apply for patents on behalf of a Chinese university; in December 2019, a Chinese Harvard-affiliated cancer researcher was caught with 21 vials of cells stolen from a laboratory at a Boston hospital; in August 2019, a Chinese professor conducting sensitive research at the University of Kansas was indicted on charges he cloaked his links to a university in China; and, in June 2019, a Chinese scholar at the University of California, Los Angeles was convicted of shipping banned missile technology to China. The National Counterintelligence Executive, Evanina, has explained, “A lot of our ideas, technology, research, innovation is incubated on those university campuses.” He further stated, “That’s where the science and technology originates–and that’s why it’s the most prime place to steal.” However, MSS does not limit itself to seeking big things from big places such as Harvard. Desired information on national security matters can be found just about anywhere in the US. Consider, in April 2016, a Florida woman was charged by the US Department of Justice, in an 18-count indictment for conspiracy to illegally export systems, components, and documents on un-manned underwater vehicles, remotely operated vehicles, and autonomous underwater vehicles to China.

Selecting Prospective Recruits

Visits to China by foreigners may be viewed by Ministry of Tourism as opportunity to display China’s cultural richness and advancements in all areas. The MSS would only characterize those visits by foreigners as intrusions into China. The foreigner, to them and their sister intelligence, counterintelligence and law enforcement organizations, will always represent a potential threat. MSS could only imagine exploiting the situation by seeing opportunities to recruit new operatives. Commonly acknowledged among experts in this province is that domestically, the MSS exercises responsibility for the surveillance and recruitment of foreign businessmen, researchers, and officials visiting from abroad. The MSS Investigation Department surveillance of dissidents and foreign journalists is often quite obvious. It is supported by more clandestine measures taken by state ministries, academic institutions, and the military industrial complex. The various Chinese intelligence services can identify foreigners of interest in China through a number of means such as trade fairs, exhibitions, and business visas. Once identified, an intelligence officer using a cover may try to develop a friendship or business friendship often using lavish hospitality and flattery. The Chinese intelligence services have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Sometimes efforts will be made via social media to spot potential recruits. A variety of ploys will be used to get to the target to travel to China where the meat and potatoes of the recruitment process will get underway.

In the current environment, US citizens especially will be closely investigated by a provincial MSS office. That kind of investigation would not be conducted with a view to recruit immediately. For the MSS, it was important to construct a psychological profile of a person, his political orientation, his attitude towards his home country and towards the country he was visiting for some reason. What is very clear about the recruitment of foreign operatives and informants by the MSS in China is that rigor is used in the selection process. The ostenibly way MSS to determine whether a foreign official should be targeted would be to investigate whether they ticked certain boxes through evaluating their actions and other information available. Among those boxes were likely the following examples: standing and influence within his organization, access to required information; standing and influence own people given position; standing and influence among specific people given position and access to decision making process and required information; and, the ability to provide secure access to information for MSS officers.

The likes and dislikes of the target and observed particular appetites of the target that may have left the door open to manipulation by seduction or blackmail are vigorously investogated. If a file secreted from the target organization can be collected by MSS agents in a position to grab it. It would be copied or stolen and included in the target’s file. A background that included an exceptional interest in China, left-leaning sympathies, and even affiliation with Socialist or Communist groups would make the target even more attractive for MSS to recruit for China’s case and the Communist Revolution. Particularly useless are observations and “insights” that merely verify generalizations, derivative, or even bigoted preconceived ideas about the target. After accumulating a sizable amount of material using plain observation, clandestine contacts and conversations, and use of a suite of technical tools for audio- and video-surveillance of the places of residence, all the information is analyzed and conclusions are reached on it. A decision is then made about transforming the investigation into a recruitment. The MSS officer who attempts the recruitment in China will exploit whatever has been collected about the target. Information acquired while the recruitment is underway will also be made available to the officer and his manager. The MSS officer will appeal to the target’s discretion. Ideally, the target wil be led to voluntarily agree to work for MSS. However, under exigent circumstances, compromising materials might be used, however, in this day and age it is hard to determine what behavior is recorded would qualify as compromising–”Goodness knows, anything goes!.”

The same rigorous selection process of operatives and informants would be used overseas as in China. By the time of their recruitment of a target, MSS would be fully aware of their recruits’ particulars. Productive operatives are a true sign of a successful recruitment. Sometimes, the prospective recruit will be asked to travel to another country where MSS officers will more formally bring in the target and introduce him or her to the world of espionage. Additionally as in China, the objective of an overseas recruitment may not always be collection. The goal can also be to educate a foreigner, conveying a favorable image of China and how it represents the best future for the world.

Within the Chinese intelligence services, the belief is that foreigners lack the strength of connection, patriotism, that Chinese have for their country is dogma. With ethnic Chinese émigrés, the belief is that the strength of their connection to China can be exploited. For decades the line emanating from Beijing has been that the people of the West for that matter are rich, sick, and filthy. With specific regard to the US, world’s chief superppwer, a guiding idea in China’s geopolitical and geostrategic struggle with it has been that the US is terminal empire. The belief that the US is collapsing from within flourishes despite the country’s decades long record of economic success and steady ascent. In current times, Beijing’s line has become nuanced to express the view that the US is spiraling downward under the weight of racism endemic to all institutions and neo-fascism. To that extent, the liberal democracy is suffocating on its own self-aggrandizement. China sees its quest for dominance over the US further aided by the fact that the US citizen, in the face of an ever encroaching China, would prefer to enjoy an easy life, a lazy existence, and would hardly be concerned with providing any resistence. So far, MSS has been able to add one successful recruitment after another to its tally.

The Minister of State Security, Chen Wenqing (above). The male MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. Their comportment resembles that of the MSS Minister Chen Wenqing, seen above. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. However, shrewd MSS managers are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch.

Some Specifics on How It Is Done: The MSS Officer on the Beat in the US

Based on information gleaned from defectors, MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. Having stated that, it is also very likely that far greater numbers of MSS officers as well as officers from the PLA and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. More often than not, they operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial.

Possunt quia posse videntur. (They are able because they appear able.) The MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. MSS is results oriented, and that is always foremost in the minds of good managers. Actions taken will never be perfunctory, and situations should not be forced. In the field, operating against an opponent, nothing can be thought of as too trivial to disregard. After being read-in on reports, must let nothing escape a manager’s consideration. Every target for recruitment is unique, requiring some nuance. Thus, shrewd managers in MSS are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating and counterintuitive. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch. That might make the target more comfortable and easier to handle once the collection process begins. This is not any reference to sexual enticement or manipulation. Rather, the touch of a female officer may prove more effective. For some operatives, the female officer may be able to effectively take a “motherly approach,” comforting them and making them more responsive. Having stated that about female officers, in some cases, it may be discovered after the initial approach that a woman may prove to be, for a variety of reasons, too intimidating for a target and make the interaction difficult and likely unsuccessful. The target may simply hold a bias against women, and perhaps may find working for a woman disagreeable. Such are the realities of human interactions.

Among scientists, technicians and engineers, it may be the case that the target would be best approached by a more compatible, “bookwormish,” reserved and understanding officer, who can connect with the target not only on a professional level, being able to discuss technical details of information sought and the work in which the target may be engaged, but on a social level, perhaps having many of the same interests as the target. In every case though, the main pitch to the target would include something along the lines that Just as humanity has no nation, science has no nation. The line that would soon follow is how China would be the dominant power and be the country to lead humanity to excellence and so on.

As mentioned earlier, possessing a diverse team of male and female officers for operations is not likely to be the case for most MSS managers operating under either official cover or non-official cover. For this reason, it has become necessary for MSS to seek to the cooperation of scientists, technicians and engineers from other government branches or civilian enterprises who would be directed to attend lectures, conferences, conventions trade shows and the like, and make contact with targets and establish an interaction that could lead to passing the target of to an MSS officer or actually engaging in the tradecraft necessary to recruit the target and manage the target’s activities, use tradecraft to collect information procured and provide requirements collection and solutions to problems.

For an intelligence officer recruiting agents, speech is everything. Word choices must build confidence, create trust, console, assure, inspire, and comfort. To create compliant agents, the right word choice must be made every time. Some submission of operatives and informants to the words of the officer must take place, causing the operatives and informants to put aside what they may know or imagine and accept the new knowledge the officer puts before them. While of course in reality, all operatives and informants are being manipulated and corrupted by their foreign intelligence officer handlers, a relationship akin to a teacher and student or mentor and mentee is established in optimal cases. As in those sort of relationships, the operative or informant becomes the responsibility of the officer. Further, as in such relationships, it should be the hope of the officer that the operative or informant perfirms superbly and exceeds all expectations.

The less certain the recruit is about the objective truth, the more likely the individual will be drawn to a false reality. Many who are successfully recruited ultimately would believe that their actions were humanitarian contributions to peace. It is very unlikely that the operative will ever know the degree to which that furtive bit of information he or she is stealing will support any nefarious plans the officer and his country may have cooked up for the US or another country. That is always thrown into the bargain. The MSS officer’s relationship with the operative is only professional. Friendship is established due to necessity. All appearances will be false. Intriguingly, the intellects of the majority of recruits are unable to confound insincerity. Targets of MSS recruitment indeed often fail to realize that if it were not for the officer’s need to collect information from, or pass the Communist Party of China-line to, the operative, the officer would hardly have anything to do with anyone of such character that they would willingly betray their own homeland. The only reality for the recruit is that they are being molded, groomed to do nothing more than committing treason at the behest of a hostile intelligence service of a foreign country. It is all certainly not some childish parlor game. Quid est turplus quam ab aliquo illcieli? (What can be more shameful than to be deceived by someone?)

In a number of cases in the US in which economic espionage has occurred identified as having a Chinese nexus, indications were that nontraditional actors have been used in Chinese intelligence operations for quite some time. Just how many nontraditional actors are in a position and willing to serve the interests of the Chinese intelligence services could only be known based on intercepted information, informants working for US intelligence and counterintelligence and after they may be activated to collect information or materials. A conversation on the margins of a professional gathering that begins with innocuous banter. There could be a clandestine contact, an email or letter, sent to the target requesting to discuss a matter in the target’s field to assist with the writing of an article or book, to assist with academic or other scholarly research, or to discuss a grant or prize from an overseas nongovernmental organization of some type. The next contact, if any, might include leading comments or questions on technical matters or one’s work, might appear odd. That would be an almost sure sign that the inquisitive interlocutor, if not simply socially inept, was probing. If the target had even the slightest awareness of the efforts of Chinese intelligence services to recruit spies, it is at that point the individual should realize that he ir she is in a bad situatupion and break that contact immediately. If the MSS officer notices that the target realizes his or her the questions were compelled by more than a thirst for knowledge and does not run, the officer knows he may have hooked his fish.

As part of their tradecraft, MSS officers would prefer hole-in-corner meetings with prospective recruits in small, quiet locations such as cozy, dimly lit establishments, conversing over coffee or tea, perhaps a dash of brandy or even a bite to eat. It would be far better site for a furtive discussion than some crowded establishment or a spot nearby some busy thoroughfare. Other sites usually selected are hotel rooms, gardens, and parks. The MSS will also want to have an unobstructed view of passersby and other patrons to at least determine whether observable surveillance activity is being directed upon the meeting. The MSS officer will want to eliminate as many distractions as possible as he or she will want to focus wholly of communicating with the prospective recruit and have reciprocate with the same level of attention. The officer will want to analyze the individual close-up and personal and every response to his or her remarks. If a full-on recruitment effort is not made right away, everything will be done to establish a close association for the moment with the target. The figurative “contracted specialist,” will engage in similar activities, and much as the MSS officer, would also try to become a close associate of the prospective recruit. Much as an intelligence officer would be, the contracted agent would doubtlessly be placed under the close supervision of an MSS manager most likely operating under non-official cover, but potentially under officer cover. If a prospective “contracted specialist” left no doubt in the minds of MSS officer that he or she would be unable to perform the more hands-on job of recruiting operatives and informants, they might be called into service to “spot” experts at professional gatherings or even at their workplaces who MSS desires or to collect information from available databases and files there.

The Tianjin State Security Bureau (above). The thirty-one major provincial and municipal sub-elements of the MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations.

Overseas Espionage by the Provincial Bureaus: A Dimension within the Human Intelligence Dimension

It is important point out that although the bureaucratic center of gravity may reside in its Beijing headquarters, in a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial state security departments and municipal state security bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations. He further explains that unless specific units are referenced, reality will contradict general assessments. The indication and implication of this is that defeating MSS efforts in the US will require a broad-based strategy that accounts for the scale of the intelligence organization and compartmentation.

The Shanghai State Security Bureau (SSSB) has surfaced in several US espionage cases. The record its uncloaked operations leaves no doubt that SSSB is constantly looking for opportunities to collect foreign intelligence. It was actually SSSB intelligence officers that approached Clairborne and requested that she provide information on US economy policy deliberations and internal State Department reactions to talks with China. It was SSSB that recruited Mallory. It was SSSB that approached a freelance journalist focused on Asian affairs received SSSB requests for short, interview-based papers related to US policy in Burma, US contacts with North Korea, and US talks with Cambodia related to the South China Sea. Away from the US, in a case involving South Korean diplomats in Shanghai, a Chinese woman, in exchange for sex, requested and received telephone and contact information for senior South Korean government officials. Beyond government documents, the woman also used her influence to help Chinese citizens acquire expedited visa approvals to South Korea. SSSB reportedly blackmailed a Japanese code clerk working in the Japanese Consulate in Shanghai in 2003 and 2004 over his relationship with a prostitute. Allegedly, the illicit relationship began at a karaoke parlor that may have been owned by the SSSB and that catered to Japanese diplomats and businesspeople. Once the code clerk in the grips of the SSSB, its intelligence officers demanded background information on Japanese diplomats posted to the consulate and the schedule for diplomatic pouches going back to Tokyo. Counterintelligence plays a key role in SSSB efforts, too! When the SSSB blackmailed the Japanese code clerk, the organization reportedly asked him to name all of the Chinese contacts of the Japanese consulate in Shanghai.

Other evidence available indicates the SSSB is responsive to the global needs of the MSS and China’s central decision makers. A job announcement errantly circulated publicly around Shanghai universities in 2015, encouraged students who spoke English, Japanese, German, French, Russian, Taiwanese, or the languages of China’s recognized minorities to apply to the SSSB. Mattis proffers that the request for those specific language skills are suggestive of foreign-intelligence targets, counterintelligence coverage of foreigners inside China, and domestic intelligence work for monitoring the party-state’s internal enemies. The job announcement also emphasized that skills in information security, computer software programming and telecommunications as being desirable. In its recruitment efforts, SSSB benefits from a local pool that includes some of the best universities in China, including Fudan and Shanghai Jiao Tong. Shanghai’s universities, think tanks, businesses, and modern infrastructure draw a large, high-quality pool of foreigners from which the SSSB can recruit operatives. Shanghai Jiaotong University, one of China’s most prestigious universities, has been linked to military thefts in cyberspace, leaving open the possibility that such students also might seek work with state security. Admittedly, the job announcement did not describe whether such skills were required in technical support or operational positions. A recently-passed intelligence law prescribes “[combining] open work and secret work” in intelligence operations. Thus, SSSB capabilities very likely exceed human-intelligence operations to include computer network operations.

As the Historical Dictionary of Chinese Intelligence revealed it to be the pattern within the provincial departments  and municipal bureaus, the SSSB leadership appears to come from within the bureau or at least the MSS. The current bureau director is Dong Weimin, who has run the organization since 2015. Unlike the Beijing State Security Bureau’s leadership, service in the SSSB unlikely provides for upward mobility to other parts of the MSS. The directors of the Beijing State Security Bureau regularly move into the MSS party committee and become vice ministers. The most notable among these are Qiu Jin and Ma Jian. The only example of an SSSB director promoted upward in recent memory seemingly is Cai Xumin. He led the SSSB from 2000 to 2004, when he was promoted to MSS vice minister. Cai would return to Shanghai to serve as the city’s deputy procurator in late 2006.

Away from the economic espionage and technology theft in particular, MSS officers regularly have operatives engage in something akin to a Hollywood depictions of “secret agent spying” by taking photographs of restricted areas, gaining entry into restricted areas, and collecting documents, materials, and other property from a restricted area. Those types of activities are perhaps more commonplace that most ordinary citizens might believe. It is only after an MSS officer is captured, or officer of another Chinese foreign intelligence service such as the Second Department of the PLA, that they are made aware that such activity is taking place. Greater awareness that is occurring is the only chance of thwarting suspicious activity when it occurs. When Chinese nationals engaged in such activity are occasionally captured, usually found in their possession is a cache of surveillance equipment. There is typically so much that it evinces the agent believed, with a high degree of confidence that he or she would be able to act without relative impunity in or around a targeted restricted area. It may also very well have been the precedence of previous success spying on the site that helped fashion that notion. Despite the regularity of such activity, the use of MSS officers to recruit agents to do the dirty work of spying has been a fruitful approach.

MSS Informants: Motivations

Attendant to any discussion of the use of actual research scientists across the spectrum of advanced technologies as operatives, as surrogates for MSS officers in the field, would be the discussion of civilian informants and responsibilities of Chinese citizens under China’s National Security law. In the West there usually would be a variety of motivations for citizens to more than likely violate their own Constitution to engage in surveillance and higher levels of activity on behalf of US intelligence and counterintelligence services and law enforcement. Against a foreigner, they might see it as a Patriotic duty. To surveil another citizen might cause pangs of dismay anxiety for there would be the real possibility of violating the 1st Amendment and Fourth Amendment rights of a fellow citizen under the US Constitution. Sadly the motivations of money ideology, conspiracy, and excitement, as well as a healthy dose of indifference will often cure any anxieties or nervousness about another citizens Constitutional rights. Different from Western democracies, however, for the Chinese citizen, such motivations do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of the intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, the homeland. Supposedly, revolutionary zeal drives the heart of China as one beating heart so to speak.

The National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress declares under Article 9 that in maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MSS does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security.”

On MSS Informants Overseas

The immediate impression created when one learns that China regularly makes full use of Chinese nationals to support the intelligence collection process is the mind boggling prospect of a multitude of adults from China’s population, which according to the World Population Review as of this writing is put at nearly 1,439,239,000. While there may very well be several Chinese national informants moving around Western countries on a given day, that number is certainly not in the millions. Certainly, not every adult in China will be directly asked to be an informant overseas. Seasoned members of the service have decades of experience approaching young Chinese travelers. Usually prospective informants are approached just before travelling overseas for busuness or tourism or early in their overseas education or career. The younger the informant more time they might have in place and more likely they might be responsive to an MSS officer’s entreaties to take on the job. It is not a matter of taking anyone who comes along. MSS officers are looking for a safe pair of hands; those with cool heads, who can comfortably kick around foreign parts. They must be the very soul of discretion and not easily rattled.

Glenn Duffie Shriver (above). Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. The recruitment is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. A number of cases that conform to this type of recruitment have been made public. In a notable one, Glenn Duffie Shriver after graduating college decided to live in China after a short period of study there from 2002–2003. MSS officers convinced him to assist their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. In October 2010, pleaded guilty to conspiring to provide US national defense information to the MSS.

Recruiting Spies for the Long-Run: MSS Style

Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. This was also a method that Soviet intelligence was famous for. To that extent, the recruitment process is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. As for the recruit, the motivation is typically emotional, somewhat ideological. For example, from the moment of contact with the MSS, they may sense that they are able to shape the fate of the world through their furtive activities. If the recruitment takes long enough, the target will even be passed on to another officer for development. When the recruit “matures” to the point of getting into position in a business, think tank, government organization, academic institution, or some other targeted location, the MSS officer handling the individual will begin full-fledged tasking. All forms of espionage and active measures will get under way full throttle. All in all, the speed differential with other forms of recruitment is not as critical as the depth of penetration by the recruit. What MSS gets from the effort is a highly prepared mole buried deep within the US foreign and national security policy apparatus.

A number of cases that conform to this type of recruitment have made public. In a notable one, in October 2010, Glenn Duffie Shriver pleaded guilty to conspiring to provide US national defense information to SSSB intelligence officer. Shriver, a recent US college graduate decided to live in China after a short period of study there from 2002–2003. Apparently finding Shriver to be a viable target, Chinese intelligence officers successfully pitched him the idea of assisting their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. If he managed to be hired by either, he would have been obligated to communicate classified US national defense information to their organization. The apparent intent of the SSSB’s was to collect a stream of reporting on US foreign policy. It was seemingly inconsequential that only some of a portion of it would have been directly related to Asia and particularly China.

Honey Traps

As noted in the discussion on the overseas intelligence operations of MSS provincial bureaus, Chinese human Intelligence officers have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Indeed, a bog-standard method of snagging traveling businessmen is the honeytrap. As defined more specifically in Henry S. A. Becket, The Dictionary of Espionage: Spookspeak into English (Stein & Day, 1986), a honey trap is a method of sexual entrapment for intelligence purposes, usually to put a target [such as Kalugin] into a compromising position so that he or she can be blackmailed. The approach would be made once MSS intelligence or counterintelligence managers believed enough had collected enough about the target and the target’s activities, that they understood how the foreign national thought, and whether he would respond favorably to an effort to make that sort of clandestine contact with him, the approach is made by a selected female or make operative.

According to Kalugin in First Directorate, to further the KGB’s mission, he loosed those alluring qualities his personal appearance and attributes and those of other handsome males and females as weapons very effectively against Western officials and especially secretaries working in key offices in the US foreign and national security policy apparatus when he believed something considerable could be gained by doing so. If lucky, the target may already have become in contact with a woman from a house of elegant pleasure, and the recruitment of the prostitute is what is required. However, there are cases in which the prostitute may not have the background to engage the target in a way that is best for the MSS to establish appropriate level of contact to move forward toward effectual recruitment.

Prospective MSS intelligence officers?: Freshmen of Nanjing Campus of China Communications University in military training in 2015 (above). The MSS has been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. It is a bog-standard method known as the honeytrap. While prostitutes and “contractors” are often used for this purpose, female officers may be put in a position to take on a honey trap role. Insisting that female officers surrender themselves to act as lures for potential targets for recruitment is surely not in line with that goal. MSS officers, particularly to young female officers, have been forced to choose whether to engage in such behavior to support the MSS mission. The question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?”

The true humanist by the Marxist definition, seeks to understand human nature with the notion that all can be brought into an ideal Communist World. Insisting that female officers surrender themselves to act as lures for potential targets for recruitnent is surely not in line with that goal. Nevertheless, when MSS officers, particularly to young female officers, are forced to choose whether to engage in such behavior to support the MSS mission, the question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?” The female officer would certainly need to consider what her family would say and what her community would say about her taking on such an assignment. The final answer would be founded on the officer’s own self-respect, dignity, self-worth, conscience. In a system where the desires of the individual must be subordinated to the needs of the state, the only answer is to give primacy to love of country and support the Communist Revolution. That being the case, for the majority of female officers, engaging such work would still be simply outside the realm of possibility. Ad turpia virum bonum nulla spies invitat. (No expectation can allure a good man to the commission of evil.)

Discussion will be extended in Part 2, to be published later

Commentary: China’s Coronavirus Tack Includes More Abrupt Officials and Political Warfare; Its Diplomatic Tool Must Endure the Consequences

Communist Party of China Headquarters (above). The Communist Party of China’s line on the coronavirus pandemic has been thoroughly questioned in the West, especially in the US. Beijing’s finger wagging in response has not resulted in some grand conversion of anyone in the US or anyone in the world to China’s point of view. If Beijing stays on its current course, activities in support of the Party-line will surely intensify. Political warfare units and officers overseas of the Chinese intelligence services possess the know-how to propagate the Party-line and are being relied upon. A quiet sense of resentment has likely risen among Ministry of Foreign Affairs diplomats and professionals who seem to be increasingly tasked with making right turns on the truth and have watched as their legitimate work, to promote China’s policy interests, is regularly supplanted by intelligence efforts.

From the moment the coronavirus outbreak began, the People’s Republic of China was not able to overcome and resolve all challenges that beset it. Facing that reality appears to have shaken the psychological foundations of China’s Communist Movement to its core. Under the somewhat mechanical guiding principles of the Communist Movement reinvented by Chairman Mao Zedong insist that China must be forever driving upward and making progress. All efforts should be directed at pushing China to meet its destiny of taking a dominant position in the world. If China did not reach the top, it would remain a sheep not a shepherd. The volumes of collected concepts and quotes could not offer answers for Beijing to quickly and effectively contain the coronavirus, Having failed to meet the needs of its people, Beijing then failed to prevent a coronavirus outbreak worldwide which it must have come to term with by now. Thereby, any sense of failure has likely been intensified. Yet, Beijing has refused to give up the ghost and has continued to extol the virtues of its medical, scientific, and advanced technological capabilities. The identity of the Party is dependent on a certain worldview concerning the Communist Movement, the teachings of Mao, China’s greatness, and China’s world dominance in the future. When that worldview was threatened, the Party would only hold even more tightly to it and potentially double-down on that line of thinking. That possibility of doubling-down most likely led to the decision by Beijing to contain the virus in China as robustly as possible and contain any information just how bad the situation was. Certain medical approaches were approved and taken. Concern over what might have happened outside China was not given equal importance. and few real steps, if any, were taken that related to a concern over an outbreak. No alternative ideas concerning an almost certain outbreak from the discerning and wise in Beijing–academics, scientific scholars, any with relevant expertise–were investigated or allowed any light. Controversies were to be avoided. Those few who said anything contrary to the Communist Party of China line were effectively silenced.

Indisputably, the Communist Party of China’s line on the coronavirus pandemic clashes with the truth. It has been questioned in the West, especially in the US. Although finger wagging at the US in response may seem morally invigorating, it has not resulted in some grand conversion of anyone in the US or anyone in the world to China’s point of view. It certainly has not improved relations with the US. In China, the Communist Party of China, the National Party Congress, and the State Council of China are the immediate sources of all the daily needs of the Chinese people, that certainly would include information. The government would like to convince the Chinese people that international affairs, it says what it has to say, does what it has to do, to lay up a future of world dominance for China. Given this, perchance Beijing has continued this course because it believes the rebuke of the US has served to assure the Chinese public that there is no ambiguity in what the Communist Party of China has determined are the facts. Beijing may believe it is helping Chinese citizens live their lives fully and clear because they are provided “the truth.” By now, though, a good number of Chinese citizens are aware that one cannot know with certainty what is real from what one hears from the government.

In hac re ratio habenda est ut montio acerbitate. (Reason should be held to (applied) in this matter so that the admonition may be without harshness.) While greatcharlie would prefer to avoid being seen as providing advice to Beijing–which in reality would most likely have no interest in its meditations on the matter. Nonetheless, one might say out of academic interest, greatcharlie has sought to conceptualize what Beijing could have done on the world stage when the coronavirus epidemic began in China and offers some thoughts on what it could still do today to recurvate better present itself as “a leader” on the world stage. Related to that, greatcharlie also takes a brief look in the abstract at why any immediate change in the attitudes and behavior may not occur so quickly as its diplomatic tool, the People’s Republic of China Ministry of Foreign Affairs (MFA), has been going through a type of transition contrary to its purpose of building better relations with other countries.

As a net result of its ongoing tack concerning the coronavirus pandemic, Beijing has thoroughly encased itself in the dreadful mistakes it made by unintendedly, yet repeatedly, shining light on what it did not do right and by its continuous attempts to muscle its way out a disastrous situation with words and actions cobbled together inconsistently in an unsuitable emergency public relations campaign. It would seem that in undertaking its current course, not one appropriate contingency has been considered.

If one were to allow Beijing a bit of latitude, purely out of academic interest, its response to the Western, particularly the US, may be the sense that Chinese leaders might have seared into their psyches over decades about Western perceptions of China. That sense might be informed by utterances of identifiable relics of bigotry from a bygone era to the effect that China is nothing for the West to worry about and the Chinese lack the intellectual power and scientific and technological know-how to ever match US capabilities. That was the case when former US Vice President Joe Biden stated: “I mean, you know, they’re nice folks, folks. But guess what? They’re not competition for us.” To that extent, Chinese leaders view their country a being wronged for too long and they endeavor to right that wrong. (Interestingly, in the administration of US President Barack Obama from which political leaders who have made such statements mostly emerge, a laissez faire attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology.)

Certainly, the moment for immediate action has passed. However, a better course than the one taken, to be brief, would have been to accept the reality of their situation, listening to those in their own country who presented the truth about the virus, and fully acknowledging all of the different developments as they happened, the good, the bad, and the ugly. Most important would have been to be the very party that sounded the global alarm, proactively suggesting constructive precautions to all countries, interacting closely with those leading industrial powers which could have a real impact in stemming the problem worldwide while there was still at least a modicum of time for all countries to act, not just China. Beijing could have worked strenuously with international organizations to include the UN Security Council, fully alerting them that the threat that global pandemic may be in the making. Within those institutions, practical and promising forward-looking recommendations to forge a synergistic international response could have been formulated and promoted by China. The flurry of positive action, that would most noticeably include Beijing’s humble recognition of its errors, would have been an astonishing, powerful display of international leadership by Beijing, albeit over a crisis it caused. The fact that something akin to this approach was not undertaken, and perhaps not even considered, has been a sticking point for Trump.

If it so chose at this stage, Beijing could still direct energy and resources at pecking away at the shell in which they trapped themselves much as a chick breaking out an egg. Nuanced approaches requiring positive action by all relevant bureaucracies across the government to create a positive image and firm, favorable picture that a sanguine China is taking all affirmative steps possible should need to be developed. They would need to be finessed, reshaped continuously, to maximize impact upon viable opportunities to break out its self-inflicted shell the country’s earlier missteps. It would also require more humble cooperation with the rest of the world, not reckless antagonistic verbiage that has so far only triggered the never previously considered process of genuinely isolating China from the international community, international trade and political economy, that is slowly gaining momentum. Rather than experiment with anything new, thoughtful, and inspired, Beijing simply turned to the derivative tactics of locking down and concealing less-desirable and outright unpleasant developments. Disappointingly, the leadership of China appears to lack the reflexes, sensibilities, and sadly, the sophistication, to turn toward the more advanced notions required for positive cooperation. Perhaps, brooding leaders of the Communist Party of China have managed to convince themselves that the main front in all of this is a battle of wits between East and West, in which two disparate political and economic systems compete for dominance.

If no erosion of its current positions occurs, and Beijing stays on its current course, one can expect activities in support of them to intensify. Seemingly, the quondam Cold War era, in which such thinking held prominence is apparently not dead, at least not in the foreign affairs parlors of the Communist Party of China, as well as the Chinese intelligence services, particularly the Ministry of State Security (MSS), and to an extent, departments of the People’s Liberation Army (PLA) and intelligence elements of the Communist Party of China. The MSS, a civilian intelligence agency, comparable to some degree to the US Central Intelligence Agency (CIA), is the embodiment of the logic that created the Chinese system’s intimidating, authoritarian order. Since 1983, it has choreographed events to accomplish the Communist Party’s purposes worldwide. With regard to China’s coronavirus crisis, MSS possesses the know-how through specially trained personnel in political warfare units and officers overseas who could engage in active measures, propagating the line of the Communist Party of China. So far, the apparent political warfare attack against the US, has not been the smashing success leaders of the Communist Party of China were hoping for. However, its effects are doubtlessly being felt throughout the foreign and national security policy apparatus of the Chinese government. With regard to the MFA, large swathes of activities concerning China’s foreign relations with other countries have been taken out of the hands of the diplomats and other professionals at the MFA and put in the hands of the intelligence services.

Materiam superabat opus. (The workmanship excelled the materials.) In the offices of the MFA, there is very likely a very quiet sense of resentment among professionals having chosen to represent China and promote its policy interests worldwide only to have their legitimate activities regularly superseded and supplanted by the machinations of the Chinese intelligence services at the behest of Communist Party of China. After decades of proudly engaging in complex, meaningful diplomatic work, mostly behind the scenes, with the goal of having China respected and reckoned as a power that can have a significant impact in international affairs by the international community, it is surely difficult for MFA diplomats and other professionals to watch as China, instead of further establishing its place among dominant powers, is now earning a reputation as an international pariah.

The purpose of diplomacy should be to prevent war. Bilateral and multilateral contacts with other countries, statements, press releases, and other messaging should not have the aim of antagonizing and raising the ire of leaders and other decisionmakers in foreign capitals. MFA diplomats and professionals would surely prefer to avoid a tit-for-tat situation with the US in which one act of retribution would lead to another from China. With every new act, the chance that a serious outbreak of violence increases.

As mentioned, MFA is ostensibly the primary government agency with a portfolio of implementing the foreign policy and managing diplomatic affairs of China, however the ministry now finds its diplomatic efforts with the US being increasingly supplanted by MSS efforts to conduct active measures such having journalist, academics, and other policy scholars promote the Communist Party of China’s hardline and by intensifying its efforts to steal a wide variety of technologies from US companies and universities. More recently, that nefarious work has included efforts to steal the fruits of money, time, and research into therapies and vaccines for the coronavirus. MFA diplomats may find themselves more and more dragged into MSS operations and those of other Chinese intelligence services as their efforts intensify. In a recent incident, it was discovered that a biology researcher at the University of California-Davis lied about her ties to the PLA. After being interviewed by the Federal Bureau of Investigation, she sought refuge in China’s San Francisco consulate. While it has not been definitively established that she was engaged in intelligence work in the US, there is a high probability she was. The PLA would not knowingly deploy an officer to the US without tasking her with some intelligence function. MFA is a consumer of information from cloak and dagger work, and it’s diplomats would prefer not to be sacked into the business of obtaining it.

One might suppose that it was already enough for MFA diplomats to tolerate a policy generally understood to be in effect that has MSS personnel assigned to China’s embassies and other permanent diplomatic missions overseas for up to six years, with a few remaining in post for 10 years if required. Reportedly, in the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. When the accommodations to the MSS aforementioned are added to this, it most assuredly piles on to a heap of discontent that has been long standing.

To enlarge on the point of how MFA is intriguingly being utilized in the larger more belligerent approach of China toward the US, recall how early into the coronavirus crisis, the world witnessed the Department of Information of the MFA using a far sharper tone. As time moved on, it seemingly devolved into being simply a direct mouthpiece for the Communist Party of China, providing some cover for the Party’s own offices. What was being declared about the US has been far from plausible, and apparently manifested anxieties, fears, over outcomes of grave errors made within China. Press briefings amplified those statements online with a bit more vigor. Spokespersons propagating the stronger line were abrupt in what is the approved Party fashion. Indeed, all MFA officials comported themselves publicly with an astringency which some regime critics would say uncloaked the true nature of the regime. Disinformation was also being spread from MFA sources through posts on Twitter. Those who are following this matter closely will hardly forget the shocking and incredulous tweet from Zhao Lijian, the Director of the Information Department of China’s Ministry of Foreign Affairs in which he tried to direct blame at US for the coronavirus epidemic in China. From @zlj517 on March 12, 2000, at 10:37 AM, Zhao wrote: “2 CDC was caught on the spot. When did patient zero begin in US? How many people are infected? What are the names of the hospitals? It might be US army who brought the epidemic to Wuhan. Be transparent! Make public your data! US owe us an explanation!”

The hallowed diplomatic doctrine of the MFA has been moderation in all things. Calmness and authority must be shown not only in diplomacy but in all circumstances. The more recent assertive approach has pulled MFA officials from their more traditional conservative, stolid posture. Reportedly, the transition in approach is due to something called “Wolf-Warrior diplomacy.” The name derives from high grossing, action films, “Wolf Warrior” and “Wolf Warrior II,” that feature Chinese special operations forces in battle against China’s adversaries. While the films present a false reality, the nationalistic ideas and ideals they  promote apparently cross-polinated with thinking of China’s leadership on real foreign and national security issues.

Res ipsa repperi facilitate nihil esse homini melius neque clementia. (I have learned by experience that nothing is more advantageous to a person than courtesy and compassion.) With good reason, somber and astute foreign policy analysts worldwide have found it difficult to believe that MFA diplomats and professionals are pleased to adhere to a policy that is named after and centered upon a banal amusement. There is some indication that the Wolf Warrior diplomacy is not novel, but rather has been in effect for a decade. However, the requirement that MFA diplomats and even officials of other government ministries take on a “fighting spirit” has really been something insisted upon by Chinese President Xi Jinping. Wolf Warrior diplomacy is all seen is a response by Beijing to highly biased perceptions of China presented especially in Western media. Recall, that notion was touched upon earlier here. Biases heard from overseas by China are often perceived not only as ideological but racist. There is also a prevalent perception in China that as the country has become more powerful on the world stage, other countries increasingly sense that it poses a threat to their respective interests.

The official position on the impact of Wolf Warrior diplomacy on Chinese diplomats and professionals is that it has raised their morale and encouraged a more assertive style. Yet more plausibly, MFA diplomats and professionals feel Wolf Warrior diplomacy is a load of bollocks, and they could mercilessly dissect the shortcomings of that diplomacy and anything produced under it. Intriguingly, expressions of traditional Chinese diplomacy and professionalism have been heard here and there. Comments of that nature made by the People’s Republic of China Ambassador to the US Cui Tiankai about the anti-US declarations from Beijing were highlighted in greatcharlie’s March 31, 2020 post entitled, “Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic”. Reportedly, Cui told the HBO news program “Axios on HBO” that he stands by his belief that it’s “crazy” to spread rumors about the coronavirus originating from a military laboratory in the US. Cui even called this exact conspiracy theory “crazy” more than a month ago on the CBS News program, “Face the Nation.” well before the spokesperson for the Chinese Ministry of Foreign Affairs first began publicly promoting the conspiracy. However, despite such coruscating flashes of what could be called true MFA sensibilities, strong disagreements felt by diplomats and professionals are generally left at the door of their office buildings. At best a very cautious demarche should be attempted in house by the most secure diplomats in the face of decisions and policies of the leadership in an authoritarian, and arguably totalitarian, Communist state. That demarche should never be looked upon by outside observers as a fuite du courage, as much as a pragmatic, existential necessity.

Perchance, more MFA diplomats and professionals disagree with Communist Party of China line policies than one could imagine. No one hoping for the best for China would want to see good thinking officials engage in some une enterprise désespérée that could result in having them brutally weeded out of the system. At least for the time being, nothing that could relatively “bring down the house” should be uttered. Having been directed to promote policies based on the attributes of a fictitious character from an action film, MFA diplomats and professionals have done so without question both overseas and at home. The Ancient Greek philosopher Aristotle stated: “It is the mark of an educated man to be able to entertain a thought without accepting it.”

At one time, the MFA had a clear cut choice between being a mediator and an enforcer of China’s foreign policy. Its diplomats displayed a certain style and nuance as they made offers and discussed the proposals to resolve issues with other countries. Wolf Warrior requires a hardline stand every time. Insights will not advance efforts, dogma will. In following, as time passes, the MFA will likely be forced to make half turns away from the truth, ensuring that it is never on the correct side of issues. As the MFA is used more and more as a tool to proclaim the aggressive message of the Communist Party of China, it places into question whether the ministry will even keep its main job of making peaceful entreaties with foreign governments. While diplomats might meet with the foreign diplomatic counterparts, there would be superficiality to those contacts. It would be diplomacy after a fashion, albeit in an unsatisfactory way. The work of MFA diplomats, as it once was, would be finished. Maliuolum solacii genus est turba miserorum. (A crowd of fellow suffers is miserable kind of comfort.)

The fact that the Chinese government initiated the ongoing coronavirus disaster cannot be credibly truthfully argued against. Sadly, Beijing so far has not demonstrated any interest in acting appropriately concerning the present matter of the coronavirus. It will most likely attempt to continue to assail the global media with waves of distortions. Nevertheless, despite that having transpired, it is not too late to turn the situation around. China can put the present time to good use. The US, as the true dominant power in the world must maintain its poise. It must not react. It must act in a measured way using effective means, at a time and place of its choosing. Despite all the dissatisfaction and disappointment felt toward China, the US must interact as amiably as possible. Surely, the two countries are not at a point yet when the dark waters of despair have overwhelmed their leaders. When diplomats from both sides meet, they must approach each other with a certain buoyancy and hope. Consilio melius contendere atque vincere possumus quam ira. (We can compete and prevail better through wisdom than through anger.)

Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic

US President Donald Trump (left) and Chinese President Xi Jinping (right). While a tremendous amount of energy and effort is being focused on the coronavirus pandemic crisis in the US and the rest of the world, the Beijing has placed its focus on a cause far less noble. It ignited a confrontation with Washington by making the utterly absurd and impolitic official declaration that the US Army had ignited the COVID-19 virus (the novel coronavirus) while visiting Wuhan, China, and that the virus was developed in a US military laboratory. There was the attendant declaration that use of the terms “Chinese virus” or “Wuhan virus” was racist and xenophobic. By telephone, Trump and Xi offered one another messages of unity in the war against the coronavirus and appear to have resolved the matter. However, given all that was said, greatcharlie feels compelled to look at how Beijing reached its peculiar conclusions and offers a discussion on what it was likely trying to do.

When covering a subject, it is the fervent desire of greatcharlie’s editor to avoid the appearance of flogging a dead horse. To that extent, in approaching the issue of the incredibly false claims by the government of the People’s Republic of China that the US had ignited the COVID-19 virus (the novel coronavirus) in China, it does not want to dredge up what may beginning to settle down. However, the whole episode has been so peculiar, greatcharlie feels compelled to metaphorically take look under the hood. Continuing from what was just briefly mentioned, Beijing instigated the whole row by declaring the US Army while visiting China to participate in the 7th CISM Military World Games in Wuhan in October 2019, well before any reported outbreaks of the coronavirus. Beijing alleged that the virus was developed in a US military laboratory. There was the attendant declaration that calling the coronavirus the “Chinese virus”, “Chinese coronavirus”, or “Wuhan virus” was somehow an expression of racism and xenophobia. No evidence has been shown by any reliable epidemiologist worldwide that the coronavirus originated anywhere but China. Experts believe that the virus emerged from animals sold in a market in Wuhan, where the first cases of the disease were discovered. All of the declarations from Beijing were bizarre, and similiar ones of that sort were made by it afterward. While a tremendous amount of energy and effort in Washington is being focused on the coronavirus crisis in the US and the rest of the world, Beijing has decided to place a considerable portion of its focus and energy on a cause far less noble.

Much has been written and stated about this grave matter in the US news media. After first hearing of Beijing’s claims, US President Donald Trump addressed it from the White House Press Room on March 17, 2020. He adroitly countered Beijing’s declarations by stating: “China was putting out information which was false that our military gave this to them. That was false. And rather than having an argument, I said I had to call it where it came from. It did come from China.” Perhaps greatcharlie is going on a slender by stating Trump’s words were firm but still rather measured. Trump is certainly concerned with the US first and foremost, but while speaking about the matter, he may have had his positive relationship with Chinese President Xi Jinping in mind and may have wanted to keep the door open for conversation with him to sort the matter out if necessary. Since that time Trump stated he would refrain from using the term “Chinese virus” and he had a constructive telephone conversation with Xi concerning the whole matter. A considerable effort has been made by greatcharlie in it’s posts to alert foreign capitals to the pitfalls of following false information from Trump’s political adversaries in the US who have from his first year in office minus one have sought to thoroughly distort the picture of his team’s  good work and accomplishments. In this particular case, China, a highly-developed, industrialized economic power, has chosen to amplify the attitudes and behavior of Trump adversaries.

Thomas Paine, 18th Century American political writer, theorist, and activist (of the American Revolution), wrote in his work, The Crisis No. V: To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture. Although it finds the perspective on the coronavirus proffered by its senior officials in Beijing objectionable, the goal of greatcharlie here is not to argue against it but simply to offer its own perspective of what Beijing was likely attempting to do. Admittedly, China is not really greatcharlie’s patch. Nevertheless, in an effort to better this matter, greatcharlie takes a deeper dive into what Beijing is doing, what is the thinking of its leadership, and why it is fervently hoped its current behavior will stop and will be avoided in the future. Quis nescit, primam esse historiæ legem, ne quid falsi dicere audeat?; deinde ne quid veri non audeat? (Who does not know that is the first rule of history not to dare to say anything that is false?; and, the second not to dare to say anything that is not true?)

Leaders of the Communist Party of China at plenum (above). It does not feel as if greatcharlie is going out on shaky ground to state that there is a cultural angle by which Beijing can be imagined struggling to cope with a presumed loss of face, a sense of shame and embarrassment, for being unable to respond adequately and in a sure-footed way to the medical crisis. One could also imagine that the leadership of the Communist Party of China believed a torrent of precautions against the coronavirus would exceed the dangers to be avoided. They abandoned the Chinese people to destiny. Left with their egos hurt, and feeling angered and self-conscious about their country’s situation, some among the leadership of the Communist Party of China, amidst all that was transpiring, rather than sit maudlin, likely decided to use the country’s foreign policy apparatus to inappropriately lash out.

An Act of Daylight Madness by Beijing

Once an agrarian country dominated for centuries by foreign powers, China has since the end of World War II has reached amazing heights. Confident and competent, China today is an economic superpower. It has achieved tremendous scientific advances, has sent satellites and probes into far space and is gearing up its space program to meet the challenge of sending a crew to the Moon and return it home safely. China undoubtedly believes it has impressed the world with its achievements. Indeed, it has been extolled by many in the world for its great strides. However, likely sensing the world looking over its shoulder with a mix of disapprobation and commiseration at the unsteady handling of its coronavirus epidemic as the death toll in its country rose, it did not feel so sure, nay feared, that it was not holding its own as scientific powerhouse and engine of scientific advancements. It is difficult to say with certainty how the same proud, mature, self-confident, self-assured leadership of China got to the point in which it decided to ascribe culpability for the spread of the coronavirus to the US. Perhaps the place to look to understand how Beijing feels about this whole coronavirus matter is the Communist Party of China.

Indeed, what the Communist Party of China feels and says about any matter in China is always of great consequence. In spite of all that could be stated about China being an advanced and leading industrialized power, it functions under the rule of a one party, authoritarian system. The Communist Party of China would insist that from leadership, wisdom radiates in all directions. There are eight other, subordinated political parties that are allowed to exist and they form what has been dubbed the United Front. The Chinese government, itself, functions under a people’s congress system, taking the form of what is called the National People’s Congress. The National People’s Congress exercises the state power of amending the Constitution and supervising the enforcement of the Constitution; enacts basic laws of the state; elects and decides on the choices of the leading personnel of the highest state organs of China, including the President and Vice President, the choice of the Premier of the State Council and other component members of the State Council; elects the Chairman of the Central Military Commission and decide on the choice of other component members of the Central Military Commission; elects the President of the Supreme People’s Court and the Procurator-General of the Supreme People’s Procuratorate; examines and approves the plan for national economic and social development and the report on its implementation; examines and approves the state budget and the report on its implementation; and make decisions on other important issues in national life. The National People’s Congress is elected for a term of five years. It meets in session during the first quarter each year and is convened by the National People’s Congress Standing Committee. In accord withbwhat was earlier explained, it is leadership is composed of leaders from Communist Party of China. As for the leadership of the Communist Party of China, it is divided among a number of elite bodies. The 370 member Central Committee of the Communist Party of China is the largest. The Political Bureau of the Communist Party of China Central Committee, or Central Politburo of the Communist Party of China, is a 25 member group of leaders elected by the Central Committee that actually overseas the larger party. Within the Politburo, power is centralized in the smaller Politburo Standing Committee selected by current Politiburo and retired Politiburo Standing Committee members. The day-by-day operations of both the Politburo and its Standing Committee are executed by the Central Secretariat of the Communist Party of China. The Secretariat can even make decisions on how to carry out tasks set by both organizations, consulting them when necessary. All important to the Communist Party of China is upholding and perfecting the system of socialism with Chinese characteristics and the promotion of the modernization of state governance. Socialism with Chinese characteristics refers to the fact that the country’s economy largely follows the principle of a market economy while being Communist in name. The Communist Party of China believes it has provided clear direction for its country and a path for vigorous development. Although maintaining lasting peace and stability is also stated focus, the Communist Party of China believes its country moves closer everyday to a time when it will be the world’s dominant power. When the Communist Party of China causes citizens any suffering through its leaders decisions, it will without empathy, chalk the matter up as being necessary for the greater good, for the sake of the Communist Revolution. Ensuring the population’s adherence to the strictures of the Communist government is a function of its security services. The People’s Liberation Army, the world’s largest military forces, often performs ancillary functions for the security services. From almost day one of the Communist government, there has been an insistence that a watchful eye needed to be kept over threats to the system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema. The response had to be strong enough to match “the severity of the disease.” It was in the performance of that mission that the Chinese government has earned a reputation among many worldwide for being an oppressive, authoritarian regime.

It does not feel as if greatcharlie is going out on shaky ground to state that there is a cultural angle by which Chinese can be imagined struggling to cope with a presumed loss of face, a sense of shame and embarrassment, for being unable to respond adequately and in a sure-footed way to the medical crisis. One could also imagine that the leadership of the Communist Party of China believed a torrent of precautions against the coronavirus would exceed the dangers to be avoided. They abandoned the Chinese people to destiny. Left with their egos hurt, and feeling angered and self-conscious about their country’s situation, some among the leadership of the Communist Party of China, amidst all that was transpiring, rather than sit maudlin, likely decided to use the country’s foreign policy apparatus to inappropriately lash out.

The coronavirus spread from Wuhan, China, in late December 2019 according to available evidence. The New York Times on March 13, 2020 reported that scientists have not yet identified a “patient zero” or a precise source of the virus, though preliminary studies have linked it to a virus in bats that passed through another mammal before infecting humans. A senior official from China’s National Health Commission, Liang Wannian, proffered the idea at a briefing in Beijing in February 2020 that the likely carrier was a pangolin, an endangered species that is trafficked almost exclusively to China for its meat and for its scales, which are prized for use in traditional medicine. The first clustering of patients was recorded at the Huanan Seafood Wholesale Market, and studies have since suggested that the virus could have been introduced there by someone already infected. The overwhelming amount of cases and deaths have been in Wuhan and the surrounding province of Hubei. Reportedly, Li Wenliang, a Wuhan doctor, tried to raise alarm about the coronavirus outbreak, was targeted by police in an effort to silence him. He has since succumbed to the coronavirus. Another Wuhan doctor, who was immersed in the battle against the coronavirus and tried to sound the alarm as to the magnitude of the threat, has reportedly disappeared.

Chinese state media has generally praised Beijing’s efforts in containing the virus. On March 17, 2020, a China Daily editorial stated that the world should learn from China’s example in aggressively quarantining and detecting the virus. Yet, At the height of the outbreak in China, local governments were reportedly criticized for excessive measures and lack of supplies and capacity. However, those who closely follow online social media noticed numerous conspiracy stories were emanating from China spreading falsehoods including the idea that the coronavirus might have been brought in by US military athletes who visited Wuhan to participate in the 7th CISM Military World Games, which opened on October 17, 2019 and closed on October 27, 2019. Coronavirus was being labelled by those sources as an “American disease.” Those conspiracy theories were continously recirculated on China’s tightly controlled internet. There is not a shred of evidence to support that, but the notion received an official endorsement from China’s Ministry of Foreign Affairs, whose spokesman accused American officials of not coming clean about what they know about the disease. Then, the disinformation was suddenly being spread from official sources such as a series of posts on Twitter by Zhao Lijian, the Director of the Information Department of China’s Ministry of Foreign Affairs and its top spokesperson. In a now famous tweet from @zlj517 on March 12, 2000, at 10:37 AM, Zhao wrote: “2 CDC was caught on the spot. When did patient zero begin in US? How many people are infected? What are the names of the hospitals? It might be US army who brought the epidemic to Wuhan. Be transparent! Make public your data! US owe us an explanation!” For Zhao, his exertions could hardly have been morally invigorating as he would certainly have known full well, and as aforementioned, that all credible experts believe the coronavirus originated in a wet food market in Wuhan, China, where it was likely passed from different animals until a host carrying the disease transferred it to a human. Zhao who has a reputation for making use of Twitter, though the platform is blocked in China by the government, to push what some policy analysts call Beijing’s new aggressive, hawkish, diplomatic strategy. Yet, in this “campaign” Zhao surpassed himself. Zhao took the posture of a positive serpent. Other senior officials of the government comporting themselves publicly when discussing the coronavirus epodemic did so with an astringency which some regime critics would say uncloaked the true nature of the regime. Lin Songtian, China’s ambassador to South Africa also tweeted that the virus might not have originated in China. Fallacia alia aliam trudit. (One falsehood thrusts aside another.( i.e., leads to more))

After giving an address on March 16, 2020, warning of a possible recession, the US president posted from @realDonaldTrump on March 17, 2020 at 12:16AM on Twitter: “The United States will be powerfully supporting those industries, like Airlines and others, that are particularly affected by the Chinese Virus. We will be stronger than ever before!” Chinese officials took a similar acidic approach to Trump’s reference of the pandemic as the “Chinese virus.” Zhao’s colleague, Geng Shuang, deputy director of the Chinese Ministry of Foreign Affairs Information Department, at a press briefing in Beijing on March 17, 2020, stated: “Some US politicians have tried to stigmatise China … which China strongly condemns.” He went further to explain: “We urge the US to stop this despicable practice. We are very angry and strongly oppose it [the tweet].” When asked if comments such as his and Zhao’s reflected Beijing’s official views on the virus, reportedly he did not directly comment. Instead, he replied: “The international community, including the US, have different opinions about the origin of the virus,” he told the Reuters press agency, adding that the origin of the virus was a scientific matter and as such, scientific views should be listened to. (Perhaps there would be a need to twist his tail to force him to mimic the obloquy of his colleagues.) Then the superior of Geng and Zhao at the Information Department of the Ministry of Foreign Affairs, its director Hua Chunying, sent out a tweet amplifying, with a bit more vigor, Geng’s line of argument. He included a link to a video clip that included the director of the US Centers for Disease Control, Robert Redfield stating on March 17, 2020 that it was wrong to refer to the coronavirus as a “Chinese coronavirus,” noting while it first emerged in China it has since severely impacted countries such as South Korea and Italy. Hua’s tweet from @SpokespersonCHN on March 12, 2020 at 3:26AM was the following: @CDCDirector Dr. Robert Redfield: Some cases that were previously diagnosed as Flu in the US were actually . It is absolutely WRONG and INAPPROPRIATE to call this the Chinese coronavirus. https://www.c-span.org/video/?c4860650/user-clip-diagnosed-flu-covid-19 …”

One could call what Beijing was doing as diplomacy after a fashion. Yet, certainly it is diplomacy conducted in an unsatisfactory way. On the coronavirus matter, Beijing appears to have little interest in holding themselves to what generally might be understood to be higher standards international statesmanship. Going directly to the source of Chinese power, US Secretary of State Mike Pompeo issued “strong US objections” in a telephone conversation with Yang Jiechi, director of the Office of Foreign Affairs of the Communist Party of China. CCTV, Chinese state television, reported that Yang also issued “strong objections” to attempts by the US to “slander and smear” China’s efforts in combatting the virus. That unfortunate response from a key Communist Party of China official was quite telling. With the exception of the two national leaders, Beijing at almost every level was all over Washington, and in turn, Washington, at nearly all senior levels, was all over Beijing.

What is quite troubling was the way Beijing’s effort smacked of provocative efforts during a previous era of a geopolitical struggle between East and West, Communism versus Capitalism. There was a paranoia that eventually hardened both East and West, seemingly giving rise to intractable negative beliefs and harsh convictions of each side’s respective intentions. One would have hoped that era was dead. It would seem that in the minds of some in Beijing, particularly among the leadership of the Communist Party of China, that era is still very much alive. To that extent, a defacto bigotry toward the US appears to exist in the thinking among a number of them.

Other than an eventual good telephone call between Trump and Xi, the only bright spot in the middle all that has occurred was comments made by the Chinese Ambassador to the US Cui Tiankai about the anti-US declarations from Beijing. Reportedly , Cui told the news program “Axios on HBO” that he stands by his belief that it’s “crazy” to spread rumors about the coronavirus originating from a military laboratory in the US. Cui even called this exact conspiracy theory “crazy” more than a month ago on the CBS News program, “Face the Nation.” well before the spokesperson for the Chinese Ministry of Foreign Affairs first began publicly promoting the conspiracy. It would seem that true professionals in the Chinese government would prefer to stick with the primary problem instead of rooting around extraneous matters and bizarre claims. Cui apparently holds firmly to the belief that good diplomacy among advanced industrialized societies, to preserve peace and security, must not exceed what is decent.

Zhao Lijian (above), deputy director of the Information Department of the Chinese Ministry of Foreign Affairs. One could call what Beijing was doing with its impolitic declarations about the US as diplomacy after a fashion. Yet, certainly it is diplomacy conducted in an unsatisfactory way. On the coronavirus matter, Beijing appears to have little interest in holding themselves to what generally might be understood to be higher standards international statesmanship. With the exception of the two national leaders, Beijing at almost every level was all over Washington, and in turn, Washington, at nearly all senior levels, was all over Beijing. What has been quite troubling was the way Beijing’s effort smacked of provocative efforts during a previous era of a geopolitical struggle between East and West, Communism versus Capitalism.

A Possible Political Warfare Strategem

What Beijing has expressed may very well be a projection of its disappointment with itself. Knowingly speaking vaguely, it is not hard to imagine leaders in Beijing, particularly within the Communist Party of China, smouldering over the embarrassing reality that the coronavirus pandemic was due to their incompetence. It was not something embarrassing that could be hidden away. The resulting choice for Beijing, not to behave as a good player on the international stage, was the wrong one. Looking upon the matter of Beijing’s declarations with more discerning eyes, it cannot be ruled out that the leadership there has done more than simply green lighted  some unconstructive propaganda by the senior members of the foreign ministry. The implications and indications are that their declarations have most likely been part of a greater political warfare stratagem.

Male cuncta ministrat impetus. (Anger manages everything badly.) Beijing’s nose has certainly being put out of joint. If greatcharlie’s  supposition that Beijing had launched a political warfare attack is valid, its primary purpose would be getting the rest of the world to tear the Chinese name off of the virus was part of a larger effort to conceal the fact that the virus had any connection to China and save face after an absolutely failure to respond to it appropriately and contain it. Indeed, throwing the yoke of embarrassment off China’s shoulders would mean everything to its leadership. It would no longer be the cause for so much torment and anguish worldwide. It would no longer be the scapegoat for the pandemic. In an eccentric way of thinking, Beijing may have seen this tact as a way to make amends for quite a failure. With seemingly little hesitation, they apparently chose to threaten the civilized order. Their minds were confined to what has already transpired and unwilling to open to the potential of the future. It would seem, much as it has been said by the many who have suffered its wrath and by those foreign journalists and scholars who have closely oberved it in action, the voice of deception and hypocrisy lingers in China via the Communist Party.

In an April 30, 2018 greatcharlie post entitled, “US-Led Military Strikes in Syria Were a Success: Was a Correlative Political Warfare Success Achieved, Too?”, the features of a political warfare effort were outlined. It was noted by greatcharlie that political warfare consists of the international use of one or more of the implements of power–diplomatic, information, military, and economic–to affect the political composition of decision making within a state. Citing Brian Jenkins, a renowned security affairs analyst at RAND, the post explained that political warfare reverses the famous dictum of the 19th century Prussian military theorist Carl von Clausewitz that “war is the extension of politics by other means,” as political warfare is really the extension of armed conflict by other means. It could take the form of the following: economic subversion; propaganda–not tied to a military effort; psychological warfare–as part of a military effort; conditional aid to a state; aid to political parties; aid to resistance groups; political accommodation; and, even assassination. Those engaged in political warfare perceive an opposing side not as a monolithic force, but as a dynamic population of individuals whose grievances, sense of humiliation, and desire for revenge, honor, status, meaning, or mere adventure could propel them to resistance. Political warfare recognizes that usually members of the opposing side are constantly calibrating and recalibrating their commitment. It sees every member of the opposing side as a potential convert. Many of these features are readily discernible in Beijing’s effort.

Likely Hopes in Beijing for Its Possible Political warfare Attack

One might believe that it would be a risky leap of faith to attempt to include the mighty US on the list of the league of countries and peoples who have been targeted by Beijing’s disinformation campaigns focused on concealing its own misdeeds. Included on a short list of ongoing targets of such deception would be the Uhigars of China, the people of Tibet, the people of Hong Kong, Taiwan (officially the Republic of China), Vietnam, and South Korea.

Trying to manipulate thinking and events the US, however, would not at all be an alien concept. Along with the Russian Federation, China also was detected meddling in 2016 US Presidential Election. This fact has been highlighted by Trump’s adversaries in the US for their own varied purposes. In fact, it was perhaps viewed as a low risk. To that extent, within the Communist Party of China, the operation very likely made plenty of sense from certain perspectives. The attack would be launched from China. Since physical courage would not be required, they would likely flatter their own egos by displaying the political courage to act in such a way. Beijing likely believed that they had superior operational awareness. They felt they knew terrain and all of the actors on the other side. They likely felt confident that they could make profound use of detailed all source intelligence concerning the US. Having reviewed endless reports and commentaries produced by Trump’s adversaries that were already calling him racist and xenophobic for saying the Coronavirus was from China, and calling it the “Wuhan Virus”, and observing them try to tie the word racist to his tail in general, was surely encouraging in Beijing. The know-how was in their possession through specially trained personnel in political warfare units in their intelligence services and perhaps even in the Communist Party of China itself. Whether the political warfare attack came to the personal attention of Xi himself is uncertain. Considering his likely desire to preserve his line of communication and relatively good relations with Trump, Xi would probably find the presumed political warfare operation too rich for his blood. He would also likely have intuited that it would all become an untidy situation in the end.

An likely important goal of Beijing’s political warfare campaign would be to exploit individual weaknesses in the US on a large scale. The focal points surely woukd be the feelings, sensibilities and sentiments of those unable to find assurance and security in what has been done by the US President so far. Without question, Beijing targetted Trump’s adversaries, particularly anti-Trump members of the US news media. Those members of the US public who were bewildered by all the news about the coronavirus and ambivalent about what was being done in response were also likely primary targets of the attack. With proper measure, Beijing believed it would chip away at reality and replace it with the false reality it had constructed. The key would remain getting the US public and the people of the world to accept what it was saying. Beijing apparently believed that faith would be out into its words and that there was a considerable lack of faith in Trump and the US government both in the US and in the rest of the world.

Xi (center) at ceremony with Communist Party of China’s leadership. What Beijing has expressed through its impolitic declarations about the US may very well be a projection of its disappointment with itself. It is not hard to imagine leaders in Beijing, particularly within the Communist Party of China, smouldering over the embarrassing reality that the coronavirus pandemic was due to their incompetence. The resulting choice for Beijing, not to behave as a good player on the international stage, was the wrong one. It cannot be ruled out that the leadership there has done more than simply green lighted some unconstructive propaganda by the senior members of the foreign ministry. The declarations may have been part of a greater political warfare stratagem. Whether the presumed political warfare attack came to the personal attention of Xi himself is uncertain. Considering his likely desire to preserve his line of communication and relatively good relations with Trump, Xi would probably find such an operation too rich for his blood and intuited that it would all become an untidy situation in the end.

Targeting the US News Media

In Book II of his masterwork, Paradise Lost (1667), the great 17th century English poet and intellectual, John Milton,  wrote: “But all was false and hollow; though his tongue Dropp’d manna, and could make the worse appear The better reason, 4 to perplex and dash Maturest counsels.” As adversaries of Trump, the rhetoric of the US news media has only been second in virulence to the utterances of some political adversaries in the opposition Democratic Party. On list of Trump’s adversaries, however, there is a far larger group to include: academics; think tank scholars, other policy analysts; political pundits on television, radio, print media, and online; former senior members of the previous administration of US President Barack Obama; television personalities; and, Hollywood celebrities. For whatever reason, they have some inextinguishable, inexhaustible need to injure Trump. They are all absolutely comfortable with expressing the most fanatical rebukes possible as opposed to constructive criticisms.

One should be under no illusion concerning an extreme dislike of Trump in the US news media. From the first days of the Trump administration, there has been an “us-them” approach taken by the majority of the US news media toward anything it does. Reporters and pundits in the broadcast media have gone beyond the point of being gadflies. Primacy is given to an effort to shape the thinking of the public against Trump, as well as provoke the US President, with daily stories that harshly criticize him, gainsay his administration’s decisions and actions, and chastises administration personnel from senior advisers to middle level staff. Opportunities to make platitudinous objections to Trump are never missed. Words used are beyond hostile and aggressive. The distance that many journalists are willing to travel away from past norms is unknown. Into the second year of his first term in office, the news media remains all Trump, all the time. Journalists discuss hypotheticals sometimes with only a tenuous connection with the realities of ongoing events rather than informing the US public of facts from solid reporting and analysis based on studied patterns of decision making. The facts offered are more often bleached to the point of being superficial. Deeper dives into facts are avoided, and gaps are filled with opinions. Journalists will even seek to capitalize on Trump’s criticism of their stories whenever he decides to get involved with them. It is puzzling how for so long  in the US news media has raged a fever in their blood. The reason for their commitment to such anger and aggression has begun to appear demonically inspired from Hell.

As noted by greatcharlie in its February 25, 2020 post entitled, “Commentary: With the Impeachment Results In, Foreign Capitals Can See Clearer How Their Relations with Washington Add Up”, foreign capitals able to discern the angry and hateful language of Trump’s adversaries for what it was, have managed to establish good relations with his administration and to reach new, balanced agreements with US over the past three years. Their respective leaders have enjoyed good person-to-person communications with Trump. Economic improvement, growth, and a greater sense of hope in their own countries can be seen.

A trove of information could be found in open source reporting from the US news media for those foreign capitals bent on promoting odious ideas about Trump and his administration. Clearly, Beijing stands alongside those foreign capitals willing to take that path. Its worst opinions about the Trump administration and the US were surely satisfied via that stream of information. However, what Beijing has done goes beyond just rereporting useful negative information from US sources. Doubtlessly watching carefully how members of the US news media and Trump’s adversaries would grab at essentially any morsel to attack him, made use of that penchant.  Indeed, Beijing likely calculated that Trump’s adversaries would not be able to resist its statements about alleged US Army activities in Wuhan, which they of course would conclude Trump ordered. Declarations that Trump was racist and xenophobic for using the terms Chinese coronavirus and Wuhan virus was figurative catnip for them. Suffice it to say that many, true to form, picked the figurative low hanging fruit and have continued to grab what has been dangled before them. Conference rooms of US news media outlets were likely set ablaze over talk about the statements. Almost immediately, the false statements from Beijing were found in broadcasts, online sources, and print media. Upon learning what has very likely transpired, however, one should hardly expect anti-Trump members of the US news media to assume a virtue.

Targeting the Bewildered and Ambivalent in the US

Decipit frons prima multos, rara mens intelligit quod interiore condidit cura angulo.
(The first appearance deceives many, our understandings rarely reach to that which has been carefully deposed in the innermost recesses of the mind.) Targeting the feelings and sensibilities of those in the US public who are unsure of what is what during the coronavirus would make good sense from an adversary’s perspective. At best, under ordinary circumstances, such declarations by Chinese officials would not overly concern the US public. It would most likely sound much as a conspiracy theory by those who might ponder it. Some perhaps harboring negative impressions of Trump has performed might leap to use the nonsense proffered from Beijing to support their worst impressions. Many were led by the nose during the Impeachment debacle in the US Congress, the claims of what the Investigation of Special Counsel Robert Mueller would find regarding Trump’s alleged ties to the Russian Federation Government, and absolute farce that Trump was a Russian Federation spy. Some who might find difficulty recognizing the good intentions of the Trump administration due to unique preconceptions on how it operating might find it easy to fold what was declared from Beijing into their own sense of the bigger, uglier picture of the what the administration is all about. The overwhelming and baffling nature of it all might cause some to believe it serves as evidence that elements of the secret world have been at it again. Those judgments most likely would be based almost exclusively upon what has been produced in Hollywood about US intelligence services. Hollywood’s version, of course, was created as a commercial amusement and never intended to inform viewers of the realities of the intelligence business.

Although their behavior may be condemned by the informed, more astute, self-assured, perhaps those bewildered and ambivalent members of the US public who may have fallen prey to the disinformation generated by Beijing should not be hastily, or too harshly judged. There is always the chance that the Information one might receive about a matter could be false, a deception, fraud. Yet, tell anyone anything and up9n immediate impression, it will likely arouse some feeling. If it is tragic information about someone, the feelings can be sorrow, pain, sympathy, and  regret. If it is good news it can lead to feelings of satisfaction, happiness, joy, and pleasure. If information is bad it can create resentment and anger. Feelings of anger when stirred by information, even if it is false, can also lead to hostility and violence. If one is willing to act solely on feelings, one cannot hardly be certain if the facts are true and feelings are warranted. Given the intensity of feelings one might manifest about information, one, without really giving it a thought, might simply accept that the truth is already in ones possession. One’s impressions about a source can also lead one to make that determination that enough proof exists. Yet, only to the limits of one’s knowledge and trust of the source can be one certain that they have the truth. Over time, the impulse, to find truth through stirred feelings or mere impressions, can become a habit. However, it is a bad habit. It is error self-taught. It leaves one open to manipulation from all directions. Surely, one must only act on truth; a better than sufficient amount proof. When available, data must be collected and considered. Prima sapientiæ gradus est falsa intelligere. (The first step towards wisdom is to distinguish what is false.)

Where Beijing’s Possible Political Warfare Attack Went Wrong

The clever boots in Beijing who likely fashioned the messages put out by officials were likely drawn from scholarly analytical cells of their diplomatic service, intelligence services, and intelligence elements of the Communust Party of China. They doubtlessly as a duty closely follow US politics and public opinion and have been closely observing the progress of the coronavirus epidemic in the US. They were likely quite cognizant of the anxiety and fear created by the “all virus all the time” reporting on broadcast television, on the internet, and social media, and daily publications. Even if any had expressed doubts about the potential success of the political warfare attack, they surely would have been ignored. Assuming that those who executed the presumed political warfare attack were gung-ho across the board, perhaps just before its execution, they might likened themselves as the final push from behind to a ball they already saw moving in the right direction. Yet, rather than pushing a ball in the right direction to hurt Trump and the US, they metaphorically dislodged a boulder on a cliff above their own homes that came crashing down through their roofs. They were essentially sabotaged by their own ignorance,

Beijing’s Impolitic Declarations Defied Reality

As discussed earlier, there were already plenty of odd things being promoted about Trump from everywhere. As the likely operation was executed and the declarations about the US were made, it all seemed too unnatural, too unusual, and stood out in a big way. The declarations made actually mimicked the tone of the most zealous and loyal elements of the Communist Movement and the Communist Party of China. Indeed, what Beijing has been declaring are such a extravagant deviations from what was already understood and had settled in worldwide about the origins of coronavirus. More than anything else, for the overwhelming majority of people who can across it, Beijing’s anomalous expression, that points to the US Army as the initiator of the crisis, was one more example of its perfidy. Among the more compassionate though, perhaps Beijing’s exertion about the US appeared more as a cry for help, having been subsumed by efforts to stave back and resolve the crisis they created for themselves. Perhaps for a few, Beijing’s decision to proffer such ideas actually garnered pity rather than disapproval. Multorum te etiam oculi et aures non sentientem, sicuti adhuc fecerunt, speculabuntur atque custodient. (Without your knowledge, the eyes and ears of many will see and watch you, as they already have.)

Due to human nature, immutable as it is, one would more likely expect to hear a vacuous claim concerning the US and the spread of coronavirus as an impolitic, off-color witticism, surely unacceptable, softly spoken as a blague during conversation around a tea trolley at a club, rib-tickling nonsense mumbled to amuse colleagues in the pantry or around the water cooler in an office, or shouted out in the locker room in a gymnasium or fitness center as a wisecrack to stoke a jovial atmosphere. Presumably, even the more infamous shock comedians, such a jib might be seen as potentially striking too close to the nerve right now and hardly be attempted on the comedy circuit, which is presently closed down, same as the other sites of congregation mentioned, due to coronavirus concerns. One might chalk up the declaration of such absolute nonsense about the US Army by China’s venerable Foreign Ministry as the second embarrassing episode that Beijing has had to face in a very short period of time.

The US team during the Opening Ceremonies of the 7th CISM Military World Games in Wuhan (above). Perhaps confusion in Beijing that led to the impolitic declaration about US service members visiting Wuhan may be rooted in a fundamental misunderstanding of how different the US military is from that of their authoritarian system. US military personnel cannot be ordered to potentially put themselves at risk by carrying a virus overseas rather than seek treatment, interact among his or her fellow US military athletes in transit and at the site of the competition, and potentially make them ill, all with the goal of passing the virus to the Chinese people. If the US had used a goodwill visit by its military personnel to Wuhan as a pretext to get an infected service member to China and launch a covert biological warfare attack, it could have been viewed as an act of war. One would think if Beijing truly believed the US used a Trojan Horse scheme to launch some form of biological warfare attack from Wuhan, the response from Beijing would have been far more severe than unsubstantiated declarations from their foreign ministry.

The Fallacy That a US Service Member Brought the Coronavirus to China

The US sent 17 teams with more than 280 athletes and other staff members to participate in the 7th CISM Military World Games in Wuhan. If one were to give consideration to whether the coronavirus virus was brought to inadvertently by a service member on the US military team, purely out of academic interest, several pertinent facts would arise that would well-refute the idea. They should not be overlooked. It is hard to imagine that any toned athlete anywhere, primed to successfully compete in an international competition would not notice that he or she was not up to par. They would most likely inform their trainer or coach and seek treatment in order to get back to snuff. If that were not possible, the best choice would be to step away from the competition. While this suggestion is frightfully out of court, one might suppose an athlete displaying symptoms of some illness, and wrongheadedly, and likely full of emotion, might insist upon participating in a competition. In such a case, his or her trainers, coach, and fellow athletes would undoubtedly to note and respond. They would all know that attempting to compete in any event while ill would be foolish. They would insist the athlete get a full medical check up. The athlete would certainly be removed from the roster of competitors and reminded that if one cannot perform at their best, there is no reason to compete. From these angles, it would hardly be the case that a service member who was infirmed would have travelled on the US military team to China. The same tact would likely be taken with regard to coaches, trainers, and the team’s other support staff. To go a step further, athletes who were members of the US team sent to Wuhan had to qualify among their fellow service members to compete. Coaches typically conduct qualifying competitions to see who will represent the US military in each event. The top qualifying competitors take the slots available in their events. However, a depth chart is usually made with their names as well as the names of those athletes who competed well but did not qualify given the number of slots available. If a service member who qualified to compete became ill or was unable to compete, the next best qualified service member on the chart would move up into the vacant slot. One of the unqualified athletes would suddenly be qualified to go to the competition. Perhaps the clever boots in Beijing who came up with the vacuous idea that one of the US military athletes went around Wuhan making everyone ill, likely never participated in any team sports or organized athletics and are unaware of the system that typically exists. Perhaps those who came up with the idea were hoping to prey on the ignorance of those for whom the information was targeted.

Perhaps confusion may be rooted in a fundamental misunderstanding of how different the US military is from that of their authoritarian system. Travelling with an illness is a bad idea under any circumstance. US military personnel cannot be ordered to potentially put themselves at risk by carrying a virus overseas rather than seek treatment, interact among his or her fellow US military athletes in transit and at the site of the competition and potentially make them ill, all with the goal of passing the virus to the Chinese. That would fall under the category of an illegal order in the US military.

To insinuate that the US, through a goodwill visit to China by military personnel to participate in international competition, sought to knowingly launch a potential, unprovoked biological warfare attack against China, is truly so beyond what is decent  that it shocks the conscience. This claim serves as evidence of how the paranoia carried over from the previous era can take its toll. In reality, if the US had used a goodwill visit by its military personnel to Wuhan as a pretext to get an infected service member to China and launch a covert biological warfare attack, it could have been seen as an act of war. Nothing was indicated in statements from US officials that there was any hostility toward China so strong that would cause the US to do anything of the kind. Nothing indicated that the US would even do anything so odious to any country. There were no threatening military movements ordered by Trump prior to the Wuhan games. The US and China were still trying to get each others assent on a Phase One trade agreement. One would think if Beijing truly believed the US used a Trojan Horse scheme in order to launch some form of biological warfare attack from Wuhan, the response from Beijing would have been far more severe than un substantiated declarations from their foreign ministry. Indeed, the response, if the claim were really believed in Beijing, could be characterized as extremely relaxed. Whether one might accept that Beijing’s declaration that the US Army brought the coronavirus to Wuhan was a simple expression of propaganda or the first part of a political warfare campaign, it seems almost certain that the claim was not thoroughly thought through. Again, as mentioned earlier, no evidence has been shown by any reliable epidemiologist worldwide that the coronavirus originated anywhere but China. Experts believe that the virus emerged from animals sold in a market in Wuhan.

Regarding the Racism and Xenophobia Claims

The argument that Trump’s use of the terms “Chinese coronavirus” and “Wuhan virus” is racist and xenophobic fallacious on its face. It must be acknowledged that questions were never before raised concerning the correctness of this long standing practice until this point. While it may have satisfied those already hostile to Trump, presenting such a flawed case to a global audience was a wasteful exertion. The argument that naming diseases, illnesses and viruses after the locations in which they originated is a long-established practice, nondiscriminatory, bias-free, and apolitical is quite convincing.

In a March 13, 2020 article in the Federalist entitled “17 Diseases Named After Places Or People”, it was demonstrated that the practice of naming diseases after their places or origin is actually centuries old. Consider the following: Guinea Worm was named in the 1600s by European explorers for the Guinea coast of West Africa; German Measles was named in the 18th century after the German doctors who first described it; Japanese Encephalitis was named in 1871 after its first case in Japan; Rocky Mountain Spotted Fever was named in 1896 after the mountain range spreading across western North America once first recognized first in Idaho; West Nile Virus was named in 1937 after being discovered in the West Nile District of Uganda; Omsk Hemorrhagic Fever was named in 1940s after its discovery in Omsk, Russia; Zika Fever was named in 1947 after its discovery in the Zika Forest in Uganda; Lyme Disease was named in 1970s after a large outbreak of the disease occurred in Lyme and Old Lyme, Connecticut; Ebola Hemorrhagic Fever was named in 1976 for the Ebola River in Zaire located in central Africa; and, Middle East Respiratory Syndrome (MERS) was named in 2012 after being reported in Saudi Arabia and all cases were linked to those who traveled to the Middle Eastern peninsula.

Was Beijing Attempting to Influence the 2020 US Presidential Election?

Pointing out what is obvious, a possible intention was to influence the 2024 US Presidential Election. Beijing may have been  convinced by its intelligence services, observations of US politics, and the US news media and writings and presentations by Trump’s other adversaries that was looked upon widely with disfavor in the US public. While seemingly tossing a sack of coals on the political fire with Beijing’s likely hope would be that its declarations of the US Army’s role in the spread of Coronavirus and raising issues of race and xenophobia over use of the terms Chinese Coronavirus and Wuhan virus, would stoke the political fires in the US by providing Trump’s Democrat political opponents with one more figurative box of ammo to use against him.

Chinese intelligence services may pride themselves in having what it believes to be considerable expertise on the US affairs, it surely is not up to snuff when it comes to understanding US politics. Few foreign intelligence services are. Clearly, Beijing completely missed the mark in appraising Trump’s political opponents in the 2020 Election Campaign. They have contributed their respective fair share of propoganda about Trump to the mix, too, primarily by promoting falsehoods about his record. One significant fact that Beijing should have noticed immediately was that both former Vice President Joe Biden and Senator Bernie Sanders were beset with considerable problems of their own that would have hardly allowed them to turn toward their attention to whatever nonsense was being put out by China. The frontrunner so far based on state primary results, Biden, was very noticeably displaying signs of cognitive impairment even before wild accusations about the US Army, racism, and xenophobia were made from Beijing. More importantly, the coronavirus epidemic in the US has essentially put their campaigns at a standstill.

Unless greatcharlie is terribly mistaken, Chinese intelligence analytical cells are presumably managed by loyal members of the Communist Party of China. What they have plenty of ostensibly is revolutionary zeal and an immense desire to please their superiors. Fervent dedication to their own system, and focus on their own society,  and being most familiar with politically skewed interpretations particularly of Western capitalist societies would presumably leave them with nothing reality based upon which they could find their interpretations and conclusions.  They very likely lacked points of reference within their own political systems which resembled what was happening in the US. What can typically be the case among bigoted, inflexible, often bumptious individuals who are Hell bent on following the party line, is the display of unwillingness to accept open-minded analyses that may very well have correctly contradicted their understanding of matters.

Given its compatibility with the thinking of many in Beijing, from what was collected and extrapolated about the US political scene regarding the 2020 US Presidential Election, primacy was likely given somewhat popular, yet incredibly hostile commentaries about Trump propagated by his adversaries. Beijing also likely enjoyed data collected from social media provided by emotional individuals across the political spectrum, political activists, and fringe elements who simply attack and lack boundaries. There is the real possibility that very little of anything collected in Beijing reflected thinking within the US public. Such information could only lead to the development of incorrect interpretations of US political activity. Using those incorrect interpretations in support of a political warfare operation would ensure that its failure from the start.

Trump (center) in the White House Press Room. What likely was a frightful miscalculation of so-called experts on the US in Beijing was the failure to foresee that most in the US public would appreciate Trump’s performance during the coronavirus epidemic and find that he proved himself most Presidential. The overwhelming majority in the US public knows very well that the coronavirus pandemic was caused through no fault of Trump, but by those outside the US who have sought to distort reality with outright lies about the pandemic’s origins. Polls support the argument that the US public well-appreciates what Trump is doing. He has been seen everyday with the White House’s Coronavirus Task Force, state governors, medical professionals, leaders of all industries creating a synergistic effect, bringing the full power of the US to bear on the problem to reach a speedy and successful resolution.

Reality Check for Beijing on US Public Opinion

What likely was a frightful miscalculation of so-called experts on the US in Beijing was the failure to foresee that most in the US public would appreciate Trump’s performance during the coronavirus epidemic and find that he proved himself most Presidential. A great many in their number would even begin to adore him. The rapid spread of the coronavirus beyond China’s borders surprised and shocked many in the health care professionals in the US. A few US infectious disease experts got permission to go into China to better understand the problem. Trump quickly developed a good sense for what was happening based on information he was provided. He did not get off to a slow start protecting the US public. Rather, as it is his strong suit, he began to tackle the coronavirus crisis by immediately cracking on to the heart of matter. He is observed working hard daily by the US public, trying to to find answers. He has been seen everyday with the White House’s Coronavirus Task Force, state governors, medical professionals, leaders of all industries creating a synergistic effect, bringing the full power of the US to bear on the problem to reach a speedy and successful resolution. In all areas, public-private partnerships have been forged. Trump has displayed a superb possession of will and ideas. He has developed a comprehensive plan of attack against the coronavirus that will defeat it, safeguard the US economy, and protect the well-being of the US public. In addition to asking the US public to stay out of harm’s way, Trump has asked them to stand calm and firm and united in this time of trial. What he has done marvellously is keep the US public calm has been to keep the people informed. He wants them to rest assured that they are getting their information for the highest sources. He sought to ensure despite disruptive voices of doom and destruction, admonition and contempt of his adversaries, he has made certain that the truth is out there for them to know. Trump has referred to himself as a Wartime President engaged in battle with what he characterized as the “hidden enemy.”

The overwhelming majority in the US public knows very well that the coronavirus pandemic was caused through no fault of Trump, but by those outside the US who now seek to distort reality with outright lies about the pandemic’s origins. Data supports the argument that the US public well-appreciates what Trump is doing. In Harris’ national surveys conducted March 17, 2020 and March 18, 2020, the US public’s approval of Trump’s management of the coronavirus crisis rose to 56%. His handling of foreign affairs rose to 52% in the same timeframe. Overall approval of Trump was 55%. Harris Insights and Analytics surveyed 2,050 American adults online in two waves on March 14, 2020 and March 15, 2020 and later on March 17, 2020 and March 18, 2020. An ABC News/Ipsos poll released March 20, 2020 reported that 55% of respondents approved of Trump’s management of the public health crisis, while 43 percent disapprove. The latest figures represent a boost in the president’s rating from the previous iteration of the survey, published one week ago, which showed only 43 percent approval for Trump and 54 percent disapproval. According to Gallup the US public has given Trump positive reviews for his response to the novel coronavirus pandemic, with 60% approving and 38% disapproving. By political affiloation, 94% of Republicans, 60% of independents and 27% of Democrats approve of his response. In fact, according to Gallup, Trump’s overall approval rating by the US public is 49%! Line graph. 49% of Americans approve of the job President Trump is doing, up from 44% in early March. On the day that the crisis finally subsides, Trump will very likely stand about 8 feet tall in the minds of the US public.

If the political warfare attack was a trial balloon, the intent would likely have been to determine whether Beijing could have an impact on perceptions in the US public in a piecemeal way, much as water dripping in a stone and eventually breaking through it making its mark. If Beijing concludes that its venture was successful, more virulent efforts could be expected. If an appropriate assessment were made just on what was observed so far, it would be that little was really achieved by the operation. Pressing forward on the matter would only be a wasted effort. If it was a full fledged effort, again the results should have shown Beijing that the impact of such disinformation wanted small. The best course of action would be to count their losses, cut their losses, and close the book on an operation that was ill-fated from the get-go.

Among those who constructed the plan of attack for Beijing’s political warfare tact there are unlikely any flashes of merriment at the moment. Undoubtedly, someone fairly senior in the mix in Beijing who fancies miracles managed to get the  whole cabaret off the ground. The failed political warfare attack was a stumble of the type that would likely stir some young go-getters to have designs on his spot.

Trump and Xi

Trump rarely refrains from stating publicly that he considers Chinese President Xi Jinping a friend. Trump’s political adversaries disparage and mock him for stating this claiming it was further evidence of his alleged affinity for dictators. Looking at their friendship in an abbreviated way, one finds that Trump and Xi are both solid experienced men, who wield significant power daily, under tremendous pressures of leadership, yet still manage to make the right decisions. Although greatcharlie has recognized the following intriguing quality of Trump in previous posts, it could be stated confidently that both men seem to have been born with an innate sense for leading very large organizations, in this case the US and Chinese governments respectively, with a dominant sense and intuition of what is happening with all of their near infinite moving parts at any given time. Often such abilities go unnoticed much as the fine strokes of a master painters brush. The two men were raised in two different cultures and two different systems of government. Those differences at certain points are considerable. Yet, there is a respect between them and as important, a willingness by both to treat one another as they would want to be treated. That practice can even be seen when the two leaders are together publicly.

Key elements of their interactions have been honesty, frankness, and wisdom. Honesty is ostensibly present when both leaders speak for they “tell it like it is” at least from each other’s perspective, and use each other’s respective understanding of an issue to construct a solution with which both can be satisfied. Through frankness, both make it clear that they are interested first and foremost in what is best for their countries and national interests first, and view each other as competitors in the world, but not enemies. With wisdom, while being frank with each other, both are able and willing to listen and accept explanations while speaking in businesslike terms about situations knowing both countries are far better off when they can reach solutions, and that allows for good, congenial communications and the ability to understand each other’s opinions and positions. To that extent, Trump and Xi have really provided the path upon which that advancement of US-China relations can travel. In difficult times, their relationship has served as the thin line between chaos and order.

Xi knew that he would need to come figuratively knocking at Trump’s door with une explication très élégant before the situation between the two countries got to a full gallop. He also likely recognized that it was his country overstepped certain boundaries. As aforementioned, he likely knew before anyone else in Beijing that the political warfare attack, which greatcharlie has presumed was launched, could not possibly succeed. Thus, when he called Trump on March 26, 2020, he did so from a less than favorable position. Yet, at long last Xi was able to say a few words of his own concerning the US. Given the circumstances, they certainly should not be viewed as anodyne statements.

Reportedly, during the call, Xi somewhat side-stepped the matter of the statements that were the reason for US concern. He primarily presented Trump with a message of unity in the war against the coronavirus. China’s official Xinhua News Agency made no mention of the previous spurious claims that the US spread the coronavirus from Wuhan or that use of certain terms were racist or xenophobic. No US news media outlets picked up on any exchange of that kind either. According to Xinhua, Xi told Trump that relations between the two sides were at a “critical moment” and vowed to cooperate to defeat the deadly illness. Reportedly, Xi continued: “Both sides will benefit if we cooperate, both will lose if we fight each other.” Xinhua further quoted Xi as saying: “Cooperation is the only correct choice. I hope the U.S side could take real actions. The two sides should work together to enhance cooperation fighting the virus and develop non-confrontational” relations.” Xi also reportedly expressed concern about the outbreak in the U.S., which has surged ahead of China’s number of confirmed cases and turned New York City into a global epicenter. On that matter, Xi said, “I am very worried about the outbreak in the U.S., and I’ve noticed the series of measures being taken by the U.S. president.” He additionally remarked: “Chinese people sincerely hope the outbreak can be contained very soon.”

Surely, Trump managed to express his feelings to Xi during the telephone conversation. When he presented his impressions of the call directly through Twiiter. Through @realDonaldTrump on March 27, 2020 at 1:19AM , he graciously stated: “Just finished a very good conversation with President Xi of China. Discussed in great detail the CoronaVirus that is ravaging large parts of our Planet,” Trump tweeted Friday. “China has been through much & has developed a strong understanding of the Virus. We are working closely together. Much respect!” Trump did not use the telephone call as an opportunity to pounce on Xi. Perchance Xi, getting to know Trump as he has, intuited that he would not. To that extent, having such a sense about Trump would have likely fortified Xi when he made the decision to make the call. Xi likely believed Trump would not go about it the wrong way and take the high road. Trump did. Assurément, Trump was not simply going through the motions of talking with Xi. He doubtlessly let him know that he expected results from their talk, measurable ones. Trump, after all, spoke from a clear position of moral authority given all that had transpired, for as Milton wrote in Areopagitica (1644): “For truth is strong next to the Almighty. She needs no policies or stratagems or licensings to make her victorious. These are the shifts and the defences that error uses against her power.”

From left to fight) Peng Liyuan, Xi, Trump, and Melanie Trump at Mar-a-Lago in April 2017. Looking at both Trump and Xi, both are solid experienced men who wield significant power daily under tremendous pressures of leadership. Both men seem to have been born with an innate sense for leading very large organizations, in this case the US and Chinese governments respectively, with a dominant sense and intuition of what is happening with all of their near infinite moving parts at any given time. Often such abilities go unnoticed much as the fine strokes of a master painters brush. The two men were raised in two different cultures and two different systems of government. Those differences at certain points are considerable. Yet, there is a respect between them and as important, a willingness by both to treat one another as they would want to be treated. That practice can even be seen when the two leaders are together publicly. They are competitors, but they are also friends.

The Way Forward

Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.) Nothing discussed here should sound extravagant. Beijing has proffered wild ideas about the US beginning with the farce about the US Army’s role in the spread of the coronavirus. It does appear that was very likely part of Beijing’s effort to score a political warfare victory. The political warfare attack was method, wrongfully implemented, poorly executed, and absolutely unnecessary. It is all sad and unfortunate. The entire industrialized world is presently caught up with defeating this virus pandemic and doing their best. It is unfortunate that your country suffered first and dearly over it, but despite embarrassment or disappointment, even shame that may cause, that is a reality. That, however, should not be the immediate focus. What the world does not need is the distraction of attacks to deflect culpability. It does not solve the crisis, does not demonstrate goodwill, and does not display an appropriate use of China’s national power along the lines of excellence. If anything, the political warfare attack has resulted in a loss of political currency in the world, which ironically is what China sought to protect with the effort. Lies do not last with age. The truth is usually discovered.

China is a great nation, a nation of great achievements, and it certainly has ambitions to accomplish even greater things. However, at the present, with the exception of Xi’s telephone call to Trump, it is not acting as such. Hopefully, his words have set the true course for the Chinese government from this point on. Indeed, rather than focusing on what has occurred emotionally and ascribing fault, and igniting discourse over a farce, China’s focus should be finding solutions. That would greatly impress the world. When a solution is found, that will garner far more praise than reproach for fault. If establishing a positive image for itself has become some immutable cause, China might show the world just how hard at work it is in finding that solution as a good member of the community of nations. Again, achievements made in that direction will shape the image of China not political warfare. Deus hæc fortasse benigna reducet in sedem vice. (Perhaps God by some gracious change, will restore things to their proper place.)