Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectantly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)

Commentary: There Is still the Need to Debunk the Yarn of Trump as “Russian Federation Spy”

The current director of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Sergey Naryshkin (above). US President Donald Trump’s adversaries have tried endlessly to uncloak some nefarious purpose in his legitimate effort to perform his duties, which has been akin to seeking long shadows at high noon. Some in the opposition Democratic Party have gone as far as to offer dangerous fantasies that Trump and officials in his administration are operatives of the Russian Federation. The notion that Russian Federation foreign intelligence officers would not only approach, but even more, attempt to recruit Trump, is daylight madness. No one knows that better than Naryshkin and the directors of the other Russian Federation intelligence services. It is more than likely that in the 2020 US Presidential Election, the outcome will go Trump’s way. Unfortunately, many of the ludicrous allegations, having been propagated for so long and with prodigious intensity by his adversaries, will likely stick to some degree for some time.

From what has been observed, critics and detractors, actual adversaries of US President Donald Trump, within the US news media and among scholars, policy analysts, political opponents, and leaders of the Democratic Party, have exhibited a practically collective mindset, determined to find wrong in him as President and as a person. His presidency was figuratively born in the captivity of such attitudes and behavior and they remain present among those same circles, four years later. Trump’s adversaries have tried endlessly to uncloak some nefarious purpose in his legitimate effort to perform his duties, which has been akin to seeking long shadows at high noon. Many of those engaged in such conduct have garnered considerable notoriety. Specific individuals will not be named here. When all is considered, however, those notables, in reality, have only left a record littered with moments of absolute absurdity. That record might break their own hearts, if they ever took a look over their shoulders. In developing their attacks on Trump, his adversaries have built whimsy upon whimsy, fantasy upon fantasy. One stunt that became quite popular was to make an angry insinuation of Trump’s guilt in one thing or another, and attach the pretense of knowing a lot more about the matter which they would reveal later, in an childlike effort to puff themselves up. Ita durus eras ut neque amore neque precibus molliri posses. (You were so unfeeling that you could be softened neither by love nor by prayers.)

Of the many accusations, the worst was the claim, proffered with superfluity, that Trump and his 2016 US Presidential Campaign were somehow under the control of the Russian Federation and that he was the Kremlin’s spy. The entire conception, which developed into much more than a nasty rumor, a federal investigation to be exact, was daylight madness. (It is curious that anyone would be incautious enough to cavalierly prevaricate on hypothetical activities of the very dangerous and most ubiquitous Russian Federation foreign intelligence services in the first place.) Before the matter is possibly billowed up by Trump’s adversaries again in a desperate effort to negatively shape impressions about him, greatcharlie has made the humble effort to present a few insights on the matter that might help readers better appreciate the absolute fallaciousness of the spy allegation.

With regard to the yarn of Trump as Russian Federation spy, his adversaries sought to convince all that they were comfortable about accusing Trump of being such because they had the benefit of understanding all that was necessary about the tactics, techniques, procedures, and methods of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU, and, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB. However, it was frightfully obvious that the whole subject was well outside the province of those self-declared experts. Whenever they made statements concerning how Russian Federation foreign intelligence services operated, no doubt was left that they did not have a clue as to what they were talking about. It actually appeared that everything they knew about it all was gleaned from James Bond and Jason Bourne films, as well as streaming television programs about spying. That fact was made more surprising by the fact that Members of both chambers of the US Congress who were among Trump’s political adversaries actually can get facts about how everything works through briefings from the US Intelligence Community. They even have the ability to get questions answered about any related issue by holding committee hearings. Those on the House and Senate Intelligence Committees, in particular, can get themselves read-in on a good amount of available intelligence on an issue. The words and actions of many political leaders leaves open the real possibility that they were intentionally telling mistruths about Trump with the goal of deceiving the US public. That would simply be depraved and indefensible. As one should reasonably expect, there are stark differences between the banal amusements of Hollywood and the truths about spying.

Imaginably as part of their grand delusion, Trump’s adversaries would claim the reason why Russian Federation foreign intelligence would want to recruit him would be to establish an extraordinary, unprecedented level of access to, and influence upon, US policymaking, decisionmaking, and top secret information. In considering how Russian Federation foreign intelligence senior executives and managers would likely assess Trump as a recruitment prospect, purely out of academic interest, one of the first steps would be a genuine examination of his traits. Among the traits very likely to be ascribed to Trump that would obviate him as an intelligence recruitment target would include: his extroverted personality; his gregarious, talkative nature; his high energy; his desire to lead and be in command at all times; his oft reported combustible reactions to threats or moves against him, his family, or their interests; his strong intellect; his creativity; his curious, oftentimes accurate intuition; his devotion to the US; and his enormous sense of patriotism. To advance this point furthrr, if Russian Federation foreign intelligence senior executives and managers were to theoretically ruminate on just these traits while trying to reach a decision on recruiting him, they would surely conclude that an effort to get him to betray his country would fail miserably. Indeed, they would very likely believe that an attempted recruitment would more than likely anger Trump. They would also have good reason to fear that he would immediately contact federal law enforcement and have the intelligence officers, who approached him, picked up posthaste. If any of the lurid negative information that his adversaries originally alleged was in the possession of the Russian Federation intelligence services–all which has since been totally debunked–were used by Russian Federation intelligence officers to coerce him, Trump might have been angered to the point of acting violently against them. (This is certainly not to state that Trump is ill-tempered. Rather, he has displayed calmness and authority in the most challenging situations in the past 4 years.) Whimsically, one could visualize Russian Federation intelligence officers hypothetically trying to coerce Trump, being immediately reported by him and picked up by services of the US Intelligence Community or federal law enfiecement, and then some unstable senior executives and managers in Yasenevo would go on to publicize any supposed embarassing information on him. That would surely place the hypothetical intercepted Russian Federation intelligence officers in far greater jeopardy with the US Department of Justice. They could surrender all hope of being sent home persona non grataCorna cervum a periculis defendunt. (Horns protect the stag from dangers.)

Perhaps academically, one might imagine the whole recruitment idea being greenlit by senior executives and managers of the Russian Federation foreign intelligence services despite its obvious deficiencies. Even if they could so recklessly throw caution to the wind, it would be beyond reason to believe that any experienced Russian Federation foreign intelligence officer would want to take on an assuredly career-ending, kamikaze mission of recruiting Trump and “running” him as part of some magical operation to control the US election and control the tools of US national power. As a practical matter, based on the traits mentioned here, no Russian Federation intelligence officer would have any cause to think that Trump could be put under his or her control. Not likely having a truly capable or experienced officer step forward to take on the case would make the inane plot Trump’s adversaries have speculated upon even less practicable. Hypothetically assigning some overzealous daredevil to the task who might not fully grasp the intricacies involved and the nuance required would be akin to programming his or her mission and the operation for failure. (Some of Trump’s adversaries declare loudly and repeat as orbiter dictum the ludicrous suggestion that Russian Federation President Vladimir Putin was his intelligence “handler.” No one in the Russian Federation foreign intelligence mens sana in corpore sano, and as an existential matter, would ever suggest that Putin should involve himself in such an enterprise. The main reason for that being because he is Putin, and that means far more in the Russian Federation than outsiders might be able to comprehend.) One could go even a step further by pointing out that in order to make his adversaries’ notional plot work, Russian Federation foreign intelligence senior executives and managers conceivably involved would need to determine how to provide Trump with plenty tutoring along the way given that Trump had no experience whatsoever with the work involved in the sort complicated conspiracy as his adversaries have envisioned. Such notional work would require the impossible, Trump’s “obedience,” and even more, plenty of covert contact, thereby greatly increasing the chance that any Russian Federation foreign intelligence officers involved would be noticed and caught.

Politically, for Russian Federation foreign intelligence service senior executives and managers, there will always be a reluctance to make new problems for the Kremlin. If proper Russian Federation foreign intelligence officers under this scenario were actually caught attempting to recruit Trump, US-Russian relations would be put in a far worse place than where they were before the theoretical operation was executed. If the matter of recruiting Trump were ever actually brought up at either SVR or GRU headquarters, it would imaginably be uttered only as an inappropriate witticism at a cocktail reception filled with jolly chatter or during some jovial late night bull session with plenty of good vodka on hand. Even under those circumstances, experienced professionals would surely quiet any talk about it right off. Unquestionably, few on Earth could be more certain that Trump was not a Russian Federation operative than the Russian Federation foreign intelligence services, themselves. For the Russians, watching shadowy elements of the US Intelligence Community work hard to destroy an innocent man, the President of the US nevertheless, must have been breathtaking.

Information that may appear to be evidence for those with preconceptions of a subject’s guilt very often turns out to be arbitrary. One would not be going out on shaky ground to suggest that a far higher threshold and a more finely graded measure should have been used by the US Intelligence Community to judge the actions of the President of the US before making the grave allegation that the country’s chief executive was functioning as a creature of a hostile foreign intelligence service. Initiating an impertinent federal investigation into whether the US President was a Russian Federation intelligence based primarily on a negative emotional response to the individual, and based attendantly on vacuous surmisals on what could be possible, was completely unwarranted, could reasonably be called unlawful, and perhaps even be called criminal. Evidence required would imaginably include some indicia, a bona fide trail of Russian Federation foreign intelligence tradecraft leading to Trump. The hypothetical case against him would have been fattened up a bit by figuratively scratching through the dust to track down certain snags, hitches, loose ends, and other tell-tale signs of both a Russian Federation foreign intelligence operation and presence around or linked to him.

To enlarge on that, it could be expected that an approach toward Trump by Russian Federation foreign intelligence officers under the scenario proffered by his adversaries most likely would have been tested before any actual move was made and authentic evidence of that initial effort would exist. Certain inducements that presumably would have been used to lure Trump would have already been identified and confirmed without a scintilla of doubt by US counterintelligence services and law enforcement as such. To suggest that one inducement might have been promising him an election victory, as his adversaries have generally done, is farcical. No reasonable or rational Republican or Democrat political operative in the US would ever be so imprudent as to offer the guarantee of an election victory to any candidate for any local, state, or national office. Recall how the good minds of so many US experts failed to bring victory to their 2016 Presidential candidates, to their 2018 midterm Congressional candidates, and to their 2020 Democratic Presidential candidates. Anyone who would believe that the Russian Federation Intelligence Community would be more certain and better able, to put a candidate into national office in the US than professional political operatives of the main political parties would surely be in the cradle intellectually. Martin Heidegger, the 20th century German philosopher in What Is Called Thinking? (1952), wrote: “Das Bedenklichste in unserer bedenklichen Zeit ist, dass wir noch nicht denken.” (The most thought-provoking thing in our thought-provoking time is that we are still not thinking.)

Trump came to the Oval Office somewhat contemptuous of orthodox ways of doing things in Washington. He referred to those elements of the system in Washington that were shackled to traditional, politically motivated ways of doing things as “the swamp.”  Trump said he would do things his way and “drain the swamp.” To an extent, as US President, that was his prerogative. Trump was new to not just politics in general, but specifically national politics, new to government, new to foreign policy and national security making, and new to government diplomacy. (This is certainly no longer the case with Trump for he has grown into the job fittingly.) For that reason, and as their patriotic duty, directors and senior managers in the US Intelligence Community should have better spent their time early on in Trump’s first term, developing effective ways of briefing the newly minted US President with digestible slices of information on the inherent problems and pitfalls of approaching matters in ways that might be too unorthodox. More effective paths to doing what he wanted could have been presented to him in a helpful way. With enormous budgets appropriated to their organizations by the US Congress, every now and then, some directors and senior managers in the US Intelligence Community will succumb to the temptation of engaging in what becomes a misadventure. If money had been short, it is doubtful that the idea of second guessing Trump’s allegiance would have even glimmered in their heads. Starting a questionable investigation would most likely have been judged as being not worth the candle.

Sir Arthur Conan Doyle’s superlative sleuth, Sherlock Holmes, had occasion to state: “To a great mind, nothing is too little.” It should be noted that Russian Federation foreign intelligence and counterintelligence services almost certainly have kept their ears perked hoping to collect everything reported about the painstaking work of elements of the US Intelligence Community first to prevent, then to bring down, Trump’s Presidency. Indeed, they have doubtlessly taken maximum advantage of the opportunity to mine through a mass of open source information from investigative journalists, various investigations by the US Intelligence Community, the US Justice Department, and varied US Congressional committees, in order to learn more about how US counterintelligence services, in particular, operate. Strands of hard facts could be added to the existing heap of what Russian Federation foreign intelligence and counterintelligence services had already collected about the deplorable enterprise. Previous analyses prepared in the abstract on other matters were also very likely enhanced considerably by new facts. Indeed, Russian Federation foreign intelligence and counterintelligence services very likely have been able to extrapolate, make inferences about, and more confidently conceptualize what was revealed to better their understanding of the activities of the US Intelligence Community in their own country, both past and present. Sadly, that may have helped to pose greater challenges and dangers for US intelligence officers, operatives, and informants.

The illustrious John Milton’s quip, “Where more is meant than meets the ear, “ from “Il Penseroso” published in his Poems (1645), aptly befits the manner in which words and statements are often analyzed in the intelligence industry. When those senior executives and managers formerly of the US Intelligence Community who were involved in the plot against Trump and are now commentators for broadcast news networks, offer their versions of the whole ugly matter on air, there is always something for Yasenevo to gain. Despite the best efforts of those former officials to be discreet during their multiple on air appearances, there have doubtlessly been one or more unguarded moments for each when a furtive tidbit that they wanted to keep concealed was revealed as they upbraided Trump. Moreover, their appearances on air have surely provided excellent opportunities to study those former officials and to better understand them and their sensibilities. Such information and observations doubtlessly have allowed Russian Federation foreign intelligence and counterintelligence services to flesh out psychological profiles constructed on them over the years. (Although it seems unlikely, some could potentially return to government in the future. It has been said that “Anything can happen in cricket and politics.”) Moreover, Russian Federation foreign intelligence and counterintelligence services have also likely been allowed to use that information and observations, to put it in the bland language of espionage, as a means to better understand specific US intelligence and counterintelligence activities that took place during the years in which those errant US senior executives and managers involved in the plot against Trump were in their former positions.

To journey just a bit further on this point, Russian Federation foreign intelligence and counterintelligence additionally had a chance to better examine specific mistakes that they respectively made in their operations versus the US, using revelations from investigations into the plot against the Trump administration. That information would have most likely inspired audits in Yasenevo to better assess how closely its foreign intelligence officers, operatives, and informants have been monitored and how US counterintelligence has managed to see many Russian Federation efforts straight. Whether these and other lessons learned have shaped present, or will shape future, Russian Federation foreign intelligence operations in the US is unknown to greatcharlie. Suffice it to say that there were most likely some adjustments made.

Trump has absolutely no need to vindicate himself concerning the “hoax” that insisted he was in any way linked to the Russia Federation for it is just too barmy. Trump has the truth on his side. Nothing needs to be dressed-up. He has been forthright. Regarding the Russian Federation, Trump has stood against, pushed back on, and even defeated its efforts to advance an agenda against the US and its interests. Those who have tried to suggest otherwise are lying. The normative hope would be that Trump’s adversaries actually know the truth and for their own reasons are acting against it. In Lord Jim, Joseph Conrad wrote: “No man ever understands quite his own artful dodges to escape the grim shadow of self-knowledge.” It seems, however, that Trump’s adversaries, refusing to accept reality, have replaced it with a satisfying substitute reality by which they may never find the need to compromise their wrongful beliefs. In the US, one is presumed innocent until proven guilty, has a right to due process, and upholding the rights of the citizen is paramount. For the most part, US citizens understand these ideas and are willing to defend those rights. As such, there has actually been a very poor reaction among US citizens toward the aggressive posture Trump adversaries have taken toward him. It is still a possibility that in the 2020 US Presidential Election, the outcome will go Trump’s way. Unfortunately, the many abominable, false stories of his wrongdoing will likely stick to him to some degree for some time. Opinionem quidem et famam eo loco habeamus, tamquam non ducere sed sequi debeat. (As for rumor and reputation let us consider them as matters that must follow not guide our actions.)

Russia Tells Iraq It’s “Ready” to Support Fight Against ISIS; But Russia Must Take “Direct Action” in Iraq and Syria for the Sake of Its Own Security

Russian Federation President Vladimir Putin greets members of Directorate “A” of the FSB Special Purpose Center (Alpha Group). Russia has pledged to support Iraq and Syria in the fight against ISIS and other Islamic militant groups. However, the threat to Russian security posed by Russian citizens in those groups makes action by Putin in those countries imperative.

According to a September 26, 2014 NBCNews.com report entitled, “Russia Tells Iraq It’s ‘Ready’ to Support Fight Against ISIS”, Russian Foreign Minister Sergey Lavrov made the pledge to Iraqi Prime Minister Haider al-Abadi on the sidelines of the UN General Assembly in New York that Russia would help support Iraqi in the fight against ISIS. The Russian Foreign Ministry stated through the Itar-Tass state-run news agency that “During the meeting, Lavrov confirmed Russia’s support for Iraq’s independence, territory integrity, and sovereignty.” The Russian Foreign Ministry further stated “Moscow is ready to continue supporting Iraq in its efforts in fighting the terrorist threat, and, first of all, the one from the Islamic State.” On September 19th, Ilya Rogachev, head of the Russian Foreign Ministry’s Department for New Challenges and Threats, told the Interfax news agency that Russia still declines to participate in the US-led effort against Islamic militant groups in Iraq or Syria. However, Russia pledges to continue its aid to Iraq, Syria, and other nations that are fighting terrorists. Indeed, in the form of a sillitude he explained, “The anti-ISIL [Islamic State of Iraq in the Levant used interchangeably with the Islamic State of Iraq and Greater Syria (ISIS)] coalition is not a club party—we do not expect any invitations and we are not going to buy tickets.” Apparently, the Russian government has not amended its position even though the first round of US-led airstrikes on Islamic militant groups that began on September 23rd obviated its contention that the air strikes would be used as a pretext to attack the armed forces or any other elements of Syrian President Bashar al-Assad’s regime. The air strikes actually hit a range of target including leaders, command and control centers, communications facilities, training camps, and supply depots of the Islamic State of Iraq and Greater Syria, the Al-Qaeda linked Khorasan Group, and its parent organization, the Al-Nusra Front. While the US executed the majority of the strikes from bombers, fighters, cruise missiles, and drones, the United Arab Emirates, Saudi Arabia, Jordan, Bahrain, and Qatar in the second and third wave of attacks in the strike formation and through reconnaissance flights. The US began air strikes against ISIS in Iraq on August 8th.

The Khorasan Group, a collection of seasoned Al-Qaeda operatives, that the West feels poses a direct threat to targets in Europe and the US, should be of particular interest to Russia. Its members include several fighters from Chechnya, as well as Pakistan, Afghanistan, and Yemen are included among its members. Khorasan’s leader, Muhsin al-Fadhli, fought against Russian forces in Chechnya and was trained there in the use of firearms, anti-aircraft weapons, and explosive.

Since the initial days of the Syrian conflict, Russian Federation President Vladimir Putin made it clear that he had no plans to intervene on the ground in Syria with Russian forces. At the same time, he made it clear last year that he was following the movement of Russians and Europeans to Syria very closely, and was concerned about their capabilities and possibilities for action against Russia. Surely, the conscience of the Russian people has been struck while watching the Islamic militants move through Syria as well as Iraq. Some may recall the ruthlessness of Nazi forces in the rear areas as they moved through Russia during World War II. Unlike some Western countries, Putin has not been compelled to respond with force to the anguish and outrage of Russian citizens, after witnessing a public execution of a Russian citizen by extremist Islamic militants in Syria or Iraq. Putin wants Russia to look strong, but sitting on the sidelines and relying on the US to manage the entire situation does not allow Russia to look strong. Interestingly, standing aside practically amounts to a conceit that US leadership and support for countries, militarily, financially, or politically can ensure positive things are accomplished internationally, and that the importance of the US is unmatched on the world stage. That is precisely the perspective of the US that Putin has tried so hard to knock down in speeches and published statements. It is also a gamble. ISIS, the Al-Nusra Front, and its off-shoot, Khorasan pose a genuine threat to the Russian homeland. They have declared that. Only force will have a sustained impact and strong educational effect on these groups. Some of Putin’s advisers may counsel that using force in Iraq and Syria would prove ineffective and pointless. Others may reject the idea fearing Western condemnation and retribution over unilateral intervention by Russia. Yet, if a search and destroy operation by Russian military or other security organizations against Russian elements in Islamic militant groups in Iraq and Syria will make Russia more secure, it should be undertaken. Virtus tentamine gaudet! (Strength welcomes the challenge!) 

Russia and Islamic Militant Groups

Putin has been continuously engaged in an effective fight against Islamic militant groups in Russia. Counter-terrorism has been a key aspect of Russia’s national security policy for many years due in great part to longstanding security problems the government has faced from the Islamic insurgency near the Caucasus Mountains. The insurgency, organized into a loose alliance of rebel groups known as Imarat Kavkaz (Caucasus Emirate), has been simmering more than a decade after it drove separatists from power in the North Caucasus province of Chechnya during Putin’s first term. They seek to carve an Islamic state out known as the Chechen Republic of Ichkeria from a swath of southern Russia. That group posed the greatest threat to the Olympic Games in Sochi.

The possibility that Russian fighters from these groups that have fought in Iraq and Syria may return home to engage in terrorist activities remains one of Putin’s greatest concerns. Back in June 21, 2013, at a conference in St. Petersburg, Russia, Putin made the claim that 600 Russians and Europeans were within the Syrian opposition fighters’ ranks. While the US and European intelligence services expressed concern over the viability of vetting Syrian opposition fighters to discover who among them are Islamic militants, the Russian intelligence service apparently already possessed files on the identities of a considerable number of Syrian opposition fighters. The London-based International Centre for the Study of Radicalization estimates that the number of Russian fighters in Islamic militant groups in Iraq and Syria, including those in the field now and those that have returned home, is around 800. Putin has not provided any new estimates publicly. 

In his September 11, 2013 New York Times Op-Ed, Putin discussed the danger posed to international peace and security by Islamic militant groups in Syria. Putin explained, “There are few champions of democracy in Syria. But there are more than enough Qaeda fighters and extremists of all stripes battling the government. The United States State Department has designated Al-Nusra Front and the Islamic State of Iraq and the Levant, fighting with the opposition, as terrorist organizations. This internal conflict, fueled by foreign weapons supplied to the opposition, is one of the bloodiest in the world. Mercenaries from Arab countries fighting there, and hundreds of militants from Western countries and even Russia, are an issue of our deep concern. Might they not return to our countries with experience acquired in Syria? After all, after fighting in Libya, extremists moved on to Mali. This threatens us all.”

Taking Action

Assad and Abadi would most likely give their consent for Russia to conduct operations in their countries and provide Russia valuable support in its efforts. Finding Russian citizens in Iraq and Syria among reportedly over 30,000 fighters of ISIS may be akin to finding a needle in a haystack. Yet again, the potential benefit of thwarting potential attacks in Russia by extremists Islamic militants underscores the efficacy of such an undertaking. Given the degree of difficulty involved, Russia should use special forces units from the Federal’naya sluzhba bezopasnosti Rossiyskoy Federatsi (Federal Security Service) or FSB, Directorate “A” of the FSB Special Purpose Center (Alpha Group) and Directorate V of the FSB Special Purpose Center (Vympel) groups. Russia could also employ Zaslon (Barrier), a special services group of the Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Of the many special service groups established in Russia, Alpha Group and Vympel are the most well-known and respected. Alpha Group, an elite stand alone sub unit of Russia’s special services, is a dedicated counter-terrorism task force of the FSB. It primarily prevents and responds to violent acts in public transportation and buildings. Vympel is officially tasked with protecting Russia’s strategic installations, however it is also available for extended police duties, paramilitary applications, and covert operations in Russia or abroad. The profile and capabilities of both units have increased, and they have taken over and consolidated roles and personnel from other organizations. Over many years, Alpha Group has acquired a reputation for using ruthless methods in response to terrorist acts. Zaslon has not been publicly recognized by the Russian government. Zaslon personnel are said to be former spetsnaz troops and serve under the sole command of Foreign Intelligence Service (SVR) headquarters in Yasenevo, on the outskirts of Moscow. In his book Russian Security and Paramilitary Forces Since 1991 (Osprey, 2013), Mark Galeotti, of NYU’s Center for Global Affairs, explains that Zaslon has been linked with everything from assassinations abroad to gathering up documents and technology that the Russian government did not want the US to seize when Baghdad fell. In Syria, Galeotti suspects Zaslon may be providing additional support for Russian military and diplomatic personnel, and is likely already earmarked to extract people, documents, or technologies Russia would not want to share if Syrian President Bashar al-Assad’s regime began to collapse.

Air strikes should continue to disperse ISIS fighters as they try to avoid certain death from US bombs and cruise missiles. Perhaps operating as mixed “combined special groups” (svodnye spetsialnye gruppy (mixed special groups) or SSGs, Russian special operations forces could go into ISIS and Al-Nusra Front controlled areas and kill Russian elements or when the opportunity presents itself, collect prisoners. If ordered by Putin to present a plan for such an operation, senior Russian special services’ planners will more than likely produce something that displays a high level of acumen and creativity, utilizing advanced technologies in a manner that neither analysts nor the potential opponent could foresee. In Syria, for example, Russia special services’ efforts might entail some of the following steps. Russian special services should exploit all of its intelligence surveillance and reconnaissance capabilities to assist in locating rouge Russian elements on the ground in Syria. FSB and other Russian intelligence and security services apparently already possessed files on the identities of Russians who have traveled to Syria. Support from FSB operating in areas of Russia from which the suspected nationals originate will also support Alpha Group, Vympel, and Zaslon operations. With assistance from the Syrian military intelligence services, Mukhabarat, Russian special services could interact with Syrian citizens to collect granular information on the Islamic militant groups including the size of specific units, the locations of its fighters, the backgrounds of individual fighters and commanders, unit capabilities, and its combat and nonlethal resources. Russian special services may benefit from liasing with elements of the Iranian Revolutionary Guards Corps’ Quds Force. From that work, an effective operational plan can be developed. Russian special reconnaissance and electronic surveillance means would be used to monitor the locations, daily movements, and activities of the hostile Islamic militant groups. Leaders, arms, supply lines and depots, and financial support would be targeted. All entry points of Islamic militants could be identified and placed under special reconnaissance and electronic surveillance. Penetrating the Islamic militant groups, if Russia’s SVR has not already done so, would unlikely be helpful and would place any assets engaged in that effort at risk, especially once direct action is taken against those groups. All of that would be done while trying not to cross paths with US-led air assets.

Eventual strikes against Russian targets in the Islamic militant groups must be executed swiftly and covertly. Retired US General Stanley McChrystal, former commander of the US Joint Special Operations Command, has offered hints on how to exploit situational awareness which were summarized in the January 7, 2014 greatcharlie.com post entitled, “Obama, Putin discuss Olympics Security in Call; Putin Has Got It Covered and He Will Keep His Promise to the Terrorists, Too!” When striking at a terrorist group’s network, the goal is to paralyze its nervous system. Hitting it intermittently, or every other night, allows the opponent to become stronger, having become accustomed to resurrecting itself. However, McChrystal explains that if you strike at enough targets simultaneously, taking down key leaders, the group will be thrown into chaos and confusion and have a difficult time “regenerating.” That will allow for decisive effects.

Units also can be better utilized as a result of excellent situational awareness. As McChrystal explained “Traditionally, if we did a raid and we thought we were going to need 20 commandos, to actually be on the target, we might take 120, because we had to put security around the site to protect it from enemy reinforcements, and we might have to put a support section and a command and control section there because you need all those things to account for the unexpected. But when you have very good situational awareness and good communications, you only send the 20, because your security comes from being able to see, and then you can maneuver forces if you need them. So suddenly, the 120 commandos aren’t doing one raid; their doing six raids, simultaneously, and you start to get the ability to do 300 raids a month.”

To speed the process and achieve a high level of success, the Russians could adapt a form of “find, fix, finish, exploit, and analyze” (F3EA) developed by McChrystal. Under the concept, security forces would understand who or what is a target, locate it, capture or kill it, take what intelligence one can from people and documents, analyze that, then go back out execute the same cycle again. If Russian security services want to act at a speed as fast as US special operators in Iraq under McChrystal ‘s command, decision-making would need to be de-centralized because of the high number of raids. Subordinate elements must be allowed to operate quickly. It is very likely that FSB has been using sophisticated technical means to monitor the movements and activities of individuals and groups, likely to engage in terrorist acts, has been on-going. Such surveillance efforts could also be used to develop leads for the operation.

Assessment

On September 11, 2014, US Secretary of State John Kerry stated on a Voice of America radio broadcast that the administration of US President Barack Obama was disappointed by Russia’s initial reaction to the president’s speech on ISIS, which indicated the group represented a direct threat to Russia itself. Kerry explained in his view Russia must join the international fight against ISIS. Prompting by the Obama administration will unlikely cause Putin change his position and join the multinational effort against Islamic militants groups in Iraq and Syria. Indeed, it would more likely cause him to turn away from it. Yet, clear headed, practical choices must be made on Iraq and Syria in the Kremlin. As a result of US-led air strikes, there are opportunities being created for Russia in Iraq and Syria to enhance its security. Putin, his military commanders, and senior security officials know the capabilities of specific individuals and units in Russia, the effectiveness of their weapons systems, and what the real possibility for success of any given operation would be. They must also recognize the real possibility for success in enhancing Russia’s security if Russian special services acted in Iraq and Syria against Russian targets.

Of course, if Putin targeted Russian members of Islamic militant groups in Iraq and Syria, he would be contributing immensely to the international effort against those groups. Indeed, in addition to the Chechen members of Khorasan, a number of the senior leaders of ISIS are Chechen. An ethnic Chechen named Omar al-Shishani is one of ISIS’ most prominent commanders and at one point was the face of the group. Putin demands that Russia should be recognized as a world power, but Russia also must act in a manner consistent with that title. While he has shown a willingness to intervene in the former Soviet republics bordering Russia, Putin has certainly not had Russian forces gallivanting outside of its region, attempting to secure Russian interests. Taking action in Iraq and Syria as proposed here would be more about establishing Russia’s security than posturing. Yet, as result of the action, Putin would demonstrate not only to the Russian people, but to the world, he is a leader who is able to respond effectively to security issues. Putin would be able to show the Russian people and the world, that Russia is a global power.

Putin Vows to Annihilate Terrorists, But Until the Winter Olympics Are Over, Other Steps Must Suffice

For Russian President Vladimir Putin, the 2014 Winter Olympics Games in Sochi will provide an excellent opportunity to showcase his resurgent Russia in the best light possible.  However, much has happened to prevent that goal from being achieved. Within Russia, concerns have mounted over the cost for hosting the Olympic Games, with some estimates stating it has surpassed $50 billion.  Outside of Russia, there has been a significant, negative reaction to Putin signing a law in June 2013, banning “propaganda of nontraditional sexual relations” and imposing fines on those holding gay pride rallies.   Several world leaders have responded by declining to attend the Games, including US President Barack Obama, whose relationship with Putin remains less than congenial.  However, both in Russia and worldwide, all with interest in the Games, are concerned with security at the event given the most recent terrorist attacks in Volgograd, some 690 km northeast of the Sochi Olympic Park.  Of all of the issues that have arose, Putin has been most responsive to the attacks.  In his televised New Year address, Putin stated, “We will confidently, fiercely and consistently continue the fight against terrorists until their complete annihilation.”  For the Russian people, any statement less forceful than that from Putin would have been unexpected and unacceptable.  There is an issue, however, over the degree to which Putin will actually retaliate for the attacks.  Moreover, it is uncertain that any action against the terrorist group allegedly responsible will prevent new attacks before or during the Games.  Perhaps a key factor in the organization of a significant response by the Russian government is timing.

There were two terrorist attacks in Volgograd in December 2013.  On December 29th, a suicide bomber detonated explosives inside a crowded railway station, killing at least 17 and wounding many others.  On December 30th, another bomber detonated explosives on an electric trolleybus, killing 14 and critically wounding several more.  An Investigative Committee spokesperson stated identical explosives were used in both bombings, establishing a link between them.  The attacks in Volgograd came on top of a number of other terrorist enumerated by the Russian law enforcement officials in the North Caucasus Federal District and the Southern Federal District.  Volgograd was also targeted in October 2013 when a suspected female suicide bomber killed six people on a bus.  While nobody claimed responsibility for the December attacks either through a message or manifesto to authorities, the violence underscored Russia’s vulnerability to insurgents more than a decade after it drove separatists from power in the North Caucasus province of Chechnya during Putin’s first term.  The insurgents suspected, from the group Imarat Kavkaz (Caucasus Emirate), say they are fighting to carve an Islamic state out known as the Chechen Republic of Ichkeria from a swath of southern Russia that includes Sochi.  In a video posted online in July, the group’s Chechen-born leader, Doku Umarov, called for “maximum force” to prevent Russia from staging the Games.

While the Games will go on as planned and nations will send their teams to compete, the Volgograd attacks have still had a strong effect on the psyche of the Russian people and on Putin himself.  Given the increased sense of patriotism and nationalism found among the Russian people, most are proud of the fact the Games are being held in Russia and are hoping for a successful event.  However, those hopes have been moderated by fears that more attacks will occur before the Games start.  They are relying on Putin’s reputation for being a strong leader and very capable of responding firmly on security issues.  They are relying upon him to guarantee the Games will be a glorious occasion for them.  Putin, himself, is certainly unintimidated by terrorists from Russia or anywhere else.  However, having dedicated a great amount of government resources, especially from the security services, to the Games, and being fully aware of his reputation as a strong leader, for Putin, the attacks were a personal affront.  The attacks appear to discredit his effort to prove Russia is on the rise again and suffering the fate of lesser states.  For that, he will be unforgiving.  With the leaders of other world powers absent, at Sochi, Putin would have the spotlight to himself on the world stage.   What a tragic figure Putin would be, if he had to stand alone at the Olympic Park, explaining a devastating terrorist attack.

Under the circumstances, Putin must thoroughly respond to the attacks.  To some degree, the security services have acted.  When cars, stores, homes, and marketplaces are bombed, Russian Interior Ministry (MVD) and Federal Security Service (FSB) troops surround the homes of suspected militants and pull them out for arrest.  It has been said that those troops have bombed homes when relatives have refused to turn suspects over.  After the Volgograd attacks, 4000 policemen were dispatched to Volgograd, placing over 5,200 on the ground for what Russian authorities called an “Anti-Terrorism Whirlwind.”  Over 1,500 buildings were searched and more than 1,000 people were searched.  Several dozen have been detained for resisting arrests for not having documents allowing them to carry weapons.  The internal troops (VV) of the Ministry of Interior have already been heavily engaged in operations in North Caucasus.  Those VV units that genuinely conduct operations are from the ten Independent Special Designation Brigades (OBrON).  These specialized forces fight local rebels and control protests.  The short-term, specific operations OBrON carry out differentiate the VV forces from the regular army, which is trained and equipped to fight long-term conflicts.  Such services provided by the VV are not without cost.  Whenever people have been arrested and interrogated, policemen are often killed in retaliation.

Putin is dedicated to preventing any further terrorist attacks.  It is uncertain that any response against the group allegedly responsible will prevent future attacks before or during the Games.  The raids undertaken, although significant, were not as robust as might have been expected given the likely desperation and paranoia felt among security service officials over a possible Sochi attack.  However, federal district wide, large scale operations weeks before the Games will mar them, and erase any impression that Sochi is safe to visit.  Putin’s entire investment of Russia’s resources would be wasted.  Moreover, a full-scale attack upon terrorist groups now may lead to a full-scale nihilistic response from them.  That type of conflict, regardless of whether Russian authorities might destroy the terrorist groups in the process, could lead to a drastic decision by the International Olympic Committee to cancel, postpone, or relocate the Games.

It is very likely sophisticated technical means to monitor the movements and activities of individuals and groups, likely to engage in terrorist acts, has been on-going.  Hitting those groups may disrupt those monitoring efforts, by destroying leads before they yield their potential. That would be counter-intuitive.  Losing lines into to those groups now would create major security problems.  (If the attackers in Volgograd were completely off the radar, that likely created a conundrum for Russian security officials.  The attackers operations would have been pre-planned.  They would have been set up to move independently on specific dates, times, and locations without the communication of orders.  To defeat such attacks, anti-terrorism efforts must peak just before the Games begin and remain heightened until they end to defeat lone operatives.)

A better time for the security services to strike against suspected terrorist groups would be just days before the opening ceremonies or during Sochi.  Communications must be destroyed or disrupted.  There must be confusion and chaos within the leadership.  The groups must stand rudderless.  The strikes must be of sufficent strength to prevent the groups from resurrecting themselves enough to conduct any operations during the Games.  Strikes of this nature would likely be executed swiftly and covertly against terrorist elements being monitored.  Very capable special service troops would most likely be called upon to carry out such a task.  Of the many special service groups established in Russia, the most well-known and respected are Directorate “A” of the FSB Special Purpose Center (Alpha Group) and Directorate V of the FSB Special Purpose Center (Vympel).  Alpha Group, an elite stand alone sub unit of Russia’s special services, is a dedicated counter-terrorism task force of the FSB.  It primarily prevents and responds to violent acts in public transportation and buildings.  Vympel is officially tasked with protecting Russia’s strategic installations, however it is also available for extended police duties, paramilitary applications, and covert operations in Russia or abroad.  The profile and capabilities of both units have increased, and they have taken over and consolidated roles and personnel from other organizations.  During the Soviet era, Alpha Group acquired a reputation for using ruthless methods in response to terrorist acts.  In Hezbollah: The Global Footprint of Lebanon’s Party of God (Georgetown University Press, 2013),  Matthew Levitt recounts different versions of how Soviet authorities used Alpha Group in response to the 1985 kidnappings of four Soviet diplomats in Beirut, Lebanon.  After one of the Soviet hostages was shot and dumped near a stadium in West Beirut, Alpha Group sought the help of Druze informants to identify the kidnappers, their clans, and their families. One account has Alpha Group kidnapping a relative of the hostage taking organization, cutting off his ear, and sending it to his family.  In another account, Alpha Group abducted one of the kidnapper’s brothers and sent two of his fingers home to his family in separate envelopes.  A third version has Alpha Group kidnapping a dozen individuals tied to the kidnapping group, one of them being a relative of its leader. The relative was castrated, shot in head, had his testicles stuffed in his mouth, and shipped to the group with a letter promising a similar fate for the eleven other captives if the Soviet hostages were not released.  That same evening, the three diplomats, in bad condition, appeared at the gates of the Soviet embassy.

There is also the possibility that Russian authorities may utilize their most capable assets in response to the terrorist attacks.  In his book Russian Security and Paramilitary Forces Since 1991 (Osprey, 2013), Mark Galeotti of NYU’s Center for Global Affairs discusses Zaslon (Barrier), a special services group not officially recognized by the Russian government.  Zaslon personnel are said to be former spetsnaz troops and serve under the sole command of Foreign Intelligence Service (SVR) headquarters in Yasenevo, on the outskirts of Moscow.  Galeotti explains that Zaslon has been linked with everything from assassinations abroad to gathering up documents and technology that the Russian government did not want the US to seize when Baghdad fell.  In Syria, Galeotti suspects Zaslon may be providing additional support for Russian military and diplomatic personnel, and would likely be ordered to extract people, documents, or technologies Russia would not want to share if Syrian President Bashar al-Assad’s regime began to collapse.  As part of Putin’s full court press on security for Sochi, Zaslon has likely already been included among those special services units called in to provide both anti-terrorism and counter-terrorism capabilities.  An outstanding scholar at the University of Utrecht, Ralph Ladestein, shared a picture with greatcharlie.com in November 2013 that, as he explained, showed Russian special service troops in Syria.  The picture is below.

Are these Zaslon troops operating in Syria? The message written on the wall of the structure in the background (translated by Ladestein) reads, “Syria for Assad!”

By the end of the Games, it is possible that so much information will have been gathered as a result of the concentration of security resources to the anti-terrorism effort that new, more effective operations against terrorist groups could simply be conducted by MVD and FSB.  Necessity could lead to the consideration of innovative approaches toward blunting the capabilities of the terrorists perhaps by using precision strikes with military firepower and directed attacks by special service troops.  Some new ideas may come as a result of Russian security officials working closely with foreign security officials from participating states.  After examining the situation in the North Caucasus, those foreign security officials may likely offer suggestions on how lessons from their own experiences in counter-terrorism to could be applied to reduce or defeat any security threats.  Additionally, with the Games over, Putin will have the flexibility to respond to the terrorists on a far larger scale if he chooses

If after the closing ceremonies, Sochi is known for being the Black Sea resort on the edge of the Caucasus Mountain range where the 2014 Winter Olympic Games were superbly organized, the Russian people will be very satisfied.  If after the Games, an impressed world audience has a sense that Russia is a world power on the rise again, with great capabilities and possibilities, Putin would be elated.  However, if a terrorist attack is attempted or successfully carried out in Sochi, for Russia, it will be a disaster.  Russia will be viewed as a questionable choice by the International Olympic Committee for the Games and the country’s reputation for being stifled by authoritarianism, insecurity and uncertainty will endure.

Despite personal or political views of Putin and his decisions regarding the Winter Olympic Games, no one should have any interest in seeing Sochi struck by a terrorist attack.  Anti-terrorism and counter-terrorism by the Russian security services should be supported by all states, including the US.  While security officials of the US, EU, and other countries may liaise and provide some assistance, everything possible should be done to prevent an attack, including the supply of personnel and technical resources.  A secure and successful event would not only be in Russia’s interest, but also the transnational interest.