vimarsana.com

General at the office of the Deputy Attorney general where he oversaw investigations conducted by the dojs Law Enforcement agencies. In 2003, president george w. As theminated mr. Wray assistant attorney general for dojs criminal division, where he oversaw major investigations in the domestic and International Criminal activities. The dojsersaw counterterrorism Counter Intelligence and export control sections. In they was instrumental dojs efforts to combat terrorism, cyber crime, and espionage. Today, he joins us to discuss chinas ongoing efforts to interfere in the United States Domestic Affairs through espionage, disinformation campaigns, intellectual property theft, and monetary theft. It is my pleasure to welcome director wray to the Hudson Institute. [applause] mr. Wray thank you. Good morning, everybody. I realize it is challenging under the current circumstances to put on an event like this. I am grateful to the Hudson Institute for hosting us today. The greatest longterm threat to our nations information and intellectual property and to our Economic Vitality is a counterintelligence and economic espionage threat from china. It is a threat to our Economic Security and, by extension, to our National Security. As National Security advisor obrien said in his recent remarks, we cannot close our eyes and ears to what china is doing. Today, in light of the importance of this threat, i will provide more detail on the chinese threat than the fbi has ever presented in an open forum. Significantis so that the attorney general and secretary of state will also be addressing a lot of these issues in the next few weeks. But if you think these issues are just an intelligence issue, or a government problem, or a nuisance largely for big corporations who can largely take care of themselves, you could not be more wrong. It is the people of the United States who are the victims of what amounts to chinese theft on a scale so massive that it represents one of the largest transfers of wealth in human history. Are an american adult, it is more likely than not that china has stolen your personal data. 2017, the Chinese Military conspired to hack equifax and made off with sensitive personal information of 150 million americans, we are talking nearly half of the american population, and most american adults. As i will discuss in a few moments, this was hardly a standalone incident. Our data is not the only thing at stake here. So is our health, our livelihoods, and our security. We have now reached the point where the fbi is opening a new chinarelated counterintelligence case about every 10 hours. Of the nearly 5000 active fbi counterintelligence cases currently underway across the country, almost half are all related to china. At this very moment, china is working to compromise American Health care organizations, pharmaceutical companies, and academic institutions, conducting a central covid19 research. Me be clear. N, let this is not about the Chinese People and certainly a not certainly not about chinese americans. Every year, the United States welcomes more than 100,000 Chinese Students and teachers into this country. People who have journey to china from the United States secured blessings of liberty for themselves and their families and our society is better for their contributions. When i speak of a threat from china, i mean the government of china and the Chinese Communist party. Threat andnd this how we must act to respond to it, the American People should remember three things. First, we need to be clear eyed about the scope of the Chinese Governments ambition. China, the Chinese Communist party, leaves it is in a generational fight to surpass our country in economic and technological leadership. That is sobering enough, but it is waging that fight not through legitimate innovation, not through fair and lawful competition, and not by giving their citizens the freedom of thought and speech and creativity that we treasure here in the United States. Instead, china is engaged in an effort to become the worldss only superpower by any means necessary. The americaning people need to understand is diverse ranges a of sophisticated techniques. Everything from cyber intrusions to corrupting trusted insiders. They even engage in outright physical threats, and they pioneered an expansive approach to stealing information through a wide range of actors. Including not just chinese intelligence services, state owned enterprises, private companies, certain kinds of graduate students and researchers, and a whole variety of other actors working on their behalf. And surpassts goals america, china recognizes it needs to make leaps in cutting edge technologies. But the sad fact is instead of og ofing in the hard sl innovation, china often steals and uses it to compete with the American Companies it has victimized. They are targeting research on everything from military equipment, wind turbines, rice and corn seeds, through its talent recruitment programs like the socalled thousand Talents Program, the chinese try to entice scientists to bring our knowledge and innovation back to china, even if that means stealing proprietary information or violating our export controls and conflict of interest rules. Scientist, a of a , anese national and american lawful permanent resident. He applied to the China Thousand Talents Program and stole more than 1 billion worth of trade secrets from his former employer. In oklahoma based company. He got caught. A few months ago, he was convicted and sent to prison. There is the case of a texasbased scientist, also sent to prison earlier this year. Told secrets regarding a phone, an important piece of knowledge in submarines. To the thousand Talents Program, to absorb the Relevant Technology in the United States. Chinesehis on behalf of state owned enterprises, which ultimately planned to put the American Company out of business and take over the market. In one of the more galling and egregious aspects of the scheme, conspirators actually patented in china the very manufacturing process they had stolen and then offered their victim American Company a joint venture using its own stolen technology. We are talking about an American Company that spent years and developing dollars that technology, and china could not replicate it, so instead, it paid to have it stolen. Was two weeks ago, another convicted of espionage, trade secrets, in conspiracy for Trading Proprietary information about devices two u. S. Companies. Spent those companies has over 20 years developing the technology he stole. These cases were among more than 1000 investigations the fbi has into chinas actual and attempted theft of american technology, and that is not even talking about the more than 1000 other ongoing counterintelligence investigations of other kinds related to china. We are conducting these kinds of investigations in all 56 of our field offices. Over the past decade, we have seen economic espionage cases with a link to china increased by approximately 1300 . ,he stakes could not be higher and the potential economic harm to american businesses and the economy as a whole almost defies calculation. Advisornal security obrien discussed in his remarks, the Chinese Government is also making liberal use of hacking to steal our corporate and personal data, and they are using both military and nonstate hackers to do it. Intrusion i mentioned just a few moments ago, which led to the indictment of Chinese Military personnel, was hardly the only time china stole the sensitive personal information for future numbers of the american public. For example, did any of you have Health Insurance through anthem or one of its associated insurers . In 2015, chinas hackers stole the personal data of 80 million of that companys current and former customers. Or maybe you are a federal employee or used to be one, or you applied for a government job once, or a Family Member or roommate did. 2014, chinas hackers stole more than 21 million records from the federal Government Office of personnel management. Why . First, china has made becoming an Artificial Intelligence world leader a priority, and these kinds of thefts feed right into chinas development of Artificial Intelligence tools. But compounding the threat, the data china stole is of obvious value as they attempt to identify people for secret intelligence gathering. On that front, china is using social media platforms, the same ones americans use every day to , to connected or find jobs identify people with access to Sensitive Information and then target those people. Those people to try to steal it. One example. A chinese Intelligence Officer posing as a headhunter on a popular social media platform recently offered an american citizen a sizable sum of money socallede for Consulting Services. Sounds benign enough until you realize those Consulting Services were related to Sensitive Information the American Target had access to as a u. S. Military intelligence specialist. That particular tale has a happy ending. The american citizen to the right thing, reported the suspicious contact, and the fbi, working together with our armed forces, took it from there. I wish i could say all such incidents and that way end that way. Through talent recruitment programs like the 1000 Talents Program i mentioned moments ago, china pays scientists at american universities to secretly bring our knowledge and innovation back to china, including valuable federally funded research. To put it bluntly, this means american taxpayers are effectively footing the bill for chinas technological development. China than leverages its illgotten gains to undercut u. S. Research institutions and companies wanting our nations advancement and costing american jobs. We are seeing more and more of these cases. Arrested ae, we former researcher with the Cleveland Clinic who worked on malec will or medicine, and the genetics of cardiovascular disease, and a university of arkansas scientist doing research for nasa. Both of these guys were while accepting millions of dollars in american federal grant funding. Month, a former emery pled guiltyrofessor to filing a false tax return for failing to report the income he received through chinas thousand talents plan. While the was while he was researching, he was pocketing a half a million dollars. Department ofrds biology, was indicted last month for making false statements to federal authorities about his thousand talents participate in. United states alleged he stole nih, vard and and the fact through the Wuhan Institute of technology, a 50,000 monthly stipend, more than 150,000 in living expenses, and more than 1. 5 million to establish a laboratory back in china. There is more. Another tool china and the Chinese Communist party used to manipulate americans is what we call malign foreign influence. The traditional foreign influence is a normal, legal, diplomatic activity, typically conducted through diplomatic channels. Influence foreign efforts are subversive, under declared, criminal or coercive attempts to sway our governments policies, distort our public discourse, and undermine confidence in our demo democratic processes and values. In a highlyaged sophisticated, Malign Foreign Influence Campaign, including bribery, blackmail, and covert deals. Bothse diplomats also use open, naked economic pressure, and seemingly independent chinasn, to push preferences on american officials. Just take one all too common illustration. Lets say china gets wind that some american official is planning to travel to taiwan. Think, a governor, state senator, or member of congress. China does not want that to happen because that travel might appear to legitimize taiwanese independence from china and legitimizing taiwan would of course be contrary to chinas one china policy. So what does china do . Thea has leverage over american officials constituents. American companies, academics, and members of the media have a legitimate and understandable reason to want access to chinese partners and markets. Because of the authoritarian nature of chinese commonest party, china has immense power over those same partners and markets. So china will sometimes start by attempted to influence the american official overtly indirectly. China might old openly warned that if an american official goes in and take the trip to taiwan, china will take it out on a company from that officials home state by withholding the license to manufacture in china. That could be economically ruinous for the country and would directly pressure the american official to alter his travel plans and the official would know that china was trying to influence him. Bad enough, but the Chinese Communist party does not stop there. It cannot stop there if it wants to stay in power so it uses its leverage even more prodigiously. If china is more direct, if chinas more direct influence does not do the trick, it sometimes goes to indirect and deceptive efforts. To continue with the lustration of the american official with travel plans that the Chinese Communist party does not like, china will work relentlessly to identify the people closest to that official, the people that official trusts the most. China will work to influence those people to act on chinas behalf as middlemen to influence the official. The coopted middlemen may then whisper in the officials ear and try to sway the travel plan or public position on chinese policy. These intermediaries of course are not telling the american , and some of these intermediaries may not realize they are being used as pawns, because they, too, have been deceived. Ultimately, china does not hesitate to use smoke, mirrors, and misdirection to influence americans. Similarly, china often pushes academics and journalists to self center self sensor if theywant censor to travel. Chinas ambitions regarding hong kong or taiwan. This kind of thing is happening over and over across the United States. I will note that the pandemic has not stopped any of this. We have heard from federal, state, and local officials, that chinese diplomats are aggressively urging support for chinas handling of the covid19 crisis. Yes, this is happening at both the federal and state levels. Not that long ago, we had a state center who was recently even asked to redo introduce a resolution supporting chinas response to the pandemic. The punchline is, all of these seemingly inconsequential measures at up to a policymaking environment in which americans find themselves held over a barrel by the Chinese Communist party. While, chinas government and communist party has brazenly violated norms of the rule of law. 2014, xi jinping has spearheaded a program known as fox hunt. As andescribes fox Hunt International anticorruption campaign. It is not. Instead, it is a sweeping bid by toi he seesetary x as threats. We are talking about political rivals and critics seeking to expose chinas expensive human rights violations. Hunteds of these fox victims that they target live right here in the United States, and many are united american citizens and green card holder. The Chinese Government wants to force them to return to china, and chinas tactics to accomplish that are shocking. For example, when it could not locate one fox hunt target, the Chinese Government sent an emissary to visit the targets family here in the United States. On message they said to pass the target had two options. Return promptly or commit suicide. Happens when foxhound targets refused to return to china . In the past, Family Members here in the United States and in china have been threatened and coerced, and those back in china are even arrested for leverage. I will take this opportunity to note that if you believe the Chinese Government is targeting you, that you are a potential foxhound victim, please reach out to your local Fbi Field Office. Understanding how a nation could engage in these kinds of tactics brings me to the third thing the American People need to remember. China has a fundamentally different system than ours, and it is doing all it can to exploit the openness of ours while taking advantage of its. Wn closed system many of the distinctions that mean a lot here in the United States are blurry or almost nonexistent in china. I am talking about distinction is between the government and the Chinese Communist party, between civilian and military sectors, between the state and the private sector. For one thing, an awful lot of large chinese businesses are state owned enterprises, literally owned by the government and thus the party. Even if they are not, chinese laws allow its government to compel any Chinese Company to provide any information it requests, including american citizens data. On top of that, Chinese Companies of any size are legally required to have communist party cells inside of them to keep them in line. Communist party cells have reportedly been established in some American Companies operating in china as the cost of doing business there. These kinds of features should give u. S. Companies pause when they consider working with chinese corporations like huawei , and they should give all americans pause when relying on such a companys devices and networks. Worlds largest telik medications equipments huawei has brought influence to what if much of what americans do in china. It has been charged in the United States with racketeering conspiracy and has, as alleged in the indictment, repeatedly stolen intellectually intellectual property, obstructed justice, and lied to the u. S. Government and commercial partners, including banks. The allegations are clear. Huawei is a serial intellectual thief, disregarding both the rule of law and the rights of its victims. It certainly caught my attention to read a recent article describing the words of huaweis founder about the companys mindset. A Huawei Recent Development center, he reportedly said to ensure the companysurvival, they need to surge forward, killing as you go, to blaze us a trail of blood. He also reportedly told employees that huawei entered to a state of war. I hope he could not have meant that literally but it is hardly an encouraging tone, given the companys repeated criminal behavior. In our modern world, there is perhaps no more ominous prospect that a hostile foreign andents ability devices. If Chinese Companies like huawei are given unfettered access to our Telecommunications Infrastructure they could collect any of your information that traverses their devices or networks. Worse still, they would have no choice but to hand it over to the Chinese Government if asked. The privacy and due process protections that are sacrosanct in the u. S. Are simply nonexistent in china. The Chinese Government is engaged in a broad, Diverse Campaign of theft and malign influence, and it can execute that campaign with authoritarian efficiency. Are calculating, persistent, patient, and they are not subject to the righteous constraints of an open Democratic Society with a rule of law. China, as led by the Chinese Communist party will continue to try to misappropriate our ideas, influence our policy makers, manipulate our Public Opinion and steal our data. They will use all tools and all sectors and that demands our own all tools and all sectors approach and response. Our folks at the fbi are working their tails off every day to protect our nations companies, universities, computer networks, and our ideas and innovations. Using a broadare set of techniques from traditional Law Enforcement authorities to intelligence capabilities. I will note that we are having real success and with the help of many of our foreign partners we have arrested targets all over the globe. Theinvestigations and resulting prosecutions have exposed the tradecraft and techniques the chinese use, raising awareness of the threat and our industrys defenses. They also show our resolve and our ability to attribute these crimes to those responsible. It is one thing to make assertions, but in our Justice System when a person or corporation is investigated and charged with a crime we have to prove that beyond a reasonable doubt. The truth matters so these criminal indictments matter. We have seen how our criminal indictments have rallied other nations to our cause, which is crucial to persuading the Chinese Government to change its behavior. We are working more closely than ever with Partner Agencies here in the u. S. And partners abroad. We cant do it on our own, we need a whole society response. Thats why we in the intelligence and Law Enforcement communities are working harder than ever to give companies, universities, and the American People the information they need to make their own informed decisions to protect their most valuable assets. Confronting this threat effectively does not mean we should not do business with the chinese. It does not mean we should not host chinese visitors. It does not mean we should not welcome Chinese Students or coexist with china on the world stage. It does mean that when china violates our International Laws and norms we are not going to tolerate it or enable it. The fbi and our partners throughout the u. S. Government will hold china accountable and protect our nations innovation, ideas, and way of life with the help and vigilance of the American People. Thank you for having me. [applause] thank you, director. We will be taking questions from people who were not able to be here today. If you could email any questions you have two events huds on. Org we will be happy to take a look at them. A hudson staff member will look at them and the questions will be collated and we will see if we can get your question to the director. Before that, i have a few of my own. The minds of is on a lot of americans who listen to your talk and hear that china is stealing personal data and their efforts may be intensifying. What would you suggest for americans who are concerned about their own personal Data Security from china or other hostile foreign actors . Dir. Wray i think the American People need to take steps on their own to protect their data. Likeincludes things changing passwords frequently and things like monitoring your Credit History and your account transactions to see if somebody may have stolen your identity. We have a whole bunch of information about that thing on the american on the fbi on the fbi website. How would they find their local Fbi Field Office . Dir. Wray its pretty easy to find online. 1 he said that you said that there has been a trend of increasing Cooperation Among other countries on this. Can you talk about that . Dir. Wray one thing i have found most encouraging in the middle of everything i just finished talking about is the degree of alignment and consensus that seems to be growing between the United States and our foreign partners on this threat. Threat,everity of the the priority of the threat, in terms of working together to combat the threat. I find when i sit down with my foreign partners which i do all the time that this threat, the chinese threat is one of the first things they want to talk about even when it would not necessarily be on my agenda. Happeningsame thing with the business community, with academia, both here in the u. S. And elsewhere. A communist, in country where things often seem so divisive it feels like sometimes people in this country cannot agree on what day of the week it is. On this threat, the chinese threat, on the seriousness, priority, and the need to come together to tackle the threat, i am seeing a level of alignment bipartisanus that is across the public and private sector in academia, and as you noted in your question with foreign partners in a way i have never seen and i think that is good news. This is certainly different from a lot of the narrative that we hear. Do you get any sense that china is targeting the november elections . Do you have any special concerns about that . Chinas Malign Foreign Influence Campaign targets our policies, our 24 73 65 days a year so it is not election specific. Its really more of it all year all the time threat. There are implications for elections and they certainly have preferences to go along with it. One of the issues that you see most chinese influence what are the issues you see the most chinese and owens around . And hean, hong kong, calling out of chinese oppression, human rights, the responseslims, chinese to the covid pandemic. There is a long list of things. The Chinese Government posco and policies, positions, and preferences are known. What is more pernicious as the indirect way to try to shape our policy makers on that threat in ways that the policy makers are not aware of. You mentioned some of those in the talk, can you go beyond that to talk about ways that shyness weeks to assert this kind of influence . If you have a question about whether the chinese use of this or that tactic think about a multiplechoice where the answer is all of the above and you will usually be right. One of the threats we are concerned about is what i would call the more indirect, but equally significant influence through middlemen. Are aample if you governor, state senator, or mayor you are probably sophisticated enough to know that the representative from a Chinese Embassy comes in and tells you you have it all wrong about hong kong and taiwan, to at least be a little bit on your guard and take it with a grain of salt. If that person who comes in and talks to you is someone you have known for years, maybe a prominent donor or some business you have had a relationship in the past, somebody you trust and that person says hey walter, i think you got it wrong on hong kong, you should back off or go back off. If they say someone from the Chinese Embassy told them to say that sure, but thats not what is happening in most in instances. You need to have the information so you as the member of congress universitiesmes to china has a lot of points of leverage from allowing scholars to come visit china which is necessary for some cooperation agreements but also we could add student recruitment. Do you see signs that china tries to orchestrate its various sort of instruments here to move universities to accept certain things . Certainly they look to try to influence academics. We see that quite frequently. We see them try to recruit academics through things like of the thousand talents plan that i described before. I have have things and spoken about this before, better sort of soft power like the confucius institutes that are in a lot of american colleges and universities which are efforts to censor or drive china friendly speech in a decidedly unorthodox way here in the u. S. The good news there is that more and more universities are closing those down, so in some ways that is not a high of a priority as other things i described. These confucius institutes, how do they work . It is an effort to bring students together to ensure that the chinese narrative makes its way into and dominates the conversation on universities. I could be more specific but that would take longer. Lets talk about the business and Technology Security concerns. Are there particular areas where had ae chinese espionage level where they seem to have priorities . As a general rule china has these fiveyear plans and the made in china goal strategy they articulated. If you look at the Industry Sectors that are laid out on that point and strategy you will a less than coincidental coordination with a lot of the properties i was describing. Aviation, health care in the middle of this pandemic, it is not unusual for us to see right after some Pharmaceutical Company or Research Institution makes some significant somencement about Promising Research related to the pandemic, they will start seeing cyber activity facing back to china targeting whatever that institution is, almost the next day. Aviation, health care, robotics, sometimes even agriculture. That is one thing a lot of people dont understand. When i mentioned all 56 of the fbis field offices have investigations of this sort, that is not because we are trying to spread the work around , that is because the threat is all over the country in rural areas and big cities. Fortune 100s down to small startups. Do you have any estimates for how much damage is done to american businesses by this type of espionage . Dir. Wray i dont have an exact number. People are trying to come up with a figure. Every figure i have seen is breathtaking. So billions and not just a few billion. Dir. Wray if you take the case ive mentioned in oklahoma where you had an individual, that is one guy, stealing 1 billion worth of trade secrets from one company and you extrapolate that across the thousand or so investigations i described and they are all particularly in the area of chinese theft of u. S. Technology. Their legislative authority that you dont have that you would like . Well, you have probably never met an fbi director that would not welcome more tools. I will say congress has done a number of valuable things to not that longding the legislative scheme for those who dont know t deals with acquisitions foreign acquisitions in the United States. That is often a place where some of the more Sensitive Information can be compromised through a foreign acquisition. Some of the holes that existed made itscheme before more possible for the National Security community to appropriately collect american information. Some questions coming in from the audience at this point. Asking, how prevalent is the flotsam problem within the u. S. And europe and can you discuss any similar tactics the ccp is conducting . In terms of the prevalence of the fox hunt efforts we have seen hundreds just here in the United States. You could call them targets and victims. Hundreds of individuals that the Chinese Government is trying to reach and coerce. It is also happening in my speech in other countries as well. It is a of the tactics variety of means of coercion. Have situations where they show up and they comment about their Family Members back home in china in a way that is pretty unmistakably threatening. If you use your imagination you will not be far off. Have we been working with other governments to try to counter this . Certainly have worked with a lot of our good foreign partners to compare notes, best practices and so forth to try to combat the foxconn threat. There is another part of coordination that is important. Anone level there is established means there are established processes for foreign Law Enforcement to cooperate with one another. Legitimate Foreign Cooperation happens all the time all over the world. There is a way you do that and you coordinate with Law Enforcement in the country that the person that is in. That is not what fox hunt is. These people are engaged in ,ogue Law Enforcement unsanctioned, uncoordinated with Law Enforcement in the u. S. That really exposes what this is about which is about suppressing dissent and trying to pressure dissidents. Makeat can countries do to this response to chinese questionable conduct more urgent and more of an actual deterrent to china . Dir. Wray the more we can communicate collectively nations around the world that we welcome competition, we welcome academic exchange, we welcome travel, but ipt i theft is not ok. Corporate espionage is not ok. Its about the behavior. The more we can communicate that part of participating in a Global Economy is playing by the rules that other nations played by. Law and to the rule of International Norms that civilized countries respect, the chineseefully the government will adjust its behavior to understand there is a right way to compete and a wrong way to compete. If they keep violating our criminal laws and undermining our National Security they will keep encountering the fbi. Another one the viewers would like to know, whether there is some kind of Global Institutional framework needed to fight this ip theft and Tech Security theft . Beingray that is addressed through a variety of improvement, but there is a long way to go. Nations working together in a bilateral way, but also multilateral. There are international standardsetting bodies of all shapes and sizes that we to some extent and other nations participated in. Nations coming together in those kinds of forms to make clear that there are rules. Thinks that know stealing somebody elses property is ok. Another question. In the recent case of the Chinese National convicted of trespassing at a naval air station, the person was found to be working for the Chinese Ministry of public security, not the ministry of state security or pla intelligence. Has the fbi seen trying to use securitytry of public and intelligence operations in the u. S. Against the u. S. . Dir. Wray the fox hunt effort is more through the mps than it all the thingsla i am describing in my remarks are geared more towards mss than pla. Another viewer would like to know more about chinese interest in agriculture and ip theft there, can you tell us more about what their targets are and how it works . The United States is rightly recognized as the world leader in the agriculture and advanced agricultural techniques. That includes things like genetically modified seeds and Different Things like that. Amount of normas very Sophisticated Research and development that happens in the world of agriculture. Midwest, wes in the have cases in places like kansas, iowa, nebraska, where you had people trying to steal chinese chinese actors trying to steal to bring back to china to essentially reverse engineer some of those things. We hade rice, corn a state where they caught various nonstate actors working on behalf of the Chinese Government basically digging up seeds under the cover of night to steal them. We had another one where they were caught at the airport with seeds in their luggage to try to bring them back. Bulk of thek at the cases the fbi has thus far brought against researchers, most of the vaught are most of the violations ofking at transmission specific research inside ip. How does that universe breakdown . Will use whatever charges we think are the most provable and in some instances we will choose to charge a case a certain way to protect sources and methods. We are trying to take the long view. Variety ofhere are a intellectual property theft type charges, but a lot of the charges i described our about concealment at some level. Underlyingst the theft, it is the concealment of the theft and that is where things that include false statements, false tax returns, and things like that become. Mportant they are concealing their relationship with the Chinese Government, whether it is an American University or american employer. At the end of the day i have high confidence in American Companies, american universities, and the American People if given the right informed,n to make sensible patriotic decisions. When some of these nonstate actors conceal their relationship with the chinese the employers Like Companies and universities cannot make the informed decisions. You have been talking about a whole of Society Approach to the problem in the form of nongovernmental actors in the u. S. The fbi or doj have resources for private sector entities . What would you counsel these entities to do . Dir. Wray in all of our field offices we have established individuals who are entrusted with developing relations with businesses and universities in their area. Private sector coordinators. That is a new feature over the last 10 or 15 years in the fbi and it reflects the degree of partnership that currently is needed and happens between the fbi and the private sector whether it is a business or university. Provide, not we funding, but information. It is information about how they theirke steps to protect information technology, ideas and innovations. We have materials we provide, we answer questions and things like that. I have been to all 56 Fbi Field Offices, and in every single one met of what i have done is with private sector partners in see theates and you can relationship, the partnership that exists. I want to be clear, these are institutions, i am talking private companies and versities they are voluntarily deciding to terminate a relationship to increase their cybersecurity, whatever happens theink that is one of strengths of our system. Fbi, doj,r that the and other federal entities are stepping up their pressure on this are you seeing signs of china changing tactics or pulling back a little . Is any of this having an impact on china . Dir. Wray i think it is having an impact. Whether the impact will be one we have in the long run remains to be seen. China in we have seen some ways be less overt about some of their tactics. Open question as to whether that is progress. Are they hiding it better or holding it back . I think they are starting to get the message without getting into the reasons we know that. We are not going to tolerate violations of our laws. We are coming to a close here. Lot in your speech about the need to keep open channels with china, not for a tax on the Chinese Government, to attacks onver what can we do to keep students and other chinese welcome here even as all of this is going on . Look at it they are targeting our system, our ideas, our innovation in a way you know the saying imitation is the most sincere form of flattery . They envy the success of our system and they should. We are proud of the freedom and environment that we have here. I think it is important to make clear that we are not afraid of competition. We are not afraid of competition over business or ideas. It is about the behavior. The behavior is what has to change. It is about the rule of law at the end of the day. Thank you for joining us today. It has been a terrific session. I have learned a lot in this howging u. S. Consensus over to deal with some aspects of chinese behavior is one of the most striking things we see even in a very divided and polarized moment in american life. Mr. Director, thank you for joining us. Dir. Wray thanks for having me. [applause] [no audio] more live coverage coming up at noon eastern when a House Financial Services subcommittee holds a hearing on the effect of the coronavirus pandemic on jobs. That starts at noon eastern on cspan. At two 30, the White House Coronavirus task force coordinator, dr. Deborah birx, will be joined by ambassadors from several countries to talk about covid19 in a Virtual Event hosted by the atlantic council. Appropriations subcommittee debates and votes on 2020 one spending levels for that Labor Department health and Human Services and the department of education. You can watch all of these changes online on cspan. Org or listen live on the cspan radio app. Americas future is in our hands. , the best gentlemen is yet to come. [applause] President Trump is hosting a rally in portsmouth, new hampshire. Watch our Live Campaign covered saturday at 8 00 p. M. Eastern on cspan. On demand at cspan. Org or listen on the go with the free cspan radio app. This is a crisis. People are losing their lives. With Police Reform taking center stage in Congress Watch our live unfiltered coverage of the latest developments. Plus the latest response of the coronavirus pandemic. From were going down 30,000 to 25 to 20. We saw it flat then it goes up. Are breathing from the white house on foreign affairs. Insight from former administration officials. There is a line one should not cross where governmental power is used exclusively for personal benefit. We will stand proud and we will stand tall. The latest from the campaign 2020 trail. Join in the conversation every day on our live callin program, washington journal. If you missed any of our live coverage watch on demand on cspan. Org or listen on the go with the cspan radio app. We will talk about the spending of the covid19 relief funds approved by congress over the past couple months. We are joined by the Health Care Team manager, nicole clowers

© 2025 Vimarsana

vimarsana.com © 2020. All Rights Reserved.