1 00:00:00,080 --> 00:00:02,960 Speaker 1: I'm newt Gingrich. Please watch Journey to America, my new 2 00:00:03,000 --> 00:00:07,040 Speaker 1: documentary in PBS about nine remarkable individuals who strengthen our 3 00:00:07,080 --> 00:00:10,479 Speaker 1: country through their pursuit of the American dream. From Albert 4 00:00:10,480 --> 00:00:14,680 Speaker 1: Einstein to Hetty Lamar to Zelma Calilazade. We explore how 5 00:00:14,760 --> 00:00:19,000 Speaker 1: individual stories help shape our national identity. Watch Journey to 6 00:00:19,040 --> 00:00:22,799 Speaker 1: America premier on Tuesday, January fourteenth to ten pm Eastern, 7 00:00:23,239 --> 00:00:31,640 Speaker 1: nine pm Central on PBS and the PBS app. On 8 00:00:31,680 --> 00:00:35,520 Speaker 1: this episode of Newts World. On December eighth, twenty twenty four, 9 00:00:36,040 --> 00:00:38,960 Speaker 1: the US Treasury Department was notified by a third party 10 00:00:39,040 --> 00:00:43,279 Speaker 1: software provider, Beyond Trust, that a hacker had gained access 11 00:00:43,320 --> 00:00:47,400 Speaker 1: to a security key which allowed the intruder to override 12 00:00:47,440 --> 00:00:52,520 Speaker 1: certain security protocols and access some Treasury Department office workstations 13 00:00:52,560 --> 00:00:55,840 Speaker 1: and unclassified documents stored on them, according to the letter 14 00:00:56,200 --> 00:01:00,000 Speaker 1: notifying the Senate Banking Committee of the breach. On Friday, 15 00:01:00,160 --> 00:01:03,800 Speaker 1: January third, the US Treasury place sanctions on Beijing based 16 00:01:04,080 --> 00:01:08,720 Speaker 1: cybersecurity company for its alleged role in multiple hacking incidents 17 00:01:08,800 --> 00:01:14,560 Speaker 1: targeting critical US infrastructure. Here to discuss the latest Chinese 18 00:01:14,600 --> 00:01:17,560 Speaker 1: hacking incidents and what it means in the larger picture. 19 00:01:18,080 --> 00:01:21,800 Speaker 1: I'm really pleased to welcome back my guest, doctor Waifong Zhong, 20 00:01:22,520 --> 00:01:26,240 Speaker 1: Senior Advisor for the Office for Fiscal and Regulatory Analysis 21 00:01:26,560 --> 00:01:29,720 Speaker 1: at the America First Policy Institute. He is a co 22 00:01:29,840 --> 00:01:34,280 Speaker 1: creator of the Policy Change Index, an open source project 23 00:01:34,640 --> 00:01:38,679 Speaker 1: that users ai to analyze and predict government's actions based 24 00:01:38,720 --> 00:01:51,280 Speaker 1: on their words. Waifong, welcome and listen. Thank you so 25 00:01:51,360 --> 00:01:53,680 Speaker 1: much for joining me once again on Newsworld. 26 00:01:54,160 --> 00:01:56,240 Speaker 2: Thank you very much for having me missed a speaker. 27 00:01:56,800 --> 00:02:00,360 Speaker 1: Now, before we talk about the Treasury Department hack, I 28 00:02:00,440 --> 00:02:04,120 Speaker 1: want to go back and start with salt typhoon. What 29 00:02:04,240 --> 00:02:06,760 Speaker 1: is salt typhoon and what have they been accused of doing. 30 00:02:08,160 --> 00:02:11,080 Speaker 2: The Salt Typhoon, which may or may not be directly 31 00:02:11,160 --> 00:02:15,360 Speaker 2: related to the sanctions that was announced this time, was 32 00:02:15,480 --> 00:02:19,840 Speaker 2: one of the many state sponsor hacking attacks led by 33 00:02:20,000 --> 00:02:24,720 Speaker 2: Chinese hackers and fundamentally sponsored and supported by the Chinese regime. 34 00:02:25,280 --> 00:02:29,480 Speaker 2: And things like this actually have happened repeatedly and much 35 00:02:29,520 --> 00:02:33,960 Speaker 2: more rampantly in recent years because the Chinese government has 36 00:02:34,000 --> 00:02:38,240 Speaker 2: been much more aggressive than before in collecting intelligence from overseas, 37 00:02:38,280 --> 00:02:41,920 Speaker 2: primarily from the American people. In American government, well. 38 00:02:41,840 --> 00:02:45,440 Speaker 1: As I understand it. In late twenty twenty four, US 39 00:02:45,480 --> 00:02:49,480 Speaker 1: officials announced that hackers affiliated with salt Typhoon had access 40 00:02:49,520 --> 00:02:54,240 Speaker 1: to computer systems of nine US talk communications companies, later 41 00:02:54,280 --> 00:03:01,000 Speaker 1: acknowledged to include Verizon AT and T T Mobile, Spectrum, Luhmann, 42 00:03:01,360 --> 00:03:07,239 Speaker 1: Consolidated Communications, and Windstream. I mean virtually the entire American system. 43 00:03:07,480 --> 00:03:10,120 Speaker 1: This has got to be over ninety percent of the system. 44 00:03:10,520 --> 00:03:14,520 Speaker 1: And yet we say that salt Typhoon access to computer 45 00:03:14,560 --> 00:03:18,920 Speaker 1: systems of ALLIHA and if I understand it correctly, we 46 00:03:19,040 --> 00:03:21,960 Speaker 1: believe they were able to access metadata of user calls, 47 00:03:22,360 --> 00:03:27,519 Speaker 1: text messages, including data and timestamps, source and destination IP addresses, 48 00:03:27,840 --> 00:03:31,519 Speaker 1: and phone numbers from over a million users, most of 49 00:03:31,560 --> 00:03:35,440 Speaker 1: which were located in the Washington, DC metro area. Now 50 00:03:35,960 --> 00:03:38,440 Speaker 1: I'm an amateur about this, but that strikes me as 51 00:03:38,480 --> 00:03:42,040 Speaker 1: a pretty amazing achievement. Can you walk us through what 52 00:03:42,120 --> 00:03:46,040 Speaker 1: we know so far about the whole process of hacked targeting, 53 00:03:46,360 --> 00:03:49,040 Speaker 1: and in particular what happened at the US Treasure Department. 54 00:03:49,680 --> 00:03:52,119 Speaker 2: Absolutely, so for that, I think we should go back 55 00:03:52,120 --> 00:03:55,440 Speaker 2: to the beginning of the Internet in the early two thousands. 56 00:03:55,920 --> 00:03:58,520 Speaker 2: Now we are talking about the former Chinese President Hu 57 00:03:58,640 --> 00:04:02,960 Speaker 2: Jintao before think even took office, was that the CCP 58 00:04:03,120 --> 00:04:06,200 Speaker 2: had realized from the very beginning of the Internet age 59 00:04:06,600 --> 00:04:10,520 Speaker 2: that information is really critical. They recognized the importance of 60 00:04:10,640 --> 00:04:15,240 Speaker 2: controlling information flow not only domestically within China, but also 61 00:04:15,720 --> 00:04:19,320 Speaker 2: as much as possible elsewhere in the world. And that 62 00:04:19,400 --> 00:04:22,240 Speaker 2: has a lot to do with what we called in 63 00:04:22,279 --> 00:04:27,239 Speaker 2: the open source intelligence model. The CCP has prioritized, which 64 00:04:27,279 --> 00:04:32,200 Speaker 2: means that they believe, compared to espnage, you know, cultivating 65 00:04:32,320 --> 00:04:35,679 Speaker 2: spies around the world, simply collecting information on the Internet 66 00:04:35,680 --> 00:04:38,640 Speaker 2: could be very useful. And so that has led to 67 00:04:38,839 --> 00:04:43,440 Speaker 2: decades of efforts by the CCP to create the industry, 68 00:04:43,600 --> 00:04:48,039 Speaker 2: the complex between the Chinese government agencies and a lot 69 00:04:48,040 --> 00:04:51,200 Speaker 2: of tech firms in China to start collecting a lot 70 00:04:51,200 --> 00:04:55,200 Speaker 2: of information around the world, and the primary target of 71 00:04:55,240 --> 00:04:59,080 Speaker 2: that operation is the United States. Now, there are different 72 00:04:59,120 --> 00:05:02,679 Speaker 2: ways to go about, and China has exhausted all of them. 73 00:05:02,960 --> 00:05:06,360 Speaker 2: There's the hardware side of things, meaning that for example, 74 00:05:06,480 --> 00:05:08,920 Speaker 2: in the telecom network that we have, we have a 75 00:05:08,920 --> 00:05:12,800 Speaker 2: lot of Chinese made devices, and those devices primarily made 76 00:05:12,800 --> 00:05:17,320 Speaker 2: by Huawei. Those devices have many vulnerabilities and some of 77 00:05:17,360 --> 00:05:20,840 Speaker 2: those vulnerabilities are actually hidden, meaning that there could be 78 00:05:21,000 --> 00:05:25,040 Speaker 2: backdoor mechanisms that were left there when they were manufactured, 79 00:05:25,279 --> 00:05:27,800 Speaker 2: and then the CCP mail may not try to access 80 00:05:27,800 --> 00:05:31,480 Speaker 2: them until years later. And there's also software side of things. 81 00:05:31,800 --> 00:05:35,080 Speaker 2: Because hacking groups in China they have gotten very good 82 00:05:35,080 --> 00:05:38,839 Speaker 2: and they work with overseas mercenaries, some based in Russia, 83 00:05:38,920 --> 00:05:41,360 Speaker 2: some based in other, you know, many other countries, and 84 00:05:41,440 --> 00:05:45,680 Speaker 2: they took very complex routes eventually to get to information 85 00:05:45,839 --> 00:05:49,000 Speaker 2: resided in the United States. So it's a very very 86 00:05:49,040 --> 00:05:50,200 Speaker 2: sophisticated operation. 87 00:05:51,000 --> 00:05:54,040 Speaker 1: In response to this most recent hack, the US government 88 00:05:54,160 --> 00:05:59,719 Speaker 1: post sanctions on a Beijing based cybersecurity firm, Integrity Technology Group. 89 00:06:00,200 --> 00:06:02,320 Speaker 1: Can you explain who this company is and what is 90 00:06:02,360 --> 00:06:04,640 Speaker 1: connection to the Chinese Communist is. 91 00:06:05,680 --> 00:06:09,440 Speaker 2: I think the general public knows very little about individual 92 00:06:09,560 --> 00:06:14,320 Speaker 2: tech company cyber especially firms associated with cyber attacks in China, 93 00:06:14,480 --> 00:06:17,160 Speaker 2: for a very good reason, which is that the CCP 94 00:06:17,320 --> 00:06:21,880 Speaker 2: deliberate try to make all these companies very secretive, and 95 00:06:21,920 --> 00:06:27,080 Speaker 2: they oftentimes create different entities to conduct different operations. Even 96 00:06:27,120 --> 00:06:30,159 Speaker 2: if any single entity is sanctioned by the US, they 97 00:06:30,160 --> 00:06:33,160 Speaker 2: can create another one. They're just shelles for their operations, 98 00:06:33,400 --> 00:06:35,640 Speaker 2: and so it's very hard to actually find out. And 99 00:06:35,920 --> 00:06:38,440 Speaker 2: it's very interesting you mentioned that, mister speaker, that the 100 00:06:38,600 --> 00:06:42,240 Speaker 2: US government is sanctioned in one one such entity this time, 101 00:06:42,279 --> 00:06:44,880 Speaker 2: but there's so many of them, and the reason we 102 00:06:44,920 --> 00:06:47,840 Speaker 2: are getting more and more rampant attacks from China. I mean, 103 00:06:47,839 --> 00:06:50,920 Speaker 2: we have to think about it from our enemies perspective, Right, 104 00:06:51,279 --> 00:06:55,320 Speaker 2: So what's the costs and benefits the hackers or the 105 00:06:55,320 --> 00:06:58,760 Speaker 2: ccpeople consider. You know, if they initiate a hacking campaign 106 00:06:58,839 --> 00:07:01,240 Speaker 2: against the US, if they succeed, they got a lot 107 00:07:01,240 --> 00:07:01,800 Speaker 2: of information. 108 00:07:01,960 --> 00:07:02,120 Speaker 3: Right. 109 00:07:02,400 --> 00:07:05,560 Speaker 2: If they fail, at least by how things are standing now, 110 00:07:05,600 --> 00:07:09,480 Speaker 2: they lose one firm, particularly one shell they can easily replace. 111 00:07:09,800 --> 00:07:14,240 Speaker 2: We are really taking insufficient countermeasures to deal with this 112 00:07:14,360 --> 00:07:15,040 Speaker 2: huge problem. 113 00:07:15,480 --> 00:07:20,160 Speaker 1: It seems to the idea of sanctions against individual companies 114 00:07:20,200 --> 00:07:23,360 Speaker 1: when in fact it's a collective effort sponsored by and 115 00:07:23,360 --> 00:07:27,560 Speaker 1: supported by the Chinese government. When it's almost silly. That's 116 00:07:27,600 --> 00:07:30,360 Speaker 1: not a strategy, that's a public relations event. 117 00:07:31,040 --> 00:07:33,840 Speaker 2: That's like doing something as a gesture to say that 118 00:07:33,880 --> 00:07:36,840 Speaker 2: at least, you know, the administration is not sitting around, 119 00:07:36,920 --> 00:07:39,240 Speaker 2: even though they are pretty much sitting around there and 120 00:07:39,280 --> 00:07:42,800 Speaker 2: doing nothing. It's a very difficult problem to actually tackle 121 00:07:42,960 --> 00:07:46,480 Speaker 2: at the piecemeal mannor so, meaning that if find out 122 00:07:46,480 --> 00:07:48,760 Speaker 2: one firm you sanctioned them, when the tomorrow they will 123 00:07:48,760 --> 00:07:50,960 Speaker 2: be in a different firm, right, and so, which I 124 00:07:51,040 --> 00:07:54,880 Speaker 2: think justifies a more systematic approach to deal with the 125 00:07:55,040 --> 00:07:58,560 Speaker 2: Chinese hacking problems. For example, President Trump came out with 126 00:07:58,640 --> 00:08:01,680 Speaker 2: a very strong position eight years ago to ban Huawei, 127 00:08:01,760 --> 00:08:04,960 Speaker 2: which is a great policy because once we ban the hardware, 128 00:08:05,120 --> 00:08:07,200 Speaker 2: right it solves a lot of problem. It doesn't solve 129 00:08:07,200 --> 00:08:09,960 Speaker 2: all the problems, but it solves many problems, and so 130 00:08:10,000 --> 00:08:13,320 Speaker 2: we have to take broader measures. Another one I think 131 00:08:13,480 --> 00:08:17,000 Speaker 2: is very important we don't pay enough attention to is 132 00:08:17,040 --> 00:08:21,920 Speaker 2: that the US government itself is collecting a vast amount 133 00:08:21,920 --> 00:08:25,280 Speaker 2: of information of the American people. We need to make 134 00:08:25,320 --> 00:08:30,080 Speaker 2: the government smaller, even in the information sense, because right now, 135 00:08:30,240 --> 00:08:33,439 Speaker 2: all the government agencies they have a lot of information 136 00:08:33,440 --> 00:08:37,559 Speaker 2: about the American people. Their information security is very low, 137 00:08:38,200 --> 00:08:41,079 Speaker 2: and so once the Chinese hackers got the hang of 138 00:08:41,120 --> 00:08:44,000 Speaker 2: even just one agency, it could potentially get a lot 139 00:08:44,080 --> 00:08:47,760 Speaker 2: of information about the entire country, and I think that's 140 00:08:47,920 --> 00:08:49,679 Speaker 2: not a very good position to be in. 141 00:08:50,320 --> 00:08:53,200 Speaker 1: So in a very real sense, you could almost argue 142 00:08:53,559 --> 00:08:56,680 Speaker 1: that the Chinese are happy, did the American government gather 143 00:08:56,800 --> 00:08:59,400 Speaker 1: up the information so they can then hack the American 144 00:08:59,440 --> 00:09:02,959 Speaker 1: government and get all the stuff the American government's picked 145 00:09:03,040 --> 00:09:05,200 Speaker 1: up a taxpayer expense precisely. 146 00:09:05,280 --> 00:09:09,160 Speaker 2: That's the wholesales approach, right, And that's actually very easy 147 00:09:09,200 --> 00:09:12,720 Speaker 2: because if you look at holders of information on the 148 00:09:12,800 --> 00:09:16,200 Speaker 2: US market, private companies, they are more secure because they 149 00:09:16,240 --> 00:09:20,120 Speaker 2: have more resources to have a good defense. But government agencies, 150 00:09:20,160 --> 00:09:23,280 Speaker 2: because of many reasons, they don't have very good security measures. 151 00:09:23,480 --> 00:09:26,240 Speaker 2: But they are actually the biggest collector of information in 152 00:09:26,280 --> 00:09:29,679 Speaker 2: the country. For example, it just used a taxation as 153 00:09:29,760 --> 00:09:32,480 Speaker 2: an illustration. You know, if you have a very simple 154 00:09:32,559 --> 00:09:36,480 Speaker 2: tax system, then the American taxpayers would only need to 155 00:09:36,520 --> 00:09:39,280 Speaker 2: submit very little information to the RS, right. But when 156 00:09:39,320 --> 00:09:43,800 Speaker 2: you have a very compact system, many deductions, many loopholes, 157 00:09:44,120 --> 00:09:47,120 Speaker 2: then oftentimes people will have to submit information to justify 158 00:09:47,160 --> 00:09:51,760 Speaker 2: those loopholes. That information is than with the RS. So 159 00:09:51,880 --> 00:09:53,840 Speaker 2: all the CCP would need you to is to hack 160 00:09:53,880 --> 00:09:54,720 Speaker 2: the RS. 161 00:09:55,280 --> 00:09:58,240 Speaker 1: In terms of the inability of the US government to 162 00:09:58,280 --> 00:10:03,400 Speaker 1: defend itself. Fifteen, the Office of Personnel Management at a 163 00:10:03,480 --> 00:10:07,760 Speaker 1: data breach that exposed the personal information of over twenty 164 00:10:07,840 --> 00:10:12,560 Speaker 1: million government employees and contractors think about that scale. We 165 00:10:12,679 --> 00:10:17,440 Speaker 1: really don't understand the scale of the intensity of the Chinese. 166 00:10:17,080 --> 00:10:22,079 Speaker 2: Effort absolutely, and a very important thing we need to 167 00:10:22,160 --> 00:10:28,640 Speaker 2: focus on is how much our adversaries can make inferences 168 00:10:29,200 --> 00:10:33,680 Speaker 2: by different pieces of information. The OPM hacked, mister speaker 169 00:10:33,720 --> 00:10:38,240 Speaker 2: you mentioned, it's actually a huge deal. Why because there 170 00:10:38,240 --> 00:10:41,719 Speaker 2: are so many contractors in the Washington, DC area who 171 00:10:41,760 --> 00:10:46,120 Speaker 2: worked with the government, right, and sometimes they don't disclose 172 00:10:46,200 --> 00:10:49,320 Speaker 2: at work on the website for obvious security reasons. But 173 00:10:49,440 --> 00:10:52,480 Speaker 2: if the OPM system is hacked, the CCP could find 174 00:10:52,480 --> 00:10:55,440 Speaker 2: out which federal contractors are working for the federal government 175 00:10:55,480 --> 00:10:58,240 Speaker 2: on which projects. Because when the federal government is off, 176 00:10:58,280 --> 00:11:00,520 Speaker 2: they're off too, right, So you can easily find out 177 00:11:00,880 --> 00:11:04,480 Speaker 2: likely how we're exactly they're associated. And a lot of 178 00:11:04,480 --> 00:11:07,880 Speaker 2: times this kind of piecemeal information, it's hard to make 179 00:11:07,920 --> 00:11:09,520 Speaker 2: a lot of influence when you have a little bit 180 00:11:09,559 --> 00:11:11,439 Speaker 2: of them. But if you have a lot of them, 181 00:11:11,520 --> 00:11:14,959 Speaker 2: which the Chinese government does, the actual intelligence would scale 182 00:11:15,000 --> 00:11:15,720 Speaker 2: up very quickly. 183 00:11:16,520 --> 00:11:20,360 Speaker 1: When you get data on twenty three million people, most 184 00:11:20,360 --> 00:11:22,760 Speaker 1: of whom aren't all that important and aren't involved in 185 00:11:22,840 --> 00:11:25,839 Speaker 1: national security. What did the Chinese do with all of them? 186 00:11:26,760 --> 00:11:30,559 Speaker 2: Well, there are two levels of intelligence. One is, if 187 00:11:30,559 --> 00:11:32,520 Speaker 2: you have the Trump campaign, you learn a lot, right, 188 00:11:32,600 --> 00:11:36,600 Speaker 2: that's obvious, But if you had millions of people, it's 189 00:11:36,640 --> 00:11:41,119 Speaker 2: helpful to think back at intelligence failure episodes of intelligence 190 00:11:41,160 --> 00:11:43,880 Speaker 2: failure in the past. In the US, the CI did 191 00:11:43,880 --> 00:11:47,160 Speaker 2: not see, for example, the Iranian revolution, right, And the 192 00:11:47,160 --> 00:11:49,679 Speaker 2: reason the GAY for that was, well, we didn't understand 193 00:11:49,760 --> 00:11:53,640 Speaker 2: the groundswell of puppy opinions. And that's something you can 194 00:11:53,760 --> 00:11:56,800 Speaker 2: learn about by having a vast amount of information on 195 00:11:56,840 --> 00:11:58,839 Speaker 2: a vast amount of people. The same is true for 196 00:11:58,880 --> 00:12:01,880 Speaker 2: Afghanistan too, right. So the US foolish they did not 197 00:12:01,960 --> 00:12:03,960 Speaker 2: see that the Taliban can come back so fast. 198 00:12:04,000 --> 00:12:04,160 Speaker 3: Right. 199 00:12:04,720 --> 00:12:07,120 Speaker 2: That's again the piece of information that requires a lot 200 00:12:07,160 --> 00:12:10,000 Speaker 2: of pieces of information, So it's not really hacking a 201 00:12:10,320 --> 00:12:13,000 Speaker 2: key individual, but it's hacking an entire nation or entire 202 00:12:13,000 --> 00:12:13,640 Speaker 2: group of people. 203 00:12:14,080 --> 00:12:18,840 Speaker 1: With the rise of artificial intelligence, my guess is that 204 00:12:18,920 --> 00:12:22,920 Speaker 1: they can now scan and analyze and look for parallels 205 00:12:23,040 --> 00:12:26,480 Speaker 1: or connections on a scale we can't imagine. So twenty 206 00:12:26,480 --> 00:12:29,719 Speaker 1: three million files wouldn't be a big deal. Just let's 207 00:12:29,760 --> 00:12:31,400 Speaker 1: a computer keep grinding away at. 208 00:12:31,240 --> 00:12:35,400 Speaker 2: Them exactly with today's computation power. That's a no brainer. 209 00:12:35,960 --> 00:12:38,320 Speaker 2: I think it comes down to really the combination of 210 00:12:38,640 --> 00:12:42,760 Speaker 2: vast amount of data and then the advancing AI and computation. 211 00:12:43,040 --> 00:12:46,080 Speaker 2: So that allows us to extract patterns, right, because patterns 212 00:12:46,160 --> 00:12:48,840 Speaker 2: is what would tell us about trends, and trends are 213 00:12:48,880 --> 00:12:51,360 Speaker 2: more persistent the rise of the Taliban, Right, that's the 214 00:12:51,400 --> 00:12:55,240 Speaker 2: trend that's way more persistent than hacking any single Taliban leaders. 215 00:12:55,280 --> 00:13:07,880 Speaker 3: For example, I'm newt Gingrich. 216 00:13:08,000 --> 00:13:11,160 Speaker 1: Please watch Journey to America, my new documentary in PBS 217 00:13:11,200 --> 00:13:15,160 Speaker 1: about nine remarkable individuals who strengthen our country through their 218 00:13:15,200 --> 00:13:18,640 Speaker 1: pursuit of the American dream. From Albert Einstein to Hetty 219 00:13:18,720 --> 00:13:23,280 Speaker 1: Lamar to Zelmai Kalilazad. We explore how individual stories help 220 00:13:23,320 --> 00:13:27,680 Speaker 1: shape our national identity. Watch Journey to America premier on Tuesday, 221 00:13:27,840 --> 00:13:31,600 Speaker 1: January fourteenth to ten pm Eastern, nine pm Central on 222 00:13:31,760 --> 00:13:42,160 Speaker 1: PBS and the PBS app. So, in a sense, in 223 00:13:42,200 --> 00:13:45,000 Speaker 1: the cyber world, correct me if I've got this wrong, 224 00:13:45,360 --> 00:13:48,160 Speaker 1: But there's sort of a gray zone where you have 225 00:13:48,920 --> 00:13:53,680 Speaker 1: private sector hackers who may be Romanian or Russian or Chinese, 226 00:13:54,280 --> 00:13:59,400 Speaker 1: all collaborating off and on for different reasons, and some 227 00:13:59,440 --> 00:14:02,880 Speaker 1: of it's come My sense is that the amount of 228 00:14:02,920 --> 00:14:07,960 Speaker 1: money stolen or blackmailed is dramatically greater than we have 229 00:14:08,040 --> 00:14:11,079 Speaker 1: any understanding of and that in fact, banks don't want 230 00:14:11,120 --> 00:14:13,760 Speaker 1: to be open about it because they don't want people 231 00:14:13,760 --> 00:14:17,400 Speaker 1: to understand how limited their ability is to protect information. 232 00:14:18,240 --> 00:14:21,480 Speaker 1: You have an economic side, and then you have sort 233 00:14:21,480 --> 00:14:25,120 Speaker 1: of a national security political side. And yet with all 234 00:14:25,160 --> 00:14:30,000 Speaker 1: that stuff, the Chinese communist government's reaction is consistently, oh, 235 00:14:30,040 --> 00:14:33,760 Speaker 1: we don't do that. It isn't us now. Is it 236 00:14:33,840 --> 00:14:37,160 Speaker 1: conceivable to you that you could have this skill of 237 00:14:37,240 --> 00:14:41,480 Speaker 1: hacking coming from China without the toutlitarian state knowing it. 238 00:14:42,520 --> 00:14:44,360 Speaker 2: I think we should take it as just a joke. 239 00:14:44,440 --> 00:14:46,800 Speaker 2: On the CCP, they say many things, right, we didn't 240 00:14:46,800 --> 00:14:50,160 Speaker 2: do this, we didn't do that. But that might have 241 00:14:50,240 --> 00:14:53,240 Speaker 2: some truth at the beginning of the economic reforms, for example, 242 00:14:53,280 --> 00:14:56,040 Speaker 2: in the nineties, perhaps when China was trying to be 243 00:14:56,080 --> 00:14:59,600 Speaker 2: more open and there was some space between the state 244 00:14:59,680 --> 00:15:03,000 Speaker 2: sector and the private sector. But in the last twenty 245 00:15:03,080 --> 00:15:06,920 Speaker 2: years that no longer is the case. Even private companies 246 00:15:07,000 --> 00:15:10,640 Speaker 2: think about Huawei, where Huawei is a perfectly private company. 247 00:15:10,800 --> 00:15:13,760 Speaker 2: It's not perfect, but it's perfectly private company, but it's 248 00:15:13,880 --> 00:15:16,600 Speaker 2: under the full control by the state. So it's laughable 249 00:15:16,640 --> 00:15:19,520 Speaker 2: to think that all these activities are happening without the 250 00:15:19,560 --> 00:15:21,800 Speaker 2: CCP supporting even proactively. 251 00:15:22,680 --> 00:15:28,080 Speaker 1: Christopher Ray, the FBI director center a security conference in Germany, quote, 252 00:15:28,560 --> 00:15:31,560 Speaker 1: the cyber threat posed by the Chinese government is massive. 253 00:15:32,200 --> 00:15:35,640 Speaker 1: China's hacking program is larger than that of every other 254 00:15:35,760 --> 00:15:39,360 Speaker 1: major nation combined. Now should we respond to that? 255 00:15:40,640 --> 00:15:43,640 Speaker 2: I think we should go back to the cause and benefit, 256 00:15:43,880 --> 00:15:49,000 Speaker 2: to think in our adversaries perspective, to put us in 257 00:15:49,040 --> 00:15:53,640 Speaker 2: their shoes, because when they contemplate about hacking the United States, 258 00:15:54,080 --> 00:15:58,760 Speaker 2: the benefit now is much larger than it used to 259 00:15:58,760 --> 00:16:02,960 Speaker 2: be before because every additional piece of information they can 260 00:16:03,080 --> 00:16:06,920 Speaker 2: gather from the US that could be put together with 261 00:16:07,040 --> 00:16:10,120 Speaker 2: the information they had already gotten in their past and 262 00:16:10,200 --> 00:16:13,360 Speaker 2: make a lot more influences. So that's the network effect 263 00:16:13,920 --> 00:16:17,440 Speaker 2: of different pieces of information. When you have more pieces 264 00:16:17,440 --> 00:16:20,360 Speaker 2: of a puzzle, you see the picture very clearly. When 265 00:16:20,360 --> 00:16:23,400 Speaker 2: you only have a few pieces, it doesn't really mean much, right. 266 00:16:23,720 --> 00:16:27,680 Speaker 2: So the marginal return of hacking for the Chinese is increasing, 267 00:16:28,720 --> 00:16:31,760 Speaker 2: but the cause of hacking is decreasing, especially under the 268 00:16:31,760 --> 00:16:35,920 Speaker 2: Biden administration. Sometimes they would sanction one or two Chinese firms. 269 00:16:35,960 --> 00:16:38,840 Speaker 2: That's a huge problem. Now we can talk about what 270 00:16:38,920 --> 00:16:42,240 Speaker 2: kind of countermeasures are the best. We might hack back. 271 00:16:42,280 --> 00:16:45,920 Speaker 2: You know, we might impose punitive sanctions across the board 272 00:16:45,960 --> 00:16:50,160 Speaker 2: on Chinese goods or Chinese investments, for example. We could 273 00:16:50,200 --> 00:16:53,000 Speaker 2: think more about how to liberate the private sector in 274 00:16:53,040 --> 00:16:55,800 Speaker 2: coming up with better defense for the information in the 275 00:16:55,880 --> 00:16:59,040 Speaker 2: United States. But what we cannot do is to just 276 00:16:59,280 --> 00:17:02,800 Speaker 2: sanction one or two because we need to increase the 277 00:17:02,880 --> 00:17:06,760 Speaker 2: punishment the Chinese hackers will face because their reward is 278 00:17:06,800 --> 00:17:08,000 Speaker 2: increasing every single day. 279 00:17:08,640 --> 00:17:11,040 Speaker 1: For a very very long time, we were the dominant 280 00:17:11,080 --> 00:17:15,600 Speaker 1: player with the National Security Agency, and we had capabilities 281 00:17:16,240 --> 00:17:20,320 Speaker 1: of accessing and understanding information that was dramatically greater than 282 00:17:20,359 --> 00:17:24,520 Speaker 1: anybody else. How do you distinguish the efforts that we've 283 00:17:24,520 --> 00:17:28,720 Speaker 1: made over the years to maximize our intelligence capabilities with 284 00:17:28,880 --> 00:17:31,320 Speaker 1: the kind of things that the Chinese are doing. 285 00:17:31,480 --> 00:17:35,680 Speaker 2: I think the main difference is that sometimes US actors, 286 00:17:35,720 --> 00:17:38,640 Speaker 2: they do have the capabilities, but sometimes they are misdirected. 287 00:17:39,080 --> 00:17:41,439 Speaker 2: When we think about law enforcement in the United States, 288 00:17:41,640 --> 00:17:44,760 Speaker 2: oftentimes in recent years, they are more and more politicized, Right, 289 00:17:45,000 --> 00:17:47,640 Speaker 2: so you have all these ammunitions that are not really 290 00:17:47,720 --> 00:17:50,280 Speaker 2: pointed at the enemies, but our own people, and that's 291 00:17:50,359 --> 00:17:52,560 Speaker 2: not right. And the other thing is that for the 292 00:17:52,560 --> 00:17:55,399 Speaker 2: CCP is not a problem. They just enhance capabilities to 293 00:17:55,440 --> 00:17:58,919 Speaker 2: spy on anybody, including their own people, which is given already. 294 00:17:59,119 --> 00:18:02,040 Speaker 2: So they spile the China these people, but then increasingly 295 00:18:02,560 --> 00:18:05,360 Speaker 2: have their eyes overseas. They have their eyes on targets 296 00:18:05,400 --> 00:18:08,359 Speaker 2: like the United States and Europe, the UK. You know, 297 00:18:08,400 --> 00:18:10,679 Speaker 2: Europe and UK no longer quite method that much to 298 00:18:10,680 --> 00:18:13,400 Speaker 2: this CZ people. The US matters even more. 299 00:18:14,000 --> 00:18:16,439 Speaker 1: Somebody pointed out to me that a lot of places 300 00:18:16,480 --> 00:18:20,359 Speaker 1: around the world are buying Chinese equipment, for example, for 301 00:18:20,640 --> 00:18:25,840 Speaker 1: facial recognition, and that somebody who might be a covert 302 00:18:25,880 --> 00:18:30,480 Speaker 1: agent in one country could be picked up traveling another country. 303 00:18:30,160 --> 00:18:30,920 Speaker 3: By the cameras. 304 00:18:31,280 --> 00:18:32,640 Speaker 2: Absolutely absolutely, and. 305 00:18:32,600 --> 00:18:34,439 Speaker 1: Then they could analyze it and figure out who that 306 00:18:34,480 --> 00:18:39,000 Speaker 1: person is. And so they're really acquiring a worldwide ability 307 00:18:39,680 --> 00:18:42,959 Speaker 1: to gather information and spy on people on a scale 308 00:18:43,000 --> 00:18:47,360 Speaker 1: that's totally outside the nation state. I mean, it's genuinely global. 309 00:18:47,840 --> 00:18:49,359 Speaker 1: Does that fit with what you're saying. 310 00:18:50,400 --> 00:18:53,480 Speaker 2: Absolutely, And I think the Chinese always had that plan, 311 00:18:53,800 --> 00:18:55,800 Speaker 2: you know, long ago. It's the same plant they're just 312 00:18:55,840 --> 00:18:59,480 Speaker 2: carrying through over the years. Mister speaker, you talked about 313 00:18:59,480 --> 00:19:02,720 Speaker 2: the facial condition from footage. Right, Let's say you penetrate 314 00:19:02,840 --> 00:19:06,520 Speaker 2: one country in whatever footage it have. That doesn't really 315 00:19:06,600 --> 00:19:09,000 Speaker 2: mean a lot, but when you panish it enough, then 316 00:19:09,040 --> 00:19:11,280 Speaker 2: you can figure out other agents. Right, So it really 317 00:19:11,320 --> 00:19:12,840 Speaker 2: needs the scale of the operation. 318 00:19:13,440 --> 00:19:15,040 Speaker 1: Let me ask you about a couple of things beyond 319 00:19:15,080 --> 00:19:20,280 Speaker 1: cyber How did you interpret the school bus size spy 320 00:19:20,400 --> 00:19:21,760 Speaker 1: balloon in twenty twenty three. 321 00:19:22,680 --> 00:19:25,000 Speaker 2: I think that what was most striking to me was 322 00:19:25,000 --> 00:19:29,960 Speaker 2: the incapabilities of our administration to respond. It took forever 323 00:19:30,000 --> 00:19:32,320 Speaker 2: to shout have done in the first place. But they 324 00:19:32,359 --> 00:19:35,320 Speaker 2: also came out initially to say the balloons were not 325 00:19:35,359 --> 00:19:38,840 Speaker 2: collecting information in the US, and then they later admitted, okay, sorry, 326 00:19:38,960 --> 00:19:42,000 Speaker 2: they are collecting information in the United States. This is 327 00:19:42,040 --> 00:19:45,520 Speaker 2: just incapabilities. I think we should not shy away from 328 00:19:45,600 --> 00:19:49,480 Speaker 2: recognizing that. A lot of responsibilities on our end. But 329 00:19:49,840 --> 00:19:51,760 Speaker 2: the Chinese they always try to do that, right, and 330 00:19:51,800 --> 00:19:54,160 Speaker 2: then the weather balloons, and then they tried to use 331 00:19:54,200 --> 00:19:57,400 Speaker 2: it for other information collection purposes. I have to say 332 00:19:57,400 --> 00:19:59,919 Speaker 2: that's the same for any Chinese equipment, right, Chinese hardware, 333 00:20:00,040 --> 00:20:02,879 Speaker 2: they would sell smart devices around the world, and then 334 00:20:02,920 --> 00:20:06,679 Speaker 2: they would record those conversations by the customers, and then 335 00:20:06,680 --> 00:20:08,680 Speaker 2: they would send them back to China. It's the same thing. 336 00:20:09,359 --> 00:20:13,200 Speaker 1: Are you at all concerned about the degree to which 337 00:20:13,200 --> 00:20:17,640 Speaker 1: the Chinese are buying up US farmland, particularly near military basis. 338 00:20:18,440 --> 00:20:21,560 Speaker 2: I am very concerned about this. I'm not against, for example, 339 00:20:21,720 --> 00:20:25,840 Speaker 2: Chinese nationals purchasing property like a very broad rule in 340 00:20:25,880 --> 00:20:27,440 Speaker 2: the United States. Right we have a lot of Chinese 341 00:20:27,440 --> 00:20:30,520 Speaker 2: immigrants buying houses in the United States. That does not 342 00:20:30,800 --> 00:20:34,040 Speaker 2: necessarily become a national security issue. But when you buy 343 00:20:34,080 --> 00:20:37,040 Speaker 2: farm lands near military bases, that would be a huge problem. 344 00:20:37,200 --> 00:20:39,480 Speaker 2: In the past, some people think of that as like fear, 345 00:20:39,640 --> 00:20:42,200 Speaker 2: just have an anti Chinese sentiment or anti Asian sentiment. 346 00:20:42,560 --> 00:20:44,600 Speaker 2: Let's look at the track records of the CCP, like 347 00:20:44,600 --> 00:20:47,600 Speaker 2: what kind of information have they been collecting? And it 348 00:20:47,720 --> 00:20:50,879 Speaker 2: is true that they exhaust all sorts of means possible 349 00:20:51,320 --> 00:20:53,880 Speaker 2: to spy on American people. So I think it's much 350 00:20:53,920 --> 00:20:56,960 Speaker 2: more well justified fear than it was before. 351 00:20:57,720 --> 00:21:01,280 Speaker 1: One other topics that is sort of unavoidable when you're 352 00:21:01,320 --> 00:21:05,760 Speaker 1: talking about the Internet in China and that's TikTok. Do 353 00:21:05,840 --> 00:21:11,440 Speaker 1: you think that an American could buy TikTok liberated from 354 00:21:11,520 --> 00:21:15,760 Speaker 1: Chinese control and actually keep it going without the Chinese 355 00:21:15,760 --> 00:21:19,879 Speaker 1: having such dense penetration of the system that it's inevitably 356 00:21:20,520 --> 00:21:23,960 Speaker 1: enabling them to in various ways to store what's going on. 357 00:21:24,760 --> 00:21:27,520 Speaker 2: That's a really tricky issue. So there are two levels 358 00:21:27,560 --> 00:21:30,520 Speaker 2: I think to look at this. One is should TikTok 359 00:21:30,600 --> 00:21:33,840 Speaker 2: exist in its current form in the United States, And 360 00:21:33,880 --> 00:21:36,560 Speaker 2: the second is whether it's even possible to ban it 361 00:21:36,640 --> 00:21:39,280 Speaker 2: right or change its form. I'm less certain about the 362 00:21:39,320 --> 00:21:41,639 Speaker 2: second one, but I'm very certain about the first one, 363 00:21:41,880 --> 00:21:44,560 Speaker 2: meaning that TikTok in its current form should not exist 364 00:21:44,920 --> 00:21:48,120 Speaker 2: in the United States because of the level of information 365 00:21:48,240 --> 00:21:50,720 Speaker 2: collection on the app. There are many, many studies about 366 00:21:50,720 --> 00:21:54,400 Speaker 2: this and the way that they penetrates information not only 367 00:21:54,560 --> 00:21:58,440 Speaker 2: just on users' behavior scoring the app on the phone, 368 00:21:58,560 --> 00:22:02,359 Speaker 2: but also other information the users has on their phone 369 00:22:02,560 --> 00:22:06,199 Speaker 2: could potentially come through the app and be obtained by 370 00:22:06,240 --> 00:22:08,800 Speaker 2: the CCP. Even passwords you use on your bank could 371 00:22:08,800 --> 00:22:11,639 Speaker 2: potentially be sent over to the CCP. So that's a 372 00:22:11,720 --> 00:22:15,520 Speaker 2: huge problem. Now, how is it even possible to ban TikTok? 373 00:22:15,520 --> 00:22:17,520 Speaker 2: I think that's harder to address because there's the First 374 00:22:17,560 --> 00:22:21,600 Speaker 2: Amendment issues there. I think the best outcome might be 375 00:22:21,920 --> 00:22:24,679 Speaker 2: to force a sale to an American entity such that 376 00:22:24,720 --> 00:22:27,879 Speaker 2: we can have better protection without having to eliminate the 377 00:22:27,920 --> 00:22:29,119 Speaker 2: app in the US market. 378 00:22:29,680 --> 00:22:33,320 Speaker 1: So let's tell you did so, TikTok. Would that mean 379 00:22:33,359 --> 00:22:36,240 Speaker 1: that the hardware would have to be inside the unitiztation? 380 00:22:36,720 --> 00:22:39,080 Speaker 1: Isn't part of the problem right now that the ultimate 381 00:22:39,119 --> 00:22:41,480 Speaker 1: center of information flows in China? 382 00:22:41,520 --> 00:22:44,720 Speaker 2: Exactly? I think it all comes down to hardware. 383 00:22:45,000 --> 00:22:48,800 Speaker 1: So someonew I have to literally transfer the American TikTok 384 00:22:49,920 --> 00:22:52,040 Speaker 1: And does that that mean you're transferring the world wide 385 00:22:52,119 --> 00:22:55,960 Speaker 1: TikTok or would the non American parts still be Chinese. 386 00:22:56,760 --> 00:22:59,880 Speaker 2: As it is now? TikTok claim that they have under 387 00:23:00,080 --> 00:23:05,080 Speaker 2: gone a measure to enhance data security. That's what they claim, 388 00:23:05,440 --> 00:23:07,720 Speaker 2: And what that meant is there is I think a 389 00:23:07,920 --> 00:23:13,440 Speaker 2: US entity hardware that it ultimately stored the information, But 390 00:23:13,480 --> 00:23:18,199 Speaker 2: ironically the information first comes through China and goes to 391 00:23:18,359 --> 00:23:22,600 Speaker 2: the US hardware and then stay there. That doesn't really 392 00:23:23,000 --> 00:23:25,480 Speaker 2: help a lot or a single bit because the CCP 393 00:23:25,600 --> 00:23:27,520 Speaker 2: has the more. It's really a joke to say that 394 00:23:27,520 --> 00:23:30,960 Speaker 2: that's a security measure. So eventually I think the real 395 00:23:31,160 --> 00:23:35,440 Speaker 2: secure way would require information to not flow through mainland China. 396 00:23:35,480 --> 00:23:38,360 Speaker 2: At all, and then to prevent any Chinese entity from 397 00:23:38,359 --> 00:23:41,600 Speaker 2: ever accessing the US portion of the information. Now, the 398 00:23:41,640 --> 00:23:44,280 Speaker 2: CCP might want to have access to the Chinese version 399 00:23:44,320 --> 00:23:47,600 Speaker 2: of TikTok and to the extended overseas TikTok and the 400 00:23:47,840 --> 00:23:50,840 Speaker 2: Chinese allies, and that's a problem beyond the United States. 401 00:23:50,880 --> 00:23:53,200 Speaker 2: But at least we should make sure that the US 402 00:23:53,240 --> 00:23:54,920 Speaker 2: portion of it is secure. 403 00:23:55,760 --> 00:23:56,240 Speaker 3: As you know it. 404 00:23:56,320 --> 00:24:01,560 Speaker 1: Study published last Thursday asserts TikTok's algorithms promote Chinese Communist 405 00:24:01,600 --> 00:24:05,960 Speaker 1: Party narratives and suppressed content critical of those narratives. Claim 406 00:24:06,040 --> 00:24:12,400 Speaker 1: that TikTok forcefully denies entitled the CCP's digital charm offensive. 407 00:24:12,840 --> 00:24:17,240 Speaker 1: The study by the Rutgers University based Network Contgent Research 408 00:24:17,440 --> 00:24:21,679 Speaker 1: Institute argues that much of the pro China content originates 409 00:24:21,880 --> 00:24:26,400 Speaker 1: from state link entities. Byte Dance, a Chinese technology company, 410 00:24:26,680 --> 00:24:30,800 Speaker 1: owns TikTok. What should we be doing about that? 411 00:24:30,800 --> 00:24:34,520 Speaker 2: There's suddenly validity to the findings. I see that as 412 00:24:34,840 --> 00:24:39,720 Speaker 2: just a small function of TikTok, meaning that yes, it's 413 00:24:39,760 --> 00:24:42,920 Speaker 2: a popular app, it has a wide reached in the 414 00:24:43,240 --> 00:24:49,120 Speaker 2: American audience, and so any censorship or propaganda on this network, 415 00:24:49,240 --> 00:24:52,159 Speaker 2: it's going to affect a lot of American people. But 416 00:24:52,280 --> 00:24:55,480 Speaker 2: I think that's an obvious trivial way. The Charum reference 417 00:24:55,560 --> 00:24:57,720 Speaker 2: in this example is that they're trying to put out 418 00:24:58,040 --> 00:25:01,240 Speaker 2: content that would put the cc in a more positive 419 00:25:01,320 --> 00:25:04,479 Speaker 2: light and put US politics in the negative lighte the 420 00:25:04,520 --> 00:25:07,640 Speaker 2: CCP always does anyway with any other outlets they have. 421 00:25:08,400 --> 00:25:11,720 Speaker 2: But a harder problem is actually that because TikTok app 422 00:25:11,800 --> 00:25:15,119 Speaker 2: is so addictive, it's addicted to many people so that 423 00:25:15,200 --> 00:25:18,600 Speaker 2: they keep scrolling on the app for more and more videos, right, 424 00:25:19,640 --> 00:25:22,280 Speaker 2: And the process of that is the reason TikTok is 425 00:25:22,320 --> 00:25:26,600 Speaker 2: so popular. The algorithm actually tries to learn your preferences, 426 00:25:26,840 --> 00:25:29,639 Speaker 2: They learn what you like and not like, and they 427 00:25:29,680 --> 00:25:32,159 Speaker 2: try to recommend more content for you to keep looking. 428 00:25:32,720 --> 00:25:36,040 Speaker 2: And the fact that they're so successful means that they 429 00:25:36,080 --> 00:25:39,480 Speaker 2: have already figured out the preferences of the American people, 430 00:25:39,920 --> 00:25:42,720 Speaker 2: which means that they understand again going back to the 431 00:25:42,760 --> 00:25:46,000 Speaker 2: grounds well issue here, right, So they understanding the US 432 00:25:46,040 --> 00:25:49,120 Speaker 2: population at the deeper and deeper level every single day, 433 00:25:49,480 --> 00:25:51,680 Speaker 2: and that would help them make a lot of valuable 434 00:25:51,800 --> 00:25:55,040 Speaker 2: judgment about where this country is going, what people might 435 00:25:55,119 --> 00:25:59,040 Speaker 2: do in various different locations, including in actions and that's 436 00:25:59,240 --> 00:25:59,920 Speaker 2: very concerning. 437 00:26:01,040 --> 00:26:04,400 Speaker 1: So in a sense where we rely on say, national 438 00:26:04,440 --> 00:26:07,520 Speaker 1: polling of two or three thousand sample, they actually have 439 00:26:08,240 --> 00:26:11,400 Speaker 1: tens of millions of pieces of data that give them 440 00:26:11,480 --> 00:26:15,400 Speaker 1: dramatically richer and deeper insights into who we are. 441 00:26:16,040 --> 00:26:19,200 Speaker 2: And that's oftentimes the future generation of the American people. 442 00:26:34,119 --> 00:26:37,800 Speaker 1: Given everything we've talked about, if the United States wanted 443 00:26:37,800 --> 00:26:42,280 Speaker 1: to undertake a grand strategy to raise the cost to 444 00:26:42,400 --> 00:26:44,840 Speaker 1: the Chinese counties government to such a point that they 445 00:26:44,840 --> 00:26:48,600 Speaker 1: would actually cut off this behavior and police against it, 446 00:26:49,240 --> 00:26:51,159 Speaker 1: what would that kind of a strategy look like. 447 00:26:53,000 --> 00:26:55,760 Speaker 2: Well, that's hard to contemplate, and the problem is that 448 00:26:55,760 --> 00:26:58,120 Speaker 2: once you're contemplated, it might lose some of the effect 449 00:26:58,880 --> 00:27:01,360 Speaker 2: because in the end and at some point it becomes 450 00:27:01,359 --> 00:27:05,679 Speaker 2: the same thing as talking about military deterrence. Chinese has 451 00:27:05,720 --> 00:27:08,520 Speaker 2: a lot of military power too, and it's not using 452 00:27:08,560 --> 00:27:11,680 Speaker 2: against the US yet, right and so we want china 453 00:27:11,800 --> 00:27:14,800 Speaker 2: cyber attack to be like its military power to not 454 00:27:14,880 --> 00:27:17,840 Speaker 2: be used upon the US and its allies. But right 455 00:27:17,880 --> 00:27:20,080 Speaker 2: now it is being used by US and its airlines. 456 00:27:20,520 --> 00:27:22,320 Speaker 2: It comes down to deterrence, and there are so many 457 00:27:22,480 --> 00:27:26,160 Speaker 2: ways of deterrence. I think it may not necessarily mean 458 00:27:26,359 --> 00:27:29,600 Speaker 2: cyber deterrence, you could deter Chinese in other ways, right. 459 00:27:29,800 --> 00:27:35,359 Speaker 2: For example, threatening certain severing of incongabborations with the Chinese 460 00:27:35,480 --> 00:27:38,320 Speaker 2: in some areas like punitive terrorists might be a way. 461 00:27:38,720 --> 00:27:41,000 Speaker 2: I'm sure the incoming president has a lot of ideas too. 462 00:27:41,080 --> 00:27:43,600 Speaker 2: I think, thinking too openly about it, it may not even 463 00:27:43,640 --> 00:27:45,080 Speaker 2: be a good idea. But I don't know. But if 464 00:27:45,080 --> 00:27:47,560 Speaker 2: you ask me, I would think that keeping the enemies 465 00:27:47,640 --> 00:27:52,960 Speaker 2: guessing and outlining some maximum response, we might go there. 466 00:27:53,000 --> 00:27:55,479 Speaker 2: We don't necessarily go there, but we might go there someday. 467 00:27:55,480 --> 00:27:55,639 Speaker 1: You know. 468 00:27:55,680 --> 00:27:58,320 Speaker 2: Having this kind of range of actions to be known 469 00:27:58,480 --> 00:28:00,280 Speaker 2: by our adversaries will be the best. 470 00:28:00,600 --> 00:28:03,600 Speaker 1: This may be a minor thing, but we ought to 471 00:28:03,640 --> 00:28:08,000 Speaker 1: seriously consider re establishing sort of a radio free China 472 00:28:08,520 --> 00:28:12,320 Speaker 1: and the kind of traditional propaganda we used against the 473 00:28:12,359 --> 00:28:16,600 Speaker 1: Soviet Union and the various satellite states, because somehow we 474 00:28:16,680 --> 00:28:21,639 Speaker 1: have to communicate that hostility can't be one sided, that 475 00:28:21,720 --> 00:28:24,320 Speaker 1: we can't be permanently on defense and they get to 476 00:28:24,320 --> 00:28:26,800 Speaker 1: come and play. We have to communicate that if they 477 00:28:26,880 --> 00:28:30,879 Speaker 1: actually want to engage in a genuine cold war, and 478 00:28:30,920 --> 00:28:33,119 Speaker 1: in a sense, this cyber offensive is part of a 479 00:28:33,119 --> 00:28:37,119 Speaker 1: cold war, then we have tools we can use too, 480 00:28:37,200 --> 00:28:40,920 Speaker 1: and they're in fact much more vulnerable to domestic discontent, 481 00:28:41,600 --> 00:28:44,240 Speaker 1: and I think probably more frightened of it than we 482 00:28:44,320 --> 00:28:47,000 Speaker 1: have any current notion. And I think back to the 483 00:28:47,080 --> 00:28:51,280 Speaker 1: Typing rebellion, which costs about seventy five million lives in 484 00:28:51,360 --> 00:28:54,680 Speaker 1: the eighteen sixties and seventies. This is why Tenement Square 485 00:28:54,760 --> 00:28:57,960 Speaker 1: was so violent. They have a very clear sense that 486 00:28:58,000 --> 00:29:01,920 Speaker 1: their population can get out of control much faster, much 487 00:29:01,960 --> 00:29:05,520 Speaker 1: more decisively than any free society. That may be the 488 00:29:05,560 --> 00:29:08,040 Speaker 1: wrong idea of the wrong approach, but it does seem 489 00:29:08,080 --> 00:29:11,120 Speaker 1: to me we can't continue to pretend that we are 490 00:29:11,200 --> 00:29:14,240 Speaker 1: totally at peace. Doesn't mean we have to do award militarily, 491 00:29:14,600 --> 00:29:17,040 Speaker 1: but we have to recognize we have a genuine adversary, 492 00:29:17,480 --> 00:29:20,400 Speaker 1: and every morning they have lots of people trying to 493 00:29:20,400 --> 00:29:22,840 Speaker 1: figure out how to cause us harm. And the harm 494 00:29:22,880 --> 00:29:25,560 Speaker 1: may be electronic, it may not be military, but it's 495 00:29:25,600 --> 00:29:27,800 Speaker 1: still harm absolutely. 496 00:29:27,840 --> 00:29:31,479 Speaker 2: And we often think about rightfully so, that the Chinese 497 00:29:31,480 --> 00:29:34,120 Speaker 2: regime is our adversary, right, but the Chinese people are 498 00:29:34,160 --> 00:29:37,360 Speaker 2: not right. You reference the TM and Square protests and 499 00:29:37,400 --> 00:29:40,280 Speaker 2: the violent crackdown, but even if you look at the 500 00:29:40,560 --> 00:29:45,240 Speaker 2: protests in many cities in China right before China lifted 501 00:29:45,240 --> 00:29:48,200 Speaker 2: the COVID restriction, the zero COVID restrictions a few years ago. 502 00:29:48,280 --> 00:29:51,760 Speaker 2: Right that basically came right after the wave of protests 503 00:29:51,760 --> 00:29:54,840 Speaker 2: happening in mainland China. It means that the Chinese feeple 504 00:29:54,880 --> 00:29:58,560 Speaker 2: actually they know, at least those more educated fraction of 505 00:29:58,600 --> 00:30:00,920 Speaker 2: the Chinese people who are able to get over the 506 00:30:01,000 --> 00:30:03,760 Speaker 2: Internet censorships, they know what's going on in the world, 507 00:30:03,920 --> 00:30:07,440 Speaker 2: and they see America as a better example of how 508 00:30:07,480 --> 00:30:11,200 Speaker 2: to govern right. And so the implication of that is, first, 509 00:30:11,320 --> 00:30:14,080 Speaker 2: you know, we need to change the direction our country 510 00:30:14,120 --> 00:30:17,640 Speaker 2: is currently going. We need to correct all these wrongs 511 00:30:17,800 --> 00:30:20,280 Speaker 2: that have happened, particularly in the last four years. We 512 00:30:20,360 --> 00:30:22,920 Speaker 2: need to move to the right direction because it sets 513 00:30:22,960 --> 00:30:26,520 Speaker 2: an example even for audiences in China. And the other 514 00:30:26,760 --> 00:30:30,160 Speaker 2: lesson I think is those people who know in China, 515 00:30:30,520 --> 00:30:33,800 Speaker 2: they're not getting the information from Radio Free China, not necessarily, 516 00:30:33,840 --> 00:30:36,120 Speaker 2: not exclusively, they're not getting it from the Voice of 517 00:30:36,160 --> 00:30:40,440 Speaker 2: America Mandarin channel necessarily because once they have the capabilities 518 00:30:40,440 --> 00:30:44,200 Speaker 2: to jump the Great Internet Firewall, they can see everything 519 00:30:44,200 --> 00:30:47,040 Speaker 2: in the world. Right, I'm not so much convinced about 520 00:30:47,240 --> 00:30:52,960 Speaker 2: having to penetrate information flow into China because websites like 521 00:30:53,000 --> 00:30:56,080 Speaker 2: the Voa China would be banned anyway by the CCP. Right, 522 00:30:56,440 --> 00:30:59,040 Speaker 2: it really comes down to some people in China they 523 00:30:59,040 --> 00:31:01,880 Speaker 2: can come outside, and once they come outside, they see everything. 524 00:31:02,000 --> 00:31:03,360 Speaker 2: They can see the New York Times, they can see 525 00:31:03,360 --> 00:31:05,880 Speaker 2: the wats. In general, I think what we need to 526 00:31:05,880 --> 00:31:09,160 Speaker 2: do the most is to set a great example to 527 00:31:09,280 --> 00:31:11,320 Speaker 2: the Chinese people in the sense of being a good 528 00:31:11,320 --> 00:31:14,880 Speaker 2: influence right what a democracy should be and what open 529 00:31:14,920 --> 00:31:18,200 Speaker 2: society should be, and then hopefully more and more of 530 00:31:18,280 --> 00:31:21,640 Speaker 2: them will be increasingly gravitating toward it. 531 00:31:21,680 --> 00:31:24,760 Speaker 1: Is there a rule for us for a place to 532 00:31:24,880 --> 00:31:28,520 Speaker 1: try to help communicate how you can break through the 533 00:31:28,640 --> 00:31:32,160 Speaker 1: various barriers or do they just naturally evolve on their 534 00:31:32,160 --> 00:31:32,920 Speaker 1: own Internally? 535 00:31:34,120 --> 00:31:38,560 Speaker 2: Well, so far has been evolving internally. There are what's 536 00:31:38,640 --> 00:31:42,120 Speaker 2: called VPN virtual Private network services in China that helps 537 00:31:42,120 --> 00:31:46,040 Speaker 2: people to get over the firewall. The CCP keeps cracking 538 00:31:46,080 --> 00:31:49,000 Speaker 2: down on those tools, so people will have to keep 539 00:31:49,040 --> 00:31:52,240 Speaker 2: looking for new tools every other month. Some pro democracy 540 00:31:52,280 --> 00:31:55,360 Speaker 2: movement could take the form of providing the Chinese people 541 00:31:55,400 --> 00:31:56,560 Speaker 2: better access to internet. 542 00:31:56,720 --> 00:32:01,080 Speaker 1: That's a fascinating point. It's our generation's version of putting 543 00:32:01,080 --> 00:32:04,880 Speaker 1: out small radios in the nineteen fifties and sixties to 544 00:32:04,920 --> 00:32:09,280 Speaker 1: try to penetrate the barriers is utterly fascinating. Boy fun look, 545 00:32:09,320 --> 00:32:11,560 Speaker 1: I want to thank you for joining me and for 546 00:32:11,600 --> 00:32:15,760 Speaker 1: helping us better understand the context of China's recent cyber 547 00:32:15,880 --> 00:32:19,800 Speaker 1: espionage efforts. Our listeners can follow your work by visiting 548 00:32:19,800 --> 00:32:24,120 Speaker 1: the America First Policy Institute's website at America Firstpolicy dot com. 549 00:32:24,120 --> 00:32:26,680 Speaker 1: And I really appreciate you being our guests again, and 550 00:32:27,120 --> 00:32:30,080 Speaker 1: I'm confident as the world evolves, we're going to come 551 00:32:30,080 --> 00:32:32,680 Speaker 1: back to you for wisdom again in the future. But 552 00:32:32,720 --> 00:32:35,240 Speaker 1: thank you very much for sharing with us today. 553 00:32:35,640 --> 00:32:38,000 Speaker 2: Thank you very much for having me again, missed the speaker. 554 00:32:41,480 --> 00:32:44,160 Speaker 1: Thank you to my guest Waifong Zong. You can learn 555 00:32:44,160 --> 00:32:47,720 Speaker 1: more about the China cyber espionage efforts on our show 556 00:32:47,760 --> 00:32:50,880 Speaker 1: page at newtworld dot com. New Chorld is produced by 557 00:32:50,880 --> 00:32:55,160 Speaker 1: gangwid three sixty and iHeartMedia. Our executive producer is Guarnsey Sloan. 558 00:32:55,560 --> 00:32:59,200 Speaker 1: Our researcher is Rachel Peterson. The artwork for the show 559 00:32:59,440 --> 00:33:02,840 Speaker 1: which created by Steve Penley. Special thanks to the team 560 00:33:02,880 --> 00:33:06,000 Speaker 1: at Ginglish three sixty. If you've been enjoying Newtsworld. I 561 00:33:06,120 --> 00:33:08,880 Speaker 1: hope you'll go to Apple Podcasts and both rate us 562 00:33:08,880 --> 00:33:11,440 Speaker 1: with five stars and give us a review so others 563 00:33:11,440 --> 00:33:14,480 Speaker 1: can learn what it's all about. Right now, listeners of 564 00:33:14,560 --> 00:33:19,200 Speaker 1: Newtsworld consign up from my three freeweekly columns at ginglishree 565 00:33:19,240 --> 00:33:24,400 Speaker 1: sixty dot com slash newsletter. I'm new Gingrich. This is Newtsworld. 566 00:33:37,960 --> 00:33:40,880 Speaker 1: I'm new Gingrich. Please watch Journey to America, my new 567 00:33:40,880 --> 00:33:44,960 Speaker 1: documentary on PBS about nine remarkable individuals who strengthen our 568 00:33:44,960 --> 00:33:48,320 Speaker 1: country through their pursuit of the American dream. From Albert 569 00:33:48,360 --> 00:33:52,600 Speaker 1: Einstein to Hetty Lamar to Zelmai Kalilazad, we explore how 570 00:33:52,640 --> 00:33:56,880 Speaker 1: individual stories help shape our national identity. Watch Journey to 571 00:33:56,920 --> 00:34:01,680 Speaker 1: America premiere on Tuesday, January fourteenth pm Eastern, nine pm 572 00:34:01,760 --> 00:34:04,600 Speaker 1: Central on PBS and the PBS app