1 00:00:00,080 --> 00:00:12,960 Speaker 1: Ye, Welcome to the Bloomberg Surveillance Podcast. I'm Tom Keene 2 00:00:13,480 --> 00:00:17,560 Speaker 1: Jay Leye. We bring you insight from the best in economics, finance, investment, 3 00:00:18,000 --> 00:00:23,520 Speaker 1: and international relations. Find Bloomberg Surveillance on Apple Podcasts, SoundCloud, 4 00:00:23,600 --> 00:00:32,040 Speaker 1: Bloomberg dot Com, and of course on the Bloomberg. The 5 00:00:32,159 --> 00:00:33,960 Speaker 1: markets are going to be a big part of the 6 00:00:34,000 --> 00:00:37,919 Speaker 1: conversation today, as is a fantastic piece of reporting from 7 00:00:37,960 --> 00:00:41,160 Speaker 1: our colleagues over at Bloomberg Business Week. A special shout 8 00:00:41,159 --> 00:00:44,160 Speaker 1: out to Jordan Robinson and Michael Riley as they reveal 9 00:00:44,200 --> 00:00:47,160 Speaker 1: how China used the smallest of chips in a hack 10 00:00:47,200 --> 00:00:50,239 Speaker 1: that infiltrated some of the biggest companies in America. The 11 00:00:50,240 --> 00:00:54,400 Speaker 1: attack by Chinese spies reaching almost thirty US companies by 12 00:00:54,440 --> 00:00:59,680 Speaker 1: compromising America's technology supply chain. This all according to extensive 13 00:00:59,720 --> 00:01:02,760 Speaker 1: intervie used with government and corporate sources. And I'm pleased 14 00:01:02,800 --> 00:01:05,040 Speaker 1: to say, Tom Keane, we're gonna be talking about this 15 00:01:05,280 --> 00:01:07,520 Speaker 1: a little bit later in the program, So really looking 16 00:01:07,520 --> 00:01:09,720 Speaker 1: forward to doing that a little bit later right here 17 00:01:09,880 --> 00:01:12,280 Speaker 1: on Bloomblock Surveillance to get to the price action and 18 00:01:12,319 --> 00:01:14,320 Speaker 1: what's happening in markets. I'm also pleased to say that 19 00:01:14,400 --> 00:01:16,160 Speaker 1: joining us here in New York is to buys the 20 00:01:16,240 --> 00:01:19,840 Speaker 1: left of its city group, Global Markets Chief US equity strategist, 21 00:01:19,840 --> 00:01:21,920 Speaker 1: Good morning to to Bias, good morning, how are you? 22 00:01:22,080 --> 00:01:24,840 Speaker 1: Let's start with those yields ten years, thirty years, or 23 00:01:24,880 --> 00:01:27,720 Speaker 1: breaking out what does it mean for the equity market. So, look, 24 00:01:27,920 --> 00:01:30,360 Speaker 1: we've been worried about this environment for a while. The 25 00:01:30,400 --> 00:01:32,640 Speaker 1: economy is strong enough for wage pressures are starting to 26 00:01:32,680 --> 00:01:34,920 Speaker 1: grow and probably growth in further based on some of 27 00:01:34,920 --> 00:01:39,920 Speaker 1: our analysis, So this was kind of almost in the cards. However, um, 28 00:01:40,040 --> 00:01:42,240 Speaker 1: how much flexibility is there in the equity market to 29 00:01:42,280 --> 00:01:44,400 Speaker 1: handle this? In our sense is that you've had a 30 00:01:44,520 --> 00:01:47,840 Speaker 1: range on equity ris premium since the financial crisis of 31 00:01:47,920 --> 00:01:51,320 Speaker 1: four to seven percentage points right. We're about four point 32 00:01:51,360 --> 00:01:54,160 Speaker 1: four percent right now, so you have flexibility to get 33 00:01:54,160 --> 00:01:55,640 Speaker 1: you to kind of about three and a half percent, 34 00:01:55,800 --> 00:01:59,200 Speaker 1: offset by less risk premium because you believe the economy 35 00:01:59,240 --> 00:02:02,520 Speaker 1: is growing beyond three and a half percent starts becoming 36 00:02:02,520 --> 00:02:05,120 Speaker 1: more challenging on the tenure yield um, and I think 37 00:02:05,160 --> 00:02:08,520 Speaker 1: that's where the pressure starts to evolve on on on valuation. 38 00:02:08,760 --> 00:02:10,680 Speaker 1: The chapter of the Fed Reserve out with I think 39 00:02:10,760 --> 00:02:13,400 Speaker 1: a really important common in the last twenty four hours 40 00:02:13,520 --> 00:02:16,840 Speaker 1: that he thinks we're a long way away from hitting 41 00:02:16,840 --> 00:02:18,840 Speaker 1: the neutral, right, But the FED, what do you think 42 00:02:18,840 --> 00:02:21,960 Speaker 1: of that? Subus? So look, I wonder how much and 43 00:02:22,000 --> 00:02:24,800 Speaker 1: again I'm trying to get into the motive behind saying that. 44 00:02:24,840 --> 00:02:27,280 Speaker 1: How much of that is moral suation trying to prevent 45 00:02:27,919 --> 00:02:30,440 Speaker 1: um the yield curve going flatter and footing, And how 46 00:02:30,520 --> 00:02:33,680 Speaker 1: how much is that kind of FED speak to to 47 00:02:33,840 --> 00:02:37,360 Speaker 1: force some steepening in the curve. I don't know his motive. 48 00:02:37,400 --> 00:02:39,919 Speaker 1: I don't know if that is what he wanted to imply, 49 00:02:40,080 --> 00:02:43,639 Speaker 1: But the FED historically has been able to utilize its 50 00:02:43,720 --> 00:02:47,080 Speaker 1: language to kind of get its way in the market. 51 00:02:47,120 --> 00:02:48,880 Speaker 1: If it didn't, then it can go into the market 52 00:02:48,919 --> 00:02:52,520 Speaker 1: and actually use its toolbox and crowbar kind of forced 53 00:02:52,560 --> 00:02:56,639 Speaker 1: the outcome. Do you care what Indian rupees doing? I mean, 54 00:02:56,680 --> 00:03:00,360 Speaker 1: I know city groups, you know, got branches and bay 55 00:03:00,400 --> 00:03:04,079 Speaker 1: and you're selling toasters and all that. But I mean, 56 00:03:04,919 --> 00:03:06,920 Speaker 1: the day after day John and I are watching e 57 00:03:07,080 --> 00:03:10,359 Speaker 1: M blow up in you know, different ways, in different forms, 58 00:03:10,440 --> 00:03:13,560 Speaker 1: and it seems like we're just rationalizing the revenue stream 59 00:03:13,600 --> 00:03:17,359 Speaker 1: of Amazon or Apple or the other magic stocks. Doesn't 60 00:03:17,360 --> 00:03:20,040 Speaker 1: a guy like you care about the knock on effects 61 00:03:20,040 --> 00:03:21,880 Speaker 1: to e M. We have to worry about. I mean, 62 00:03:21,880 --> 00:03:23,400 Speaker 1: one of the things that we watched, for example, is 63 00:03:23,440 --> 00:03:28,240 Speaker 1: the dollar relative to the performance of US markets versus 64 00:03:28,280 --> 00:03:30,600 Speaker 1: e M. And what do you see? It's very tight 65 00:03:30,639 --> 00:03:33,720 Speaker 1: over like thirty years. So anytime the dollar goes up, 66 00:03:33,720 --> 00:03:36,880 Speaker 1: you tend to see outflows from emerging markets UM, and 67 00:03:36,960 --> 00:03:40,040 Speaker 1: it puts meaningful pressure not just on the currencies one 68 00:03:40,040 --> 00:03:42,760 Speaker 1: of the economies as well as that foreign direct investment 69 00:03:42,840 --> 00:03:47,000 Speaker 1: kind of leaves in a often bumpy and an erratic way. 70 00:03:47,360 --> 00:03:51,000 Speaker 1: So do I care about the rupie personally? Maybe if 71 00:03:51,000 --> 00:03:53,520 Speaker 1: I'm planning a trip to the taj mahal Um. Do 72 00:03:53,600 --> 00:03:57,560 Speaker 1: we worry about it? From UM economic knock on effects 73 00:03:57,560 --> 00:04:00,640 Speaker 1: to the US It's fairly small for US cutty markets. 74 00:04:00,640 --> 00:04:03,160 Speaker 1: It's horrible if you're sitting in in the emerging markets 75 00:04:03,160 --> 00:04:05,560 Speaker 1: equity world to bus when you look at US markets 76 00:04:05,560 --> 00:04:07,160 Speaker 1: in a vacuum. And what I mean by that is 77 00:04:07,160 --> 00:04:10,400 Speaker 1: just focusing on domestic issues. America looks great. The DP 78 00:04:10,560 --> 00:04:13,840 Speaker 1: report yesterday was solid. The non manufacturing guy Sam was fantastic, 79 00:04:13,880 --> 00:04:15,200 Speaker 1: and it looks like we're set up for a decent 80 00:04:15,200 --> 00:04:17,720 Speaker 1: payrolls report. As well in a vacuum things look great. 81 00:04:17,920 --> 00:04:20,520 Speaker 1: When you look at things internationally, you just wonder how 82 00:04:20,560 --> 00:04:23,400 Speaker 1: US markets are holding up so well to bias. So 83 00:04:23,400 --> 00:04:25,760 Speaker 1: so I'm getting a lot of those questions actually, like 84 00:04:25,839 --> 00:04:28,120 Speaker 1: why is the US? Yeah, so so one is the 85 00:04:28,160 --> 00:04:32,039 Speaker 1: economy where we you know, keep in mind, probably sent 86 00:04:32,120 --> 00:04:36,159 Speaker 1: of the SMP five revenues are US driven. If it's 87 00:04:36,279 --> 00:04:39,479 Speaker 1: if it's for example, Asian sales of semi conduckers, it 88 00:04:39,520 --> 00:04:41,680 Speaker 1: really isn't. Those are products that are coming back here 89 00:04:42,040 --> 00:04:45,400 Speaker 1: in the form of smartphones, tablets, computers, servers, et cetera, 90 00:04:45,520 --> 00:04:49,719 Speaker 1: some apparently with rice like uh, espionage units on them. 91 00:04:49,720 --> 00:04:53,200 Speaker 1: But the the the economy itself is for that's one thing. 92 00:04:53,279 --> 00:04:56,520 Speaker 1: Number two, technology in particularly which is on the way 93 00:04:56,560 --> 00:05:00,000 Speaker 1: to the SMP five um is phenomenal in terms of demand. 94 00:05:00,279 --> 00:05:04,080 Speaker 1: And then lastly we have massive buyback activity. So that's 95 00:05:04,160 --> 00:05:06,280 Speaker 1: that's kind of keeping us separate from the rest of 96 00:05:06,320 --> 00:05:09,039 Speaker 1: the world. Exacuity, can we do a Surveilla's clarification not 97 00:05:09,120 --> 00:05:12,320 Speaker 1: a correction? Chris from New Jersey emails in and says, 98 00:05:12,640 --> 00:05:16,800 Speaker 1: did Tobias mean the old Trump taj Mahal that is 99 00:05:16,800 --> 00:05:20,480 Speaker 1: now the hard rock cafe in Atlantic city. I haven't 100 00:05:19,440 --> 00:05:24,760 Speaker 1: been many many Exactly I want to go. You want 101 00:05:24,760 --> 00:05:28,720 Speaker 1: to get back there? Okay, I just lose money. Needs 102 00:05:28,720 --> 00:05:30,320 Speaker 1: to worry about the rupeat. If he wants to go 103 00:05:30,440 --> 00:05:34,240 Speaker 1: to New Jersey, tell Chris actually has been replaced. Just 104 00:05:34,320 --> 00:05:36,200 Speaker 1: keep that in minded New Jersey. That's why it time 105 00:05:36,240 --> 00:05:39,240 Speaker 1: to email. Oh god, I think it was a different Chris. 106 00:05:40,080 --> 00:05:42,440 Speaker 1: I guess, but I don't care what. Maybe you don't 107 00:05:42,480 --> 00:05:45,440 Speaker 1: understanding I literally do not understand the appeal of gambling. 108 00:05:45,440 --> 00:05:51,320 Speaker 1: I really don't. Well, let's let's people think what you 109 00:05:51,440 --> 00:05:53,560 Speaker 1: do is gambling. I mean, come on, so let me 110 00:05:53,560 --> 00:05:55,920 Speaker 1: give you so far off? Can I can? I give 111 00:05:55,960 --> 00:06:01,120 Speaker 1: me two very important statistical days. Okay, um, nearly seventy 112 00:06:01,160 --> 00:06:03,200 Speaker 1: eight percent at the time. If you buy equities the 113 00:06:03,279 --> 00:06:05,480 Speaker 1: SMP five hundred, you will be up a year later. 114 00:06:05,520 --> 00:06:08,919 Speaker 1: If you look back over fifty sixty years, if you 115 00:06:09,000 --> 00:06:12,480 Speaker 1: go to a casino, there is a fifty six percent 116 00:06:12,560 --> 00:06:14,719 Speaker 1: probability that you will lose money. Okay, how do you 117 00:06:14,720 --> 00:06:16,800 Speaker 1: respond to the doubt chart? I have from two thousand 118 00:06:16,920 --> 00:06:21,400 Speaker 1: seven that five of the thirty three stocks rather have 119 00:06:21,520 --> 00:06:25,080 Speaker 1: outperformed Amazon, Visa, Nike, and there's two others. I can't 120 00:06:25,080 --> 00:06:28,120 Speaker 1: remember right now, ge on the bottom clearly, but I 121 00:06:28,200 --> 00:06:30,880 Speaker 1: use the SMP five. But if you don't gamble and 122 00:06:30,960 --> 00:06:33,919 Speaker 1: get those five stocks, you don't get elpit, do you. 123 00:06:34,080 --> 00:06:37,000 Speaker 1: But if you bought the index, the Dow Jones Index, 124 00:06:37,040 --> 00:06:39,359 Speaker 1: you would have been fine. If you're trying to I 125 00:06:39,400 --> 00:06:42,640 Speaker 1: think for most individuals trying to pick that wonderful stock 126 00:06:42,680 --> 00:06:44,720 Speaker 1: that's gonna make you ten times your money, you're you're 127 00:06:44,720 --> 00:06:49,279 Speaker 1: probably gonna lose because that probably approach. You know, I 128 00:06:49,320 --> 00:06:52,479 Speaker 1: always shove around with you. I own a few penny stocks. 129 00:06:52,480 --> 00:06:55,160 Speaker 1: They did didn't start out that way. Um, so all 130 00:06:55,200 --> 00:06:57,400 Speaker 1: of us will make a mistake buying stocks. But but 131 00:06:57,680 --> 00:07:01,279 Speaker 1: if you're buying stocks in aggregate, it's it's a winning 132 00:07:01,320 --> 00:07:05,880 Speaker 1: combination over time. The statistics Aretty, thank you for so 133 00:07:05,920 --> 00:07:08,200 Speaker 1: many things, but thank you for joining us this morning 134 00:07:08,200 --> 00:07:11,640 Speaker 1: to bars Left City Group Global Markets chief US. Can 135 00:07:11,680 --> 00:07:14,720 Speaker 1: you see that we're both you are troubled today on 136 00:07:15,000 --> 00:07:18,040 Speaker 1: both of us were watching Leaves Canadians last night. We 137 00:07:21,160 --> 00:07:23,880 Speaker 1: are talking about that one because in the real world, 138 00:07:24,040 --> 00:07:28,320 Speaker 1: least Canadians really matters in certainly in Canada matters. And 139 00:07:28,320 --> 00:07:34,040 Speaker 1: when Toronto beats Montreal, it really hurts us. Montreal or Toronto, 140 00:07:45,840 --> 00:07:48,600 Speaker 1: John Farroll and Tom Keane, And in terms of the 141 00:07:48,640 --> 00:07:53,000 Speaker 1: diplomacy and the international relations of our Bloomberg Business Week 142 00:07:53,040 --> 00:07:56,920 Speaker 1: effort on spying by China by elements of the People's 143 00:07:56,960 --> 00:08:00,960 Speaker 1: Liberation Army by placing microchips on over boards that ended 144 00:08:01,040 --> 00:08:05,120 Speaker 1: up being used by thirty American corporations, and illusions occurse 145 00:08:05,280 --> 00:08:09,400 Speaker 1: over to our defense and intelligence establishment. It is good 146 00:08:09,920 --> 00:08:12,760 Speaker 1: to speak to the eleventh United States Ambassador to China, 147 00:08:12,800 --> 00:08:16,760 Speaker 1: the gentleman from Montana, Max BACKUS Ambassador book is wonderful 148 00:08:16,800 --> 00:08:20,600 Speaker 1: to have you with us up today. Many in government 149 00:08:20,760 --> 00:08:25,720 Speaker 1: have known about these efforts by China for years. Bloomberg 150 00:08:25,760 --> 00:08:29,800 Speaker 1: now publishes the history of this from two thousand fourteen 151 00:08:29,840 --> 00:08:34,160 Speaker 1: and definitely two thousand fifteen bring us to the present 152 00:08:34,360 --> 00:08:38,920 Speaker 1: right now. Is cyber attack, spying whatever you want to 153 00:08:38,960 --> 00:08:42,200 Speaker 1: call it from China? Is it a growing issue or 154 00:08:42,240 --> 00:08:46,240 Speaker 1: is it a stable issue that's a growing issue, Um, 155 00:08:46,679 --> 00:08:49,040 Speaker 1: It's probably one of the biggest issues we have. During 156 00:08:49,040 --> 00:08:53,480 Speaker 1: the time I served UM in China, I pressed the 157 00:08:53,640 --> 00:08:55,679 Speaker 1: government as hard as I could to try to admit 158 00:08:55,800 --> 00:09:00,840 Speaker 1: that that made me a distinction between them for security 159 00:09:00,840 --> 00:09:03,319 Speaker 1: purposes and science for commercial purpose. I couldn't even get 160 00:09:03,320 --> 00:09:05,440 Speaker 1: them agree to that. Finally we got the goods on 161 00:09:05,480 --> 00:09:08,800 Speaker 1: them when we are able to document that one of 162 00:09:08,840 --> 00:09:15,640 Speaker 1: their patriot companies, DTE was Transparent Technology against uh as 163 00:09:15,640 --> 00:09:18,760 Speaker 1: a proliferation statute and that's akin to what they've been doing. 164 00:09:19,000 --> 00:09:22,480 Speaker 1: We also during the OPR investigation found it. So they 165 00:09:22,520 --> 00:09:27,560 Speaker 1: sold about fifty million records of the US citizens, and 166 00:09:27,960 --> 00:09:30,559 Speaker 1: we had the goods on them, and they didn't admit it, 167 00:09:30,600 --> 00:09:33,800 Speaker 1: of course, but they did agree that we started to 168 00:09:33,840 --> 00:09:38,120 Speaker 1: sanction them, that they agreed to the security agreements with 169 00:09:38,120 --> 00:09:41,560 Speaker 1: with with US and which was there's five parts to it, 170 00:09:42,160 --> 00:09:49,080 Speaker 1: namely to them. So that's good to first admit it. Okay, 171 00:09:49,120 --> 00:09:53,000 Speaker 1: we're spying, which just something about it. Right within this 172 00:09:53,080 --> 00:09:56,480 Speaker 1: ambassador is the idea of what should be our approach. 173 00:09:57,000 --> 00:09:59,920 Speaker 1: Things move slowly in the legislative body of a wor 174 00:10:00,640 --> 00:10:04,320 Speaker 1: do we have time to go through a slow American 175 00:10:04,480 --> 00:10:09,560 Speaker 1: process to protect our cyber technology or do we do 176 00:10:09,679 --> 00:10:13,120 Speaker 1: we have to speed things up. We're gonna have to 177 00:10:13,120 --> 00:10:17,199 Speaker 1: speed things up. I think this is the biggest problem 178 00:10:17,280 --> 00:10:20,120 Speaker 1: we have, not just with China but frankly the world. 179 00:10:20,280 --> 00:10:23,600 Speaker 1: That is, we are behind the eight ball, we Americans. Um, 180 00:10:23,720 --> 00:10:27,520 Speaker 1: it's just technology that's growing so quickly, and that's good. 181 00:10:28,080 --> 00:10:32,400 Speaker 1: Uh reach a point where countries are going to have 182 00:10:32,480 --> 00:10:36,080 Speaker 1: to realize that they we've got to home reach some 183 00:10:36,160 --> 00:10:38,720 Speaker 1: kind of agreements otherwise it's it's gonna be wild. Wise. 184 00:10:39,640 --> 00:10:41,040 Speaker 1: I think we've got some problems with a line. So 185 00:10:41,280 --> 00:10:50,679 Speaker 1: we'll have to apologize the technical difficulties with us this 186 00:10:50,720 --> 00:10:52,559 Speaker 1: morning that there's an important interview and you could hear 187 00:10:52,600 --> 00:10:54,520 Speaker 1: the heat there in the in the history that the 188 00:10:54,679 --> 00:10:58,040 Speaker 1: ambassador Backus was directly involved in with z T E 189 00:10:58,320 --> 00:11:00,640 Speaker 1: and z T is brought up in the store. Worry 190 00:11:00,840 --> 00:11:04,920 Speaker 1: is sort of iteration one, and now this is iteration too. 191 00:11:05,000 --> 00:11:08,559 Speaker 1: So I think traditionally when we think about cyber protection 192 00:11:08,960 --> 00:11:11,840 Speaker 1: at cyber warfare with thinking about the software Tom And 193 00:11:11,880 --> 00:11:15,080 Speaker 1: what's interesting about Bloomberg's reporting today and reporting from our 194 00:11:15,120 --> 00:11:17,439 Speaker 1: colleagues at Business Week, is this is about the hardware. 195 00:11:17,800 --> 00:11:20,160 Speaker 1: And of course, as everyone listening knows, a lot of 196 00:11:20,200 --> 00:11:24,040 Speaker 1: this hardware is made in China, So what can you 197 00:11:24,160 --> 00:11:30,360 Speaker 1: do to national that the hardware is made in But 198 00:11:30,559 --> 00:11:33,520 Speaker 1: you nailed the luxury and I mentioned this on television 199 00:11:33,559 --> 00:11:37,200 Speaker 1: and Kinneth Rogoff of Harvard ten years out front on this. 200 00:11:37,760 --> 00:11:41,600 Speaker 1: We're addicted to the capitalism to the price theory of 201 00:11:41,679 --> 00:11:45,240 Speaker 1: cheap stuff from China, whether it's you know, bow Tizer 202 00:11:45,440 --> 00:11:48,400 Speaker 1: or whatever. Well, guess what. Some of this stuff is 203 00:11:48,440 --> 00:11:51,960 Speaker 1: important and involves espionage and that and my question the 204 00:11:51,960 --> 00:11:55,320 Speaker 1: ambassador was going to be, Okay, if we don't make 205 00:11:55,360 --> 00:11:59,559 Speaker 1: it in China, where do we make it in America? 206 00:11:59,640 --> 00:12:03,880 Speaker 1: Which is President Trump's theme? And you hear a thundering silence, 207 00:12:03,920 --> 00:12:06,160 Speaker 1: And if and if the hardware is compromise, what can 208 00:12:06,200 --> 00:12:07,880 Speaker 1: you do? Tom? You're going to check every single life 209 00:12:07,880 --> 00:12:10,400 Speaker 1: fund that's produced out of China. You're going to check 210 00:12:10,440 --> 00:12:13,160 Speaker 1: every single chip that has produced out of China. Yeah. 211 00:12:13,160 --> 00:12:15,319 Speaker 1: I want to make clear that within the reporting and 212 00:12:15,720 --> 00:12:20,000 Speaker 1: speaking with Jordan Robertson, that this is not about consumer 213 00:12:20,040 --> 00:12:24,200 Speaker 1: goods and iPhones here, and I'm certainly not trying to 214 00:12:24,200 --> 00:12:26,400 Speaker 1: infer that that's what this is about. What I'm saying, Tom, 215 00:12:26,480 --> 00:12:28,839 Speaker 1: is that much of the hardware is produced there. So 216 00:12:28,880 --> 00:12:31,319 Speaker 1: how on earth do you have some kind of cyber 217 00:12:31,360 --> 00:12:35,760 Speaker 1: protection scheme, initiative policy that protects you from what has 218 00:12:35,800 --> 00:12:38,280 Speaker 1: happened and what our reporting reveals. And and again, as 219 00:12:38,360 --> 00:12:41,600 Speaker 1: Max Park has said, there, we've negotiated and got nowhere 220 00:12:41,600 --> 00:12:43,640 Speaker 1: and sort of you really wonder where it goes. And 221 00:12:43,720 --> 00:12:47,760 Speaker 1: I would suggest that all Democrats, um would give a 222 00:12:47,880 --> 00:12:51,520 Speaker 1: victory lap to the president for at least identifying the 223 00:12:51,720 --> 00:12:56,640 Speaker 1: urgency and immediacy. Was with Secretary Ross about this, but 224 00:12:56,679 --> 00:12:58,520 Speaker 1: I think it makes it very public. It makes it 225 00:12:58,640 --> 00:13:00,480 Speaker 1: very public, and it comes want to day you that 226 00:13:00,520 --> 00:13:03,080 Speaker 1: we're expecting Vice President Mike pens to come. I'm glad 227 00:13:03,080 --> 00:13:06,360 Speaker 1: you mentioned and layout allegations of Chinese election medaling in 228 00:13:06,400 --> 00:13:09,760 Speaker 1: a harshly worded speech to expecting late today um Dan 229 00:13:09,880 --> 00:13:21,480 Speaker 1: in Washington, Tom, so look out for that. One of 230 00:13:21,480 --> 00:13:24,360 Speaker 1: our most popular guests over the years. Luisia Mata joins 231 00:13:24,440 --> 00:13:28,439 Speaker 1: us now from Luisia Mata Technical Research. Louise, I'm just 232 00:13:28,480 --> 00:13:31,880 Speaker 1: going to cut to the chase. You look at consolidation 233 00:13:32,400 --> 00:13:36,440 Speaker 1: and distribution, the minute price changes that are seen in 234 00:13:36,559 --> 00:13:40,080 Speaker 1: point and figure charting. Can you be long equities today? 235 00:13:41,440 --> 00:13:44,760 Speaker 1: We are growing much more cautious. I think I would 236 00:13:44,800 --> 00:13:48,280 Speaker 1: be taking money off the table in the groups and 237 00:13:48,360 --> 00:13:53,840 Speaker 1: stocks that are underperforming and that are showing monthly momentum 238 00:13:53,880 --> 00:13:56,600 Speaker 1: sales signals, and we have more and more. Give us 239 00:13:56,600 --> 00:14:00,640 Speaker 1: an example of those sectors. Does it include banking? Okay, yeah, 240 00:14:00,679 --> 00:14:04,679 Speaker 1: it does include the financials, utilities of course, reads, materials, 241 00:14:05,120 --> 00:14:10,280 Speaker 1: industrials s flirting with the cell signals, financials and staples 242 00:14:10,320 --> 00:14:12,360 Speaker 1: at this moment. And we have to see how the 243 00:14:13,000 --> 00:14:17,960 Speaker 1: new consumer discretionary in the communications groups evolved, because what 244 00:14:18,160 --> 00:14:22,720 Speaker 1: SMP did was not start them new with the the 245 00:14:22,240 --> 00:14:25,880 Speaker 1: news the new sectors. Yeah yeah, yeah, they they encourage 246 00:14:25,920 --> 00:14:28,400 Speaker 1: them and change the devices. We will see over time. 247 00:14:28,680 --> 00:14:30,360 Speaker 1: In folks, I think all of you know that I'm 248 00:14:30,360 --> 00:14:32,760 Speaker 1: in fully on board with point and figure charting, going 249 00:14:32,760 --> 00:14:36,160 Speaker 1: back to and the I have no time function on 250 00:14:36,200 --> 00:14:39,920 Speaker 1: the X axis, Louise. What everybody wants to know is 251 00:14:40,000 --> 00:14:45,120 Speaker 1: can you use traditional technical analysis to benefit on a 252 00:14:45,200 --> 00:14:49,480 Speaker 1: bi hole cell basis with modern stocks like Apple Computer 253 00:14:49,640 --> 00:14:55,880 Speaker 1: and particularly with Amazon of course, yeah, you mean the 254 00:14:55,880 --> 00:14:58,120 Speaker 1: point and figure charts And what do they say then, okay, 255 00:14:58,160 --> 00:15:00,720 Speaker 1: you could use them. What do they say right now? Well, 256 00:15:00,800 --> 00:15:04,600 Speaker 1: the the Apple is continuing in an uptrend just the 257 00:15:04,600 --> 00:15:06,600 Speaker 1: way it is on a bar chart. There. You know 258 00:15:06,920 --> 00:15:10,240 Speaker 1: they have similarities and Amazon as well, so you you're 259 00:15:10,400 --> 00:15:12,840 Speaker 1: you're gonna hold those right now? Can you acquire new 260 00:15:12,920 --> 00:15:16,760 Speaker 1: shares of Apple and Amazon? In particularly the idea that 261 00:15:16,800 --> 00:15:19,320 Speaker 1: the market so underweight to Apple that they gotta they 262 00:15:19,320 --> 00:15:23,120 Speaker 1: gotta level up by the end of the year. Well, 263 00:15:23,160 --> 00:15:25,840 Speaker 1: the stock has been doing incredibly well. I mean, if 264 00:15:25,840 --> 00:15:29,320 Speaker 1: you have no positions, I think you could probably nibble 265 00:15:29,400 --> 00:15:33,120 Speaker 1: a little. But things are getting quite extended, and given 266 00:15:33,160 --> 00:15:36,720 Speaker 1: the fact that we're starting to see some underlying um 267 00:15:36,720 --> 00:15:39,520 Speaker 1: starting to see over the past months of this year, 268 00:15:39,560 --> 00:15:42,920 Speaker 1: we've been seeing negative divergences in new highs, new lows, 269 00:15:42,960 --> 00:15:46,120 Speaker 1: and volume momentum and stocks above the two hundred day 270 00:15:46,240 --> 00:15:49,200 Speaker 1: moving averages which now for the New York Stock Exchange 271 00:15:49,200 --> 00:15:53,400 Speaker 1: has broken below and is a clear warning for the 272 00:15:53,480 --> 00:15:57,520 Speaker 1: overall market. So the divergences have been going on for 273 00:15:57,560 --> 00:16:00,680 Speaker 1: several years, so we're getting closer and closer. What what 274 00:16:00,720 --> 00:16:04,120 Speaker 1: would happen next? Which would concern us would be uh 275 00:16:04,360 --> 00:16:08,920 Speaker 1: monthly momentum sell signals on our industries. The European industries 276 00:16:08,960 --> 00:16:11,800 Speaker 1: are all on monthly sales. Most of the Asian that 277 00:16:11,840 --> 00:16:14,880 Speaker 1: we follow are, with the exception of Japan and India. 278 00:16:15,000 --> 00:16:17,360 Speaker 1: Luisia Matta. In the last twenty four hours, it's been 279 00:16:17,360 --> 00:16:22,000 Speaker 1: amazing split between large cap and small cap with small 280 00:16:22,080 --> 00:16:25,480 Speaker 1: kept John correct me small cap self right smoke cap 281 00:16:25,480 --> 00:16:27,720 Speaker 1: movie sound What do you mean, this is right in 282 00:16:27,760 --> 00:16:31,200 Speaker 1: the heart of Luisia Mata's research. Note, why do you 283 00:16:31,320 --> 00:16:35,120 Speaker 1: parse small, mid and large cap. Well, the small in 284 00:16:35,160 --> 00:16:38,160 Speaker 1: the meter starting to roll over. They've been under performing, 285 00:16:38,200 --> 00:16:41,160 Speaker 1: but now the prices are actually starting to roll over, 286 00:16:41,200 --> 00:16:44,080 Speaker 1: while the down the SMP have been inching higher. We 287 00:16:44,160 --> 00:16:47,200 Speaker 1: still have upward potential in the down in the SMP. 288 00:16:47,440 --> 00:16:50,720 Speaker 1: But I think one has to be growingly cautious than 289 00:16:50,760 --> 00:16:54,560 Speaker 1: watching one sports individual stocks in the portfolios, because a 290 00:16:54,560 --> 00:16:57,920 Speaker 1: lot of individual stocks around cell signals. Also, he's told 291 00:16:57,920 --> 00:17:00,320 Speaker 1: to me about the sound signals you see abroad and 292 00:17:00,360 --> 00:17:01,840 Speaker 1: the fact that you don't see that trend in the 293 00:17:01,920 --> 00:17:07,520 Speaker 1: United States, and how unique that difference is. Well, you've 294 00:17:07,560 --> 00:17:10,800 Speaker 1: got sell signals on the foot, see the CAC, the docks, 295 00:17:10,920 --> 00:17:16,359 Speaker 1: the Italian market, Spain and Switzerland. Uh so there there 296 00:17:16,400 --> 00:17:20,240 Speaker 1: clearly has been a pattern of distribution in those countries. 297 00:17:20,640 --> 00:17:22,840 Speaker 1: Whether or not they can grip at some point and 298 00:17:22,880 --> 00:17:27,119 Speaker 1: turn up is questionable with those monthly cell signals in place. 299 00:17:27,160 --> 00:17:31,080 Speaker 1: But the US is still in the lead. And uh 300 00:17:31,280 --> 00:17:35,320 Speaker 1: of course the interest rate perspective is also intriguing. If 301 00:17:35,359 --> 00:17:38,560 Speaker 1: you're interested covering that, well, we know we do we 302 00:17:38,600 --> 00:17:41,240 Speaker 1: cover into come on, Louise, we cover interest rates a 303 00:17:41,280 --> 00:17:44,440 Speaker 1: little bit. Do we have a true breakout on tenure 304 00:17:44,680 --> 00:17:49,160 Speaker 1: or thirty year or they within the Yamada range absolutely breakout. 305 00:17:49,359 --> 00:17:52,960 Speaker 1: We've we've been suggesting that a little tick above three 306 00:17:53,359 --> 00:17:55,840 Speaker 1: for the tenure was a breakout. You have eight to 307 00:17:55,920 --> 00:17:59,240 Speaker 1: ten year basing that's taken place in these duh in 308 00:17:59,359 --> 00:18:04,200 Speaker 1: these um treasuries also for the two year. And we 309 00:18:04,280 --> 00:18:08,480 Speaker 1: know that reversals from falling rate cycles to rising rate 310 00:18:08,520 --> 00:18:13,119 Speaker 1: tacles take time because they've all experienced deflationary pressures. Historically 311 00:18:13,119 --> 00:18:15,800 Speaker 1: it's been two to fourteen years, and here we are 312 00:18:16,000 --> 00:18:18,280 Speaker 1: eight to ten years, and I think it's a very 313 00:18:18,359 --> 00:18:21,760 Speaker 1: valid change. We're now in a new rising rate cycle. So, Louise, 314 00:18:21,760 --> 00:18:23,320 Speaker 1: I want to watch you about this because so many 315 00:18:23,320 --> 00:18:25,640 Speaker 1: people have a different level and they plot the thirty 316 00:18:25,720 --> 00:18:29,800 Speaker 1: year bull market in treasuries and they try and identify 317 00:18:29,880 --> 00:18:31,760 Speaker 1: the point where we have a real breakout, where the 318 00:18:31,760 --> 00:18:34,960 Speaker 1: bull market is over. Do you have that point in mind? 319 00:18:35,080 --> 00:18:37,520 Speaker 1: And how far through it are we? It was three 320 00:18:38,119 --> 00:18:41,560 Speaker 1: three percent has been the the threshold for the thirty 321 00:18:41,680 --> 00:18:44,520 Speaker 1: and for the ten and you're clearly through it. I 322 00:18:44,560 --> 00:18:47,240 Speaker 1: think you have our report from this month and there's 323 00:18:47,280 --> 00:18:50,719 Speaker 1: a very interesting study showing that we've now put in 324 00:18:50,760 --> 00:18:55,680 Speaker 1: the first lower lower in price, higher low in field, 325 00:18:56,040 --> 00:18:59,720 Speaker 1: and that signifies to us the point which the trend 326 00:18:59,760 --> 00:19:02,000 Speaker 1: has change. John, we gotta be careful because lose your 327 00:19:02,000 --> 00:19:04,560 Speaker 1: model will hang up on us. If that's the case. 328 00:19:05,080 --> 00:19:06,960 Speaker 1: And if you take and you're gonna love this, John, 329 00:19:07,240 --> 00:19:09,960 Speaker 1: if you take a three box horizontal account and you 330 00:19:09,960 --> 00:19:13,160 Speaker 1: get to some high yield of Louisia Mada two yields 331 00:19:13,200 --> 00:19:16,959 Speaker 1: finally compete with dividends. Forget about Louisia model Louise if 332 00:19:17,000 --> 00:19:20,399 Speaker 1: you're a fundamental person, is higher yields finally going to 333 00:19:20,480 --> 00:19:24,359 Speaker 1: compete with dividend and the assumption of dividend growth. Well, 334 00:19:24,400 --> 00:19:27,480 Speaker 1: I certainly think at this point that a conservative investor 335 00:19:27,560 --> 00:19:31,399 Speaker 1: could move into a two year note, if not a 336 00:19:31,480 --> 00:19:34,679 Speaker 1: one year bill where you're getting two point five, and 337 00:19:34,880 --> 00:19:37,160 Speaker 1: compare that to some of the yields, and then think 338 00:19:37,160 --> 00:19:40,280 Speaker 1: about whether or not your stockings having difficulties. I would 339 00:19:40,359 --> 00:19:42,679 Speaker 1: rather move to the safety of a short end. You 340 00:19:42,720 --> 00:19:45,280 Speaker 1: don't want to go long end when you're moving into 341 00:19:45,280 --> 00:19:48,560 Speaker 1: a rising interest rate cycle. You don't want the ten yere, 342 00:19:48,640 --> 00:19:51,119 Speaker 1: you don't want the thirty year because if you go 343 00:19:51,240 --> 00:19:54,040 Speaker 1: with a one year or a two year and they come, 344 00:19:54,119 --> 00:19:58,199 Speaker 1: do you can roll that money into a higher yield 345 00:19:58,240 --> 00:20:01,200 Speaker 1: at that point in time in tense Consluisia Mata thumb 346 00:20:01,280 --> 00:20:07,320 Speaker 1: up on gold or down down? Okay, there you go, Okay, 347 00:20:07,320 --> 00:20:09,840 Speaker 1: neutral best but down that's fair. Luisa Manta, Thank you 348 00:20:09,880 --> 00:20:13,840 Speaker 1: so much. Louisa Manta Technical service. We're really just brilliant. 349 00:20:14,240 --> 00:20:17,240 Speaker 1: Were brilliant. No, we protect the copyright John of our notes. 350 00:20:17,320 --> 00:20:21,879 Speaker 1: But she's like old school, like the old trends distribution. 351 00:20:21,960 --> 00:20:25,720 Speaker 1: She said, an eight year base in the tenure yield. 352 00:20:27,160 --> 00:20:41,600 Speaker 1: Spend the whole day talking about fundamentals. It's nice. John 353 00:20:41,600 --> 00:20:44,000 Speaker 1: Farrell and Tom came from her studios in New York. 354 00:20:44,200 --> 00:20:48,720 Speaker 1: We said, good morning FM Washington, where Jordan Robertson is 355 00:20:48,760 --> 00:20:51,600 Speaker 1: taking a victory lap with Michael Reiley. He is an 356 00:20:51,640 --> 00:20:57,360 Speaker 1: author of a forever changing article on cyber attacks America 357 00:20:57,560 --> 00:21:01,200 Speaker 1: in our naivete of the Chinese Jordan. There's about eight 358 00:21:01,200 --> 00:21:03,520 Speaker 1: ways to go here. John Farrell has three or four 359 00:21:03,560 --> 00:21:06,400 Speaker 1: of them's own. I want to focus on one thing. 360 00:21:07,119 --> 00:21:10,520 Speaker 1: You have a pregnant sentence early in your Business Week 361 00:21:10,680 --> 00:21:15,440 Speaker 1: article where you basically say operatives of part of the 362 00:21:15,480 --> 00:21:19,439 Speaker 1: People's Liberation Army. The p l A to me is 363 00:21:19,440 --> 00:21:23,199 Speaker 1: in a museum display up at the met in ninety eight, 364 00:21:23,320 --> 00:21:27,120 Speaker 1: like Red Guardish and all that. Obviously I'm wrong. Who 365 00:21:27,240 --> 00:21:32,480 Speaker 1: are operatives of the People's Liberation Army? Sure as uh yeah, 366 00:21:32,520 --> 00:21:35,000 Speaker 1: as the story shows, you know, U S Intelligence agencies 367 00:21:35,000 --> 00:21:38,800 Speaker 1: have attributed this attack, the hardware modification attack, to a 368 00:21:38,880 --> 00:21:42,160 Speaker 1: unit of the p l A that specializes in hardware modification. 369 00:21:42,359 --> 00:21:43,879 Speaker 1: And you know the n s A. Here in the 370 00:21:43,920 --> 00:21:45,600 Speaker 1: U S. We we have units that do these kinds 371 00:21:45,600 --> 00:21:47,760 Speaker 1: of things too, but the differences in China, you know, 372 00:21:47,880 --> 00:21:50,640 Speaker 1: you have the manufacturing base for the for the worldwide 373 00:21:50,920 --> 00:21:55,080 Speaker 1: you know, the global computer supply chain, computer equipment and 374 00:21:55,080 --> 00:21:57,600 Speaker 1: supply chain. So from what we understand, this is a 375 00:21:57,680 --> 00:22:00,080 Speaker 1: very specialized unit of the p l A. Uh that, 376 00:22:00,160 --> 00:22:03,720 Speaker 1: in addition to doing cyber you know, having cyber capabilities, uh, 377 00:22:03,760 --> 00:22:08,679 Speaker 1: you know, specializes in manipulating hardware. So the cyber hardware synthesis, 378 00:22:08,720 --> 00:22:10,680 Speaker 1: I mean, other than the fact that John Farrell looks 379 00:22:10,680 --> 00:22:13,320 Speaker 1: a lot like Daniel Craig, I mean it's out of 380 00:22:13,320 --> 00:22:15,480 Speaker 1: a Bond movie or it's what's his name, Keno Reeves 381 00:22:15,520 --> 00:22:19,800 Speaker 1: as I pronounced it right, the guy in the matrix question. 382 00:22:19,840 --> 00:22:23,560 Speaker 1: But come on, it's science fiction. Are these guys in uniform? 383 00:22:23,920 --> 00:22:27,119 Speaker 1: Are they peeky engineers who went where at Caltech? But 384 00:22:27,560 --> 00:22:29,360 Speaker 1: I want to last you about that, just how difficult 385 00:22:29,359 --> 00:22:33,040 Speaker 1: it is to access the manufacturing process of some of 386 00:22:33,080 --> 00:22:36,440 Speaker 1: these goods, and at one point they infiltrate it that 387 00:22:36,480 --> 00:22:39,880 Speaker 1: process to get this chip into the hardware. Yeah. One 388 00:22:39,920 --> 00:22:41,840 Speaker 1: of the things that we've encountered in reporting this story 389 00:22:41,920 --> 00:22:44,439 Speaker 1: is people here are reporting, they say, why would you 390 00:22:44,480 --> 00:22:47,600 Speaker 1: go to those lengths And the answer is if you're China. Well, 391 00:22:47,640 --> 00:22:49,640 Speaker 1: the answer is because you can. You know, if you're 392 00:22:49,720 --> 00:22:52,840 Speaker 1: China and you're trying to infiltrate highly sensitive, highly secured 393 00:22:53,160 --> 00:22:56,000 Speaker 1: government or corporate networks, you know, that's really the only 394 00:22:56,040 --> 00:22:58,240 Speaker 1: justification for going to these lengths. I mean, just to 395 00:22:58,280 --> 00:23:01,080 Speaker 1: be clear, the Chinese government has no incentive to do this. 396 00:23:01,520 --> 00:23:04,119 Speaker 1: For your mass market consumer devices, they would get caught, 397 00:23:04,640 --> 00:23:06,600 Speaker 1: it wouldn't be targeted. But if you're trying to infiltrate 398 00:23:06,680 --> 00:23:09,680 Speaker 1: highly sensitive, highly secure facilities, that's really the only thing 399 00:23:09,720 --> 00:23:12,359 Speaker 1: that justifies the time and effort. To one example in 400 00:23:12,480 --> 00:23:15,080 Speaker 1: Lockeed Martin, I believe is not in your reporting, correct me? 401 00:23:15,119 --> 00:23:18,960 Speaker 1: If I'm wrong to go to the lockeed Martin website 402 00:23:19,080 --> 00:23:21,040 Speaker 1: and John, they've got a thing called the F thirty 403 00:23:21,080 --> 00:23:24,480 Speaker 1: five Lightning Do which is a jet. So if you 404 00:23:24,600 --> 00:23:28,359 Speaker 1: got a little microchip on a board at any given company, John, 405 00:23:28,359 --> 00:23:30,320 Speaker 1: aren't you going to get the blueprints the radar of 406 00:23:30,359 --> 00:23:34,280 Speaker 1: the electronics that we're talking about access? They've got the acts, Jordan, 407 00:23:34,320 --> 00:23:36,640 Speaker 1: they've got the access. Just in terms of a story 408 00:23:36,640 --> 00:23:38,639 Speaker 1: and how this plays out, what did they do with 409 00:23:38,680 --> 00:23:40,320 Speaker 1: that access? Do we have any idea what they did 410 00:23:40,400 --> 00:23:42,440 Speaker 1: with that access? Sure? Yeah, well we know what they 411 00:23:42,440 --> 00:23:44,800 Speaker 1: wanted to clarify. We know what they wanted to do 412 00:23:44,840 --> 00:23:47,200 Speaker 1: with the access from some of the government sources we 413 00:23:47,280 --> 00:23:49,159 Speaker 1: talked to. And the idea is this. You know, one 414 00:23:49,160 --> 00:23:51,040 Speaker 1: of the things we encounter in this reporting is people say, 415 00:23:51,040 --> 00:23:53,800 Speaker 1: why would you land on a commodity server? Super Micro 416 00:23:53,880 --> 00:23:57,199 Speaker 1: makes ordinary blade servers, the pizza box sized servers that 417 00:23:57,320 --> 00:23:59,560 Speaker 1: just processed data their commodities. Why would you want to 418 00:23:59,600 --> 00:24:01,479 Speaker 1: land on those avers? And we've had intelligence folks tell 419 00:24:01,520 --> 00:24:06,160 Speaker 1: us a server is actually the perfect staging area for reconnaissance, probing, 420 00:24:06,560 --> 00:24:09,800 Speaker 1: uh and you know, and evaluating a network because because 421 00:24:09,800 --> 00:24:12,639 Speaker 1: it's a commodity because nobody really looks there for a 422 00:24:12,680 --> 00:24:15,600 Speaker 1: sophisticated attack. They look at the high value targets like 423 00:24:15,800 --> 00:24:17,720 Speaker 1: a network switch and network we're out of the places 424 00:24:17,760 --> 00:24:20,080 Speaker 1: that hackers really love to be. So the ideas this 425 00:24:20,119 --> 00:24:23,280 Speaker 1: is a staging area to perform reconnaissance on target networks, 426 00:24:23,320 --> 00:24:25,720 Speaker 1: to have kind of a stealth access point in and out. 427 00:24:25,960 --> 00:24:28,040 Speaker 1: You know, especially if it's an Internet data center like 428 00:24:28,080 --> 00:24:30,719 Speaker 1: Apple and Amazon run tons and tons of traffic are 429 00:24:30,720 --> 00:24:33,000 Speaker 1: being pumped through those machines every every man of the day, 430 00:24:33,520 --> 00:24:35,879 Speaker 1: so you can hide in that traffic. And the idea 431 00:24:35,960 --> 00:24:38,200 Speaker 1: is you've got a backdoor. You've got multiple backdoors. You've 432 00:24:38,200 --> 00:24:41,200 Speaker 1: gotten you know, dozens or potentially more ways into these networks. 433 00:24:41,440 --> 00:24:43,240 Speaker 1: And that's that's not a it's it's a means to 434 00:24:43,280 --> 00:24:45,400 Speaker 1: an end. It's it's a staging area. It's the first 435 00:24:45,440 --> 00:24:47,560 Speaker 1: stage of the attack and the goal then is to 436 00:24:47,600 --> 00:24:50,640 Speaker 1: get to more sensitive networks and to create a pathway 437 00:24:50,720 --> 00:24:53,080 Speaker 1: into you know, places where sensitive corporate I p. S 438 00:24:53,280 --> 00:24:56,440 Speaker 1: Is is stored, uh you know, or where there are 439 00:24:56,440 --> 00:24:58,240 Speaker 1: you know, Elemental, one of the companies in the story 440 00:24:58,359 --> 00:25:01,120 Speaker 1: that that found these chips. You know, they they their 441 00:25:01,280 --> 00:25:04,399 Speaker 1: equipment helps run the CIA drone program they process and 442 00:25:04,400 --> 00:25:07,040 Speaker 1: this is on their website. They process real time drone 443 00:25:07,040 --> 00:25:10,119 Speaker 1: footage for the CIA and the Defense Department. Like you know, 444 00:25:10,160 --> 00:25:11,920 Speaker 1: if you're China, you can land on one of those 445 00:25:11,920 --> 00:25:14,440 Speaker 1: servers and get any little bit of data out of them. 446 00:25:14,840 --> 00:25:16,639 Speaker 1: We don't have evidence that they landed on the CIA 447 00:25:16,680 --> 00:25:19,600 Speaker 1: program servers, but that is a supplier. Elemental is a 448 00:25:19,600 --> 00:25:22,920 Speaker 1: supplier to that program. That's a jackpot. That's the holy grail. 449 00:25:22,880 --> 00:25:25,679 Speaker 1: It's worth taking the road. It's a fantastic piece of 450 00:25:25,680 --> 00:25:27,760 Speaker 1: reporting that understand took you more than a year to 451 00:25:27,760 --> 00:25:30,560 Speaker 1: put together. For our listeners that haven't been following this 452 00:25:30,640 --> 00:25:32,679 Speaker 1: through the morning, there's some pretty strong denounced by the 453 00:25:32,680 --> 00:25:36,840 Speaker 1: companies involved. Amazon, Apple, You've been very transparent about it, 454 00:25:36,880 --> 00:25:39,800 Speaker 1: You've published those denials for our listeners that are skeptical. 455 00:25:39,880 --> 00:25:42,080 Speaker 1: What do you say about the sourcing of your story 456 00:25:42,440 --> 00:25:44,800 Speaker 1: and why you did publish it even with those really 457 00:25:44,840 --> 00:25:47,480 Speaker 1: strong denials. Sure, thanks for the questions, A very good questions, 458 00:25:47,560 --> 00:25:52,040 Speaker 1: very relevant. Yeah, Apple is the principal actors in our story. Apple, Amazon, 459 00:25:52,119 --> 00:25:54,800 Speaker 1: super Micro, They've all denied the reporting very strongly. Now, 460 00:25:54,880 --> 00:25:57,440 Speaker 1: as journalists, as Bloomber journalists, we take that very seriously, 461 00:25:58,080 --> 00:26:00,680 Speaker 1: We've you know, circled back the sources. We've recircle back 462 00:26:00,720 --> 00:26:03,119 Speaker 1: with sources. We've gotten more sources. And the reason we 463 00:26:03,160 --> 00:26:05,399 Speaker 1: feel comfortable publishing this story is this is about a 464 00:26:05,440 --> 00:26:09,440 Speaker 1: constellation of sources throughout the U S. Government and inside 465 00:26:09,440 --> 00:26:12,880 Speaker 1: those victim companies, very senior insiders in those victim companies, 466 00:26:12,920 --> 00:26:16,600 Speaker 1: Amazon and Apple both as well as across the US government, 467 00:26:16,600 --> 00:26:19,399 Speaker 1: that corroborate this information. So we can't tell why a 468 00:26:19,400 --> 00:26:22,159 Speaker 1: company chooses to deny, what the thinking behind it is. 469 00:26:22,400 --> 00:26:23,840 Speaker 1: But you know, all we can do is present them 470 00:26:23,880 --> 00:26:26,119 Speaker 1: with our facts and if they choose to deny, we 471 00:26:26,160 --> 00:26:30,600 Speaker 1: waited for ponderance of evidence, and seventeen senior, highly placed 472 00:26:30,640 --> 00:26:35,080 Speaker 1: sources throughout the government and these companies very highly, highly incredible, 473 00:26:35,160 --> 00:26:42,160 Speaker 1: highly corroborated. Jordan Robertson regards to Michael Riley, congratulations. Look 474 00:26:42,240 --> 00:26:44,760 Speaker 1: for a cover with a finger with a little baby 475 00:26:44,800 --> 00:26:49,679 Speaker 1: microchip on it. It is from China. This is Bloomberg. 476 00:27:00,880 --> 00:27:03,480 Speaker 1: One of our themes today, the journalism of Bloomberg Business 477 00:27:03,520 --> 00:27:08,080 Speaker 1: Week of Jordan Robertson and Michael O'Reilly and their important 478 00:27:08,160 --> 00:27:12,440 Speaker 1: story of other people's liberation. Army of China attached micro 479 00:27:12,600 --> 00:27:17,240 Speaker 1: chips to motherboards on servers for thirty American corporations. With 480 00:27:17,400 --> 00:27:20,480 Speaker 1: all of the illusions over to the Pentagon, the CIA, 481 00:27:21,040 --> 00:27:24,640 Speaker 1: and our defense establishment, there is no one Pim Fox 482 00:27:24,720 --> 00:27:27,359 Speaker 1: and I would rather speak to than Adam Siegel. He 483 00:27:27,480 --> 00:27:31,440 Speaker 1: is with the Council and Foreign Relations. It's his cottage industry. 484 00:27:31,880 --> 00:27:36,240 Speaker 1: The definitive book is The Hecked World Order. Adam thrilled 485 00:27:36,320 --> 00:27:38,160 Speaker 1: to have you with us on this important day. I'm 486 00:27:38,160 --> 00:27:42,080 Speaker 1: sure Jordan Robertson and Michael Reilly agree with me. Buried 487 00:27:42,119 --> 00:27:47,080 Speaker 1: in your book. Traditional war is in military jargon primarily connectic. 488 00:27:47,520 --> 00:27:49,800 Speaker 1: The point is to kill people and blow things up, 489 00:27:50,240 --> 00:27:54,000 Speaker 1: while cyber attacks are often framed as part of cyber 490 00:27:54,119 --> 00:27:58,800 Speaker 1: wars by the media. You cannot hold territory. What is 491 00:27:58,840 --> 00:28:05,320 Speaker 1: the territory? Know? Once? Well, they are trying to gain 492 00:28:05,520 --> 00:28:09,920 Speaker 1: information for competitive advantage and for political and military advantage, 493 00:28:09,960 --> 00:28:13,879 Speaker 1: and so by being in hardware and software, they have 494 00:28:14,000 --> 00:28:16,560 Speaker 1: gained access to all of that information. Do they have 495 00:28:16,680 --> 00:28:21,240 Speaker 1: blueprints from ut X just to pick a company? Well, 496 00:28:21,320 --> 00:28:23,720 Speaker 1: I don't. I think we're all gonna We're gonna question 497 00:28:23,800 --> 00:28:26,920 Speaker 1: all of that now. Um. I mean, the the importance 498 00:28:27,000 --> 00:28:29,520 Speaker 1: of the story is that people have been talking about 499 00:28:29,560 --> 00:28:32,880 Speaker 1: the vulnerability of supply chain for a long time UM, 500 00:28:33,200 --> 00:28:35,840 Speaker 1: and now here is just clear evidence that it seems 501 00:28:35,880 --> 00:28:39,320 Speaker 1: to be happening. So any US tech company that has 502 00:28:39,400 --> 00:28:42,000 Speaker 1: its supply chain in China, which is almost all of them, 503 00:28:42,640 --> 00:28:45,440 Speaker 1: we're gonna have to seriously question if the Chinese have 504 00:28:45,720 --> 00:28:49,120 Speaker 1: gained access to Adam Siegel, as the author of the 505 00:28:49,200 --> 00:28:53,440 Speaker 1: Hacked World Order, how nations fight, trade, maneuver, and manipulate 506 00:28:53,680 --> 00:28:57,800 Speaker 1: in the digital age. Can you draw an analogy between 507 00:28:57,920 --> 00:29:00,440 Speaker 1: the use of the Internet and the u of the 508 00:29:00,600 --> 00:29:07,600 Speaker 1: high seas in previous centuries. Well, I think for both 509 00:29:07,680 --> 00:29:10,720 Speaker 1: there was a period when they were completely open to 510 00:29:10,840 --> 00:29:17,040 Speaker 1: piracy and thest um and nation states often used privateers 511 00:29:17,160 --> 00:29:21,000 Speaker 1: or pirates to pursue their goals. And China has certainly 512 00:29:21,120 --> 00:29:23,720 Speaker 1: taken advantage of the fact that there are no international 513 00:29:23,800 --> 00:29:27,720 Speaker 1: rules for cyber um and that you can use the 514 00:29:27,800 --> 00:29:30,600 Speaker 1: People's Liberation Army or the Ministry of State Security, and 515 00:29:30,680 --> 00:29:33,520 Speaker 1: they can often use criminal or underground hackers and and 516 00:29:33,640 --> 00:29:37,600 Speaker 1: have possible deniability. So we are in a similar age 517 00:29:37,800 --> 00:29:41,680 Speaker 1: where it has been very hard to control UM and 518 00:29:41,800 --> 00:29:44,800 Speaker 1: where people have thought about cyberspace as a kind of 519 00:29:44,840 --> 00:29:48,320 Speaker 1: a commons like the ocean, but it's one where there's 520 00:29:48,320 --> 00:29:52,200 Speaker 1: a huge amount of conflict. UM that defines the space. 521 00:29:52,800 --> 00:29:56,200 Speaker 1: You've written about how the government and the private sector 522 00:29:56,320 --> 00:30:01,400 Speaker 1: need to enhance their current defenses, for example, two factor 523 00:30:01,560 --> 00:30:06,840 Speaker 1: authorization to log into different systems, also to things such 524 00:30:06,960 --> 00:30:13,440 Speaker 1: as absolute secure communications. Can we ever get there? Well, 525 00:30:13,560 --> 00:30:15,920 Speaker 1: it's been slow going, UM, And you can see in 526 00:30:15,960 --> 00:30:20,520 Speaker 1: the Bloomberg reporting UM that the private sector did cooperate 527 00:30:20,720 --> 00:30:26,040 Speaker 1: in some cases with the federal government in helping unraveled 528 00:30:26,160 --> 00:30:30,600 Speaker 1: this UM spy trail, but in other cases UM didn't 529 00:30:30,600 --> 00:30:34,080 Speaker 1: share as much information and has kind of denied the accusation. 530 00:30:34,280 --> 00:30:38,000 Speaker 1: So there's still different incentives in place, UM, and we 531 00:30:38,160 --> 00:30:40,800 Speaker 1: certainly need to move faster to get the two sides 532 00:30:40,880 --> 00:30:44,920 Speaker 1: to work to work better together, Adam. Within the reporting 533 00:30:45,280 --> 00:30:47,120 Speaker 1: UH that Bloomberg did on this, and I'm going to 534 00:30:47,120 --> 00:30:49,880 Speaker 1: assume to a pro like you, this is not new news. 535 00:30:50,120 --> 00:30:53,760 Speaker 1: What exactly did the story confirm within the visibility of 536 00:30:53,920 --> 00:30:56,560 Speaker 1: going back three and four years to the Obama administration 537 00:30:56,600 --> 00:30:59,479 Speaker 1: and the Trump administration, the length of time of all 538 00:30:59,560 --> 00:31:02,360 Speaker 1: this to a guy like you when you saw that article, 539 00:31:02,800 --> 00:31:07,440 Speaker 1: what was new? Well, just the fact that we now 540 00:31:07,600 --> 00:31:11,320 Speaker 1: can spit point to a specific case, a specific company 541 00:31:11,440 --> 00:31:13,600 Speaker 1: and a and the and the actual chip that was 542 00:31:13,720 --> 00:31:17,600 Speaker 1: doing the buying. Uh. As you said, the people in 543 00:31:17,600 --> 00:31:20,240 Speaker 1: the cybersecurity community have been warning about this threat for 544 00:31:20,320 --> 00:31:23,480 Speaker 1: a long time, but there were just no public examples. 545 00:31:23,640 --> 00:31:26,720 Speaker 1: They are all existed in the world of classification or 546 00:31:26,800 --> 00:31:30,000 Speaker 1: intelligence briefings. So to have this out in the open 547 00:31:30,480 --> 00:31:32,920 Speaker 1: is just a massive change and will really shape the 548 00:31:33,000 --> 00:31:40,000 Speaker 1: discussion about is it a good change? Is to get 549 00:31:40,040 --> 00:31:42,160 Speaker 1: to the point, is the Pentagon having a good morning? 550 00:31:43,480 --> 00:31:46,000 Speaker 1: I think they are. I think the problem is going 551 00:31:46,040 --> 00:31:47,640 Speaker 1: to be for everyone is how you deal with the 552 00:31:47,720 --> 00:31:51,720 Speaker 1: fallout because as the as the article rightfully raises, the 553 00:31:52,160 --> 00:31:53,920 Speaker 1: question is going to be, what's going to happen to 554 00:31:53,960 --> 00:31:57,640 Speaker 1: the U S tech industry because the supply chains are 555 00:31:57,880 --> 00:32:02,360 Speaker 1: so dependent on China uh um and um. There's you know, 556 00:32:02,720 --> 00:32:05,520 Speaker 1: the solution seems to be to remove the supply chain 557 00:32:06,440 --> 00:32:08,880 Speaker 1: from China, but that that's going to be incredibly expensive 558 00:32:08,920 --> 00:32:11,000 Speaker 1: and it's not clear it's going to be technically possible. 559 00:32:11,640 --> 00:32:16,680 Speaker 1: Adam Siegel is the United States perceived as an exceptionally 560 00:32:16,840 --> 00:32:23,000 Speaker 1: aggressive adversary when it comes to cyberspace. I think a 561 00:32:23,040 --> 00:32:26,080 Speaker 1: number of countries certainly see that. And you know, after 562 00:32:26,160 --> 00:32:31,280 Speaker 1: this note in Revelations, the revelations of the Contractor Edwards 563 00:32:31,400 --> 00:32:34,160 Speaker 1: note in you know, certain types of behaviors of the 564 00:32:34,280 --> 00:32:37,240 Speaker 1: US were shown to the rest of the world. China 565 00:32:37,320 --> 00:32:40,400 Speaker 1: in particular took notice of that um and began to 566 00:32:40,440 --> 00:32:43,480 Speaker 1: think about both um, what what it could do to 567 00:32:43,520 --> 00:32:46,400 Speaker 1: become more secure from the US and then also you know, 568 00:32:46,760 --> 00:32:49,040 Speaker 1: put ideas in its head about what type of operations 569 00:32:49,080 --> 00:32:52,040 Speaker 1: it would like to conduct as well. Do you believe 570 00:32:52,320 --> 00:32:55,040 Speaker 1: that countries that we believe to be friendly to the 571 00:32:55,160 --> 00:33:01,360 Speaker 1: United States conduct cyber defense or cyber attack efforts against 572 00:33:01,440 --> 00:33:06,719 Speaker 1: the United States, both private and public? Uh? They do? Uh? 573 00:33:06,800 --> 00:33:08,440 Speaker 1: I mean, if you look at the rip board from 574 00:33:08,480 --> 00:33:11,080 Speaker 1: the Office of Kunter Intelligence, they name a number of 575 00:33:11,680 --> 00:33:16,080 Speaker 1: close to US allies and friends, including South Korea, France, 576 00:33:16,120 --> 00:33:20,840 Speaker 1: and Israel is conducting cyber espionage against the United States. Uh. 577 00:33:20,920 --> 00:33:23,400 Speaker 1: Many United States does the stand point honestly, it also 578 00:33:24,360 --> 00:33:27,920 Speaker 1: spies on its spread now, so so this is important. 579 00:33:27,920 --> 00:33:32,640 Speaker 1: Do we are we putting microchips on motherboards on servers 580 00:33:32,760 --> 00:33:38,000 Speaker 1: of other countries? Have? Yeah? I mean the study revelations 581 00:33:38,040 --> 00:33:40,400 Speaker 1: and as the report at the Bloomberg Reporting notes that 582 00:33:40,480 --> 00:33:44,560 Speaker 1: the US prefers to interdict the product along the way 583 00:33:45,360 --> 00:33:48,960 Speaker 1: UM and and insert something then so getting a specific 584 00:33:49,880 --> 00:33:54,080 Speaker 1: server motherboard, not in the Chinese case of UM putting 585 00:33:54,120 --> 00:33:56,720 Speaker 1: it in you know, many devices and hoping that it 586 00:33:56,920 --> 00:34:00,680 Speaker 1: ends up into a specific supply chain. Speak of you 587 00:34:00,800 --> 00:34:05,520 Speaker 1: can about the US Department of Defense Defense Security Service. 588 00:34:05,640 --> 00:34:09,880 Speaker 1: What is the d s S do? Uh? It's to 589 00:34:10,040 --> 00:34:15,399 Speaker 1: help defend and respond to attacks on military networks. UM 590 00:34:15,880 --> 00:34:19,320 Speaker 1: and so it is working with Fibric Command and the 591 00:34:19,440 --> 00:34:23,200 Speaker 1: National Security Agency UM and reaching out to the private sector, 592 00:34:23,719 --> 00:34:27,440 Speaker 1: in particular the defense industry base to help them improve 593 00:34:27,520 --> 00:34:31,000 Speaker 1: their security NETMA. Adam, thank you so much. Just thrilled 594 00:34:31,040 --> 00:34:33,640 Speaker 1: to finish out our coverage today and surveillance uh and 595 00:34:33,760 --> 00:34:36,320 Speaker 1: speak of you, Adam Single Folks is with the Council 596 00:34:36,400 --> 00:34:39,279 Speaker 1: on Foreign Relations and he has just simply build up 597 00:34:39,320 --> 00:34:42,200 Speaker 1: a franchise as a director of Digital and cybers based 598 00:34:42,960 --> 00:34:47,640 Speaker 1: Policy at CFR. And again, Pim, the book, uh, you 599 00:34:47,680 --> 00:34:49,880 Speaker 1: know when it came out was more than a splash 600 00:34:49,960 --> 00:34:59,240 Speaker 1: the hacked world order. Thanks for listening to the Bloomberg 601 00:34:59,280 --> 00:35:05,239 Speaker 1: Surveillance Pie podcast. Subscribe and listen to interviews on Apple Podcasts, SoundCloud, 602 00:35:05,640 --> 00:35:09,799 Speaker 1: or whichever podcast platform you prefer. I'm on Twitter at 603 00:35:09,920 --> 00:35:14,120 Speaker 1: Tom Keene before the podcast. You can always catch us worldwide. 604 00:35:14,600 --> 00:35:15,680 Speaker 1: I'm Bloomberg Radio