comparemela.com

Card image cap

Serves as director of the fbi. Christopher wray currently serves as the eighth director of the fbi. He has served in a number of roles on the federal government, including as principal associate heorney general where oversaw investigations conducted by the in 2003, president bush for the criminal division, where he oversaw Major Investigation into domestic and International Criminal activities. He also oversaw the dojs Law Enforcement agencies. He was instrumental in the dojs efforts to combat terrorism, cybercrime and international espionage. Today he joins us to discuss chinas ongoing efforts to interfere in the United States Domestic Affairs through espionage, disinformation campaigns, intellectual property theft, and monetary theft. It is my pleasure to welcome director wray to the Hudson Institute. [applause] mr. Wray thank you. Good morning, everybody. I realize it is challenging under the current circumstances to put on an event like this. I am grateful to the Hudson Institute for hosting us today. The greatest longterm threat to our nations information and intellectual property and to our Economic Vitality is a counterintelligence and economic espionage threat from china. It is a threat to our Economic Security and, by extension, to y. As National Security advisor obrien said in his recent remarks, we cannot close our eyes and ears to what china is doing. Today, in light of the importance of this threat, i will provide more detail on the chinese threat than the fbi has ever presented in an open forum. This threat is so significant that the attorney general and secretary of state will also be addressing a lot of these issues in the next few weeks. But if you think these issues are just an intelligence issue, or a government problem, or a nuisance largely for big corporations who can largely take care of themselves, you could not be more wrong. It is the people of the United States who are the victims of what amounts to chinese theft on a scale so massive that it represents one of the largest transfers of wealth in human history. If you are an american adult, it is more likely than not that china has stolen your personal data. In 2017, the Chinese Military conspired to hack equifax and made off with sensitive personal information of 150 million americans, we are talking nearly half of the american population, and most american adults. As i will discuss in a few moments, this was hardly a standalone incident. Our data is not the only thing at stake here. So is our health, our livelihoods, and our security. We have now reached the point where the fbi is opening a new chinarelated counterintelligence case about every 10 hours. Of the nearly 5000 active fbi counterintelligence cases currently underway across the country, almost half are all related to china. At this very moment, china is working to compromise American Health care organizations, pharmaceutical companies, and academic institutions, conducting a central covid19 research. Before i go on, let me be clear. This is not about the Chinese People and certainly not about chinese americans. Every year, the United States welcomes more than 100,000 Chinese Students and teachers into this country. People who have journey to china from the United States secured blessings of liberty for themselves and their families and our society is better for their contributions. When i speak of a threat from china, i mean the government of china and the Chinese Communist party. To understand this threat and how we must act to respond to it, the American People should remember three things. First, we need to be clear eyed about the scope of the Chinese Governments ambition. China, the Chinese Communist party, leaves it is in a generational fight to surpass our country in economic and technological leadership. That is sobering enough, but it is waging that fight not through legitimate innovation, not through fair and lawful competition, and not by giving their citizens the freedom of thought and speech and creativity that we treasure here in the United States. Instead, china is engaged in an effort to become the worldss only superpower by any means necessary. The second thing the American People need to understand is that china uses a diverse range of sophisticated techniques. Everything from cyber intrusions to corrupting trusted insiders. They even engage in outright physical threats, and they pioneered an expansive approach to stealing information through a wide range of actors. Including not just chinese intelligence services, state owned enterprises, private companies, certain kinds of graduate students and researchers, and a whole variety of other actors working on their behalf. To achieve its goals and surpass america, china recognizes it needs to make leaps in cutting edge technologies. But the sad fact is instead of engaging in the hard slog of innovation, china often steals and uses it to compete with the American Companies it has victimized. They are targeting research on everything from military equipment, wind turbines, rice and corn seeds, through its talent recruitment programs like the socalled thousand Talents Program, the chinese try to entice scientists to bring our knowledge and innovation back to china, even if that means stealing proprietary information or violating our export controls and conflict of interest rules. Take the case of a scientist, a Chinese National and american, a lawful permanent resident. He applied to the China Thousand Talents Program and stole more than 1 billion worth of trade secrets from his former employer. An oklahomabased based petroleum company. He got caught. A few months ago, he was convicted and sent to prison. There is the case of a texasbased scientist, also sent to prison earlier this year. She told secrets regarding a phone, an important piece of knowledge in submarines. She also applied to the thousand Talents Program, to absorb the Relevant Technology in the United States. He did this on behalf of Chinese State owned enterprises, which ultimately planned to put the American Company out of business and take over the market. In one of the more galling and egregious aspects of the scheme, conspirators actually patented in china the very manufacturing process they had stolen and then offered their victim American Company a joint venture using its own stolen technology. We are talking about an American Company that spent years and millions of dollars developing that technology, and china could not replicate it, so instead, it paid to have it stolen. Just two weeks ago, another was convicted of espionage, trade secrets, in conspiracy for Trading Proprietary information about devices two u. S. Companies. One of those companies has spent over 20 years developing the technology he stole. These cases were among more than 1000 investigations the fbi has into chinas actual and attempted theft of american technology, and that is not even talking about the more than 1000 other ongoing counterintelligence investigations of other kinds related to china. We are conducting these kinds of investigations in all 56 of our field offices. Over the past decade, we have seen economic espionage cases with a link to china increased by approximately 1300 . The stakes could not be higher, and the potential economic harm to american businesses and the economy as a whole almost defies calculation. As National Security advisor obrien discussed in his remarks, the Chinese Government is also making liberal use of hacking to steal our corporate and personal data, and they are using both military and nonstate hackers to do it. The equifax intrusion i mentioned just a few moments ago, which led to the indictment of Chinese Military personnel, was hardly the only time china stole the sensitive personal information for future numbers of the american public. For example, did any of you have Health Insurance through anthem or one of its associated insurers . In 2015, chinas hackers stole the personal data of 80 million of that companys current and former customers. Or maybe you are a federal employee or used to be one, or you applied for a government job once, or a Family Member or roommate did. In 2014, chinas hackers stole more than 21 million records from the federal Government Office of personnel management. Why . First, china has made becoming an Artificial Intelligence world leader a priority, and these kinds of thefts feed right into chinas development of Artificial Intelligence tools. But compounding the threat, the data china stole is of obvious value as they attempt to identify people for secret intelligence gathering. On that front, china is using social media platforms, the same ones americans use every day to stay connected or find jobs, to identify people with access to Sensitive Information and then target those people those people to try to steal it. One example. A chinese Intelligence Officer posing as a headhunter on a popular social media platform recently offered an american citizen a sizable sum of money in exchange for socalled Consulting Services. Sounds benign enough until you realize those Consulting Services were related to Sensitive Information the American Target had access to as a u. S. Military intelligence specialist. That particular tale has a happy ending. The american citizen to the right thing, reported the suspicious contact, and the fbi, working together with our armed forces, took it from there. I wish i could say all such incidents and that way end that way. Through talent recruitment programs like the 1000 Talents Program i mentioned moments ago, china pays scientists at american universities to secretly bring our knowledge and innovation back to china, including valuable federally funded research. To put it bluntly, this means american taxpayers are effectively footing the bill for chinas technological development. China than leverages its illgotten gains to undercut u. S. Research institutions and companies wanting our nations advancement and costing american jobs. We are seeing more and more of these cases. In may alone, we arrested a former researcher with the Cleveland Clinic who worked on malec will or medicine, and the genetics of cardiovascular disease, and a university of arkansas scientist doing research for nasa. Both of these guys were committing fraud while accepting millions of dollars in american federal grant funding. Pled guilty to filing a false tax return for income he had received for china 7000 pounds program. Our investigation found that while lee was researching huntingtons disease at emory come he was pocketing half a million unreported dollars from china. In a similar vein, Charles Lieber was indicted last month for making false statements to federal authorities about his participation. Thousand talents participate in. United states alleged he stole from harvard and nih, and the fact through the Wuhan Institute of technology, a 50,000 monthly stipend, more than 150,000 in living expenses, and more than 1. 5 million to establish a laboratory back in china. There is more. Another tool china and the Chinese Communist party used to manipulate americans is what we call malign foreign influence. The traditional foreign influence is a normal, legal, diplomatic activity, typically conducted through diplomatic channels. But malign foreign influence efforts are subversive, under declared, criminal or coercive attempts to sway our governments policies, distort our public discourse, and undermine confidence in our demo democratic processes and values. China is engaged in a highly sophisticated, malign Foreign Influence Campaign, including bribery, blackmail, and covert deals. Chinese diplomats also use both open, naked economic pressure, and seemingly independent middlemen, to push chinas preferences on american officials. Just take one all too common illustration. Lets say china gets wind that some american official is planning to travel to taiwan. Think, a governor, state senator, or member of congress. China does not want that to happen because that travel might appear to legitimize taiwanese independence from china and legitimizing taiwan would of course be contrary to chinas one china policy. So what does china do . China has leverage over the american officials constituents. American companies, academics, and members of the media have a legitimate and understandable reason to want access to chinese partners and markets. Because of the authoritarian nature of chinese commonest party, china has immense power over those same partners and markets. So china will sometimes start by attempted to influence the american official overtly indirectly. China might openly warned that if an american official goes in and take the trip to taiwan, china will take it out on a company from that officials home state by withholding the license to manufacture in china. That could be economically ruinous for the country and would directly pressure the american official to alter his travel plans and the official would know that china was trying to influence him. That would be bad enough, but the Chinese Communist party does not stop there. It cannot stop there if it wants to stay in power so it uses its leverage even more prodigiously. If chinas more direct influence does not do the trick, it sometimes goes to indirect and deceptive efforts. To continue with the lustration of the american official with travel plans that the Chinese Communist party does not like, china will work relentlessly to identify the people closest to that official, the people that official trusts the most. China will work to influence those people to act on chinas behalf as middlemen to influence the official. The coopted middlemen may then whisper in the officials ear and try to sway the travel plan or public position on chinese policy. These intermediaries of course are not telling the american official, and some of these intermediaries may not realize they are being used as pawns, because they, too, have been deceived. Ultimately, china does not hesitate to use smoke, mirrors, and misdirection to influence americans. Similarly, china often pushes academics and journalists to self center self sensor if self censor to travel. Chinas ambitions regarding hong kong or taiwan. This kind of thing is happening over and over across the United States. I will note that the pandemic has not stopped any of this. We have heard from federal, state, and local officials, that chinese diplomats are aggressively urging support for chinas handling of the covid19 crisis. Yes, this is happening at both the federal and state levels. Not that long ago, we had a state center who was recently even asked to redo introduce a resolution supporting chinas response to the pandemic. The punchline is, all of these seemingly inconsequential measures at up to a policymaking environment in which americans find themselves held over a barrel by the Chinese Communist party. All the while, chinas government and communist party has brazenly violated norms of the rule of law. Since 2014, xi jinping has spearheaded a program known as fox hunt. China describes fox hunt as an International Anticorruption campaign. It is not. Instead, it is a sweeping bid by general secretary xi to he sees as threats. We are talking about political rivals and critics seeking to expose chinas expensive human rights violations. Hundreds of these fox hunt victims that they target live right here in the United States, and many are united american citizens and green card holder. The Chinese Government wants to force them to return to china, and chinas tactics to accomplish that are shocking. For example, when it could not locate one fox hunt target, the Chinese Government sent an emissary to visit the targets family here in the United States. The message they said to pass on the target had two options. Return promptly or commit suicide. What happens when foxhound targets refused to return to china . In the past, Family Members here in the United States and in china have been threatened and coerced, and those back in china are even arrested for leverage. I will take this opportunity to note that if you believe the Chinese Government is targeting you, that you are a potential foxhound victim, please reach out to your local Fbi Field Office. Understanding how a nation could engage in these kinds of tactics brings me to the third thing the American People need to remember. China has a fundamentally different system than ours, and it is doing all it can to exploit the openness of ours while taking advantage of its own closed system. Many of the distinctions that mean a lot here in the United States are blurry or almost nonexistent in china. I am talking about distinction is between the government and the Chinese Communist party, between civilian and military sectors, between the state and the private sector. For one thing, an awful lot of large chinese businesses are state owned enterprises, literally owned by the government and thus the party. Even if they are not, chinese laws allow its government to compel any Chinese Company to provide any information it requests, including american citizens data. On top of that, Chinese Companies of any size are legally required to have communist party cells inside of them to keep them in line. Communist party cells have reportedly been established in some American Companies operating in china as the cost of doing business there. These kinds of features should give u. S. Companies pause when they consider working with chinese corporations like huawei, and they should give all americans pause when relying on such a companys devices and networks. It has been charged in the United States with racketeering conspiracy and has, as alleged in the indictment, repeatedly stolen intellectual property, obstructed justice, and lied to the u. S. Government and commercial partners, including banks. The allegations are clear. Huawei is a serial intellectual property thief, disregarding both the rule of law and the rights of its victims. It certainly caught my attention to read a recent article describing the words of huaweis founder about the companys mindset. At a Huawei Research and development center, he reportedly said to ensure the companys survival they need to , surge forward, killing as you go, to blaze us a trail of blood. He also reportedly told employees that huawei entered to a state of war. I hope he could not have meant that literally but it is hardly an encouraging tone, given the companys repeated criminal behavior. In our modern world, there is perhaps no more ominous prospect than a hostile foreign governments ability to technologyith our and devices. If Chinese Companies like huawei are given unfettered access to our telecommunications infrastructure, they could collect an of your information that traverses their devices any of your information that traverses their devices. They would have no choice but to hand it over to the Chinese Government. The privacy and to process that is sacrosanct in the United States is nonexistent with china. The Chinese Government is engaged in a broad, Diverse Campaign of theft and maligned influence and it can exercise execute that campaign with authoritarian efficiency. They are calculating, persistent, patient, and not subject to the righteous constraints of the open Democratic Society or the rule of law. China, as led by the chinese eat communist party, will try to continue to appropriate ideas, misappropriate our ideas, influence policy makers, manipulate public opinion, and steal our data. They will use all tools and all sectors approach, and that demands our own all tools and all sectors approach and response. Our folks at the fbi are working their tails off every day to protect our nations companies, our universities, our computer networks, and our ideas and innovation. To do that, we are using a broad set of techniques from our traditional Law Enforcement authorities to our intelligence capabilities. I will briefly note that we are having real success. With the help of many of our foreign partners, we have arrested targets all over the globe. The resulting prosecutions have exposed the techniques the chinese use, raising awareness of the threat and our industries defenses. They also show our resolve and our ability to attribute these client these crimes to those responsible. It is one thing to make assertions. But in our justice system, when a person or corporation is investigated and charged with a crime, we have to prove the truth of that allegation beyond a reasonable doubt. The truth matters. So these criminal indictments matter. We have seen how our criminal indictments have rallied other nations to our cause, which is crucial to persuading the Chinese Government to change its behavior. We are also working more closely than ever with partners abroad. We cannot do it on our own. We need a whole society response. That is my reintelligence and Law Enforcement communities are working harder to give companies, universities and the American People themselves the information that they need to make their own informed decisions to protect their assets. Confronting this threat does not mean should not do business with the chinese or host chinese businesses. It does not mean that we should not host Chinese Students. What it does mean is that when china violates criminal laws and norms, legal not tolerate it, or enable it. Protect innovation, ideas and way of life with help and vigilance. Thank you for having me here today. [applause] thank you, director. We will be taking questions from people who were not able to be here today, so if you could email any questions you have to events at hudson. Org, legal be happy to take a look at them. Collatedions will be and we will see if we can get your question to the directory. The first question is one on the minds of a lot of american. They hear that china is stealing personal data. What would you suggest for americans concerned about their own personal Data Security . I think the American People need to be taking steps on their own to protect their data. That includes things like changing your password frequently, things like monitoring your Credit History and account transactions, to see if someone may have stolen your identity. We have a lot of information about that on the fbi website. How would they find their local Fbi Field Office . Mr. Wray it is pretty easy to find online. Been aaid there has trend of increasing cooperation between Different Countries on this. One of the things that i found most encouraging in the middle of Everything Ice i finished talking about is the degree of alignment and consensus that seems to be growing between the u. S. And our foreign partners on this threat, on the severity of the threat, priority of the threat, the importance of working together to combat the threat. When i sit down with my foreign chinese threat is one of the first things they want to talk about, even when it would not necessarily be on my agenda. I see the same thing happening with the business community, academia and elsewhere. Country wherehis , peopleeem so divisive cannot even agree what day of the week it is. , on thehinese threat priority of it and the need to come together to tackle the threat, i am seeing a level of alignment and consensus. , across the public and private sector, and as you that i had never seen in my career. I think that is good news. It is certainly different than a lot of the narrative that we hear. Do you get any sense that china is targeting the november elections . Do you have any concern about that . Maligned china has Foreign Influence Campaign targets our policies and 365 days a year. It is not an election specific allat, more of an all year, time threat. One what are the issues that you see the most chinese influence around . You mentioned taiwan. Are there others . Taiwan, hong kong, any ,alling out chinese oppression ,issidents, human rights chinas response to covid pandemic there is a long list of things. Ways, china governments own preferences are pretty much well known, but what is more pernicious is their way of trying to shape our policymakers on that threat in ways that our policymakers are not aware of. He mentioned some of those in the talk. Can you talk about the ways china seeks to assert this kind of influence . Think of it like a multiplechoice question, where the last option is all of the above. One thing we were concerned equally particular is significant. A mayor,le, if you are you are sophisticated enough to know when a representative comes in and starts telling you you had it all wrong, be a little bit on guard and take it with a grain of salt. But if the person who talks to you is something you have known for 10 or 15 years . That person comes in and says, i think you have it all wrong on this hong kong thing. If the person said this guy asked me to tell you this, sure. That is probably not what is happening in most of these incidents. You need to have all of the information. When it comes to universities, china has a lot of points of leverage, from allowing scholars to visit china , which is necessary for some cooperation agreements, but also , we could add student recruitment, and so on. Do you see signs that china instrumentshestrate to move universities to accept certain things . Certainly, they look to influence academics. We see that quite frequently. We see them tried to recruit academics and things like the thousand talents plan that i talked about. We have things that i have spoken about before. That are in a lot of american colleges and universities, efforts to censor or to drive china friendly in a decidedly unorthodox way in the u. S. , the good news there is that more and more universities are closing those down, so in some ways, that is not as high of a priority. These institutes how do these institutes work . An effort tois bring students together to ensure that the chinese andative makes its way dominates the conversation. I could be more specific, but that would take longer. Lets get back to the business and technology concerns. Are there particular areas where you see chinese espionage as very intense level . A general rule, china has these fiveyear plans. In general, if you look at the Industry Sectors laid out in those plans and that strategy, people see a probably less than situation to the Identity Theft that i was describing. Health care in the middle of it is notndemic unusual for us to see some Pharmaceutical Company or Research Institution make some significant announcement about some Promising Research related to the pandemic. We will start seeing cyber activity, targeting whatever that institution is, sometimes almost the next day. Aviation, health care, robotics sometimes even agriculture. That is one thing a lot of people do not understand. When i mentioned that all the field offices some has some kind of investigation, that is because we are trying to spread the work around. Fortune 100 all the way down to small startups. Estimateshave any damage damage is done to american businesses . People are always trying to come up with a figure. Everything here i have seen is risktaking, so billions. The one case i mentioned in guyhoma, where you had one stealing one billions dont 1 billion worth of secrets from a company and extrapolate that over the thousand of investigations i described. They are all in the area of chinese attempted of u. S. Technology. Is there legislative authority that you do not have that you would like . Met an fbi never director that would not welcome work tools. Congress has done a number of valuable things to help us, ago,ding not that long they amended the legislative deals withthose that acquisitions, foreign acquisitions in the u. S. , which is often a place where some of the more Sensitive Information can be compromised. They plugged some of the holes that existed in that before. They made it possible for the National Security community to protect american information. Questions coming in from the audience this morning. One is asking, how prevalent is the problem in u. S. And europe . Tactics . Iscuss similar , in terms of the prevalence we have seen hundreds just here in the u. S. You could call them targets or victims. Chinese arethat the trying to reach and colors. In othero happening countries as well. In terms of the tactics, it is a variety of means of coercion. Comments up and make about their Family Members back that ischina in a way pretty unmistakably threatening, imagination,e your you will not be far off. Have we been working with other governments to counter this . Mr. Wray we have certainly worked with a lot of our foreign , bestrs to compare notes practices and so forth to combat the threat, but there is another part of coordination that is important here. Meansis an established and established processes to cooperate with each other. Legitimate Foreign Cooperation happens all of the time, all over the world. There is a way that you do that with Law Enforcement in the country the person is in. Is. Is not what fox hunt they are engaged in rogue Law Enforcement. That really exposes what this is all about. Pressure critics. What can countries do to make this response to questionable conduct more urgent and more of a deterrent to china . Mr. Wray the more we can communicate actively, nations around the world, that we , weome Academic Exchange welcome travel, but rampant ip theft is not ok. Cyber intrusion into peoples personal data is not ok. It is about the behavior. Thatore we can communicate part of participating in a Global Economy is playing by the rules that other nations play by. Adhering to the rule of law and norms that civilized countries respect. The Chinese Government will adjust its behavior and understand that there is a right way to compete and a wrong way to compete. If they keep violating laws, they will keep encountering the fbi. Another of the viewers wants to know if there is some kind of framework needed to fight this ip theft and Tech Security theft. Mr. Wray that is being addressed through a variety of means, but clearly a long way to go. Nations working together in a bilateral way. Of allre standards that wend sizes participate in. To makecoming together clear that there are rules. No country i know thinks that stealing someone elses property is ok. Another question. In the recent case of trespassing on Naval Air Station key west, the person was found to be working for Chinas Ministry of public security, not the ministry of state security or intelligence. Usehe fbi seen china intelligence operations against the u. S. . I would say the fox hunt mpsrt is more through the than the mss. As a general rule, a lot of the kinds of things i was describing in my remarks are more geared towards mss and poa. Another view it like to know more about chinas interest in agriculture and ip theft. He talks about what the mother targets are and how it works. U. S. Is rightly recognized as a world leader in agriculture and agricultural techniques. That includes genetically modified seeds and stuff like that. There are a number of sophisticated habits in the world of agriculture. In the midwest, we have had cases in place like kansas, iowa and nebraska. People are trying to steal to bring back to china, to essentially reverse engineer some of those seeds. It could be rice or corn. I cannot remember, there was a case not that long ago where they caught actors getting up seeds in the cover of night to steal. We have another where they caught them at the airport with the seeds in their luggage, trying to bring them back. When you look at the bulk of the cases the fbi has brought against researchers, are most of the violations procedural, financial malfeasance . What specifically looks at transmission of Civic Research side ip . How does that universe breakdown . Mr. Wray we will use whatever charges we think are the most provable and in some instances we will choose to charge a case a certain way to protect sources and methods. We are trying to take the long view. Certainly there are a variety of intellectual property theft type charges, but a lot of the charges i described our about are about concealment at some level. Its not just the underlying theft, it is the concealment of the theft and that is where things that include false statements, false tax returns, and things like that become important. They are concealing their relationship with the Chinese Government, whether it is an American University or american employer. At the end of the day i have high confidence in American Companies, american universities, and the American People if given the right information to make informed, sensible patriotic decisions. When some of these nonstate actors conceal their relationship with the Chinese Government, the employers Like Companies and universities cannot make the informed decisions. You have been talking about a whole of Society Approach to the problem and the importance of nongovernmental actors in the u. S. Does the fbi or doj have resources for private sector entities . What would you counsel these entities to do . Mr. Wray in all of our field offices we have established individuals who are entrusted with developing relations with businesses and universities in their area. Private sector coordinators. That is a new feature over the last 10 or 15 years in the fbi and it reflects the degree of partnership that currently is needed and happens between the fbi and the private sector whether it is a business or university. The resources we provide, not funding, but information. It is information about how they can take steps to protect their information technology, ideas and innovations. We have materials we provide, we answer questions and things like that. I have been to all 56 Fbi Field Offices, and in every single one part of what i have done is met with private sector partners in those states and you can see the relationship, the partnership that exists. I want to be clear, these are institutions. I am talking private companies makingversities that are we are not telling them what to do. They are voluntarily deciding to terminate a relationship to increase their cybersecurity, whatever it happens to be, to protect themselves. I think that is one of the strengths of our system. It is clear that the fbi, doj, and other federal entities are stepping up their pressure on this. Are you seeing signs of china changing tactics or pulling back a little . Is any of this having an impact on china . Mr. Wray i think it is having an impact. Whether the impact will be the positive impact that we want to have in the long run remains to be seen. Seen china inhave some ways be less overt about some of their tactics. Open question as to whether that is progress. Are they hiding it better or pulling back . I think they are starting to get the message without getting into the reasons we know that. We are not going to tolerate violations of our laws. Other countries that we work with have similar views. We are coming to a close here. You spoke a lot in your speech about the need to keep open channels with china, not for a tax on the Chinese Government, not to bleed over into attacks on chinese. Anything you want to add to this . What can we do to keep students and other chinese welcome here even as all of this is going on . Mr. Wray the way i look at it, they are targeting our system, our ideas, our innovation in a you heard the saying imitation is the most sincere form of flattery . They envy the success of our system and they should. We are proud of the freedom and the free market environment that we have here. I think it is important to make clear that we are not afraid of competition. We are not afraid of competition over business or ideas. It is about the behavior. The behavior is what has to change. It is about the rule of law at the end of the day. Thank you for joining us today. It has been a terrific session. I have learned a lot in this emerging u. S. Consensus over how to deal with some aspects of chinese behavior is one of the most striking things we see even in a very divided and polarized moment in american life. Mr. Director, thank you for joining us. Hope to see you here again, one of these days. Mr. Wray national captioning institute, which is responsible for its caption content and accuracy. Visit ncicap. Org] [captions Copyright National cable satellite corp. 2020] heres a look at were live coverage. The House Appropriations Committee Considers legislation that would set 2021 spending levels for the department of housing and transportation. This followed by the coronavirus response. Another House Appropriations subcommittee meets at 9 00 a. M. Eastern to consider spending for nasa. And1 00, the House Energy Commerce committee will be hearing on federal resources for tribal communities. Coming up on washington journal, republican

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.