Transcripts For CSPAN Assistant Attorney General On Great Po

Transcripts For CSPAN Assistant Attorney General On Great Power Competition Homeland Security 20240713

Good afternoon, everyone. Im peter. I have the privilege of introducing our final speaker for today. The assistant attorney general of the United States who run it is National Security division and for the purpose of this conversation also importantly leads the China Initiative at the department of justice. He has kindly agreed to, were going to speak for probably about 25 minutes and then we will take some questions from the audience. So let me start sir with can you give us an overview of what the chinese have been doing and what youve been doing to counter it over the past since youve been in office . Great. Thanks very much. Thanks for the Homeland Security group for having me and for all of youse who are here watching on line or later on. Thanks for spending some time talking about these issues. On the china said let me say what a shift from the first time i was in the National Security division when we were doing all Counter Terrorism all the time to today where were really in the subject of this part i know is sort of great powers. And that is really our focus these days. In addition i know jay was just here talking about domestic terrorism. Its not like thats gone away. But on the great power side our focuses are as always sort of china, russia, iran, north korea, and with respect to the chinese were seeing a lot of is espionage both political sort of traditional military, espionage as well as economic espionage. And the China Initiative we put together about a yearandahalf ago with attorney general sessions continues today turned attorney general barr is focused on various aspects of chinese maligned behavior but the big emphasis has been economic. And it arose out of the intelligence that we were seeing on a daily basis come out of the finn, the n st. A, the c. I. A. , about the extent of chinese economic espionage here in the United States stealing everything from corn and Rice Technology to the bpa free lining of your water bottle to commercial jet airplane technology. Things you might actually expect them to be stealing. And can you give us a sense of the problem over time . You started the National Security division when it first started. You have Counter Terrorism is the obviously the main focus at the time. President obama did kind of go to the chinese and say knock it off at one point. Was that effective . What has proven effective and what has proven ineffective . Well, changing chinese behavior has proven to be a real challenge for people in every administration who have dealt with this. And i think there was a period and e when the chinese the u. S. Had an understanding ith respect to not doing cyber intrusion activity to steal intellectual property. That appeared for some time perhaps diminished the volume of theft by pure cyber means but these days and even before sort of just the present day what we saw was a real increase in the use of the chinese Intelligence Services. Those initial cases were Chinese Military services doing pure cyber activity. And with a we see these days although we still do see cyber economic espionage out of china we see that really complimented by the use of the Intelligence Services to steal intellectual property. And the end result of that is that we have a lot more Insider Threat cases because Intelligence Services yes they do cyber activity but they also do really well is get information out of people. And thats the trade craft that theyre trained on. And theyre almost information agnostic. They have their tools, skills, experience. And if they want to get a military secret out of you thats what they will use to try to do that. If they want to get an economic secret out of you they will use those same tools and trade crafted. And that is what our cases really reflect is kind of an Insider Threat when it comes to economic espionage. Give us a sense of the scale of the problem. I know the National Security strategy. Talked about hundreds of billions. Right. Do you have a number . I dont have a better number on the Economic Impact than they have. We did have a case go to trial not too long ago which involved the theft of Wind Turbine Technology in which because the case went to trial we did have to quantify the losses to the company. That was just the theft of this one particular piece of software that governed how the Wind Turbines interact with the electric grid. In just that one case the company lost about half of its market value about a billion dollars and about 700 to 800 people lost their job. So these are very real impacts on individual companies and obviously the individual workers and their families who lose their jobs. The mike rn case also seemed significant. That case at least thus far a good news story for us. It was a case where the company came forward and asked for the f. B. I. s help the governments help and cooperated with the government, been very public about that. And it is a case that we use to illustrate the benefits of coming forward and cooperating with the government early. What we were able to do there was charge the case, do the investigation, charge the case sort of comeback to there. But then when we charged the case the Commerce Department put the Chinese Company that had stolen the goods through the use of a joint venture by poaching certain employees, put them on the denied entity list which meant that they cant import the tooling that they need in the u. S. To make the parts that they stole the technology to make. So for us it is of great illustration in talking to the private sector which we do very often to convince them about the benefits of coming forward. Were not just trying to put the thief in jail, which may not help you as a company if in the meantime that other company has stolen your technology and theyre making a product to replace you on the market. But if we catch them early enough we can prevent no harm from occurring. Another example in that line was at the end of last year we arrested a fellow who had stolen what we call the newt rent optimizer which was basically software that helps farmers determine how much and when to water their fields and how to fertilize their fields depending on weather conditions, soil conditions, crops, stole that from mon santo and was bringing it over to china when the company noticed that he had downloaded all of this and we were actually able to stop them at the airport and take the computer that had the software on it. So if we can get involved early enough and that obviously requires the targets to be aware of the fact that theyve been stolen from early enough. But if we can do that then i think we could take great action that is will benefit the target in addition to obviously then pursuing the case against the wrong doer. How do you distinguish theres a lot of Chinese Students doing base basic Scientific Research as graduates. How do you distinguish somebody doing research for his or her own purposes from somebody with nefarious intent . It seems that could be fuzzy. You might end up imprisonning or detaining or arresting somebody here doing research. What we look at are behaviors. Were not looking at what are you here studying and what is your intent . Were not trying to divine your intent. What were looking at is your behaviors. What we see in some cases and this is what we both on the corporate side and academic side, is are people trying to get access to information or places that they really have no business getting access to given what theyre here to do. So if im here to study at lab a with this professor and ive gotten a visa to do that but in fact im over here in lab b or as weve seen im over here at this other school. You know, what are you doing over there . Right . And the same thing in terms of computer access. If i need to be in these data bases to do my jobs but im actually over here and downloading information or sending it to my home computer information thats over here, why am i over here . So thats what we try to focus on and what we tell universities and companies to focus on are those behavioral characteristics. Because then it really doesnt matter why theyre doing it. Right . Regardless of whether it is the person acting to just enrich themselves or the person acting on behalf of china or other nation states youre going to catch them. And thats the right way to do an investigation. If you start with the fact that the person is chinese, not only would that violate the law but secondly its going to be impractical because as you say the vast bulk of students here are just here doing what they should be doing and what they want them what we bant them here doing. Switching to 2020. What is the countries trying to interfere in the process . In the elections, we anticipate that we will be dealing with election influence and interference activities from russia, china, and iran for the most part. What will they look like . There absolutely are differences between them. The russians i think you have plenty of illustrations of what that looks like from 2016 and even continuing to some of the social media activity today. Obviously weve charged about four or five cases involving russian actors and election interference. A couple special Counsel Office me out of nsd proper all those cases are back right now. So i think we will see more of that. We may see well certainly see a lot of kind of social media activity. One of the things that i am concerned about is where the hacking and dumping activity occurred back in 2016. These are better kind of protections for that . Ultimately. And thats the hard part here. Theres been a tremendous amount of work hardning the election infrastructure and i think chris was here earlier today talking about that. When youre talking about somebodys email including sometimes peoples personal email that they use for work especially if theyre doing Campaign Work and their main job is at a law firm or Something Like that and theyre just using their personal email it really is very dependent on their cyber high jean practices. And not clicking on that wrong emp mail and all of that. What the russians did in 2016 in terms of their the means by which they gain access was just spear fishing. It wasnt super sophisticated cyber intrusion activity. It was ill send you an email and see if you click on it. Thats a greater vulnerability. And then email is always a vulnerability because everybody every organization i should say has emails that they would rather not be out there publicly. A lot of that is perfectly legitimate email its just could be you and i talking about the merits or demerits of a particular candidate. But its embarrassing if it gets out and were talking frankly by email. So thats why i say this is a means like its effectively also because tenchmails are real it means i think on the media side its a lot hard tore decide im not going to publish that because its stolen. Thats a very interesting point, which is is the media making a mistake eventually putting out stolen materials . Well, theres members of the media we could ask that question to rather than me. I think but i do think its something that everyone has to be thoughtful about and theres been a lot of discussion in the media about what the right lanes of the road are in terms of that. I think on the chinese side we havent seen that kind of activity. But we are worried about what i would call more foreign influence activities. So we do know that the chinese use their economic power and the availability of markets for instance to convince companies or people to make certain choices or take certain positions. We see that all the time from soccer players in europe to basketball general managers in the u. S. And on and on in terms of the examples. That could also be done in those are sort of the public examples and the public reactions to public comments. That can be done much more quietly. Give us an example. Folks who have business in china or in areas that are controlled by china are vulnerable to economic pressure and those are the same people who may be involved in a variety of ways in election campaigns here in the u. S. So we worry about that in terms of the chinese. On the iranian side not so much on that end. Possibly could look more like the russian piece of it that is using their cyber intrusion capabilities which they have. Well see how that plays out. What about the North Koreans next year . North korean side ts possible. Theyre not in the top three. But. Questions on capacity . Theyre actually quite good in terms of cyber actors. But the question is what are you getting out of it if youre one of these countries. What is your ultimate purpose in undertaking a certain election or interference or influence activities . I think thats a difference too when you look at china and russia. China often has very specific policy objectives that theyre after. Stop talking about hong kong. Stop talking about the uighers. Stop interfering with our desire one day to control taiwan. That are very specific policy objectives. The russian side there may be some of that but a lot of it is just i will take you down. I will weaken you. I will weaken democracy as an alternate and competing vision of organizing society and thrsh i will increase my own sort of power in the world. And so depending on your objectives you are going to behave very differently in terms of your means. Are you sang win about 2020 . You know, i am we are very focused on it. And i think weve come a long way since 2016. I think we had kind of a dry run but in 2018. But certainly congressional off year elections are not as much going to be the focus as obviously a president ial election. So i think 2020 is where we could really be tested. But when i think about how far even just all of us as members of the public have come in terms of our awareness of foreign influence, how far the government has come in terms of its work, its work with social Media Companies and what the social Media Companies are doing on their own. The work obviously with the state and local Election Officials since thats really the way our elections are run here in the u. S. I mean, were just miles ahead of where we were. So that gives me a certain optimism but we need to stay laser focused on this through november. What are you communicating to the state and local authorities and how does that work . So that is mainly not a main justice issue. Its d. H. S. And f. B. I. So with the state and locals a lot its been about strengthening their election fralks by which i mean Voter Registration systems and the election system itself. Having resiliency in those systems. So if for instance youve got a ransom ware attack on a Voter Registration system on the day before an election do you have a backup system thats off line that you could then use on the day of the election . Paper ballot backups have been the subject of a lot of conversation. Thats a great example of heres what were seeing and sharing intelligence with them and heres how you can improve your networks and all of that. It is the fact obviously that we have a federalist system of state and local of elections run by the state and locals. We cant just dictate a lot of things. It is a process of Getting Better together at with a were doing. Switching gears a little bit. You mentioned some of these indictments that you speak through departments. The Department Speaks through indictments. I was fascinated by the fact that you indicted some Russian Military officers for hunting around in the chemical weapons and also in the antidoping area. Talk to us about those indictments and what they mean and what you hope to achieve. Theyre not going to be coming to disney land tomorrow. Right. So why do you do those things and what were these particular military officers doing . Starting with the more general questions. Why do we sometimes indict individuals who we have very little chance of ever catching. Of here are a variety reasons. Thinking about the russian 2016 example one of the purposes is to educate. So we do speak through indictments. We want to be able to show what we can do in terms of attrition. One of the things the chinese will say that theyve been involved. Well attributetion is impossible. Who knows if you even got this right. We say we know because we dont indict nation states and we dont indict the gru. We indict individuals. And we have their faces and their names up next to us when we announce the indictment. What were showing you is we can do attributes so well we can tie it back to an slidge behind the keyboard at this time on this day. The second point is education in terms of the general public. And that is i believe that indictments have a unique ability and our legal system and our political system and a unique credibility in terms of the government speaking because im not up here speaking like this when i speak to an indictment and i am not telling you look ive read all the intelligence and trust me heres what it says. Right . When i put something in an indictment im telling you i can stand up tomorrow in court in front of 12 people who dont know anything about this and convince them of this fact beyond a reasonable doubt using only unclassified admissible evidence. So i think thats a uniquely powerful way that we have of speaking as a government and of course as the justice department. So when we lay out for instance what we laid out in the indictment you cited which is about russian hacking of the World Antidoping Agency and also of the agency involved that was testing the poisons used to poison scripple in the u. K. , what were say

© 2025 Vimarsana