Skip to main content

tv   After Words Bill Gertz Deceiving the Sky - Inside Communist Chinas...  CSPAN  October 5, 2019 10:00pm-11:01pm EDT

10:00 pm
across the world and across generations and thank you both so much. [applause] [cheering] ... ... [applause] screaming in our book tvs afterwards: washington time national security coldness, wilbert, discusses china's efforts to become a global military and economic superpower. his interview but former undersecretary stuart for a global affairs in the george w. bush his demonstration.
10:01 pm
afterwards is the weekly interview program with relevant guest house interviewing top about their latest work. >> bill, congratulations and thank you for joining us today. we are going to cover a lot of ground in your book, deceiving the sky inside communist china's drive for global supremacy. the first of all, why did you decide to write the book? >> this is my eighth book editing 2000, redbook called the china threat which was a play on what beijing calls the china threat theory. it was amazing. they really predicted the emergence of a major threat by communist china. this is never the book, i try to do another china book and every publisher approach, said we won't write a single topic try to book. you have chapters on time but we
10:02 pm
both write a single topic. why was that. tonight i really don't know. there are concerns or interest about and finally the deck in heels and i said it is time to do it another book on it from china as it is becoming greater then it was way back when the transfer was published in 2000. scenic is very timely. let me ask you about this title. it is deceiving the sky and they go on inside communist china's drive for global supremacy. the second is very clear and understandable. what is deceiving the sky, would that come from? >> the communist china and ancient strategies, and many people know the sun tzu, the famous strategist who comes from what is known as the warring states era, this is like 400 to 200 bc. there's also a book called the 36 strategies.
10:03 pm
author it's not quite clear but it's a compendium of military strategies that highlight their power to defeat his or her power. is beijing's legal today. breaker strategy is called to see the sky to cross the ocean. it goes back to alleged in the legend is that the emperor of one of his generals wanted the emperor to go to work with the neighboring house. in the emperor was reelected. so the general arranged for dinner at the home of a wealthy cousin. and when the emperor arrived he set into the house, and he felt his move. he realized it was in the house. it turned out to have been about. so the emperor was then selling honestly with the general to this neighboring province. he had to decide joy go to war with province or to return home and decided to go to work. the point is that the general and yet even deceive the sky and face legend, the sky is the
10:04 pm
emperor and ace considered a godlike figure. yet even the sight of god in order to achieve your objectives. to me this is exactly the strategy the chinese communist party in beijing are using today specifically directed at the united states. >> i was struck by the fact that you dedicated the book to the chinese people. before we go into the content of u.s. policy towards china, tells you why you decided to dedicate the book to the chinese people. i think chinese people need to be liberated from the communist regime. we don't, i remember doing a debate in new york city years ago and there was both of china was a threat. on the side no one said china wasn't a thread was a businessman. he came up afterwards and said i've been doing business in china for 20 years have never met a communist.
10:05 pm
i was shocked and you should visit the people's liberation army in beijing. the giant done in the past. there you will see all the founding fathers have communism. that is even now, so it is really i think important to understand this aspect that this regime is truly going after global supremacy in a way that it had a dent in the past. the work you know in beijing today. and you are before a chinese audience, and it was mentioned they dedicated the book to them, would you say to them. >> is the big method china the chinese party is one with the people. the chinese colonel came to visit the washington times and years ago and i said look, my beef it's not with the chinese people, it is with the communist party of china. and he said zero no no, there is
10:06 pm
no difference. between communist party of china and chinese people. there is a huge like. 1.4 billion people are enslaved into the system and there are as many as 93 million communist party members for the most part the people of china, do know that. they have tasted a little bit of prosperity mainly in nine cities and they have tasted a little bit of freedom, many of them have traveled the united states and so i really felt that i wanted to dedicate the book of frank the chinese people from the communist party of china. at the beginning the book you go into how we got it wrong. in particular you cite back in 1999, that the tillage his agency issued report and basically the report minimized basically that china was a threat. but then you just oppose that with some 20 years later, you
10:07 pm
basically indicate that army lieutenant robert ashley had in fact indicated that communist ideology had not changed that'll as a motivating force for china's ruler. and basically, the report that was issued then, really documented how and why china is the threat. in fact, one point that really struck me was a 600 billion annually in stolen technologies and intellectual properties. rather substantial. so how do we get it wrong. what was happening in 1999 and then why 20 years later, it changed. scenic i like tell the story the backend the late '90s, i was writing a story on the file. at that time depending on was more press friendly they would give you background briefings. so i went to dia and they have a background briefing which was
10:08 pm
fairly vanilla in terms of what they had to say. but at the end of the briefing, colonel came in and said the general would like to see you. the general was a director of bia and he said at the end of the table and told me that china was no threat. i was very surprised. i would expect the kind of, my question was to him why do you think that and he said basically because of their statement. this was assuming to me. i can understand from the policy officials who want to send a reporter for the possibility of intelligence. but for the top military intelligence officer to say that this is nuclear armed dictatorship which have missiles of our cities it's not a threat, i really felt deeply that there was a deception operation underway. fast-forward a couple of years later and we revealed and i revealed in one of my earlier books, one of the top analysts at dia, turned out to be a chinese spy. he was passing information.
10:09 pm
i believe that it must china's penetration of dia at the time it was giving this false information. general ashley, the current dia director has obviously taken a major shift. that's a reflection of overall of administration policy. they paid an atomic citizenship shift in policy towards china by identifying it as a strategic competitor. this filtering is way throughout the government bureaucracy right now. >> effectively pick up on that. the advent of the trump administration, in fact, back in december of 2017, when the national security strategy was released. it does state that both russia and china are strategic competitors but he also defines china it's not just only a strategic competitor, but also a threat.
10:10 pm
and you really document that in the book. elaborate a little bit more on that. >> sure. my view that the first step in finding solutions both of it is for policies or anything else, is to identify a threat. that went out understanding that, we will never be able to solve the problem of china. and so i looked at this and said what is it that makes up the threat from china. i spent a lot of time looking at chinese ideology, i look at their weapon systems there intelligence operations and their influence operations and financial warfare is quite an impressive array of threats. in my view, is the next potential threat like faced by the united states at any time in its history. >> but there was another dimension and that is in the trump administration the link has been made between american
10:11 pm
national security and the issue of economic security that is really a centerpiece that has been developed to some extent you can argue some of that is on within terms of the approach it is very hard-hitting. it's really having a significant impact particular at a time when china itself has been confronted with its own economic woes. so would you add so as not only the military component, not only digital power influence but also the economics of dimension that is absolutely essential here. >> absolutely. i have an entire chapter on chinese economic warfare. before i get into that, i wanted to.out about this idea of a multi- faceted from china. the reason that the threat has become worse, is that we, the
10:12 pm
united states has been engaged in what i describe as a 34 year gamble. strategic campbell. in that gamble began on henry kissinger when alondra with beijing against moscow during the cold war. it was designed to basically help defeat the soviet union and again the u.s. at that time, bailed out and struggling communist party of china and but after the fall of the berlin wall the collapse of the soviet union, any sum of 91, there was never a reevaluation. so the engagement policy, with china went on kind of autopilot. and i was never reevaluated and became this great lakes policy we have to continue. and that really is been in normatively damaging. for example, let me give you the most concrete example. engagement carried through several administrations both the
10:13 pm
republican and a really good during the bill clinton kinda reached a high.and at that.bill clinton allowed our national weapons laboratories, the nuclear laboratory to have exchanges with china. within a few short years of those exchanges, the cia issued a conclusion that through espionage, china that secrets of every deployed warhead in the u.s. arson. that was lost the secrets, which has never been fully resolved by our investigative agencies, but is clear that it happened, was compounded when the chinese spread warhead technology to pakistan. pakistan then through the a coupon nuclear supplier network, proliferated that nuclear technology to north korea and iran, syria and libya. we found this out in 2003, when we took down the libyan nuclear program.
10:14 pm
among the documents turned over to investigators were chinese language documents on how to design a small warhead missile. i can't think of a greater damage to our security. in global security that this engagement that didn't interest in the nature of the threat, from china. other substantial. diving into the economic lane as i was asking, just developed out of it because that particular piece, you made very clear the kind of threat that is supposed given time and kind of espionage activities taking place. but also, how is the economic instrument being route wielded in advancing china's own agenda. fear chinese economic threats derives from the fact they are trying to use their economic power to diminish the united
10:15 pm
states. they're doing this through several ways. let me first touch on as you mentioned the trump shift in policy. what president trump is done, more than any other president has alondra u.s. national security with economic security. and that is filtered throughout the entire government. what is law enforcement, intelligence, pentagon. everyone is looking at the chinese economic thread. as you mentioned, the white house was very successful in highlighting the threat. they issued a report with a stunning title called china's economic regression. there is a huge policy fight with bureaucrats staying we can't say economic aggression. we do reserve for you understand why. and that is where they to determine the based on the estimates, between 250 billion 600 billion annually in american intellectual property and technology, has been stolen by china. no nation can survive and
10:16 pm
especially nation that is so heavily reliant on its technology innovation, with that kind of theft. so getting back to the soviet cold war, an analogy as you remember back in the reagan administration, the reagan administration did something unique towards the soviet union. the basically said we are going to block western technology to masco. his major contributing factor in the demise of the soviet union. trump is basically doing a similar thing towards china. he is going to say, okay let's see how great the chinese economic miracle is. once american technology is blocked off. so there's been an unprecedented loophole of policies designed to prevent this flow of technology and in fact, i.out in the book, this policy was launched in very early 2017, during a trump tower meeting, with the present newly elected president president-elect trump.
10:17 pm
he met with the top executives in silicon valley, their main concern was how we stanch the flow of american know-how to china. that's where it's begun. >> you feel that china's predatory economic policy will be afforded as a result of this particular policy approach. do you see it having the kind of impact it should. >> yes very much so. the financial warfare, chapter of deceiving the sky. i.out that in addition to the tariffs that have been posed by the trump administration, which are having an impact, china has taken a different tack and they are going after american capital markets. through those investments to raise money. as wale as to influence policy. take for example investments by the california personnel retirement fund in chinese companies.
10:18 pm
those funds could then say, don't sanction china because our retirement funds for their. this is happening in a large-scale freedom happy to say that the administration within the past week, has announced that they are going to take steps to try and curb this very regulated capital markets which again, the united states is the unprecedented leader in all capital markets. >> the administration has been quite vigilant on this issue and negotiators are also have those goals and those objectives in correcting these predatory actions. as part of the negotiations robert lighthouse card and you mentioned are at the forefront of it. pushy? >> china's leader goals and objectives? >> is becoming a new mouth and tongue up until his extension to
10:19 pm
the operators of power, which took place around 2012 and 2013, the chinese strategy for the world began. watch closely and saw the collapse of the soviet union. their idea was let's be friends with the united states. so their main deception was they work a communist and not a threat, going back as far back as 1999 not a threat. the reason for that was the policy was minor time and builder capabilities. that has changed dramatically. they have announced his goal is the chinese dream. the chinese dream in my view is the really a communist party of china nightmare. this is where china is speaking to take his rightful place at the sole superpower in the world. so as not just that they're spreading their own power and the communist system, and the predatory lending practices through the initiative but it
10:20 pm
also means in order to achieve that they have to go after the united states. they have to weaken their main enemy of the united states. there we see the policy of china to send the opioid fictional into the united states to masturbate tens of thousands of deaths to the opioid crisis. >> is it true they are striving rather successfully and solidifying his own power base he's done that through the boat if you will, which basically says for live, he is also done that even articulating, the power of the communist party. he talks about the revitalization of the communist party. do you see him in any capacity as being vulnerable. sue mackey has consolidated power since 2012 through a massive purge it has been
10:21 pm
carried out on the offices of anticorruption but in fact that's a cover for power consolidation and he is instituted an unprecedented approach. not just middle loophole officials are low-level officials but some of the most senior officials of the communist party and anyone perceived as arrival, and the pla anybody perceived as a potential rival is being eliminated. this has created great instability within china because the weight that china's party communist party is structured, is pretty much like a group of mafia family. where each mafia has an outrage and a network and so by purging some of these mafia families, it is creating some dive boat internal opposition to him. that said, he has strengthened the apparatus in china mainly public security. there are numerous chinese security organizations and
10:22 pm
security organizations. all of the modeled after the soviet which is again a political police and intelligence service that serves a dual function is both intelligence as wale as internal security. select one of your chapter is entitled the coming space work. in fact, in the chapter, you discuss the prospect for war itself. and speculate that china that this cannot be ruled out. please talk a pit about that and then it's also discussed the allison's, the sanity strap. [applause] that the path that we are on, the word is likely. >> military threat to china is based on what the chinese goal asymmetric warfare. marcescens weapons.
10:23 pm
that's what again going back to the states where a weaker power, if there's not trying to confront the enemy had him but priceline his vulnerabilities and special capabilities. space warfare is one of those. cyber is another and that space warfare is a real vulnerability for the united states because stasis of defendant on the multitude of satellite for candidate communications and finance intelligence military navigation and china's and the strip that they've developed an array of orphans. this is the nonfiction book i included a fictional scenario. perhaps china could launch a worldwide kind of a pearl harbor missile attack of pearl harbor in their first base of that would be knocking out t missile warning signs. because the u.s. operates, very good eyes in the sky they can
10:24 pm
pick up signatures of missile launches anywhere on earth. and through attacking this and destroying as many as two dozen satellites, the u.s. military could be crippled. its ability to function again, we are the sole superpower right now but china is working to diminish that capability. what about graham allison's own thesis. clear abuse of that. >> i don't mentioned in the book because i don't think it's a valid assessment. i don't think that war with china is inevitable. this notion that in the past going back to ancient times, that a declining and rising power will automatically go to war, first of all, this is been a major propaganda theme from china. the united states and china as a rising the world. it is working to rise its power but if the united states must
10:25 pm
diminish, but we don't hear much is how china is trying to diminish the states. i still united states is definitely going to be the sole superpower and i agree with president trump his strategy through strength peace through strength. which goes back to the reagan administration which makes clay says if you would prevent a war, make sure that the other side doesn't miscalculate into settling into a war. this kind of way you disagree with the grant analysis strategy. connect the also have a number of very interesting quotes read each chapter has a quote. for example, on the assassins space, you have a kernel, a chinese kernel staying quote to meet the requirements of the exceeding the united states and the work of the pla, should have assassins mace weapons with space attack capability.
10:26 pm
[applause] sierra china has that capability today. >> you have is you said a fictional kind of scenario but you do talk about the fact that it does have that capability today. this is one of the areas where china is ahead of the united states. the united states know terry set up a new space command. guess what, they have no weapons. at least no weapons that we know china on the other hand, has an array very lethal and capable anti- satellite 11 and we first learned this back into 2007, when china tested the ground lunch missile a direct descendent missile which targeted a weather satellite, a chinese weather site and the impact on that satellite and i spent an entire chapter explaining how the chinese lied about that. it's very characteristic of their approach. the satellite created tens of thousands of pieces of floating
10:27 pm
debris which are going to threaten both manned and unmanned spacecraft for probably 50 to a hundred years. try to learn from that lesson. they took a little bit of heat from the international community. so the second thing that they have developed our ground-based lasers. the best way to attack an orbiting satellite according to the experts, is to use a ground-based laser. a high-powered. all you have to do to disable or to destroy, and orbiting satellite is to warm up the electronics or damage the centers or the optical cameras on the sink. that went out the same degree field. in addition to both missiles and lasers, they've also developed medical core overcontrol satellite and have it tested a group of small satellites. one of which had a robotic arm which could reach out and grab or crash a satellite or knock it
10:28 pm
out of orbit. this is an impressive array of weaponry. and again they been developing it, for before 2007 in the u.s. is now trying to catch up. cement your book really documents many areas like that in fact, in the digital area, and cyber attacks, you begin with a quote in this case from the 1940s. however a debt. he says quote to achieve victory, we must as far as possible, make the blind, and death by stealing his eyes and ears. and drive his commanders to distraction by creating confusion in the minds. some relate that statement to cyber. in chinese cyber). >> j cyber threat like this a threat, is another one of their asymmetric capabilities where they are on par or ahead of the united states. they have done a massive job of developing the ability to get
10:29 pm
inside networks can control networks in everything from our military networks that held will cut logistics we need everyone to move troops in and things to that battle fronts and most alarmingly, the chinese cyber threat has been detected inside of our electrical grid. again, they call this cyber reconnaissance. in other words they are mapping the networks. the united states has roughly three electric power grids in the chinese have been detected in all three. the police is among military is in a crisis of conflict, they could basically turn off lights. now we have 16 critical infrastructures in addition to her electric red in our financial communications transportation but when it really come down to, is the most critical infrastructure is our electric grid. if that goes down, we are in
10:30 pm
deep trouble. the scope and standard ten being the most concerning, warily, scale in terms of a continued to future chinese cyber attack. >> , save chinese threat today knowing 70 and going. we witnessed it in many ways. it's going to get worse when the chinese have stolen nasa's amount of data in the block, highlight the case of soothing, and he was still a hacker and he operated network out of vancouver and successively broke into boeing and stole $3.4 billion worth of research on the c-17 transport. this is the military his front-line transport. a problem many of them. they not only, for as little as $300,000, they were able to
10:31 pm
steal this technology. not only did they steal it, but they sent back to beijing where they turn it into the y20. which is their brand-new transport. this is only one example. i did indeed guide. it is characteristic of the kinds of things are dying but there have been many massive cyber breaches. the most significant of which the office of personal management, where 22 million records of federal workers not just any federal workers, federal workers who are engaged in classified work. this is an amazing breach of and the government modified to adjust in the government millions of people who hold security clearances that their information was compromised. how could china uses information. they could couple it with artificial intelligence which is another area that they are working on and they could use it to identify key people. for example, in very interested
10:32 pm
in counterintelligence. so they would use it to find out chinese language speakers who would be part of the intelligence community that could target those people for recruitment or for other dirty tricks, things like that. on cyber front, they could use it to identify network administrators that key national security agencies and target those people can learn their credentials and break in to those networks. cement you have so many areas that you cover in terms of their engagement and where they deploy different kinds of technologies economic instruments, etc. this is throughout the book. it will really cover all in a time we have allotted, but let me focus on a few more. give a chapter entitled, high-tech totalitarianism. an interesting title.
10:33 pm
you mentioned that by 2018 that china had put in place a new technological control system based in part, you stay here, on an estimated 200 million surveillance cameras deployed about iran and the camera seemingly everywhere. as three poles and lamps and ceilings traffic signals, etc. talk about this high-tech totalitarianism. >> begins the following on my important note that this is the reflection of chinese communist ideology. total control and elimination of any person for institutions that is perceived as a threat to parties of power. it is become what they call a social credit system. whereby just as you have a credit banking on your credit card refinances, they have a credit card for your politics. a friend of mine told me in beijing, where people normally
10:34 pm
cross the street, a person refused cross the street when i was in a proper crossing signals because automatically, he would be identified in his social credit would be diminished. there are also stories that people have done things that are perceived as if a regime or anti- communist party, they are limited for travel. they can't take trains, they can't take aircraft, the people in china, or actually even going to the remote parts of the country and trying to buy credit from people there that don't have this problem. china is also a lot of this technology there on the surveillance cameras was stolen from the united states. they've even developed a addition to facial recognition, they have something that can actually measure the gate the walk. so they can't see a person his face, they can use a massive database and high-speed
10:35 pm
computing to be able to identify individuals through the gate. >> learn about chinese software. avoid use the term software is the smart power. how would you assess the soft power. we know they are heavily involved in economic development of latin america, middle east and africa. you see it is very effective. if so, why is it effective in your opinion. >> on this guy, they have expanded in a number of areas, i would say soft power is one, influence operations are another and they have expanded something called united front work department which is the party unit which is because i intelligence unit that is responsible for advancing china's strategic interests around the world. i think that one of the key features of chinese expansionism today is something i mentioned earlier called the belton initiative. this is again this morphed out
10:36 pm
of things ideology called the china dream. now the road initiative is the private trojan horse of chinese expansionism. this targeted on the developing world. the way it works is that china goes into a poor country because we like to build a railroad for you and will even help you with financing. and they provide the financing and then they do it at exorbitant interest rates. then when the professor comes back and says we are having trouble paying back this loan, attorney say wale that is a railroad now. we're taking it over. in that kind of thing is taking place on a large scale. roman rule. especially in the developing world. plan view is that i see this as kind of a u.s. encirclement strategy. basically do take over and via the developing world is the way to answer the more developed world and that way exert power against the developed world.
10:37 pm
>> you've a case in here concerning key west. share with us what exactly happened in key west. most people that are familiar with chinese intelligence operations, know about the two main places. what is the mystery known as mss, is the massive intelligence political police service. the second is the second half of the pla floor to file. that is recently been folded into a new military unit but this of the two was at the fbi has been chasing for years. last year, something new. a young man had booked himself into a hotel room in key west and left his wallet and things behind had to cameras on him and then went to naval air station key west. he walked around a security fence that stretched in the water and began photographing
10:38 pm
the antenna. the contractor in the face spotted him and immediately arrested him. the fbi came in and it turns out, that this was a new dive boat chinese five. the spy from the ministry of public security. which i mentioned earlier is kind of the uber security service. in china today. actually into file, so this guy was convicted and sentenced to prison and the officials involved in the case that it wasn't unusual that the ministry of public security had been dispatched a spy despite his facility which again is the key facility for counter drug operation it's a major intelligence center there, who knows what exactly he was after but it again, and the counterintelligence business you can tell who motivation of these spies are by the targets that they are going after.
10:39 pm
>> you've also talked about influence making. in this regard, one of the things that also takes place is that you have influx of chinese students in the united states, you also have the wheels to have a number of academic institutions that have the confucius institute and there has really been a flurry of the packs on those institutions that are taking resources from the confucius institute. let me give you an example of the state of florida know there are a good number and senator norcal rubio, has come out very seriously against these institutions existing. talk a pit also and describe what is going on here. is in in your book, you do leap together specific capabilities specific capacity, technological capacity, but you also talk
10:40 pm
about ideology and the importance of ideology. >> confucius institute again is another trojan horse. it's a method. it is been very effective and chinese communist party influence tool especially on american campuses. there are about 100 of these institutes and they are funded by the chinese government. their objective is to extensively to teach chinese culture. interestingly, the officially atheist army is party of china is using confucius as a tool of influence tool. and what is happened with these institutes, is that these universities which again are dependent upon scoring students, have become dependent on these confucius institutes and therefore there moderating the policies. can't find a mini campuses courses that teach about the evils of the communist party of china. this party which is been blamed for the deaths of about
10:41 pm
60 million chinese cents the founding of communist china. so as you mentioned, norcal rubio has, the more outspoken members of congress and trying to get universities to kick these institutes often again again the universities are reluctant to do it because they become reliant on it. so again you have this finance and influence power working together. and of course on the student and an researches, there are at least 300,000 chinese students. not all of them are spies, but all of them can be called upon by chinese security agencies to conduct work for them. in fact just recently there were interest of the chinese national in the united states was involved in what was known as the thousand talents program. this is one of the chinese governments big programs to get officials of expertise to go from the united states to china.
10:42 pm
there is much of the first time in the indictment of this case that this chinese official was working with one of the confucius institutes on university up in massachusetts which it's not identified but most likely was mit or massachusetts institute of technology. speak. >> military might, we've touched upon the number of areas but let's go to military rights. clearly the chinese are investing in their navy. and also many countries in the region have been very concerned about what they've been witnessing in terms of the island of south china sea, the dispute but also about the investments in significant investment in the military. where is it out. and how would you describe it. >> i just on this a little bit earlier in the chinese military threat comes in two forms. the conventional/unconventional
10:43 pm
warfare and the nuclear. >> and you admission the nuclear right. civic right. basically they have developed an array of new weapon systems. i can remember covering way back many years ago, that the chinese through a spy case in california stool details on the battle management system which is the huge phase array radar that is at the heart of our modern navy and a select. they combined it with chinese and russian technology and now, they're cranking out hundreds of types of warships in terms of submarines, again they are behind united states in terms of quietness. in the severing warfare, how part of why it's your submarine is, is the most important thing. but they're getting quieter. on the nuclear front, it is a major challenge in the sense that the nuclear threat is increasing exponentially.
10:44 pm
and we know very little about it. we have through arms control the cold war as you know, we were able to engage the soviet union to find out things about the nuclear arsenal and that was forged for stability. the chinese have refused to engage in arms-control debate or negotiations with the united states and the reason is, they believe that any discussion of their nuclear deterrent, one or minus current deterrent value so we don't know both of they have 600 warheads or both of they have 1500 warheads or both of they have 10000 warheads. but we do know is that we have the great underground wall. this is 3000 miles of tunnels that are used for both storage and production of nuclear weapons. so the nuclear threat from china is going. it is compounded by an advanced missile system. this is another assassin case
10:45 pm
weapon that is called hypersonic missile the troubles at mach seven for about five or above. which is 7000 miles per hour and it can literally outrun her missile defenses. that is the purpose of having it. in addition to being able to have that, has the capability and very difficult physics environment to be able to maneuver to its target. chinese have developed this as a conventional warhead. perhaps anti- ship missiles as wale as a nuclear delivery vehicle. >> five g in rahway. major topic of concern. also is been front and center in terms of phone foreign-policy were the secretary of state mike pompeo has raised this issue with many of our allies. some who have taken measures against such technologies. and by the chinese and others who haven't. they have a listen to. and they're looking down that
10:46 pm
path. explain the concerns about roughly in five g. >> five g it's not simply an advance from four g to five g and telecommunications technology. it is a revolutionary step above what we are currently doing with their handheld devices and it requires an infrastructure. chinese are seeking to corner the international market on five g technology. and they are making great strides. this back to high-tech totalitarian sam wright. >> there are a few giants in chinese, many of them have been sanctioned by the united states quality technologies, is the most concerning. it is a state run company masquerading as a private company. its leader was a former pla electronic to art fair extrovert
10:47 pm
and now there is a huge battle in the trust administration has indicted the cfo. being she is being held in house arrest outside of vancouver canada. there is a case against her which shows that while way has been illegally conducting business in iran. it's kind of a backdoor way to try to deal with the wally threat. so far u.s. efforts around the world have not succeeded in getting as many allies as they should be about this technology, one way the united states has been influencing others not to use huawei technologies, which can be used for intelligence gathering, that is really the key concerns. but they have said that united states will not share technology for not share intelligence with key partners and allies that have while way technology. routers and things. and the reason is that there is a belief in fact is more than a belief, we've learned from this
10:48 pm
note of documents that national security agency was able to penetrate quality equipment and actually spy on the spies. the chinese were spying on. so you know that there in addition to that there is is known as an intelligence law which requires allstate companies in china, or excessively private companies to provide data for chinese intelligence and security services. >> two less things, one of which four affairs, years back, loophole conducted a poll, and loophole the question was is russia geopolitical challenge or threat question and it was interesting because half of the foreign policy experts, basically in varying degrees at the desk. with the other half, focused on china and very specifically said
10:49 pm
that no, it's not russia, china. let's take those look at both. you've covered both in you've written about both. so we are on the scale do you fit. where is china in west russia. in terms of geopolitical threats to the united states and our allies. >> in terms of magnitude, china is by far the greatest threat. this was a little confusing in the truck administration his national security strategy and national defense strategy where they have coupled both china and russia together. again this been a very bureaucratic ploy for many years to try and diminish the chinese threat by elevating the russia threat. the foreign-policy community and the academic community is on a kind of autopilot when it comes to russia. this based on the cold war. during colder, we fielded numerous experts on the soviet
10:50 pm
threat. and they continued. so there's kind of a russia threat and culture within this community. that is rapidly changing. again there were much fewer trying to experts. the language was more difficult, the culture was more difficult, that is changing happily now. i was recently at stanford where i heard an academic there who it's not necessarily concerned about the china threat any reeked of bunch of reporters. he literally said that i am really afraid of what is happening as we see this emerging threat from china. the other thing to look at is the chinese economy is probably sometimes larger than russian economy. i'm with the russia comes in is they are developing a series of vladimir putin his doomsday weapons. hypersonic missiles, nuclear power cruise missile, massive large icbms in a number of very threatening when the weapons.
10:51 pm
the russia threat however, is limited to vladimir putin and his regime an effect on the recommendations i make in this guy, is that the united states should play the russia guard against china. we need russia as an ally. that will not happen as long as glover pudding is in power but you know, russians have said, gluten could be bought out. and given back his civilian studies taken from russia. >> you put forth a number of recommendations. at the end of the book. what are some of your recommendations as to how we can tackle this challenge. the key recommendation is for the u.s. to recognize the true nature of the china threat. really be clear china much more than a strategic competitor but actually as an enemy of our adversary.
10:52 pm
national security and defense strategy took important steps in identifying china as a strategic competitor. to me that's a halfway measure basically is the soft to the probe engagement and pro-business community for say let's just keep trading with china fearless just keep doing business with them. the other problem is after 40 years of engagement our economy is so intertwined with china that is beginning to change. a lot of businesses are cooling out in the looking for other markets. india and vietnam and places like that. and so i think it is time to declare china and we do that, we say china is the adversary, that will go a long ways towards helping us decouple. another recommendation is to create a parliament in echo. disorganized, proto- right chinese around the world and bring them together once a year as ideas and policies for reforming the system into a democratic system.
10:53 pm
have them meet in the publisher and distributed electronically in china. these are very simple things we could be done. the other thing i talk about is expanding missile defenses. we saw in the case of south korea, seven the united states deployed the theater high-altitude area defense, a very effective antimissile system. the chinese punish south korea to the tune of three to $4 billion causing problems for them. this is the sign that china it's not and doesn't like his missile defense because they are military is so this'll oriented but they have so many different types of missiles. so let's start deploying this missile throughout the world. in mongolia, in india, and southeast asia, and australia, and all of these places and let's really this will china mitigate the china missile threat. where does india fit into the strategy given india so
10:54 pm
objectives in the region and also, going back to the issue of russia say, just a little bit more about where russia might fit in. are you concerned about a closer chinese russia alliance that is emerging. some experts think that that is happening in other experts after that and say that is not happening. and what happened. person india, the interrelationship with united states is growing. india is kind of like united states in that they have had this decade-long debate about china. with pro china and it's a china communist party his concerns. this is the beginning to wake up to the china threat. they have the border dispute with china and they are very concerned and what i talked to any officials here, is the main national security threat for china. for india. as russia, and china growing
10:55 pm
closer together. we have seen in the past couple of years and in fact, just within the past few weeks, some joint exercises. military exercises this is kind of unusual. rusher has been having large-scale exercises. i think the russians are a pit cautious about the relationship with china traditionally, russia had feared china taking over its far east and the russian far east which is very vulnerable. low population and a few defenses. so there has been a lot and couldn't has alondra with beijing, basically is an anti- u.s. motivation. it is a concern to see the growing alliance between russia and china but as may focused as an anti- u.s. alliance. >> if you to pick out, vulnerability of china will you think is china most vulnerable one. >> i think the most vulnerable on the regime limits legitimacy.
10:56 pm
chinese are going to be celebrating 70 years of communist rule and it's not and should not be a cause for celebration. again we do look back at the massive deaths that have been because, there's a book published many years ago called the black book of which estimated the debts from communism to be 60 million people. this is the legacy of the communist party of china. they need to be held accountable for that. i think by exposing them out and exposing the true nature of the communist claim, that would go a long way towards really bringing about a democratic change peaceful democratic change in china. soon i can build let me ask you if impeaching a book to policymakers, when you want them to know about this book. what is the most essential top three points and message that
10:57 pm
you want to leave with them. >> this is the most important book that anyone can read about the china threat. there are basically three things or two or three themes with the main one is china is the nuclear armed dictatorship that is growing stronger and more threatening. and second, we've really missed china. our intelligence have misted our policy commit the has misted we really need to admit that. i think that we are starting to see a much greater debate and policy circles about that. this is the key. thirdly, we've got to bring about a peaceful democratic change within time. that is ultimately the way to mitigate the threat of china. is to bring about the end of the communist party in china. of course things main objective is to keep the communist party car and ultimately to become a global hedge. where supremacy and dominance
10:58 pm
over the entire world. >> builders, thank you so much for coming today and much appreciated. and let me just start from what we will be. deceiving the sky inside communist china drive for global supremacy. it is certainly a fascinating book and you have really done a lot of work in research as you have put into this. so thank you for coming today. >> thank you. this program is available as a podcast. all actors programs can be viewed on our website apple tv .org. ♪ that will be in order. for 40 years, cspan has been
10:59 pm
providing america unfiltered coverage of congress the white house, the supreme court, and public policy events from washington dc and around the country. you can make up your mind. created by cable in 19801979, cspan2 has brought to you by your local cable or satellite provider. the span, your unfiltered view of government. you are watching the tv on c-span with top nonfiction authors every weekend. the tv, television for serious readers. starting on just a minute book to be national security agency contractor edward snowden, talks about exposing the u.s. government mass surveillance programs and having to go into exile as a result. holick as survivor irene, reflects on her childhood. imprisoned into concentration camps during world war ii, and
11:00 pm
her arrival to the united states in 1945, and later provides a history of september 11th 2001, by utilizing newly transcripts interviews with those directly affected by the image of the day. i don't start now. check your program guide for more information. . . .

43 Views

info Stream Only

Uploaded by TV Archive on