Chris Wray
Appearances
The Bulwark Podcast
Bill Kristol: Cannons All the Way Down
Part of the FBI's job is to safeguard classified information. And when we learn that information, classified material, is not being properly stored, we have a duty to act. And I can tell you that in investigations like this one, a search warrant is not, and here was not, anybody's first choice.
The Bulwark Podcast
Bill Kristol: Cannons All the Way Down
we always invariably try to pursue the least intrusive means, first trying to get the information back voluntarily, then with a subpoena, and only if after all that, we learn that the agents haven't been given all of the classified material. And in fact, those efforts have been frustrated, even obstructed.
The Bulwark Podcast
Bill Kristol: Cannons All the Way Down
Then our agents are left with no choice but to go to a federal judge, make a probable cause showing, and get a search warrant. And that's what happened here.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 8: Living Off The Land
The scale of the Chinese cyber threat is unparalleled. They've got a bigger hacking program than that of every other major nation combined. And they have stolen more of Americans' personal and corporate data than every nation, big or small, combined.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 8: Living Off The Land
There has been far too little public focus on the fact that PRC hackers are targeting our critical infrastructure, our water treatment plants, our electrical grid, our oil and natural gas pipelines, our transportation systems, and the risk that poses to every American requires our attention now. China's hackers are positioning on American infrastructure in preparation
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 8: Living Off The Land
to wreak havoc and cause real-world harm to American citizens and communities if and when China decides the time has come to strike. They're not focused just on political and military targets. We can see from where they position themselves across civilian infrastructure that low blows aren't just a possibility in the event of a conflict. Low blows against civilians are part of China's plan.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 8: Living Off The Land
We and our partners identified hundreds of routers that had been taken over by the PRC state-sponsored hacking group known as Volt Typhoon.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 8: Living Off The Land
The Volt Typhoon malware enabled China to hide, among other things, pre-operational reconnaissance and network exploitation against critical infrastructure like our communications, energy, transportation, and water sectors, steps China was taking, in other words, to find and prepare to destroy or degrade the civilian critical infrastructure that keeps us safe and prosperous.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 8: Living Off The Land
And let's be clear, cyber threats to our critical infrastructure represent real world threats to our physical safety.