China’s Challenges According to Jamie Dimon

China’s Communist Party leaders believe that America is in decline. They believe this not only because their country’s sheer size will make them the largest economy on the planet by 2030 but also because they believe their long-term thinking and competent, consistent leadership have outshone America’s in so many ways, writes Jamie Dimon, CEO, JP Morgan in his 2020 annual letter to shareholders.

The Chinese see an America that is losing ground in technology, infrastructure and education – a nation torn and crippled by politics, as well as racial and income inequality – and a country unable to coordinate government policies (fiscal, monetary, industrial, regulatory) in any coherent way to accomplish national goals. Unfortunately, recently, there is a lot of truth to this, in the next 40 years, according to Dimon.

In recent years, China has been dealing with many challenges to its economic expansion, including pandemic-related curbs, an energy crunch, and an unprecedented crackdown on private enterprises. These challenges and the Communist government’s reaction led to 4% growth in China for the fourth quarter, according to JP Morgan.

Additionally, the government actions against COVID-19 have also kept domestic demand for goods and services suppressed, putting a lid on imports.

However, Dimon opines that “China will have to confront some serious socioeconomic and geopolitical issues”:

  • The Chinese lack enough food, water and energy to support their population;
  • Pollution is rampant;
  • Corruption continues to be a problem;
  • State-owned enterprises are often inefficient;
  • Corporate and government debt levels are growing rapidly;
  • Financial markets lack depth, transparency and adequate rule of law;
  • Income inequality is higher than in the rest of the world; and
  • Their working age population has been declining since 2012.
  • Capital outflows has caused the regime to tighten capital controls.
  • Lower rates make Chinese financial markets less attractive to global and domestic capital.

Additionally, China will continue to face pressure from the United States and other Western governments over human rights abuses (especially against the Uyghur population), democracy and freedom in Hong Kong, and activity in the South China Sea and Taiwan. The Uyghurs are an ethnic Muslim minority in China that have allegedly endured forced labor and other human rights violations.

Autocratic and authoritative leadership works well when you can manage top down and you are starting from a very low base. China’s recent success definitely has its leadership feeling confident.

Regardless of Chinese Communist Party’s opinions regarding its inevitable economic rise, only 100 million people of its more than 1.4 billion population in China effectively participate in the nation’s one-party political system. No other developed nation has such low participation. Growing middle classes almost always demand political power, which helps explain why autocratic leadership almost always falters in a larger, more complex economy.

Under autocratic leadership, a major risk is the allocation of economic assets (capital and people), which are, over time, used to further political interests, leading to inefficient companies and markets, favoritism and corruption.

In addition, autocratic leadership diminishes the rule of law and transparency – damaging the ability to create a well-functioning financial system (this certainly restricts the internationalizing of the RMB).

Disruption of trade is another risk China faces. The United States’ trade issues with China are substantial and real. They include:

  • Theft or forced transfer of intellectual property;
  • Lack of bilateral investment rights, transfer of ownership or control of investments;
  • Onerous non-tariff barriers;
  • Unfair subsidies or benefits for state-owned enterprises; and
  • Lack of rapid enforcement of any disagreements.

China will only comply with international trade agreements and only do what is in its own self-interest. Near term, we should expect challenge and conflict to characterize the relationship between China and the West over a range of economic, human rights and strategic issues.

There may, however, be areas where we will simply never agree. As the two largest economies in the world, China and the United States should continue to have a long-term interest in collaborating where we can on critical global issues, including climate change, global health and stability on the Korean Peninsula.

China does not have a straight road to becoming the dominant economic power. To put this in perspective, America’s GDP per person in 2019 was $65,000 and China’s was $10,000. Even if we do a rather poor job at managing our economy (growing at 2%), our GDP per person in 20 years would be $85,000. And if the Chinese do a good job managing their economy, their GDP per person in 2040 would still be under $35,000. While China is well on its way to becoming a fully developed nation, it may face more uncertainty and moments of slower growth in the future (like the rest of us) than in the past.

For the near term, if China and the United States can maintain a healthy strategic and economic relationship, it could greatly benefit both countries – as well as the rest of the world.

Another factor is the Chinese currency, the renminbi (RMB). The renminbi cannot be freely moved around the world; it can leave China only in limited amounts and can be invested only as the Chinese see fit. Thus the renminbi is a long way from replacing the U.S. dollar as the world’s reserve currency.

The Chinese currency is subject to their internal politics, laws and regulations. While the Chinese have done a good job building their economy and are slowly moving toward a more transparent society and financial system, they are a long way from having a currency that is fully “convertible” like the U.S. dollar.


References:

  1. https://reports.jpmorganchase.com/investor-relations/2020/ar-ceo-letters.htm
  2. https://www.wsj.com/articles/slow-meltdown-of-china-economy-evergrande-property-market-collapse-downturn-xi-cewc-11640032283
  3. https://www.msn.com/en-us/money/markets/could-chinas-economy-collapse/ar-AAPypxS
  4. https://warontherocks.com/2021/12/could-chinas-massive-public-debt-torpedo-the-global-economy/

Commercial real estate bust.

While the U.S. economy is likely to grow 6% in 2021 and 4% in 2022, the highest rate in decades, analysts project.

China’s economy has been faltering despite it’s exceptionally strong trade surplus and it’s authoritarian government’s heavy hand on COVID-19.


Preventing Scams and Cybercrime

Fraudsters and cybercriminals are getting sneakier – sometimes even claiming to be your bank or financial institution. Outsmart scammers with these tips.

With more than 2 billion people worldwide accessing the internet through smartphones, hackers have never had greater incentive to devise new scams. Getting scammed is an unpleasant experience, but you can be one step ahead.

For example, you look at your phone and you have a new text message saying it is from your bank or financial institution. The message tells you to click this link and download a new app to secure your identity or customer account. It’s strange because you’ve never received a text from your bank at this number before, and you already have your bank’s app downloaded, or at least you thought?

STOP! Don’t click that link. There are a number of red flags to watch out for to recognize a phishing attack. Although this trick is commonly employed over email, savvy thieves are now trying to install ransomware or steal your financial or personal information by impersonating a bank, credit card company or service provider by phone calls or even text messages. Phishing is when a fraudster tricks a consumer into providing their personal information through a fake app or website. The site may appear have a copy of your bank’s or another company’s logo and appears legit. So how do you tell it’s not?

  • With increasing number of cases related to cyber frauds or online scams, it’s recommended that you follow these tips to detect a scam by text and protect your identity:
    • Check the number and search for how your bank has texted you in the past. Are they different? Don’t click the link!
      Is this message irregular? If you have not recently conducted business, used your cards or logged into your bank via the app, mobile or desktop, it may feel out of context to be receiving this request. Don’t click it!
      Are they using the right terminology for you and your account? Does your bank refer to you as a member but this text message says “customer.” Don’t click it!

    REMEMBER: Do not download any software or click on unknown links sent to you by email or text! Banks will typically never ask you to download software in an email or while you are on the phone with us..

    Emails

    There are some easy ways to ensure the email is from bank. Bank emails typically include a Security Zone to help you distinguish a legitimate email from a fraudulent one. Here is what to look for to help identify authentic emails:

    • Always hover over the sender’s email address to verify who it is from. Banks will only send emails from an address that clearly indicates it is from your bank.
    • To be effective, you must verify the spelling of your first and last name and the accuracy of the last four digits of your USAA member number every time you receive an email from USAA.

    Phone Calls

    RING, RING, RING

    The caller ID says your bank across the top. It’s not a 1-800 or a 1-877 number, but when you answer, the caller says they are with your bank and now asks for your customer service identification number to verify you. The caller may offer to assist with installing software you need for your financial services … what do you do?

    STOP! Don’t share your personal information before verifying the caller. If your bank is calling you, they typically will never ask for your “customer” identification number, credit card number or other personal information.

    Follow these tips to detect a scam by a phone call and protect your identity:

    • Do not share security or personal data: Your bank will never call you and then ask you for your one-time verification code, PIN, password or other personal identification details.
    • Always realize that you can call your bank to determine if any request for information is valid. When you call us, know that we’ll use the multifactor identification code from your phone to verify you.

    “Grandpa, I need your help. My car won’t start. Please send me money using this app…” OR

    “Hi, how are you? I can’t deposit any money into my bank account because I am deployed. Can you send me some money for my phone card so we can continue talking? I really miss you.”

    STOP! Imposters have many tricks up their sleeves when they are trying to access your information or steal your assets. As discussed above, it could be by impersonating a company through a phone call, email or text, but now they are even trying to contact you on third-party social platforms, like Facebook or Twitter, or through dating apps and sites.

    Follow these tips to avoid a grandparent or romance scam:  

    • Never send money to someone you don’t know in real life, especially using a third-party app like Zelle, CashApp, etc.
    • If someone claims to be a family member, verify with that family member by calling them directly! If you think your grandson needs help, call him or call his parents before sending money unintentionally to a scammer.
    • Do your research. If you are getting to know someone online, make sure you look them up, validate they are who they say they are. Some also claim to not have access to common resources overseas because they are serving, which is often untrue.

    If any of these situations should happen to you, reach out for advice before giving out any personal information. And, if you get a suspicious email, text, instant message or phone call, you can report it to your bank or to the Federal Trade Commission at ftc.gov/complaint.

    If a scam does trip you up in real life, get help! The FBI has an Internet Crime Complaint Center at ic3.gov. You can also report identity theft to the Federal Trade Commission to 1-877-ID-THEFT (84338).

    There are also some easy ways to ensure a text message is from your bank.  Based on your request, many banks may send a one-time code as part of its multi-factor authentication process. If you suspect fraud, you should:

    •  REPORT! Even if you didn’t share personal information or click a questionable link, if you suspect fraud, let us know so we can help prevent it to protect you and other members in the future.
    • If you receive a suspicious call from someone claiming to be your bank and is requesting account information or security credential information, hang up immediately!
    • If you provided any personal identifiable information prior to hanging up, alert your bank.
    • If you did not provide any information, you should still send an email to your bank reporting the phone number or text message and message details. This helps them to actively work to shut down fraudulent callers, sites and emails.

    Imposters can come from the least expected places and they are constantly changing their tactics. That’s why it is so important to always be on alert. While financial institutions can use sophisticated detection processes, they are most effective in fighting fraud when they work together with their customers.

     

    Millions of Americans Fall Victim to Identity Theft

    While online, your personal information is constantly exposed to bad actors. Take actions to protect your identity and prevent the theft of your identity.

    A shocking amount of information about you can be found online. From Social Security numbers to bank account numbers to social media profiles, a savvy thief potentially has access to all the data he or she needs to assume and steal your identity.

    Identity theft is a serious crime. It happens when someone uses your Social Security number or uses other personal information about you without your permission to open new accounts, make purchases or get tax refunds. They could use your:

    • Name and address
    • Credit card or bank account numbers
    • Social Security number
    • Medical insurance account numbers

    Many Americans whose information was compromised did not realize their identity was stolen until years later when they tried to buy a car, file tax returns or purchase a home.

    Experts warn that identity thieves can use social engineering to steal your information. Social engineering is the art of manipulating someone to divulge sensitive or confidential information that can be used for fraudulent purposes.

    Social engineering can happen everywhere, online and offline. And unlike traditional cyberattacks, whereby cybercriminals are stealthy and want to go unnoticed, social engineers are often communicating with you in plain sight. Consider these common social engineering tactics that one might be right under your nose.

    • Your “friend” sends you a strange message. Social engineers can pose as trusted individuals in your life, including a friend, boss, coworker, even a banking institution, and send you conspicuous messages containing malicious links or downloads. Just remember, you know your friends best — and if they send you something unusual, ask them about it.
    • Your emotions are heightened. The more irritable we are, the more likely we are to put our guard down. Social engineers are great at stirring up our emotions like fear, excitement, curiosity, anger, guilt, or sadness.
    • The request is urgent. Social engineers don’t want you to think twice about their tactics. That’s why many social engineering attacks involve some type of urgency, such as a sweepstake you have to enter now or a cybersecurity software you need to download to wipe a virus off of your computer.
    • The offer feels too good to be true. Ever receive news that you didn’t ask for? Even good news like, say winning the lottery or a free cruise? Chances are that if the offer seems too good to be true, it’s just that — and potentially a social engineering attack.
    • You’re receiving help you didn’t ask for. Social engineers might reach out under the guise of a company providing help for a problem you have, similar to a tech support scam. And considering you might not be an expert in their line of work, you might believe they’re who they say they are and provide them access to your device or accounts.
    • The sender can’t prove their identity. If you raise any suspicions with a potential social engineer and they’re unable to prove their identity — perhaps they won’t do a video call with you, for instance — chances are they’re not to be trusted.

    A thief can get your personal information in person or online. Here are some ways thieves might steal someone’s identity. A thief might:

    • Steal your mail or garbage to get your account numbers or your Social Security number
    • Trick you into sending personal information in an email
    • Steal your account numbers from a business or medical office
    • Steal your wallet or purse to get your personal information

    Identity experts share five recommendations for how to protect your identity:

    • Once a year, order and closely review a free credit report from each national credit reporting agency: Experian, Equifax and Transunion.
    • Browse and purchase online while only using a secure connection. Never use autofill features when filling out online forms, unless it is on a trusted site.
    • Refrain from giving solicitors personal or financial information over the phone, by email or through pop-up message.
    • Opt out of pre-screened offers of credit and insurance by mail.
    • Avoid oversharing on social networking sites so you’re not sharing a potential scam with others.

    If you do think you’re a victim, call the three major credit bureaus and place a credit freeze and file a report with law enforcement.

    Even if you don’t believe it’s that big of a deal, reporting these crimes can help law enforcement prevent others. It took identity theft victims an average of 10 hours to resolve the fraud in 2020, according to LifeLock.

    Moreover, you may be responsible for what the thief does while using your personal information. You might have to pay for what the thief buys. This is true even if you do not know about the bills.

    How can that happen?

    • A thief might get a credit card using your name.
    • He changes the address.
    • The bills go to him, but he never pays them.
    • That means the credit card company thinks you are not paying the bills.
    • That will hurt your credit.

    This is the kind of trouble identity theft can cause for you.

    Your best defense against identity theft and social engineering attacks is to educate yourself of their risks, red flags, and remedies. To that end, stay alert and avoid becoming a victim.


    References:

    1. https://www.consumer.gov/articles/1015-avoiding-identity-theft#!what-it-is
    2. https://us.norton.com/internetsecurity-emerging-threats-what-is-social-engineering.html
    3. https://www.usnews.com/360-reviews/identity-theft-protection