CHINA’S RISE TO CYBER SUPREMACY
A first-of-its-kind documentary look at China’s rise to cyber supremacy, its motives, and what can be done about it. Join NYTimes bestselling author Nicole Perlroth as she interviews those who have been victims of - and those instrumental in tracking - Chinese cyber threats.

Are You Ready?
I've spent the past fifteen years swimming in cyber threats. For a decade, I was The New York Times' lead cybersecurity reporter. I wrote a book This is How They Tell Me the World Ends, investigating the ins and outs of the cyber arms market. Now I travel the world educating people about the very real potential for a cataclysmic, cascading cyberattack.
Over the past two decades, trillions of dollars' worth of American R&D, trade secrets, intellectual property have crept out the back door. And when you peel the mask off the thieves, it's the same culprit. Every. Single. Time.
For whatever reason, this has never quite reached the American mainstream. Most Chinese cyberattacks have been seen as one-offs. Join me by listening to To Catch a Thief: China's Rise to Cyber Supremacy. We'll pull back the curtain to understand the strategy behind China's cyber operations and how we must prepare going forward.
Featured Guests

Kevin Mandia
CEO,
Mandiant

Jen Easterly
Former Director,
CISA

Dmitri Alperovitch
Co-Founder,
Crowdstrike

Jim Lewis
Center for Strategic
& International Studies

Dave Dewalt
Founder & CEO,
NightDragon Security

Heather Adkins
Founding Member,
Google Security Team

Evan Medeiros
Professor & Penner Chair in Asian Studies (China),
Georgetown University

John Hultquist
Chief Analyst,
Mandiant Intelligence

Andrew Scott
Associate Director for China
Operations, CISA

John Carlin
Former US Acting Deputy Attorney General

Steve Stone
SVP, Threat Discovery & Response, SentinelOne

Dale Peterson
Founder & CEO,
Digital Bond

Nate Fick
Former Ambassador at Large for Cyberspace & Digital Policy

Matt Turpin
Former US National Security Council's Director for China

David Barboza
Pulitzer Prize Winner, Former New York Times Shanghai Bureau Chief

Rob Joyce
Former Cybersecurity Director, NSA
Listen to the Episodes

The Five Poisons
Former NSA Director Keith Alexander called it “the greatest transfer of wealth in history.” Hillary Clinton, FBI Director James Comey and President Barack Obama also sounded the alarm on the biggest heist in human history. In Episode 1, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth, pulls back the curtain on China’s sprawling hacking operations. To combat the “Five Poisons”, or the five groups the Chinese Communist Party deems existential threats, China builds an expansive domestic surveillance apparatus. As these dissidents fled China, China’s state-sponsored hackers followed closely behind, wiring the world for Chinese surveillance and paving the way for Operation Aurora.

Then They Came for Us
Google discloses its hack and points the finger squarely at Beijing, which spells the end for Google’s business ambitions in China. Other victims stay silent, too fearful to offend the gatekeepers to the world’s largest market. Nobody will talk. Until they came for The New York Times.
In Episode 2, Nicole outlines what happened when she learns hackers are inside the Times. Mandiant is called. The malware traces back to a Chinese military unit based in Shanghai. Hackers’ digital crumbs make clear they are after one reporter: David Barboza. Just as he is putting the finishing touches on a massive, years-long investigation on the secret wealth of Chinese leaders and their families. Nicole recounts the behind-the-scenes build-up to the hack that started edging victims into the light.

The Most Dangerous Time in American History
In Episode 3, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth visits a welding shop in rural Wisconsin where Chinese hackers have set up shop in a dusty, back-office server. Hackers are using the welding shop as staging grounds to attack a staggering range of American businesses, including a major American airline, fast-growing Silicon Valley start-ups, law firms and research labs, in search of capitalism’s crown jewels: Intellectual property.
Nicole revisits a period that cybersecurity experts now call “the most dangerous time in American history”-- a period in which the blueprints to airplanes, stealth fighter jets, turbines, genetically-modified seeds, oil exploration strategies, even the formula for white paint, were smuggled back to China.

Naming and Shaming
As Chinese hackers continue their raid of American companies. The threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.
Then, the Times’ outing of its own breach, and its Shanghai assailants, gives the White House an opening. The Obama Administration decides to indict the Chinese military hackers responsible for thousands of hacks on American businesses. But the naming-and-shaming only sends China’s hackers further underground. In Episode 4, host and former New York Times cybersecurity reporter, Nicole Perlroth explores China’s hacking talent pipeline and how the PRC shifted tasking for its most sensitive operations from slipshod PLA hackers to high-precision, digital ninjas.

A Cyber Detente
Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States.
For years, the U.S. fends off its own accusations of hacking. But then China goes for the mother lode. And creates an opening for Obama to strike a deal with his Chinese counterpart, Xi Jinping. Nicole reveals the ins and outs and backroom dealings of the cyber detente nobody saw coming.

The Gunslingers
During China’s pseudo-cyber-hiatus, the PRC’s hacking operations get a major overhaul. CCP leadership moves responsibility away from the sloppy, brazen hackers at the People’s Liberation Army to the far more stealthy, and strategic, Ministry of State Security. Gone are the “most polite” hackers in the digital world. Here to stay are the gunslingers – the elite of the elite in their field.
In Episode 6, host and former New York Times cybersecurity reporter, Nicole Perlroth lays out what it looked like as China’s hackers went underground… and what we missed in Eastern Europe as they did.

Live Panel with Top China & Cyber Experts at The New York Stock Exchange
For this special live recording of To Catch a Thief at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth sits down with those who have been directly targeted by, traced, or directly engaged China’s state-sponsored hackers, diplomatically, or in the cyber domain: Pulitzer Prize winning journalist David Barboza, the National Security Agency’s former Cybersecurity Director Rob Joyce, former Cybersecurity and Infrastructure Security Agency Director Jen Easterly, Jim Lewis, of the Center for Strategic and International Studies and Rubrik CEO Bipul Sinha. They discuss how the Chinese hacking threat has morphed from corporate espionage to insidious attacks on infrastructure, the strategic leverage China hopes to gain with these hacks, how Xi Jinping views Trump 2.0, and what levers the United States can still pull to salvage what’s left of its cyber defense.