podcast

CHINA’S RISE TO CYBER SUPREMACY

A first-of-its-kind documentary look at China’s rise to cyber supremacy, its motives, and what can be done about it. Join NYTimes bestselling author Nicole Perlroth as she interviews those who have been victims of - and those instrumental in tracking - Chinese cyber threats.

img
nicole perlroth

Are You Ready?

I've spent the past fifteen years swimming in cyber threats. For a decade, I was The New York Times' lead cybersecurity reporter. I wrote a book This is How They Tell Me the World Ends, investigating the ins and outs of the cyber arms market. Now I travel the world educating people about the very real potential for a cataclysmic, cascading cyberattack.

Over the past two decades, trillions of dollars' worth of American R&D, trade secrets, intellectual property have crept out the back door. And when you peel the mask off the thieves, it's the same culprit. Every. Single. Time.

For whatever reason, this has never quite reached the American mainstream. Most Chinese cyberattacks have been seen as one-offs. Join me by listening to To Catch a Thief: China's Rise to Cyber Supremacy. We'll pull back the curtain to understand the strategy behind China's cyber operations and how we must prepare going forward.


Featured Guests

img

Kevin Mandia
CEO,
Mandiant

img

Jen Easterly 
Former Director,
CISA

img

Dmitri Alperovitch
Co-Founder,
Crowdstrike

img

Jim Lewis
Center for Strategic
& International Studies

img

Dave Dewalt
Founder & CEO,
NightDragon Security

img

Heather Adkins
Founding Member,
Google Security Team

img

Evan Medeiros
Professor & Penner Chair in Asian Studies (China),
Georgetown University

img

John Hultquist
Chief Analyst,
Mandiant Intelligence

img

Andrew Scott
Associate Director for China
Operations, CISA

img

John Carlin
Former US Acting Deputy Attorney General

img

Steve Stone
SVP, Threat Discovery & Response, SentinelOne

img

Dale Peterson
Founder & CEO,
Digital Bond

img

Nate Fick
Former Ambassador at Large for Cyberspace & Digital Policy

img

Matt Turpin
Former US National Security Council's Director for China

img

David Barboza
Pulitzer Prize Winner, Former New York Times Shanghai Bureau Chief

img

Rob Joyce
Former Cybersecurity Director, NSA

Listen to the Episodes

test
episode 1

The Five Poisons

Former NSA Director Keith Alexander called it “the greatest transfer of wealth in history.” Hillary Clinton, FBI Director James Comey and President Barack Obama also sounded the alarm on the biggest heist in human history. In Episode 1, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth, pulls back the curtain on China’s sprawling hacking operations. To combat the “Five Poisons”, or the five groups the Chinese Communist Party deems existential threats, China builds an expansive domestic surveillance apparatus. As these dissidents fled China, China’s state-sponsored hackers followed closely behind, wiring the world for Chinese surveillance and paving the way for Operation Aurora.


test
episode 2

Then They Came for Us

Google discloses its hack and points the finger squarely at Beijing, which spells the end for Google’s business ambitions in China. Other victims stay silent, too fearful to offend the gatekeepers to the world’s largest market. Nobody will talk. Until they came for The New York Times.

In Episode 2, Nicole outlines what happened when she learns hackers are inside the Times. Mandiant is called. The malware traces back to a Chinese military unit based in Shanghai. Hackers’ digital crumbs make clear they are after one reporter: David Barboza. Just as he is putting the finishing touches on a massive, years-long investigation on the secret wealth of Chinese leaders and their families. Nicole recounts the behind-the-scenes build-up to the hack that started edging victims into the light.


test
episode 3

The Most Dangerous Time in American History

In Episode 3, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth visits a welding shop in rural Wisconsin where Chinese hackers have set up shop in a dusty, back-office server. Hackers are using the welding shop as staging grounds to attack a staggering range of American businesses, including a major American airline, fast-growing Silicon Valley start-ups, law firms and research labs, in search of capitalism’s crown jewels: Intellectual property.

Nicole revisits a period that cybersecurity experts now call “the most dangerous time in American history”-- a period in which the blueprints to airplanes, stealth fighter jets, turbines, genetically-modified seeds, oil exploration strategies, even the formula for white paint, were smuggled back to China.


test
episode 4

Naming and Shaming

As Chinese hackers continue their raid of American companies. The threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.

Then, the Times’ outing of its own breach, and its Shanghai assailants, gives the White House an opening. The Obama Administration decides to indict the Chinese military hackers responsible for thousands of hacks on American businesses. But the naming-and-shaming only sends China’s hackers further underground. In Episode 4, host and former New York Times cybersecurity reporter, Nicole Perlroth explores China’s hacking talent pipeline and how the PRC shifted tasking for its most sensitive operations from slipshod PLA hackers to high-precision, digital ninjas.


episode 5
Episode 5

A Cyber Detente

Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States. 

For years, the U.S. fends off its own accusations of hacking. But then China goes for the mother lode. And creates an opening for Obama to strike a deal with his Chinese counterpart, Xi Jinping. Nicole reveals the ins and outs and backroom dealings of the cyber detente nobody saw coming. 


episode 5
Episode 6

The Gunslingers

During China’s pseudo-cyber-hiatus, the PRC’s hacking operations get a major overhaul. CCP leadership moves responsibility away from the sloppy, brazen hackers at the People’s Liberation Army to the far more stealthy, and strategic, Ministry of State Security. Gone are the “most polite” hackers in the digital world. Here to stay are the gunslingers – the elite of the elite in their field.

In Episode 6, host and former New York Times cybersecurity reporter, Nicole Perlroth lays out what it looked like as China’s hackers went underground… and what we missed in Eastern Europe as they did.


bonus
bonus episode

Live Panel with Top China & Cyber Experts at The New York Stock Exchange

For this special live recording of To Catch a Thief at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth sits down with those who have been directly targeted by, traced, or directly engaged China’s state-sponsored hackers, diplomatically, or in the cyber domain: Pulitzer Prize winning journalist David Barboza, the National Security Agency’s former Cybersecurity Director Rob Joyce, former Cybersecurity and Infrastructure Security Agency Director Jen Easterly, Jim Lewis, of the Center for Strategic and International Studies and Rubrik CEO Bipul Sinha. They discuss how the Chinese hacking threat has morphed from corporate espionage to insidious attacks on infrastructure, the strategic leverage China hopes to gain with these hacks, how Xi Jinping views Trump 2.0, and what levers the United States can still pull to salvage what’s left of its cyber defense.

Subscribe on your favourite platform