Menu
Sign In Pricing Add Podcast

John Carlin

Appearances

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1288.089

I was the assistant attorney general for national security. Prior to that and during his first term, I was the chief of staff to the director of the FBI. And then in between, I was the principal deputy assistant attorney general for national security.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1326.217

I went to a facility, an unnamed facility out in Virginia, and there was a giant Jumbotron screen, like a movie theater, and I could watch in real time as nation state actors, China in particular, hopped into places like universities,

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1342.2

used the fact that they penetrated the university to hop into places like private corporations and then to steal economic information off intellectual property, commit economic espionage. And it was amazing to see that being tracked in real time.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1358.047

And it felt like an incredible intelligence success, but it did not feel like actual success to watch that much information, things of value to the American public flow from the United States to China.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1374.039

It was literally classified. We weren't allowed to publicly say as a government official for years what everybody knew, which was that China was hacking these private companies.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1414.261

Clearly Unit 61398 was tasked with hitting these private sector targets in a way that others may not be. They were sloppy in their tradecraft. They were noisy. They had great nicknames like Ugly Gorilla that could be used. So it really was a rich trove of evidence.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1434.915

But also the fact that private sector groups like Kevin Mandia's group, Mandiant, had the information and were making it publicly available meant, To those who were worried about sources, methods, etc., this wasn't information that was uniquely the province of the government, so we really weren't giving anything up by being allowed to use it in a criminal case.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1480.509

The activity would spike at around nine in the morning Beijing time. It would then stay high. And then apparently they took a lunch break because it would decrease slightly in the middle of the day. Then they get back to work. You'd see it spike again, decrease overnight, decrease on weekends and Chinese holidays.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1497.785

So as the prosecutor in me, circumstantial evidence that this group is coming from China, but also It shows that the second largest military in the world was putting on their uniform, getting up every morning and then hacking you, you know, hacking us, hacking private companies. And that that simply couldn't be allowed to stand.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1520.424

If you let someone walk across your lawn long enough in common law and international law is a law of common law. They earn the legal right to walk across your lawn. It's called an easement. And that's why people put up no trespass signs.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1534.513

As long as we were allowing them to hack this noisily, we were creating the international law, the new norms, the new rules for this cyber age that said that this was OK. And so we felt very strongly that we need to show, no, this is a crime like any other type of theft. And if we don't at least treat it that way,

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

1554.162

Under our system, even if we can't hold these individuals accountable, we're never going to create the rules for the world that we want our children to live in.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 5: A Cyber Detente

1321.423

My daughter's first real piece of mail addressed to her. She was actually a baby, was old enough though to see it and be excited her name was on the envelope, was saying that her identity had been stolen in that hack along with the rest of our family. That, I think, was of such a scope and scale at that time.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 5: A Cyber Detente

1345.612

along and came shortly on the heels of the pla indictment where we were talking about it publicly and where they were noisily denying that they ever did did such things that i think that helped as well to bring china to the table but also to convince our own uh folks in government that that something had to be done and at that moment obama said um i've had it

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 5: A Cyber Detente

1928.338

I was surprised that we reached the norm, and I was even more surprised when we actually saw a decrease in hacks that looked like they were occurring in that space.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 5: A Cyber Detente

2291.437

Thank you.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 5: A Cyber Detente

2365.745

Thank you. Thank you.

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 5: A Cyber Detente

613.151

We could go to people in the private sector and say, to your point, what was so evidently clear, which is that when you're up against the second largest military in the world, it's not a fault of the New York Times, however big, 10-person IT team, that they can't keep them out of a system. That's a fight that traditionally has been nation to nation. We don't leave every company up against...

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 5: A Cyber Detente

638.394

major nation state rivals. It was such a unique space that we were allowing that to happen in cyber.