John Carlin
Appearances
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
I was the assistant attorney general for national security. Prior to that and during his first term, I was the chief of staff to the director of the FBI. And then in between, I was the principal deputy assistant attorney general for national security.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
I went to a facility, an unnamed facility out in Virginia, and there was a giant Jumbotron screen, like a movie theater, and I could watch in real time as nation state actors, China in particular, hopped into places like universities,
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
used the fact that they penetrated the university to hop into places like private corporations and then to steal economic information off intellectual property, commit economic espionage. And it was amazing to see that being tracked in real time.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
And it felt like an incredible intelligence success, but it did not feel like actual success to watch that much information, things of value to the American public flow from the United States to China.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
It was literally classified. We weren't allowed to publicly say as a government official for years what everybody knew, which was that China was hacking these private companies.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
Clearly Unit 61398 was tasked with hitting these private sector targets in a way that others may not be. They were sloppy in their tradecraft. They were noisy. They had great nicknames like Ugly Gorilla that could be used. So it really was a rich trove of evidence.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
But also the fact that private sector groups like Kevin Mandia's group, Mandiant, had the information and were making it publicly available meant, To those who were worried about sources, methods, etc., this wasn't information that was uniquely the province of the government, so we really weren't giving anything up by being allowed to use it in a criminal case.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
The activity would spike at around nine in the morning Beijing time. It would then stay high. And then apparently they took a lunch break because it would decrease slightly in the middle of the day. Then they get back to work. You'd see it spike again, decrease overnight, decrease on weekends and Chinese holidays.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
So as the prosecutor in me, circumstantial evidence that this group is coming from China, but also It shows that the second largest military in the world was putting on their uniform, getting up every morning and then hacking you, you know, hacking us, hacking private companies. And that that simply couldn't be allowed to stand.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
If you let someone walk across your lawn long enough in common law and international law is a law of common law. They earn the legal right to walk across your lawn. It's called an easement. And that's why people put up no trespass signs.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
As long as we were allowing them to hack this noisily, we were creating the international law, the new norms, the new rules for this cyber age that said that this was OK. And so we felt very strongly that we need to show, no, this is a crime like any other type of theft. And if we don't at least treat it that way,
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 4: Naming and Shaming
Under our system, even if we can't hold these individuals accountable, we're never going to create the rules for the world that we want our children to live in.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 5: A Cyber Detente
My daughter's first real piece of mail addressed to her. She was actually a baby, was old enough though to see it and be excited her name was on the envelope, was saying that her identity had been stolen in that hack along with the rest of our family. That, I think, was of such a scope and scale at that time.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 5: A Cyber Detente
along and came shortly on the heels of the pla indictment where we were talking about it publicly and where they were noisily denying that they ever did did such things that i think that helped as well to bring china to the table but also to convince our own uh folks in government that that something had to be done and at that moment obama said um i've had it
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 5: A Cyber Detente
I was surprised that we reached the norm, and I was even more surprised when we actually saw a decrease in hacks that looked like they were occurring in that space.
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 5: A Cyber Detente
We could go to people in the private sector and say, to your point, what was so evidently clear, which is that when you're up against the second largest military in the world, it's not a fault of the New York Times, however big, 10-person IT team, that they can't keep them out of a system. That's a fight that traditionally has been nation to nation. We don't leave every company up against...
To Catch a Thief: China’s Rise to Cyber Supremacy
Ep 5: A Cyber Detente
major nation state rivals. It was such a unique space that we were allowing that to happen in cyber.