Menu
Sign In Pricing Add Podcast
Podcast Image

To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 1: The Five Poisons

Mon, 17 Mar 2025

Description

Former NSA Director Keith Alexander called it “the greatest transfer of wealth in history.” Hillary Clinton, FBI Director James Comey and President Barack Obama also sounded the alarm on the biggest heist in human history. In Episode 1, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth, pulls back the curtain on China’s sprawling hacking operations. To combat the “Five Poisons”, or the five groups the Chinese Communist Party deems existential threats, China builds an expansive domestic surveillance apparatus. As these dissidents fled China, China’s state-sponsored hackers followed closely behind, wiring the world for Chinese surveillance and paving the way for Operation Aurora.

Audio
Transcription

Chapter 1: What is the greatest transfer of wealth in history?

2.458 - 7.45 Jim Lewis

I think it's the greatest transfer of wealth in history. So they call it advanced persistent threat.

0

8.012 - 11.099 Steve DeWalt

That time period was the most dangerous in America's history.

0

14.71 - 33.591 Nicole Perlroth

Here, danger and the greatest wealth transfer in history. And your mind goes to heist of the old school variety. Masked thieves making off with diamonds or bags of cash. But this, this was burglary on a global scale.

0

34.751 - 48.476 Kevin Mandia

You know they're there. You see these terrible little scraps of, yeah, they looked at this one file. But you know they looked at 10,000 files. And the evidence has only given you the one. And you're like, oh my god, I'm getting less than 1% visibility into what they're doing here.

0

48.496 - 59 Steve Stone

And that's how that feels. And it was very apparent that the business had just been stolen. The entire business was stolen. There's nothing we were going to do on the incident response side. Like, it's over. It's a wash.

59.4 - 63.662 Dmitry Alperovitch

As long as they keep stealing, they can't innovate. And I was like, what are you smoking?

66.414 - 83.299 Nicole Perlroth

For two decades now, trillions of dollars worth of American R&D, trade secrets, intellectual property have crept out the back door. And when you peel the mask off the thieves, it's the same culprit every single time.

83.999 - 92.582 Political Analyst

China's multi-pronged assault on our national and economic security make it the defining threat of our generations.

92.802 - 104.628 Nicole Perlroth

Our adversarial focus has long been on our Russian comrades across the Atlantic. But in the meantime, a more insidious rivalry has quietly taken shape on the far side of the Pacific.

Chapter 2: How did China become a major cybersecurity threat?

1345.157 - 1346.157 Nicole Perlroth

So a virtual cage.

0

1346.317 - 1365.207 Paul Moser

A virtual cage. What was really sad to see was that, you know, it was utterly targeted on the Uyghur ethnic minority. So you would see Han Chinese get out of their cars and just walk right past these checkpoints and nobody would stop them. But then for the ethnic minority for whom this is their homeland, it applies, and so they have to stop every single time.

0

1366.168 - 1375.68 Nicole Perlroth

That level of surveillance didn't stop in Xinjiang. Over the next several years, it began to creep into larger China and beyond.

0

1377.042 - 1390.987 Paul Moser

By 2017, they were appearing absolutely everywhere. They almost looked like Baroque sculptures mocking surveillance in some ways. You'd have three cameras hanging from a pole with another pole sticking off and two more cameras and then a camera next to that. I mean, it was just totally remarkable.

0

1391.327 - 1409.696 Paul Moser

And so I endeavored just to kind of get a sense of how absurd this was to track how many cameras I passed on my commute to work, which is about, I think, two subway stops in Shanghai. It took about 15 minutes. And during that time, I counted 250 people cameras. I tried to do it the first time without a counter and I'd lost track.

1409.716 - 1428.152 Paul Moser

So I actually had to download a little app that was a counter just to, you know, do it as I go. And I mean, there are big cameras on the escalators. There's tiny little hidden lenses inside each subway car, you know, just everywhere you can think of are cameras. And you just all of that data is being collected and being processed. And so it was a really remarkable thing.

1428.532 - 1439.84 Paul Moser

But for a lot of people, you know, it sort of didn't register. You know, they just kind of ignored it and kept going. But it was, you know, the one thing that, you know, the physical infrastructure of China, you know, fundamentally changed.

1442.515 - 1457.56 Jim Lewis

If it works at home, why not do it overseas? It's a little harder because, you know, in China they own the networks, they can put cameras up, they have everybody's birth certificate, but they're doing their best to wire the world for Chinese surveillance.

1458.579 - 1471.33 Nicole Perlroth

That was Jim Lewis again. What Google was now witnessing, hackers inside its systems, that was the first glimpse that China was exporting its surveillance overseas.

Comments

There are no comments yet.

Please log in to write the first comment.