Ep 4: Naming and Shaming

Ep 4: Naming and Shaming

Released Monday, 31st March 2025
Good episode? Give it some love!
Ep 4: Naming and Shaming

Ep 4: Naming and Shaming

Ep 4: Naming and Shaming

Ep 4: Naming and Shaming

Monday, 31st March 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:03

Within a few decades,

0:05

the Chinese economy went

0:07

from agrarian backwater to

0:10

manufacturing middleman, to world-class

0:12

innovator in its own

0:14

right. American companies had

0:16

been the pioneers, the

0:18

innovators, but somewhere along

0:20

the way, we got

0:22

beat at our own

0:24

game. And in too

0:26

many cases, it was

0:28

with our own stolen IP.

0:30

Throughout the 2010s, examples

0:32

surfaced everywhere. The world's

0:35

top telecom player, Huawei.

0:37

They're the biggest supplier

0:39

of telecoms equipment in the

0:41

world. So why are countries

0:44

increasingly turning away from Huawei?

0:46

The world's top solar panel makers,

0:48

all Chinese. The first solar panels

0:50

were invented in America in 1954.

0:53

And yet it's been China that's

0:55

been better able to capitalize on

0:57

the technology. Now, China controls over

0:59

80% of the global solar panel

1:02

supply chain. While the United States

1:04

manufactures virtually none of the

1:06

required components for solar panel

1:08

production. The fastest growing social

1:11

media app? Tiktak. Tiktak is the

1:13

latest app to capture the attention of

1:15

teens and young adults across the world.

1:17

The app came as the number one.

1:20

downloaded app of 2018. Even the

1:22

drones flown by US law

1:24

enforcement are no longer American.

1:27

For almost the last

1:30

two decades, Chinese-made

1:32

drones have dominated

1:34

the consumer market. China's

1:36

DJI owns the sky.

1:38

As for electric vehicles,

1:40

it's not Tesla anymore.

1:42

As of 2023, it's

1:44

China's B-Y-D. In the world

1:47

of electric vehicles, Tesla has

1:49

reigned supreme. But its days

1:51

as top dog may be

1:53

numbered. In China, the world's

1:55

largest EV market, it's been

1:57

losing ground to domestic automakers

1:59

as a ruthless price war.

2:01

has inflamed an already competitive

2:03

market. Nobody was connecting the

2:05

dots back to Chinese hacking.

2:07

Nortel didn't just disappear. Huawei

2:09

stole it. China subsidized it.

2:11

And they made it so

2:13

cheap, it wiped Nortel off

2:15

the map. Now, that's not

2:17

to say that Chinese companies

2:20

aren't innovative. It's just that

2:22

they were playing by different

2:24

rules. The hacking... The outright

2:26

theft gave them a huge

2:28

leg up, and all that

2:30

leapfrogging came with a heavy

2:32

price tag for American companies,

2:34

American workers, really the American

2:36

people. That time period was

2:38

the most dangerous in America's

2:41

history, I think, because we

2:43

really got a superpower elevated

2:45

probably 50 years of IT

2:47

advancement in a five-year period,

2:49

because developing all that on

2:51

your own would never have

2:53

happened. And, in my opinion,

2:55

America's companies would have dominated

2:57

China had they not been

2:59

able to build their own

3:01

Chinese companies with the IP

3:04

they stole. That was Dave

3:06

DeWalt. who had a front

3:08

row seat to these developments

3:10

as CEO of McAfee and

3:12

later fire eye. Anyone tracking

3:14

Chinese cyber theft over this

3:16

period could have told you

3:18

that this was all entirely

3:20

predictable. But even as the

3:22

hacking reached absurd levels, America's

3:25

leaders in business and government

3:27

were still hesitant to sound

3:29

the public alarm. Fears of

3:31

upsetting the world's largest market

3:33

still ruled the day. Gots,

3:35

where a certain government shorthand

3:37

came in. By the end

3:39

of the Bush administration, there

3:41

was a recognition that Chinese

3:43

cyber activities had reached troubling

3:46

levels. This is where the

3:48

famous phrase APT came from.

3:50

The Bush administration didn't want

3:52

to say China. So they

3:54

called it advanced persistent threat.

3:56

That's code for China. I'm

4:00

Nicole Pearlroth and this is

4:02

to catch a thief. I

4:04

learned the meaning of advanced

4:06

persistent threat back when I

4:08

was at the New York

4:10

Times. I was reporting out

4:12

a wild story about how

4:14

Chinese hackers had broken into

4:16

one oil company. They tried

4:18

to break in all the

4:21

usual ways, mainly through fishing

4:23

emails, but when that didn't

4:25

work, They searched for the

4:27

company's employees on Facebook and

4:29

discovered several of them had

4:31

liked the same Chinese takeout

4:33

restaurant. So what did they

4:35

do? They hijacked the restaurant's

4:37

PDF takeout menu. When the

4:39

oil company employees went to

4:41

order some general sauce chicken,

4:43

they got a helping of

4:45

Chinese malware instead. Once they

4:47

were in, getting these Chinese

4:49

hackers out of your systems,

4:51

Finding and closing every backdoor

4:53

was a huge challenge. In

4:55

one case, the U.S. Chamber

4:57

of Commerce, basically the country's

4:59

biggest business lobby, discovered they'd

5:01

been breached by Chinese hackers.

5:03

They brought in the FBI

5:05

in private security firms and

5:07

believed they'd cleaned house. But

5:09

then months later, one of

5:11

their printers inexplicably started printing

5:13

out reams of documents in

5:15

Mandarin. Separately, some of their

5:17

lobbyists started complaining that the

5:19

thermostats in their corporate apartments

5:21

in DC were acting funny.

5:23

Upon closer inspection, both the

5:25

printer and these thermostats were

5:27

still communicating with IP addresses

5:29

in China months later. This

5:31

was the level of persistence

5:33

we were dealing with. Back

5:35

to Dave DeWalt. This was

5:37

stuff we hadn't seen before.

5:39

The epiphanies of a major

5:41

government stealing from... American companies,

5:43

directly government on business, and

5:45

then government on security companies

5:47

to business was something we

5:49

had never seen. And so

5:51

that was a wake-up call

5:53

for all of us to

5:55

go, wow, okay, this is

5:57

beyond government on government espionage

5:59

and activities. But when you

6:01

start seeing little companies, almost

6:03

measured by a press release

6:05

coming out as a series

6:07

A investment, getting hacked by

6:09

the Chinese, you knew. You're

6:11

in a whole new era,

6:13

and that's the era I

6:16

grew up in. These days,

6:18

DeWalt runs his own cybersecurity

6:20

investment firm, Night Dragon, and

6:22

yes, he named his firm

6:24

after the Chinese hacking campaign.

6:26

Some of these theft still

6:28

haunt him. I spoke at

6:30

an airline transportation summit, and

6:32

I showed 150 breaches on

6:34

how China built his next

6:36

generation jet. So they stole...

6:38

all the parts to the

6:40

jet from the airframe to

6:42

the avionics to essentially, and

6:44

it was, I wanted to

6:46

call it the C919, but

6:48

I showed the entire airframe

6:50

and avionics and every confirmed

6:52

breach that showed how they

6:54

had a strategy to build

6:56

the entire aircraft from the

6:58

breaches of American companies. Now

7:00

it took them a while

7:02

to get it off the

7:04

ground because, you know, it's

7:06

not easy just to steal

7:08

it and build it. There's

7:10

a lot of engineering process

7:12

that goes with it, but

7:14

eventually they did. and now

7:16

they have their own capabilities

7:18

to build their own aircraft

7:20

commercial airliners that all came

7:22

from breaches of the US.

7:24

The Comac C-19 came to

7:26

market in 2008. It took

7:28

another 10 years for the

7:30

US Justice Department to detail

7:32

in an indictment how Comac

7:34

narrowed the technological gap between

7:36

what it could build and

7:38

what its Western competitors could

7:40

do. Before 2008, Comac relied

7:42

on companies like Arabas, G.E.,

7:44

Honeywell, Belgium Saffrin, for major

7:46

components. But China was determined

7:48

to help Comac, which is

7:50

short for commercial aircraft corporation

7:52

of China, stand on its

7:54

own two feet. Chinese spies

7:56

bribed employees at these Western

7:58

suppliers to hand over trade

8:00

secrets, and some of them

8:02

did. A few are now

8:04

in jail. But what China's

8:06

spies couldn't get from human

8:08

sources, they stole in a

8:11

brazen series of cyber attacks

8:13

against Honeywell, capstone turbine, GE,

8:15

and Saffrin. Crowdstrike in a

8:17

report of its own concluded

8:19

that those hacks helped Comac

8:21

trim quote, several years and

8:23

potentially billions of dollars off

8:25

its development time. And that

8:27

was all for just one

8:29

airplane. When you look at

8:31

solar industry, there are so

8:33

many attacks on the solar

8:35

where they'd flood solar panels

8:37

back into the US down

8:39

to the exact bolt with

8:41

the same serial number of

8:43

the solar panels that were

8:45

stolen. I mean, we could

8:47

match it to the Chinese

8:49

maker with the exact same

8:51

characteristics with the same serial

8:53

number that was stolen from

8:55

a US provider. And we

8:57

have a lot of cases

8:59

of this. I'm not sure

9:01

how many are able to

9:03

share down to the company

9:05

names, but I mean, we

9:07

saw restaurants that were opening

9:09

in China with the exact

9:11

recipes of the food that

9:13

was served. Like we saw

9:15

good luxury goods makers who

9:17

had their products stolen down

9:19

to the handbag process of

9:21

manufacturing. Back when DeWallett was

9:23

CEO of Maccalfey and then

9:25

Firei, he handed the Obama

9:27

administration a list of American

9:29

companies he believed were getting

9:31

raided handover fist. Over the

9:33

next few years, as the

9:35

government debated what to do.

9:37

How far they were willing

9:39

to go to make China

9:41

stop. Whole companies, entire towns,

9:43

were eviscerated by Chinese IP

9:45

theft. If you go back

9:47

to 2008, window, there's a...

9:49

of town stories like that,

9:51

whose entire businesses and towns

9:53

were wiped out by Chinese

9:55

product that flooded the market

9:57

less than one year of

9:59

the espionage attack. Some of

10:01

the lives that were affected

10:03

and the people that were

10:06

affected are pretty dramatic because

10:08

entire factories and towns were

10:10

built around the manufacturing of

10:12

American good. that suddenly was

10:14

sold for a fraction of

10:16

the price below cost to

10:18

defeat the American by its

10:20

own product down to a

10:22

serial number. Today Solar World

10:24

here in Hillsborough has about

10:26

700 employees but by 2015

10:28

they say they will have

10:30

an additional 200. The company

10:32

is adding a solar panel

10:34

production line. 20 miles west

10:36

of Portland, Sitts Hillsborough, Oregon,

10:38

a town locals refer to

10:40

a Silicon Forest because a

10:42

number of big tech companies

10:44

have factories here. Intel, Salesforce,

10:46

and until recently Solar World,

10:48

a German solar company, housed

10:50

the largest solar cell manufacturing

10:52

facility in North America here.

10:54

At its peak, Solar World

10:56

hired more than a thousand

10:58

locals. The company was among

11:00

the first in the world

11:02

to manufacture a next-gen solar

11:04

cell that was highly coveted

11:06

for its efficiency and flexibility.

11:08

These solar cells allowed panels

11:10

to work in lower light

11:12

conditions and in extreme heat.

11:14

I use solar world panels.

11:16

I use solar world panels

11:18

because. We can trust them.

11:20

By far the best module

11:22

manufacture that there is in

11:24

the world. German engineering, American-made,

11:26

that hits home for most

11:28

people. The rate at which

11:30

the innovation was taking place,

11:32

rate at which we were

11:34

implementing and breaking new ground,

11:36

was just breathtaking. That competitive

11:38

edge put solar world in

11:40

Chinese hackers crosshairs. The CCP

11:42

first highlighted solar energy on

11:44

its five-year plan in 1981,

11:46

and solar has made every

11:48

five-year plan ever since. In

11:50

2012, SolarWorld discovered Chinese hackers

11:52

had broken into its network

11:54

and passed its crown jewels

11:56

over to Chinese state-owned enterprises.

11:58

Soon, those companies aided by

12:00

Chinese subsidies were dumping cheaper

12:03

copies of SolarWorld's panels into

12:05

US markets. SolarWorld fought back

12:07

both in court and in

12:09

the corridors of Washington, where

12:11

they lobbied for tariffs on

12:13

Chinese panels, but it wasn't

12:15

enough. By 2017, Solar World

12:17

laid off more than 800

12:19

of its Hillsborough factory workers.

12:21

The factory shuffled hands through

12:23

a series of takeovers and

12:25

ultimately closed up shop in

12:27

2021. Emotions are mixed here

12:29

at financially troubled Solar World.

12:31

We're in the process of

12:33

laying off people. Spokesman Ben

12:35

Santaris tells me the layoffs

12:37

at Solar World have been

12:39

happening for the last couple

12:41

of months. U.S. solar manufacturers

12:43

are finding it next to

12:45

impossible to compete. with much

12:47

cheaper imports flooding the market,

12:49

mainly from Asia. People are

12:51

being affected, they will be

12:53

affected all the way up

12:55

and down the value chain

12:57

in the US. We're sad

12:59

to have to say farewell

13:01

to our peers, but it's

13:03

a necessary move that we

13:05

need to make in order

13:07

to survive. When you start

13:09

to look at it through

13:11

the lives of people like

13:13

that, who lost their jobs,

13:15

had to go on Social

13:17

Security, or had to migrate

13:19

out of the cities. because

13:21

of the Chinese espionage, it's

13:23

a real factor. These shudderings

13:25

were happening to hundreds of

13:27

companies and towns across America.

13:29

Some, like SolarWorld, tried to

13:31

fight back. Here, Steve Stone,

13:33

he worked with a turbine

13:35

maker that discovered its Chinese

13:37

competitor had copied its hardware

13:39

and software, down to mistakes

13:41

in the original source code.

13:43

There was only a handful

13:45

of companies that really built

13:47

that technology. both the software

13:49

and the hardware. And one

13:51

of those US companies went

13:53

out of business and then

13:55

they sued the Chinese government

13:58

in US court because they

14:00

said they literally stole our

14:02

design and then they just

14:04

sold turbines at a much

14:06

discounted rate and they displaced

14:08

our business. And the court

14:10

case came down to an

14:12

actual source code review and

14:14

it had the US company's

14:16

name in the Chinese source

14:18

code. The US company went

14:20

and bought one of these

14:22

Chinese turbines and then just

14:24

mapped everything out. So they

14:26

were able to say this

14:28

isn't just. a manifestation of

14:30

our source code. It's our

14:32

actual source code. We're going

14:34

to point out spelling errors.

14:36

Our actual company is in

14:38

this. And that company no

14:40

longer exists. It was taken

14:42

to create a viable Chinese

14:44

business, which now is one

14:46

of the top turbine producers.

14:48

This is a very much

14:50

a long game for the

14:52

Chinese side of the house.

14:54

It's worth noting that four

14:56

of the world's top five

14:58

turbine makers are now Chinese

15:00

companies. Meanwhile, Western competitors, like

15:02

Capstone Turbine, filed for bankruptcy

15:04

in 2023, citing decreased demand.

15:06

Factories closing, towns hollowed out,

15:08

and yet so many Chinese

15:10

cyber attacks flew under the

15:12

radar, mainly because victims were

15:14

so reticent to step forward.

15:16

Scared with the disclosures would

15:18

mean for their reputation, for

15:20

their stock price, for class

15:22

action lawsuits, That's why our

15:24

own disclosure of the Chinese

15:26

breach of the New York

15:28

Times was such a game

15:30

changer. We've been reporting on

15:32

the warnings and seeing the

15:34

examples over and over state-sponsored

15:36

computer hacking of American companies

15:38

by China, well tonight. It's

15:40

the news media itself under

15:42

siege, including some very big

15:44

names. The New York Times

15:46

has been hacked. The New

15:48

York Times says hackers have

15:50

been attacking its computer system

15:53

for the past four months,

15:55

even managing to get passwords

15:57

for individual reporters. Just before

15:59

I hit publish on... that

16:01

story. I'd done what any

16:03

serious journalist does. I'd called

16:05

the Chinese consulate, walked them

16:07

through everything I had, and gave

16:09

them the chance to comment or

16:11

refute the story. What I got was

16:13

a full-throated denial. To

16:15

accuse the Chinese military of

16:18

launching cyber attacks without solid

16:20

proof is unprofessional and

16:23

baseless. I included that denial

16:25

word for word in the story.

16:27

China's denial, especially the part

16:29

about no solid proof, didn't sit

16:32

well with Kevin Mandia. For years,

16:34

he tracked the group behind our

16:37

hack, a group Mandient called APT1.

16:39

Officially, the group was a Shanghai-based

16:41

unit of the People's Liberation Army,

16:44

unit 61398. Mandient knew the group

16:46

better than most. It had traced

16:48

their movements to more than 100

16:51

breaches in the US. They had

16:53

their online handles. They had their

16:56

physical address. A hundred and forty-one

16:58

times we did investigations and it

17:00

went back to this bucket of

17:02

evidence or fingerprints to APT1. They're

17:04

unbelievably persistent. Like you get these

17:06

guys out of your network, they're

17:08

just back the next day. There

17:11

was no doubt they were badging

17:13

into a building and this was

17:15

their job. When Mandia read China's

17:17

denial in my story, he decided

17:20

screw it. Let's show them the

17:22

proof. He handed me and my

17:24

time's colleague David Singer a 74-page

17:27

report detailing the group's official military

17:29

designation, their tactics, techniques,

17:31

victimology, its members who

17:33

had names like Ugly Gorilla,

17:36

and critically its whereabouts. We

17:38

sent our Shanghai Bureau Chief

17:40

David Barbosa to investigate, and

17:42

sure enough, next to restaurants,

17:44

massage parlors, and a wine

17:47

importer. He found a 12-story,

17:49

nondescript white building surrounded by

17:51

Chinese soldiers. We were trying to

17:53

figure out, like, okay, this is coming

17:55

from a location in Shanghai, right? They

17:57

had the address, right, but they won.

18:00

me to go buy the building

18:02

and see what this was. About

18:04

a 30-minute cab ride from my

18:07

home to think that, wow, they

18:09

were actually not that far. And

18:11

so I went out there and

18:14

saw this white tower and clearly

18:16

saw that it was manned by

18:18

military personnel at the front. I

18:21

think I saw the big dishes

18:23

on the top of it that

18:25

the windows were... covered or not

18:28

clear. It seemed like a military

18:30

installation, but one with a lot

18:32

of antenna power and other things.

18:35

So we were like, okay, this

18:37

is a high-powered building with military

18:39

personnel and special stuff. I don't

18:42

know if it's really the hack

18:44

is coming from here, but this

18:46

seems to fit every expectation that

18:49

we have from what I've been

18:51

told by you and Mandian. Once

18:56

we were sure we could corroborate

18:58

Mandian's report, we published everything we

19:01

had. I turned on CNN. This

19:03

building is the focus of a

19:05

report from U.S. cyber security firm

19:08

Mandient. They say a hacking collective

19:10

with direct ties to the Chinese

19:12

military has stolen data from 141

19:15

organizations from around the world since

19:17

2006 a CNN crew. Crew tried

19:19

to roll their cameras through that

19:22

neighborhood. And this is what they

19:24

discovered. This is our crew being

19:26

chased by Chinese security officers. Chase

19:29

off to us just yet. I'm

19:33

sorry. You got this. Keep driving.

19:35

Drive away. Drive away. Drive away.

19:37

Drive away. Drive away. Not strong.

19:40

CNN's David McKenzie is like for

19:42

us in Shanghai with more. But

19:44

the bigger picture here, Solidad, really,

19:46

is what is happening here? The

19:49

Mandia group says that this group

19:51

is working in conjunction with the

19:53

Chinese military and the Chinese government.

19:55

Chinese government, not surprisingly, Solidad says...

19:58

is that they have nothing to

20:00

do with this. They call these

20:02

claims, quote, irresponsible. What you're saying

20:04

is that what many people saw

20:07

as a shadowy Chinese group is

20:09

actually part of the People's Liberation

20:11

Army. Well, I would think it

20:13

is, and it's taking direction from

20:16

the PLA. And that's why we've

20:18

released this report, is there's all

20:20

this public disclosure now that it's

20:22

China behind lots of these intrusions.

20:25

Even Kevin Mandia was shocked to

20:27

see its impact. I just went

20:29

into the office by myself and

20:32

right around 730 in the morning,

20:34

my wife at the time called,

20:36

and literally, this is how I

20:38

knew we were on the news.

20:41

I didn't know CNN was filming

20:43

outside the building, Nicole. The exact

20:45

words from my wife at the

20:47

time was, what in the F

20:50

did you do? And I said,

20:52

what are you talking about? She's

20:54

like, turn on the TV, your

20:56

name is on every station. And

20:59

I'd never told her we were

21:01

writing the report. I never really

21:03

thought to, you know, or anyone

21:05

for that matter. We didn't even

21:08

tell all the mandian board about

21:10

it till maybe one day prior,

21:12

hey, we're going live tomorrow with

21:14

a report that pimps China's PLA

21:17

unit 6-1-3-9, to 141 intrusions, primarily

21:19

to US companies. I just didn't

21:21

think it was going to be

21:23

news. It empowered the U.S. government

21:26

to go after the PLA unit.

21:28

Meet John Carlin, who worked at

21:30

the Justice Department under the Obama

21:32

administration. I was the assistant attorney

21:35

general for national security. Prior to

21:37

that, and during his first term,

21:39

I was the chief of staff

21:41

to the director of the FBI,

21:44

and then in between, I was

21:46

the principal deputy assistant attorney general

21:48

for national security. While I was

21:50

busy writing about Chinese cyber attacks,

21:53

it was Carlin's job to figure

21:55

out what to do about it.

21:57

Part of the challenge was that

21:59

until we outed our own hack

22:02

and the PLA unit responsible. Most

22:04

everything the U.S. government had on

22:06

Chinese hackers was classified. I went

22:08

to a facility, an unnamed facility

22:11

out in Virginia, and there was

22:13

a giant jumpotron screen, like a

22:15

movie theater, and I could watch

22:17

in real time as nation-state actors,

22:20

China in particular, hopped into places

22:22

like universities, used the fact that

22:24

they'd penetrated the university to hop

22:27

into places like private corporations, and

22:29

then to steal. economic information often,

22:31

intellectual property, commit economic espionage. It

22:33

was amazing to see that being

22:36

tracked in real time, and it

22:38

felt like an incredible intelligence success,

22:40

but it did not feel like

22:42

actual success to watch that much

22:45

information, things of value to the

22:47

American public, flow from the United

22:49

States to China. But John's team

22:51

can just call out the Chinese

22:54

Communist Party by name. It was

22:56

literally classified. We weren't allowed to

22:58

publicly say as a government official

23:00

for years what everybody knew, which

23:03

was that China was hacking these

23:05

private companies. One year after we

23:07

outed the PLA Unit 61398, John's

23:09

team was clear to prosecute. A

23:12

grand jury in Pennsylvania indicted five

23:14

of the unit's members and named

23:16

their victims. Among them, Solar World.

23:18

U.S. steel, which struggled in recent

23:21

years to compete against low-priced subsidized

23:23

steel from China, Westinghouse Electricco, the

23:25

world's biggest supplier of nuclear reactors,

23:27

Allegheny Technologies, Alcoa, and the United

23:30

Steel Workers Union. Clearly, Unit 6138

23:32

was passed with hitting these private

23:34

sector. targets in a way that

23:36

others may not be. They were

23:38

sloppy in their tradecraft, they were

23:41

noisy, they had great nicknames like

23:43

Ugly Gorilla that could be used,

23:45

so it really was a rich

23:47

trove of evidence, but also the

23:50

fact that private sector groups like

23:52

Kevin Mandia's group, and had the

23:54

information and were making it publicly

23:56

available meant to those who were

23:58

worried about sources, methods, etc. This

24:01

wasn't information that was uniquely the

24:03

province of the government, so we

24:05

really weren't giving anything up by

24:07

being allowed to use it in

24:10

a criminal case. Our reporting from

24:12

the times combined with Mandian's APT1

24:14

report meant Carlin's hands were untied.

24:16

In his mind, the prosecution hadn't

24:19

come a moment too soon. It

24:21

was about more than justice for

24:23

the victimized American companies. This was

24:25

about establishing global norms of acceptable

24:27

behavior. The activity would spike. at

24:30

around nine in the morning Beijing

24:32

time. It would then stay high

24:34

and then apparently they took a

24:36

lunch break because it would decrease

24:39

slightly in the middle of the

24:41

day. Then they get back to

24:43

work, you'd see it spike again,

24:45

decrease overnight, decrease on weekends in

24:48

Chinese holidays. So as the prosecutor

24:50

in me, circumstantial evidence that this

24:52

group is coming from China, but

24:54

also it shows that The second

24:56

largest military in the world was

24:59

putting on their uniform, getting up

25:01

every morning, and then hacking you,

25:03

you know, hacking us, hacking private

25:05

companies, and that that simply couldn't

25:08

be allowed to stand. If you

25:10

let someone walk across your lawn

25:12

long enough in common law, and

25:14

international law is a law of

25:16

common law, they earn the legal

25:19

right to walk across your lawn.

25:21

It's called an easement. And that's

25:23

why people put up. no trespass

25:25

signs. As long as we were

25:28

allowing them to hack this noisily,

25:30

we were creating the international law,

25:32

the new norms, the new rules

25:34

for this cyber age that said

25:37

that this was okay. And so

25:39

we felt very strongly that we

25:41

need to show, no, this is

25:43

a crime like any other type

25:45

of theft, and if we don't

25:48

at least treat it that way

25:50

under our system, even if we

25:52

can't hold these individuals accountable, we're

25:54

never going to create the rules

25:57

for the world that we want

25:59

to. children to live in. When

26:01

I first had started covering Chinese

26:03

cyber attacks I'd always ask the

26:06

experts, well, who did it? What

26:08

they said in those early days

26:10

though surprised me. They'd say, Nicole,

26:12

attribution doesn't matter. I always read

26:14

that as, we don't want to

26:17

piss off China for business reasons.

26:19

That was partly true, but the

26:21

other truth was that we were

26:23

getting hit so hard. and so

26:26

often that the first priority wasn't

26:28

the who but the how to

26:30

make it stop. Somebody jumps out

26:32

of an alleyway and starts hitting

26:34

me in the face to rob

26:37

me. I don't block punches going,

26:39

who are you? I just defend

26:41

myself, you know? But in the

26:43

wake of our revelations at the

26:46

times, Mande and CPT1 report, John

26:48

Carlin's indictments, that began to shift.

26:50

However, I came to understand over

26:52

time. Attribution absolutely matters to hold

26:55

nations accountable. We need to have

26:57

rules of engagement in cyberspace. But

26:59

unit 61398 was just one group.

27:01

Inside the NSA, analysts were tracking

27:03

an entire Chinese hacking apparatus. Here's

27:06

Steve Stone again. I don't think

27:08

people understand just... how big this

27:10

machine is. They tend to think

27:12

about a group or an intrusion.

27:15

The intelligence community was tracking some

27:17

20 discrete Chinese hacking units. Roughly

27:19

half were PLA military or Navy

27:21

units dedicated either to specific industries

27:24

like microchips, semiconductors, satellite technology. or

27:26

specific geographies that were just assigned

27:28

to hack targets in Australia, for

27:30

instance. These were military personnel, clocking

27:32

in for their daily hacking to-do

27:35

list. By the time we showed

27:37

up, it was valid credentials, a

27:39

user ID and pass-rays, login, and

27:41

you could tell their operators who

27:44

used to just sitting out of

27:46

desk for eight hours a day.

27:48

and we're probably getting paid by

27:50

the pound, just take everything you

27:52

can, because I used to call

27:55

it the tank through the cornfield.

27:57

Everything started with what we now

27:59

know as the PLA or even

28:01

the PLA Air Force or PLA

28:04

Navy. So what we've learned was

28:06

these were very consistent groups. They

28:08

were big, they were good at

28:10

what they did, but they were

28:13

predictable, and they didn't evolve much.

28:15

So we really thought we had

28:17

our arms around these groups in

28:19

particular. But then there was the

28:21

other half of the groups the

28:24

NSA was watching. These were looser

28:26

satellite networks of contractors. They worked

28:28

at the behest of China's spy

28:30

agency, the Ministry of State Security,

28:33

but not necessarily in the building.

28:35

These were moonlighters tasked with episodic

28:37

state missions, privately employed engineers who

28:39

got paid by the state to

28:42

hack on the side. And unlike

28:44

the PLAs hackers who could be

28:46

quite sloppy, these soldiers of fortune

28:48

were good. They had legitimate skills.

28:50

They were known for their stealth.

28:53

Here's Paul Moser, who covered China's

28:55

expanding surveillance state for the New

28:57

York Times. Hacking and the burden

28:59

of hacking shifted under Xi Jinping

29:02

from the People's Liberation Army, the

29:04

Chinese military, the Ministry of State

29:06

Security or MSS. And what MSS

29:08

does is it takes a very

29:10

different approach. It basically says that

29:13

anybody who wants to start a

29:15

franchise who's good at this kind

29:17

of stuff can have a try.

29:19

And so what we see is

29:22

a sort of network of different

29:24

hackers for hire emerging across China.

29:26

And many of them have really

29:28

deep technological experience. and they want

29:31

to turn it to these sorts

29:33

of aims. And so effectively it's

29:35

a group of soldiers of fortune,

29:37

you know, hackers for hire, who

29:39

are turning at the government's behalf

29:42

onto the United States and trying

29:44

to break into any and everything

29:46

in any kind of new hack

29:48

they get goes up. the chain

29:51

and they're rewarded. Steve Stone watched

29:53

in real time as China's hacking

29:55

unit started handing off missions to

29:57

the experts. Here's Steve. As you

29:59

mentioned there's this really emerging moment

30:02

where we just recognized things were

30:04

different and at first we thought

30:06

maybe they're just these are other

30:08

military units we hadn't run across

30:11

yet and what we really started

30:13

to get an appreciation for was

30:15

there was really different skill levels,

30:17

and there was groups that were

30:20

really proficient in other things, and

30:22

you could almost begin tracking how

30:24

they would work together. We would

30:26

see APT1 struggle with an intrusion,

30:28

and they just could not figure

30:31

it out, figure it out, and

30:33

they just could not figure it

30:35

out, and then all of a

30:37

sudden APT would show up, blast

30:40

of the doors, get the intrusion

30:42

going, and then leave and hand

30:44

it back off to APT1. And

30:46

so we were really trying to

30:49

understand how all these groups were,

30:51

Those people, the actual people behind

30:53

them, started as young people, they

30:55

knew each other and they formed

30:57

hacking groups, they went to university

31:00

and they studied together and then

31:02

they ended forming actual companies and

31:04

then they also did this hacking

31:06

on behalf of the Chinese government

31:09

for profit. They were so much

31:11

more capable because they just stayed

31:13

on keyboard and they didn't age

31:15

out. and then teaching, literally teaching,

31:17

like actually teaching in classrooms and

31:20

also these hacking groups, the next

31:22

generation. And we would actually start

31:24

to see the ecosystem and the

31:26

groups evolve. And that's how we

31:29

really got to understand where we're

31:31

at today, which is this ecosystem

31:33

of private contractors and private groups.

31:35

If you were in a military

31:38

unit, you got promoted to a

31:40

point and now you're off and

31:42

now the next person comes in

31:44

and it's a machine. This

31:49

is what U.S. intelligence came to

31:51

understand. There were two pulls of

31:53

Chinese hackers, the day-jobbers, military enlisted

31:56

personnel, and the guns. slingers. Imagine

31:58

if Stanford's top computer science professors

32:01

and Silicon Valley engineers hacked for

32:03

the NSA on their off hours

32:05

as a side hustle or because

32:08

they had no choice. This allowed

32:10

China to tap its best and

32:12

brightest for its sensitive missions and

32:15

it also gave the CCP plausible

32:17

deniability. Should they get caught the

32:20

CCP could always say it's not

32:22

us. It's these hackers, we can't

32:24

even control ourselves. In the US

32:27

intelligence community, you have to be

32:29

an employee of the government to

32:32

be authorized to do these operations

32:34

to effectively break the law, right?

32:36

Because we have effectively the CFAA

32:39

Computer Front and Abuse Act that

32:41

prohibits everyone from hacking, with the

32:44

exceptions of law enforcement intelligence community.

32:46

But to use those exceptions, you

32:48

have to be a member. On

32:51

the Chinese side, they would just

32:53

say, hey, we have these requirements

32:55

company XY&Z. go get them for

32:58

us. And then what was happening,

33:00

it was really interesting, is that

33:03

a lot of these companies decided

33:05

to start moon lighting. If the

33:07

Chinese Communist Party comes to you

33:10

and tells you to do something,

33:12

even if it's not in your

33:15

business interest to do it, you

33:17

have to do it. Because then

33:19

they have numerous levers of coercion

33:22

that they can use to effectively

33:24

put you out of business. I'd

33:26

later learn from the Snowden leaks

33:29

that China actually ran some of

33:31

its cyber attacks through popular Chinese

33:34

tech companies like 163.com, China's version

33:36

of Yahoo, and SINA, the company

33:38

that runs China's Twitter equivalent, Sino

33:41

Weibo. At one point, the GQ,

33:43

which is essentially the UK's NSA

33:46

equivalent. discovered that 163.com's mail servers

33:48

were secretly operated by a Chinese

33:50

government domain and that that same

33:53

Chinese government domain served as a

33:55

backup server for Sino Weibo. In

33:58

practical terms, that means that the

34:00

Chinese government had direct access to

34:02

any and all traffic, including private

34:05

messages run through SINA or 163.com.

34:07

This would be like discovering that

34:09

Facebook or Twitter's back-end infrastructure

34:12

was actually run by the

34:14

NSA. When you hear that, you

34:16

start to understand why there

34:18

might be some national security

34:21

concerns about TikTok. Increasingly

34:23

private security firms and US intelligence

34:25

agencies would catch China's best state

34:28

hackers using their golden access to

34:30

line their own wallets. Here's Dimitri

34:32

El Paravich again. As long as

34:34

we're hacking companies, well why don't

34:36

we do it for our benefit

34:38

too? And we started to see

34:40

actors that would hack into gaming

34:42

companies and steal virtual currency and

34:44

just monetize it. And at the

34:46

same time, there were hacking into

34:48

national security targets. of US government

34:50

or private sector companies is still

34:52

an IP theft, clearly for the

34:55

strategic interests of the state. And it

34:57

was really interesting how you have on one

34:59

hand an actor that was engaged in

35:01

personal cyber crime, and on the other hand

35:03

is executing mission requirements for the state. If

35:06

you did that in the US, you

35:08

would get arrested. And the thing is these

35:10

guys, on the one hand, they're sort of...

35:12

hacking these big national targets, but they're

35:14

also then doing other things to extract money

35:17

and make money while they're doing it.

35:19

You can make a lot of money if

35:21

you can hack without any kind of consequences

35:23

whatsoever. You have the state's backing, and

35:25

you can also just kind of, you know,

35:27

say hold data for ransom or, you know,

35:30

take certain bank accounts or crypto or whatever.

35:32

And so... these guys become this almost mercenary

35:34

army, the sort of hackers fire soldiers of

35:36

fortune and it's fascinating because it's a complete

35:38

change from the way the top down way

35:41

things were before and it's revolutionized both the

35:43

way China hacks and also the effectiveness because

35:45

they're just much better. It's much better. It's

35:47

much better when you have a startup kind

35:49

of mindset towards hacking anywhere and and China

35:51

has certainly a very capable set of people

35:54

to do it. So give them the freedom,

35:56

give them the resources and lo and behold seven

35:58

or eight years on you have a really deadly

36:00

powerful attack hacking force in China.

36:02

That was Paul Moser. One thing

36:04

to know about China's hacking pipeline

36:07

is that it's robust, and it

36:09

starts early. The best analogy is

36:11

probably American football. Talents identified young,

36:13

recruited to the best college programs,

36:15

and eventually drafted to the NFL.

36:17

they actually recruit in very interesting

36:19

ways. They'll have hacking competitions among

36:21

students. Oftentimes they're embedded in the

36:23

university. So a professor of, you

36:25

know, cybersecurity at a university might

36:28

hold hacking competitions and then the

36:30

best student will be recruited into

36:32

these new MSS efforts. It may

36:34

be that people who are, you

36:36

know, really capable programmers at a

36:38

big tech company like a sort

36:40

of large Chinese internet giant might

36:42

be pulled out and told actually,

36:44

you know, hey, you have a

36:47

future at this. How much of

36:49

this is worse labor labor? I'm

36:51

not sure we totally know. I

36:53

think it's a mix of both.

36:55

I do think they tend to

36:57

look for people who are patriotic

36:59

or at certain universities that are

37:01

linked more closely to the, to

37:03

the, you know. the government and

37:06

its efforts, but for the most

37:08

part, usually I think there has

37:10

to be some level of interest.

37:12

I don't think they're kind of

37:14

holding great tech minds and saying

37:16

you have to do this. Oftentimes

37:18

I think there's an approach and

37:20

people are kind of interested because

37:22

there's a financial reward and there's

37:24

a, you know, again, a power

37:27

reward. Like if you're working at

37:29

that level with the government, you

37:31

get privileges. You know, hacking is

37:33

not a bad thing in China.

37:35

It's companies. Like, why wouldn't you

37:37

do this? You're the silly ones

37:39

for not. You're identified early and

37:41

you perform and you get into

37:43

these tracks. And those tracks matter

37:46

for military service. They matter for

37:48

private business. They matter for hacking.

37:50

They're really smart people that hack

37:52

and then they're really smart people

37:54

that run tech companies or do

37:56

tech projects. They're probably the same

37:58

people because they're on the same

38:00

tracks. And they're being largely. influenced

38:02

by the same government apparatus in

38:04

all of these aspects. We don't

38:07

really have parallels for that. Imagine...

38:09

Imagine if you were writing a

38:11

story where you found out that

38:13

the head of this unicorn in

38:15

San Francisco was actually also a

38:17

hacker for the NSA. Like that

38:19

would be front page on every

38:21

paper in the world. That's kind

38:23

of what happens over in China

38:26

with these private groups. As the

38:28

US started naming and shaming China's

38:30

hackers, they went underground. After our

38:32

APT1 revelations, the PLA unit unplugged

38:34

their entire hacking apparatus and fell

38:36

off the map. Other Chinese APTs

38:38

started moving their operations from Chinese

38:40

servers to servers here in the

38:42

US, the welding shops, Sadleries, even

38:45

home routers, precisely where the NSA

38:47

couldn't look. But of course, even

38:49

then, the hacking didn't stop. Not

38:51

by a long shot. The target

38:53

list... only expanded. There were allowed

38:55

calls for the firing of the

38:57

top administrator at the Office of

38:59

Personnel Management. After it was revealed,

39:01

the hack of government computers is

39:03

five times worse than previously reported.

39:06

We've got breaking news coming in

39:08

right now on the hack of

39:10

the government's Office of Personnel Management

39:12

in the last hour and a

39:14

half, OPM announced that as many

39:16

as 25 million people may be

39:18

affected by the breach. Americans' personal

39:20

data was now in the crosshairs.

39:22

So that old calculus... There was

39:25

always the sense of, look, it's

39:27

a trade. We know they steal

39:29

from us, but we get a

39:31

lot of money out of China,

39:33

so right now the trade works

39:35

in our favor. It no longer

39:37

applied. I raised once again our

39:39

very serious concerns about growing cyber

39:41

threats to American companies and American

39:43

citizens. I indicated that it has

39:46

to stop. That's next, on to

39:48

catch a thief. To

39:50

catch a thief is produced by Rubric

39:52

in partnership with pod people with special

39:55

thanks to Julia Lee It was written

39:57

and produced by me Nicole Perleroth and

39:59

Rebecca Shaw on. Additional

40:01

thanks to Hannah Peterson,

40:03

Sam the Bower, and Machado. Editing

40:05

Editing and design Morgan

40:07

Fuse and Carter Wogan.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features