Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

To Catch a Thief: China’s Rise to Cyber Supremacy

Coming Soon - To Catch a Thief: China’s Rise to Cyber Supremacy

04 Mar 2025

Transcription

Chapter 1: What is the greatest transfer of wealth in history?

2.392 - 4.573

I think it's the greatest transfer of wealth in history.

0

Chapter 2: How do Chinese hackers execute their cyberattacks?

4.833 - 10.895

So they call it advanced persistent threat. They didn't take by file. They just took the whole directory.

0

12.636 - 20.658 Nicole Perlroth

Over the past two decades, the greatest heist in history has played out on American soil, or rather, in America's digital realm.

0

21.039 - 27.621

I used to call it the tank through the cornfield. You know, it was just mowing down files and taking as much as they could.

0

Chapter 3: What makes China the 'apex predator' in cyberspace?

28.08 - 37.287 Nicole Perlroth

But this wasn't the Robert Redford, George Clooney crowd, or even anonymous 20-somethings cloaked in hoodies. The burglar behind this heist was bigger than you'd ever think.

0

37.667 - 43.972 Unidentified Expert

There are two kinds of big companies in the United States, those who've been hacked by the Chinese and those who don't yet know they've been hacked by the Chinese.

0

Chapter 4: How have major companies been impacted by Chinese cyberattacks?

45.774 - 59.527 Nicole Perlroth

The Chinese Communist Party has been behind some of the 21st century's most attention-grabbing breaches. They've targeted our news sources. The New York Times reporting on a cyber attack on its own computers. Our tech giants.

0

59.747 - 62.009

Google traced the sabotage back to China.

0

62.269 - 63.991 Nicole Perlroth

And our most treasured trade secrets.

0

64.351 - 70.717

They're targeting research on everything from military equipment to wind turbines to rice and corn seeds.

0

71.137 - 79.945 Nicole Perlroth

China's state-sponsored hackers have stolen trillions of dollars worth of research and development. And now, their focus has shifted.

80.245 - 91.792

They said publicly that the reason for these hacks was in order to disable our critical infrastructure. You don't hack infrastructure for fun. It's reconnaissance.

92.473 - 107.102 Nicole Perlroth

China has built and exported a surveillance state made off with countless blueprints and now infiltrated our most critical infrastructure. For anyone watching, this wasn't a surprise. It was a decades-long strategy.

107.805 - 114.31 Unidentified Expert

Russia is much like a hurricane. They're aggressive and come at us hard and fast. But China is climate change.

114.59 - 123.137

China's multi-pronged assault on our national and economic security make it the defining threat of our generation.

Comments

There are no comments yet.

Please log in to write the first comment.