To Catch a Thief: China’s Rise to Cyber Supremacy

Ep 4: Naming and Shaming

13 snips
Mar 31, 2025
In a gripping discussion, Steve Stone, a former turbine maker and expert on Chinese hacking units, uncovers the alarming scale of cyberattacks from China. He highlights how victims often conceal breaches, limiting the government's response. The conversation dives into the New York Times' brave decision to reveal its own breach, prompting the Obama Administration to take action against Chinese military hackers. Stone explains the transformation of China's hacking strategies, evolving from clumsy attempts to precise operations, revealing the intricate web of espionage tactics.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

China's Leap via IP Theft

  • China transformed from an agrarian economy to a global innovator partly by leveraging stolen American intellectual property.
  • Chinese hacking provided a significant advantage that allowed China to surpass American companies in many tech sectors.
ANECDOTE

Stealthy Persistent Hacking Tactics

  • Chinese hackers used a hacked restaurant's PDF menu to infect oil company employees with malware.
  • The U.S. Chamber of Commerce discovered printers and thermostats still sending data to China months after supposed cleanup.
ANECDOTE

Jet Building from Stolen Designs

  • Dave DeWalt showed how China built its next-generation jet by stealing parts design from U.S. companies.
  • This cyber theft strategy shortened development time but required complex engineering to bring the plane to market.
Get the Snipd Podcast app to discover more snips from this episode
Get the app