

Ep 4: Naming and Shaming
13 snips Mar 31, 2025
In a gripping discussion, Steve Stone, a former turbine maker and expert on Chinese hacking units, uncovers the alarming scale of cyberattacks from China. He highlights how victims often conceal breaches, limiting the government's response. The conversation dives into the New York Times' brave decision to reveal its own breach, prompting the Obama Administration to take action against Chinese military hackers. Stone explains the transformation of China's hacking strategies, evolving from clumsy attempts to precise operations, revealing the intricate web of espionage tactics.
AI Snips
Chapters
Transcript
Episode notes
China's Leap via IP Theft
- China transformed from an agrarian economy to a global innovator partly by leveraging stolen American intellectual property.
- Chinese hacking provided a significant advantage that allowed China to surpass American companies in many tech sectors.
Stealthy Persistent Hacking Tactics
- Chinese hackers used a hacked restaurant's PDF menu to infect oil company employees with malware.
- The U.S. Chamber of Commerce discovered printers and thermostats still sending data to China months after supposed cleanup.
Jet Building from Stolen Designs
- Dave DeWalt showed how China built its next-generation jet by stealing parts design from U.S. companies.
- This cyber theft strategy shortened development time but required complex engineering to bring the plane to market.