
Ep 3: The Most Dangerous Time in American History
Listen and Follow Along
Full Transcript
Drive past the dairy farms, cornfields, and horse pastures, and you'll eventually arrive
at Kate Machine and Welding in Belleville, Wisconsin.
Population, 2,500.
For more than 50 years, the Kates have welded fertilizer tanks, jet fighter parts, cheese
molds, even a farmer's broken glasses.
They thought they'd seen it all.
Until the day a few strangers knocked on their door in 2015.
We had probably 15 people working at our shop.
Everyone knew the project you were working on.
So when all of a sudden someone shows up and they're ripping apart the server room, everyone wants to know what's going on. So when all of a sudden someone shows up and they're ripping apart the server room, everyone wants to know what's going on.
I'm Steve Cate, and I'm the third generation owner of a small family machine shop called Cate Machine and Welding. The men knocking on the Cate store had spent their early careers at the National Security Agency, the NSA.
At NSA, they'd watched as Chinese hackers brazenly made off with American trade and defense secrets, pulling them back to servers in China. But increasingly, the Chinese were moving their operations to the one place the NSA couldn't look, the United States, where they started setting up shop and vulnerable servers, like this one, in this dusty back office at the Cates welding shop.
The NSA can't look at domestic traffic, at least not without a court order. And as the Chinese began staging their attacks from American servers, the NSA started going blind.
A few analysts got so frustrated that they left the agency to start a private company called Area One. Their company worked with everyday unwitting Americans whose servers had been compromised by China, servers the Chinese were now using to stage these attacks.
At least from the private sector, these analysts could trace the attacks and when possible, block them at the source. So they asked if they could put a server monitoring our server and just spy on the spies.
And it wouldn't cost us anything or affect us. Just continue business as usual.
And that was the last we heard from them for months. On the day I visited the Cates, Area 1's sensor lit up.
It showed real-time connections to America's biggest brand names and fastest-growing Silicon Valley startups. As a condition of witnessing the inflow and outflows from this one server, I have agreed not to name specific victims.
But I watched firsthand as Chinese hackers leapfrogged from the Kate server to a major American airline, a Silicon Valley food delivery startup, a major Manhattan law firm, and some of our most elite university research labs. It was nauseating watching the CCP cart off America's crown jewels.
Billions worth of R&D, cutting-edge research, source code. All of it moving through the Cade's dusty server here in Wisconsin back to China.
And on the off chance, one of China's targets flagged some strange traffic coming from a Wisconsin welding shop. Well, who would suspect the Cates? They were trying to get to the big ones.
And they would never think twice about little old Kate Machine and Welding trying to access their server, apparently. So that's why they did it.
But yeah, I mean, we were just a funnel for them. At that very moment, I was watching China raid our most valuable IP.
Americans, still livid from the Edward Snowden disclosures,
were decrying NSA overreach,
demanding that governments stay the hell out of Americans' private communications.
Stop watching us! Stop watching us!
With the U.S. Capitol as their backdrop,
protesters turned out by the thousands
with one message for the U.S. government.
Stop watching us. The Cate server, and thousands like it across America, from welding shops to Texas Sadleries, was precisely where the NSA couldn't look.
As for China, well, that made it the perfect cover. I don't know what year The Dark Knight came out.
There's a scene in there where
Bruce Wayne has to catch the bad guy, and so he taps into everyone's cell phones and uses them
as a big spy device. And I remember thinking, like, this reminds me of what we went through.
Like, no one wants it to happen until there's chaos. And then it's like, ooh, what do we do now? In the game of spycraft, it's still perfectly acceptable to break into government agencies, even defense contractors.
But what the Chinese were doing, breaking in, siphoning off billions, trillions of U.S. trade secrets.
That broke all the rules. I'm Nicole Perleroth, and this is To Catch a Thief.
So it wasn't just hacking for security reasons, which the defense industrial base to me would be between the goal posts for fair game for espionage. And I think everybody would nod to that and go, yeah, that's fair game.
They make weapons, they make planes. And for security purposes, you may want to know what's the next weapon system going to look like.
So you hack in and find out. But why would you hack a beverage company or why would you hack somebody that is in entertainment? Those reasons were because a lot of these places were doing mergers and acquisitions in China.
So it was clear to us there's economic reasons behind these intrusions as well. That was Kevin Mandia.
In the early 2000s, his team of incident responders at Mandiant started getting more and more calls from businesses. Hundreds, then thousands of them, frantically calling for Mandiant's help and rooting Chinese hackers out of their systems.
The bottom line is if you made something that could help sustain the health and welfare of 1.3 billion people, you got targeted. You know, if you made some heat tolerant crop of some kind, if you made certain chemicals or things that were critical, you were fair game to what they wanted to accomplish in theft of IP.
Theft of IP. That was a game changer.
Chinese hackers weren't there for state secrets. They were there for commercial gain.
Regular espionage, what we consider to be fair game, is listening into the phone calls or reading the emails of officials of other governments to understand what their strategic intentions are, what their policies are, as a way to give the U.S. an advantage in great power competition.
That's what Garden Bride espionage is all about. You want to know what the other side is doing and thinking, and especially what they don't want you to know.
The National Security Agency does not hack into Chinese companies or the Chinese government and turn around and give it to Google or Apple or General Motors. Just doesn't happen.
That was Evan Medeiros, former China director at the National Security Council and Obama's lead China advisor. He makes a critical distinction.
Spies spy. That's what they do.
What they don't do, at least not in a free market economy, is pick winners. Say the NSA was in position to get the latest in ag tech.
Who would they pass it to? DuPont or Monsanto? Or say the Chinese made a significant AI breakthrough. Who would the NSA pass that to? Microsoft or Google? That's just not how a free market works.
But in China's socialist market economy, China's military and spy agencies could pass those trade secrets onto whichever Chinese enterprise stood to benefit most. And that is exactly what they did over and over and over again.
But I'm getting ahead of myself. So Jim, why don't you introduce this to Deng Xiaoping? We all know who Mao Zedong is, right? Great leader of China.
Currently popular again, thanks to Xi Jinping, the current leader. Mao had some rather strong views about Marxism.
One of the strongest views he had was that it would work. He was wrong on that, which was the problem.
So when Deng,
who was Mao's successor, came in, he discovered that China was impoverished. It was bankrupt.
It was so far behind the Soviet Union back then, the Soviet Union and the U.S., that the Chinese were afraid they would never catch up. That was Jim Lewis, who spent decades immersed in the issue of Chinese cyber espionage.
Now, here's Evan Medeiros again.
So the most important... That was Jim Lewis, who spent decades immersed in the issue of Chinese cyber espionage.
Now, here's Evan Medeiros again.
So the most important story of China over the last 40 years is the period of reform and opening that started in late 1978.
This was announced and pursued by Deng Xiaoping, known as the great reformer of China. And through this reform and opening policy, basically what Deng Xiaoping said was,
we're going to open China and we're going to develop the economy because under Mao,
we became so backward, backward economically, technologically.
As a result, people's lives suffered and China lost influence internationally. Under Mao, China was something of a hermit kingdom, cut off from global markets unlike its neighbors in Japan and other emerging Asian economies.
Mao's mismanagement had left China reeling from a widespread famine that, by some estimates, killed as many as 14 million. When Deng came in in 1978, China's economy and technology lagged decades behind the West.
Back to Jim Lewis. Deng inherited a China that was a mess, and he came up with two ways to fix it.
The first was to open the Chinese economy to the West, let American companies, European companies, Japanese companies invest. The second was to start a gigantic espionage campaign to steal intellectual property and to use that as the basis for China to build its own capabilities.
For the party to retain power, Deng knew he would have to prioritize economic growth. It's what scholars call performance legitimacy.
If people are suffering, they'll demand change. But if their economic prospects are good, they'll have fewer reasons to challenge the status quo.
So Deng said about a period of reform and opening. But rather than go full capitalist, he opted for a socialist market economy, essentially central state planning with free market perks.
China's state-owned enterprises were restructured and companies were allowed to operate based on free market principles. Here's Evan Medeiros again.
And so for much of the last 40 years, economic development has always been the ultimate top priority. Economic development was essential to not only growing the Chinese economy and giving the Chinese people a better standard of living, improving their lives, but it was central to the legitimacy of the Chinese Communist Party.
If they were going to claim to continue to be in power, one of the sources of that was improving people's lives. Deng welcomed Western investment with a few caveats.
Westerners rushed at the chance to take advantage of China's low-cost labor and crack open a consumer market more than a billion strong.
But first, movers like Coca-Cola and General Motors couldn't just set up shop in China.
Beijing forced foreign companies to enter into something called a joint venture with their Chinese counterparts and capped their ownership at 49%.
This gave Chinese companies access to Western technology and the chance to learn from foreign expertise. For American, European, and Japanese companies, this basically entailed forced technology transfer.
Many deluded themselves into thinking they could manage the loss of IP for the reward of partaking in China's growing market. Deng's reforms resulted in China's economic miracle.
Tiny fishing villages like Shenzhen transformed into global manufacturing powerhouses. This is the Chinese megacity of Shenzhen, a gleaming monument to China's economic miracle.
Shenzhen, widely known as the Silicon Valley of China, is the engine room of the country's technology and innovation. Once a small fishing town, the city has gradually become a global hardware center and tech hub, and the population has reached 13 million.
China's economy grew nearly 10% every year after Deng took over, lifting millions of Chinese out of poverty. What was once a poor agrarian society became the world's largest trading partner, and today, the world's second largest economy.
But China wasn't content to be the world's manufacturing closet. The CCP's leaders were determined to see to it that China become an innovator in its own right.
Indigenous innovation became a national priority. They announced a series of initiatives like Made in China 2025, a national policy to transform China from a manufacturer of cheap, low-quality goods to a leading innovator in critical industries like next-generation technology, clean energy, robotics, AI.
Every five years, the party dictated a new list of economic priorities in their five-year plan. You had the government telling people what to do.
And China, more or less, but much more skillfully, copied this Soviet model of state planning. And the five-year plan is a decision on where China thinks it should invest its money, where it should force its companies to go, what the government should do.
We have Wall Street, they have Beijing. You can judge which one works best, but it's their economic plan for what their economy will do.
China was going through this process of trying to move up the value chain in production, needed access to R&D and production expertise that it didn't have. So the Chinese government started stealing it for Chinese companies.
At least some of them were thinking, how do we leapfrog the wicked Westerners? Corporate thievery has always offended our Western sensibilities, but China sees things differently. China's leadership not only rationalized IP theft, it became a national priority.
We had a senior defense official who said to the Chinese, look, you spy on us, we spy on you, we get it. Everybody does that.
What we don't do is we don't steal technology, we don't steal intellectual property, and we'd like you to stop. And a senior PLA colonel said, you have this firm line between
political military espionage and technological espionage. That line doesn't exist for us.
When we steal technology, we are building our economic base. We are building our national security.
And so at that moment, I thought, it's going to be tough to get these guys back on the ranch. Why should Chinese companies spend decades and billions on R&D when they could just as easily steal it from foreigners for free? Here's John Holtquist, Mandiant's chief intelligence analyst.
So imagine if you can just drop them, right? Well, the efficiency here is enormous. And how much does it cost to steal a million dollars worth of intellectual property? Based on my understanding of the space, it's peanuts.
The efficiency is enormous. Scholars say the CCP also felt justified in stealing Western technology as reimbursement for what China calls its century of humiliation when European powers occupied China.
The century was actually closer to 110 years. Hook ended by the first opium war and the rise of Mao's China.
It was marked by foreign interference, invasion, and destruction at the hands of foreign powers.
What Americans consider unethical thievery, the CCP views as reparations. There's this sense that the displacement of ownership, that they're owed for the imperialism of the 19th century.
The idea of taking this from the United States wasn't thought of as this major infraction. And it was motivated in part by this Chinese belief that we, China, had been subject to shame and humiliation at the hand of foreigners for so many years.
Now was our time. So there was almost a sense of self-legitimizing this IP theft, like as if we, China, had been held back.
We're trying to get ahead. So stealing this stuff is really not so bad.
And these foreigners have so much to offer anyway. And it goes back a long time.
I was reading some memoirs from a British diplomat assigned to China in 1900. And he said that one of the things that impressed him was when a new British product showed up, there was a Chinese copy within a matter of weeks.
So this has been going on for more than a century. The theft was so blatant, at times it almost felt like they were daring their Western counterparts to do something about it.
One of the things about the Foreign Service is you change jobs every two or three years. And so I got into a new job.
And the very first day, we had a meeting on McDonnell Douglas, now owned by Boeing. McDonnell Douglas built a plant in Shanghai.
And the McDonnell Douglas guy said, you know, every morning when we come in, it's kind of like a fairy tale. Every morning when we come in, things have been moved a little bit.
And so your government, being a bit paranoid, put cameras in the ceiling. The standard trick, by the way, so I'm not giving anything away.
The Chinese should have known better. Put government cameras in the ceiling and recorded the fact that every night the Chinese came in, disassembled every machine, took pictures of it, took pictures of what was being made.
And it was like, holy cow.
So that was the introduction for me for Chinese espionage.
That was 26 years ago.
That's been part of their growth plan since Deng Xiaoping, since the 1980s. They don't have the same sort of sense of ownership that we have.
The McDonnell Douglas story was hardly unique.
This is a great question. Chaping since the 1980s.
They don't have the same sort of sense of ownership that we have.
The McDonnell Douglas story was hardly unique. This level of thievery had become systematic under China's joint venture requirements.
Meet John Bedbrook. My name is John Bedbrook, and I was formerly head of biotechnology at DuPont.
In the late 1990s, DuPont's primary business was corn. Corn genetics, really.
DuPont had figured out a way to make super varietals of the crop that could withstand drought, disease, fungi, pests, and ultimately increase farmer's yield. And DuPont was determined to bring that same know-how to rice.
China was the obvious place to start. We went to China to form this venture because, you know, rice was not a big crop of what was then Pioneer Hybrid Seed, which was owned by DuPont.
It was largely a corn seed company. You know, we thought it would be smart to go where the market was.
Here's what you need to know. China holds 20% of the world's population, but only 10% of its arable land.
Food security, really the means to efficiently grow staples like rice, is the top national priority. That partly explains why China was an early pioneer in hybrid rice, where you crossbreed two distinct rice strains to produce a super efficient varietal.
But China's cultural revolution devastated that progress. Mao villainized China's scientists and skilled ag workers.
Most were forced to abandon their work. Many were sent to rural labor camps.
Research institutes were shuttered or repurposed for political indoctrination. This is how those millions died from famine.
By the time John first set foot in China, he was shocked at the state of things. You know, all of the geneticists and breeders had had to go off in the cultural revolution to work on farms and so on and so forth.
And were no longer available to provide breeding expertise to the seed companies. Plant genetics and plant varietal development was in very poor shape in China.
And so that was the reason that they were so open to having the major players in the United States invest, obviously, in germplasm development in China. Germplasm is just plant DNA.
DuPont specialized in corn and soy breeding. If it could bring its proprietary germplasm to China's hybrid rice market, that was a multi-billion dollar opportunity.
But remember, DuPont couldn't just come set up shop in China. China forced them into a joint venture.
We had to be minority holders and we decided to work on rice and develop ways of creating male sterols that were very efficient and would lead to a broader germplasm input into hybrid rice in China. It wasn't just DuPont's billions of dollars worth of proprietary know-how.
They brought DNA vectors and seedlings. They trained up dozens of Chinese engineers in their implantation process.
For three years, everything went swimmingly. Until the day it didn't.
In China, it's kind of a permit per experiment. So you design an experiment and you apply to the government for a permit to do that experiment.
And we proceeded along this sort of line for several years, and then suddenly they just ghosted us. They no longer were providing us with permits and not explaining why they were not giving them.
John couldn't make sense of it. In effect, China was shutting them down.
He never got an explanation, and it wasn't for lack of trying. He knew several higher-ups in China's ag world from his student days in Cambridge, and he chased every last one of them down.
When the permits stopped coming in, we had to lay everybody off. So, and that was the end of the company.
And, you know, I spent quite a considerable amount of my time visiting members of the National Chinese Agricultural Academy, trying to seek an explanation for what was going on. I sort of bothered them for months.
And finally, they just said, we're sorry, we can't help you. And that was that was basically the end of the story.
Yeah. Did they give you any color at all about why the permits weren't getting approved anymore? No, they were very cautious about what they said.
They just said they couldn't help me. And what was it like to just sort of lock up the place and walk away? What's that feeling like when you invest three years of your life into this breakthrough project? It just completely stalls one day, and then you just have to lock up the place and abandon an asset.
Well, first of all, it feels devastating. Second of all, it feels unbelievably wasteful.
Container ships of rice were left to rot. Those Chinese engineers DuPont trained, they quietly left, taking all DuPont's IP, its methods, all their training with them.
China kept everything.
Obviously, technology comes off patents and it becomes generic. But this was far from generic technology.
It was proprietary technology. And, you know, it's hard to estimate the cost of that buildup.
But the total investment in developing genetic engineering for crops was billions of dollars. Some of those very same Chinese engineers started up their own labs, some right down the street.
They thrived. Meanwhile, DuPont went to U.S.
authorities, who said there was really nothing they could do. And executives didn't have the stomach to press the issue further.
DuPont was still managing other joint ventures in China. Word from on high was, best not to rock the boat.
You know, I was totally miserable about the whole affair. I mean, obviously it wasn't the most important thing that we were managing, but it was just the way it was sort of ended.
It seemed terribly unfair and inexplicable. And I guess to take a cynical point of view, they got to a point where they said, okay, we've had enough of their help.
Let's just do it ourselves from here on out. It's not just a specific example where our particular methodology was adopted and then mysteriously disappeared.
It was multiple cases. I mean, I visited companies that were, their mission was simply to reproduce the work of Monsanto and other US agricultural enterprises that had invested in developing the technology of genetic engineering.
And then they were building the same insect resistant andistant and herbicide-resistant plants.
It was just blatant.
I mean, I guess the sort of attitude is that, you know, this is for China.
So, you know, it's OK.
But clearly, you know, if you want global intellectual property to be meaningful, it's clearly not OK.
And now? China is a major investor, probably the major national investor in agricultural technology now. You may be wondering why American companies like DuPont and McDonnell Douglas were willing to turn a blind eye here, or why American administrations didn't do more to push back.
entire business lines and billions of dollars worth of R&D were getting swept. Spies were literally rolling into private facilities in the dead of night and stealing everything.
The answer, of course, is money. There was simply too much to be made in China.
Short term, no American business was willing to say or do anything that might turn off the spigot. Even if long term, it risked hollowing out entire industries.
Well, there was a lot of concern about what should we do. And there was a strong sentiment.
You see this a lot in administrations. China's a big market.
There's a lot of money in China. And so there are people who will say, oh, boys will be boys.
It's just espionage. You know, let's not rock the boat too much.
This was a big gamble. American companies bet that so long as they continue to out-innovate the Chinese, they could mitigate their losses.
Inside government, U.S. administration after administration mistakenly believed that China's economic liberalization would inevitably bring about a political liberalization as well.
That China would adopt international norms of behavior, cut out the spying, and end the theft of IP. Enter the internet.
It went on for 20 years, and then a godsend came along for the Chinese. The godsend was they connected to the internet.
They connected to the high-speed networks. This was early 2000s.
What they found is while the Americans were very excited to have created this internet thing, they had forgotten to lock it down. It's a brand new technology.
You didn't think that the old rules where China was far away, it's actually about 10 milliseconds away. It was like letting a pig into a candy store.
The Chinese had a field day. And it's been like that ever since.
At a certain point in the early 2000s, the five-year plans became a roadmap for China's state-sponsored hackers. Here's Dimitri Alperovitch, who started tracking these thefts in their infancy.
Time and again, something that's often been repeated, that this is the greatest transfer of wealth in history that's taking place, that is impacting us. And you have this huge sucking noise of all of our intellectual property and trade seekers just moving over to China.
And eventually they'll be able to use it to compete us. And literally both industry and government folks were telling me, oh, don't worry, we have the innovation as long as they keep stealing.
This is literally what someone told me. As long as they keep stealing, they can't innovate.
And I was like, what are you smoking? I mean, of course they can. Of course, if you short circuit your research and development, if you steal someone's IP and you know what works and crucially what doesn't work, then you can innovate on top of this.
For years, the theft was blatant, unapologetic. Subtlety was not high on the list of priorities.
At the Times, I got my hands on a U.S. National Intelligence Estimate, a classified report that
represents a consensus of all 18 U.S. intelligence agencies.
Their 2009 report ranked countries by their cyber prowess. In terms of skills, the assessment found that Russian hackers were the best.
Chinese hackers were deemed pretty basic. But still, the assessment determined China represented the gravest cyber threat to the United States, Not so much for their skills, but for the sheer volume of their attacks.
The tradecraft, by and large, wasn't that good. And the reason it wasn't that good is because it didn't need to be.
Because no one was looking for them. They just told you how the industry was so myopic in understanding the threat.
So you didn't really need to try hard to succeed. So why would you? It's just not a good return on your investment to expend all this effort being stealthy and caring about being discovered when all you wanted to do is just do a quick hit and run, right? And grab your data and go.
Here's Kevin Mandia. I used to describe them as the most polite hackers in cyberspace because they didn't author log files.
They didn't delete files. They didn't change your data.
They kind of let you know they were there, you know, stealing terabytes of data. And after a while, I started wondering, do they think they're doing anything wrong? It wasn't just the IP theft.
It was the trade secrets relating to pricing data, customer data, things that they could use to out-compete in the marketplace. Jim Lewis can draw a direct line from Chinese IP theft to the rise of what is now a Chinese powerhouse.
The classic story is Nortel, a company that no longer exists. In the early aughts, Nortel's fiber optics equipment was the world's envy.
70% of the world's internet traffic ran through Nortel.
For Beijing, that made it more than just an economic rival.
That made it a national security threat.
North American vendor Nortel
is the first major telecoms victim
of the global economic crisis.
Once the largest company in Canada
has filed for bankruptcy protection,
also victimized by the deepening economic slump.
Thank you. is the first major telecoms victim of the global economic crisis.
Once the largest company in Canada has filed for bankruptcy protection, also victimized by the deepening economic slump. Missing from these obituaries was the fact that Nortel's IP had been raided by Chinese hackers.
Huawei, assisted by the Chinese state, broke into Nortel, hacked their networks. And Nortel told me that sometimes they would come up with a technology and before they could get around to manufacturing it, they would see a Chinese company put it on the market before they did.
You can see the benefits. You didn't have to spend on R&D.
You didn't have to do all the personnel stuff, but you got the technology. So Nortel is a classic example, and it's a strategic one because the Chinese carefully thought about, what if we force everyone to use Chinese telecom infrastructure? Will that give us an advantage in signals intelligence? And the short answer is yes.
The details of Nortel's hack are now well known. Nortel's IT team discovered Chinese hackers inside their systems back in 2004.
When they alerted executives, there just wasn't much urgency to do what it would take to kick them out and keep them out, beyond changing up a few passwords. Ultimately, Nortel's investigators said they watched China cart off thousands of critical product schematics, sensitive emails, key business strategies.
Five years later, Nortel started getting massively underbid on a series of contracts by their Chinese competitor, Huawei. Nortel is now long gone.
Huawei is now the world's biggest telecom. And that's part of the reason we have so many problems today, is that the Chinese developed a very successful model, let's call it the Huawei model, and they're reluctant to give it up.
White House paint is another example. Fiber optic cables is another example.
High-speed trains is another example. You can find places where the Chinese state encouraged companies to go into a business and provided them both with financing, but also with intellectual property.
If, like me, you're asking yourself, why would China go to such great lengths to steal white paint?
It actually came up in a number of interviews, like this one with Matt Turpin, a senior China advisor under both Obama and Trump 1.0. It spans sectors and industries across the entire U.S.
economy. This is not simply directed simply at the most advanced military aspects, but it's things like DuPont and their secret recipe for making white paint, which had been a very valuable product for them.
And then they see that it's stolen, and that entire line of product is sort of taken away from them. We might think to ourselves, well, white paint is not that big a deal, but there's quite a bit of intellectual property that goes into making something that can stay bright white for long periods of time and why that would be valuable.
And those are the kinds of things that got stolen.
And the U.S. government has had very little recourse to be able to go after those.
The CCP deployed that Huawei model against thousands of Western companies.
China would announce its next five-year plan, and almost immediately, threat researchers like Dimitri would watch Chinese hackers race to crack every company in listed industries. This maps directly to their national priorities made in China 2025 and these different five-year plans that they've had, and the industries that they thought were strategic were exactly the industries that they were going after.
Here's Jim Lewis again. You can map, not perfectly, but pretty good, the targets set in the five-year plan to the targets of Chinese espionage.
So they'd say, we want to have a powerful electric car industry. And astoundingly, espionage against electric car companies would go up.
We want to have our own domestic gel liner. So there was a link between Chinese economic planning and Chinese cyber espionage against electric car companies would go up.
We want to have our own domestic chowiner. So there was a link between Chinese economic planning and Chinese cyber espionage.
It wasn't long before victims of these breaches started to crumble. Here's Steve Stone, who's tracked Chinese campaigns in government, at Mandiant, Rubrik, and now SentinelOne.
We were working with a victim entity, and they said, hey, listen, we need you to actually hear this with your own ears. And we were on the Zoom with the head of the plant of this U.S.-based company and they had a plant in China because they want to do business in China.
And the way that works is you have to have a Chinese business partner that has at least 51% and you have 49%. So they're meeting with their Chinese counterpart who is their business.
And their counterpart had built a plant that was the exact same plant the US company had built down to an actual error. The US company had messed up the paint and the ceiling pipes and it was a certain color shouldn't have been.
Well, the exact plant had the exact same color problem. And so we're literally on the zoom call.
And it was very apparent that the business had just been stolen. The entire business was stolen and we thought it was tied to this hacking event.
And we were actually laying out like, yeah, we can show you where they actually took that paint sample as part of this overall plan. Like all cards were on the table.
And what became very apparent out of that was there's nothing we were going to do on the incident response side. Like it's over.
It's a wash. We're not going to change anything for that company.
Even when companies discovered they'd been hacked this badly, they never disclosed it. But one year after Google's breach, the one Dimitri called Operation Aurora, he traced a series of breaches back to two other massive Chinese cyber espionage campaigns.
The first he called Shady Rat. Shady Rat, it was, you know, every industry that they were trying to steal a piece from.
Shady Rat's targets ranged from giant multinationals to tiny nonprofits across more than 30 industries. China's hackers stole everything from emails and design schematics to legal contracts and negotiation plans.
The second campaign he called Night Dragon, and it hit more than 70 organizations, including several oil and gas multinationals. It was oil and gas bidding data that the Chinese were looking to get so that they could outbid these Western companies on major exploration projects.
That bidding information and field data could be worth billions of dollars to a competitor, which is why the Chinese were so determined to steal it. But Dimitri was just looking through straws at a much bigger problem.
In hindsight, if they'd known where to look, if those of us in media had better connected the dots, we would have seen Chinese hackers slipping out with enough IP to leapfrog a superpower. And that time period was the most dangerous in America's history, I think, as we really got a superpower elevated, probably 50 years of IT advancement in a five-year period, some number like that, because developing all that on your own would never have happened.
And in my opinion, America's companies would have dominated China had they not been able to build their own Chinese companies with the IP they stole. When you start to look at it through the lives of people like that who lost their jobs, had to go on social security, or had to migrate out of the cities because of the Chinese espionage, it's a real factor.
That's next on To Catch a Thief. Follow To Catch a Thief to make sure you don't miss the next episode.
And if you like what you hear, rate and review the show. To Catch a Thief is produced by Rubrik in partnership with Pod People
with special thanks to Julia Lee. It was written and produced by me, Nicole Perleroth, and Rebecca
Chasson. Additional thanks to Hannah Petterson, Sam Gebauer, and Amy Machado.
Editing and sound
design by Morgan Foose and Carter Wogan.