<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/PDP7902453090" rel="self" type="application/rss+xml"/>
    <title>To Catch a Thief: China’s Rise to Cyber Supremacy</title>
    <link>https://www.rubrik.com/lp/to-catch-a-thief-podcast</link>
    <language>en</language>
    <copyright>© Copyright 2025 Rubrik. All Rights Reserved. 618467</copyright>
    <description>American companies, whole towns, have been eviscerated by Chinese cyberattacks. But their stories remain untold, even as the stakes get higher and the targets more reckless.

To Catch a Thief is a first-of-its-kind, documentary look at China’s rise to cyber supremacy. This podcast charts the evolution of China’s state-sponsored hackers, from their beginnings as “the most polite, mediocre hackers in cyberspace” to the “apex predator” that now haunts America’s critical infrastructure. 

Host Nicole Perlroth, bestselling author and former lead cybersecurity and digital espionage reporter for The New York Times, interviews those who were victimized, and instrumental in tracking, Chinese cyberattacks as the threat morphed from trade secret theft, to blanket surveillance, to pre-positioning in America’s critical infrastructure. For what purpose? To Catch a Thief interrogates the motives behind it all.

This audio documentary is produced by Rubrik, the leading data security company that delivers cyber resilience for businesses around the world.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/135590be-75e6-11ef-a9cf-7fa454381fa1/image/7f693fcd9e3ca7ef5bc4120687391564.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>To Catch a Thief: China’s Rise to Cyber Supremacy</title>
      <link>https://www.rubrik.com/lp/to-catch-a-thief-podcast</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>serial</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
    <itunes:summary>American companies, whole towns, have been eviscerated by Chinese cyberattacks. But their stories remain untold, even as the stakes get higher and the targets more reckless.

To Catch a Thief is a first-of-its-kind, documentary look at China’s rise to cyber supremacy. This podcast charts the evolution of China’s state-sponsored hackers, from their beginnings as “the most polite, mediocre hackers in cyberspace” to the “apex predator” that now haunts America’s critical infrastructure. 

Host Nicole Perlroth, bestselling author and former lead cybersecurity and digital espionage reporter for The New York Times, interviews those who were victimized, and instrumental in tracking, Chinese cyberattacks as the threat morphed from trade secret theft, to blanket surveillance, to pre-positioning in America’s critical infrastructure. For what purpose? To Catch a Thief interrogates the motives behind it all.

This audio documentary is produced by Rubrik, the leading data security company that delivers cyber resilience for businesses around the world.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>American companies, whole towns, have been eviscerated by Chinese cyberattacks. But their stories remain untold, even as the stakes get higher and the targets more reckless.</p><p><br></p><p><em>To Catch a Thief</em> is a first-of-its-kind, documentary look at China’s rise to cyber supremacy. This podcast charts the evolution of China’s state-sponsored hackers, from their beginnings as “the most polite, mediocre hackers in cyberspace” to the “apex predator” that now haunts America’s critical infrastructure. </p><p><br></p><p>Host Nicole Perlroth, bestselling author and former lead cybersecurity and digital espionage reporter for <em>The New York Times</em>, interviews those who were victimized, and instrumental in tracking, Chinese cyberattacks as the threat morphed from trade secret theft, to blanket surveillance, to pre-positioning in America’s critical infrastructure. For what purpose? <em>To Catch a Thief </em>interrogates the motives behind it all.</p><p><br></p><p>This audio documentary is produced by <a href="https://www.rubrik.com/">Rubrik</a>, the leading data security company that delivers cyber resilience for businesses around the world.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Rubrik | Nicole Perlroth</itunes:name>
      <itunes:email>podcastTCAT@gmail.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/135590be-75e6-11ef-a9cf-7fa454381fa1/image/7f693fcd9e3ca7ef5bc4120687391564.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Society &amp; Culture">
      <itunes:category text="Documentary"/>
    </itunes:category>
    <itunes:category text="Technology">
    </itunes:category>
    <itunes:category text="History">
    </itunes:category>
    <item>
      <title>Ep 9: The New Frontline</title>
      <description>Colonial Pipeline was a warning shot. Now, Chinese hackers are inside the digital guts of hundreds of Colonial equivalents across the U.S.—power, water, transportation, and more. The question isn’t if they’re in. It’s why. And what happens next.

Is this digital coercion? A warning to stay out of Taiwan? Is an invasion imminent—and are we ready for the cyber fallout that could come with it?

In the final episode of this series, host and former New York Times cybersecurity reporter, Nicole Perlroth, investigates the nightmare scenarios U.S. officials are gaming out behind closed doors. The battlefield is already shifting—tilting toward Beijing. And while China prepares, America’s attack surface only grows.

This isn’t just a problem for Washington. The new front line runs through all of us.</description>
      <pubDate>Thu, 29 May 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/97066c64-3c45-11f0-bea5-f7ffa6808dc8/image/f024974878a7fc410d339bad19a865c8.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Colonial Pipeline was a warning shot. Now, Chinese hackers are inside the digital guts of hundreds of Colonial equivalents across the U.S.—power, water, transportation, and more. The question isn’t if they’re in. It’s why. And what happens next.

Is this digital coercion? A warning to stay out of Taiwan? Is an invasion imminent—and are we ready for the cyber fallout that could come with it?

In the final episode of this series, host and former New York Times cybersecurity reporter, Nicole Perlroth, investigates the nightmare scenarios U.S. officials are gaming out behind closed doors. The battlefield is already shifting—tilting toward Beijing. And while China prepares, America’s attack surface only grows.

This isn’t just a problem for Washington. The new front line runs through all of us.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Colonial Pipeline was a warning shot. Now, Chinese hackers are inside the digital guts of hundreds of Colonial equivalents across the U.S.—power, water, transportation, and more. The question isn’t if they’re in. It’s why. And what happens next.</p>
<p>Is this digital coercion? A warning to stay out of Taiwan? Is an invasion imminent—and are we ready for the cyber fallout that could come with it?</p>
<p>In the final episode of this series, host and former <em>New York Times </em>cybersecurity reporter, Nicole Perlroth, investigates the nightmare scenarios U.S. officials are gaming out behind closed doors. The battlefield is already shifting—tilting toward Beijing. And while China prepares, America’s attack surface only grows.</p>
<p>This isn’t just a problem for Washington. The new front line runs through all of us.</p>]]>
      </content:encoded>
      <itunes:duration>6074</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[97066c64-3c45-11f0-bea5-f7ffa6808dc8]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP2166220329.mp3?updated=1748493305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 8: Living Off The Land</title>
      <description>Cyber experts start getting called into electric, water, pipeline, railway, and transportation hubs around the country. Hackers have found a clever way to embed in these systems, using a small, unsuspecting device in everyday Americans’ homes. And once these hackers get in, they’re not dropping the usual malware, or sucking much of any data out. Unlike their predecessors, these hackers are very careful to cover their tracks. It appears they’re just lying in wait. Sleeper cells waiting for marching orders. So what’s the trigger? And what happens if they pull it?</description>
      <pubDate>Mon, 05 May 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f27da91a-246a-11f0-840a-d3c6d23c2bd3/image/f920eb204d528dee1bac2b9c5d32214c.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber experts start getting called into electric, water, pipeline, railway, and transportation hubs around the country. Hackers have found a clever way to embed in these systems, using a small, unsuspecting device in everyday Americans’ homes. And once these hackers get in, they’re not dropping the usual malware, or sucking much of any data out. Unlike their predecessors, these hackers are very careful to cover their tracks. It appears they’re just lying in wait. Sleeper cells waiting for marching orders. So what’s the trigger? And what happens if they pull it?</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber experts start getting called into electric, water, pipeline, railway, and transportation hubs around the country. Hackers have found a clever way to embed in these systems, using a small, unsuspecting device in everyday Americans’ homes. And once these hackers get in, they’re not dropping the usual malware, or sucking much of any data out. Unlike their predecessors, these hackers are very careful to cover their tracks. It appears they’re just lying in wait. Sleeper cells waiting for marching orders. So what’s the trigger? And what happens if they pull it?</p>]]>
      </content:encoded>
      <itunes:duration>2086</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f27da91a-246a-11f0-840a-d3c6d23c2bd3]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP1765343701.mp3?updated=1747175223" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 7: Everything Everywhere All At Once</title>
      <description>The General Manager of an electric and water utility in Littleton, Mass. gets a surprise call from the FBI. At first he suspects the caller is a spammer, but soon he learns the agent is very real. Chinese hackers are lurking deep in his utility’s systems. And his is not the only one. Hundreds of other power, water and pipeline operations across the United States are getting hit. These targets have little to no intelligence value at all. But their potential for sabotage? Enormous. 

In Episode 7, host and former New York Times cybersecurity reporter, Nicole Perlroth, revisits a hack, more than a decade ago, where the motive was not entirely clear at the time. In hindsight, it was the opening salvo.</description>
      <pubDate>Mon, 28 Apr 2025 17:53:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c6e4328-2233-11f0-9d61-07259db348bd/image/b962c139530c66a91e30df27d4614d53.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The General Manager of an electric and water utility in Littleton, Mass. gets a surprise call from the FBI. At first he suspects the caller is a spammer, but soon he learns the agent is very real. Chinese hackers are lurking deep in his utility’s systems. And his is not the only one. Hundreds of other power, water and pipeline operations across the United States are getting hit. These targets have little to no intelligence value at all. But their potential for sabotage? Enormous. 

In Episode 7, host and former New York Times cybersecurity reporter, Nicole Perlroth, revisits a hack, more than a decade ago, where the motive was not entirely clear at the time. In hindsight, it was the opening salvo.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The General Manager of an electric and water utility in Littleton, Mass. gets a surprise call from the FBI. At first he suspects the caller is a spammer, but soon he learns the agent is very real. Chinese hackers are lurking deep in his utility’s systems. And his is not the only one. Hundreds of other power, water and pipeline operations across the United States are getting hit. These targets have little to no intelligence value at all. But their potential for sabotage? Enormous. </p>
<p>In Episode 7, host and former <em>New York Times </em>cybersecurity reporter, Nicole Perlroth, revisits a hack, more than a decade ago, where the motive was not entirely clear at the time. In hindsight, it was the opening salvo.</p>]]>
      </content:encoded>
      <itunes:duration>2751</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5c6e4328-2233-11f0-9d61-07259db348bd]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP6514778374.mp3?updated=1747175164" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 6: The Gunslingers</title>
      <description>During China’s pseudo-cyber-hiatus, the PRC’s hacking operations get a major overhaul. CCP leadership moves responsibility away from the sloppy, brazen hackers at the People’s Liberation Army to the far more stealthy, and strategic, Ministry of State Security. Gone are the “most polite” hackers in the digital world. Here to stay are the gunslingers – the elite of the elite in their field.

In Episode 6, host and former New York Times cybersecurity reporter, Nicole Perlroth lays out what it looked like as China’s hackers went underground… and what we missed in Eastern Europe as they did.</description>
      <pubDate>Mon, 14 Apr 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3f9a9346-16f3-11f0-a4d4-6b8063e5b42e/image/63151b2f47326ca63de1f153ff4f2820.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>During China’s pseudo-cyber-hiatus, the PRC’s hacking operations get a major overhaul. CCP leadership moves responsibility away from the sloppy, brazen hackers at the People’s Liberation Army to the far more stealthy, and strategic, Ministry of State Security. Gone are the “most polite” hackers in the digital world. Here to stay are the gunslingers – the elite of the elite in their field.

In Episode 6, host and former New York Times cybersecurity reporter, Nicole Perlroth lays out what it looked like as China’s hackers went underground… and what we missed in Eastern Europe as they did.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>During China’s pseudo-cyber-hiatus, the PRC’s hacking operations get a major overhaul. CCP leadership moves responsibility away from the sloppy, brazen hackers at the People’s Liberation Army to the far more stealthy, and strategic, Ministry of State Security. Gone are the “most polite” hackers in the digital world. Here to stay are the gunslingers – the elite of the elite in their field.</p>
<p>In Episode 6, host and former <em>New York Times </em>cybersecurity reporter, Nicole Perlroth lays out what it looked like as China’s hackers went underground… and what we missed in Eastern Europe as they did.</p>]]>
      </content:encoded>
      <itunes:duration>1978</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f9a9346-16f3-11f0-a4d4-6b8063e5b42e]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP2762797146.mp3?updated=1747175237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 5: A Cyber Detente</title>
      <description>Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States. 

For years, the U.S. fends off its own accusations of hacking. But then China goes for the mother lode. And creates an opening for Obama to strike a deal with his Chinese counterpart, Xi Jinping. In Episode 5, host and former New York Times cybersecurity reporter, Nicole Perlroth reveals the ins and outs and backroom dealings of the cyber detente nobody saw coming.</description>
      <pubDate>Mon, 07 Apr 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1eb75790-1171-11f0-821d-0bef0f9104dc/image/2c562befcfea80bdcb48d1d5037146b6.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States. 

For years, the U.S. fends off its own accusations of hacking. But then China goes for the mother lode. And creates an opening for Obama to strike a deal with his Chinese counterpart, Xi Jinping. In Episode 5, host and former New York Times cybersecurity reporter, Nicole Perlroth reveals the ins and outs and backroom dealings of the cyber detente nobody saw coming.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Every U.S. administration, dating back to President H.W. Bush has struggled to address the threat of Chinese trade theft. But a growing sense of urgency kicks in as American businesses start hemorrhaging trade secrets and entire product lines start vanishing to Chinese copycats. Just as the Obama Administration is set to do something about it, Edward Snowden shifts the narrative back onto the United States. </p>
<p>For years, the U.S. fends off its own accusations of hacking. But then China goes for the mother lode. And creates an opening for Obama to strike a deal with his Chinese counterpart, Xi Jinping. In Episode 5, host and former <em>New York Times </em>cybersecurity reporter, Nicole Perlroth reveals the ins and outs and backroom dealings of the cyber detente nobody saw coming. </p>]]>
      </content:encoded>
      <itunes:duration>2743</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1eb75790-1171-11f0-821d-0bef0f9104dc]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP3421084171.mp3?updated=1747175250" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 4: Naming and Shaming</title>
      <description>As Chinese hackers continue their raid of American companies, the threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.

Then, the Times’ outing of its own breach, and its Shanghai assailants, gives the White House an opening. The Obama Administration decides to indict the Chinese military hackers responsible for thousands of hacks on American businesses. But the naming-and-shaming only sends China’s hackers further underground. In Episode 4, host and former New York Times cybersecurity reporter, Nicole Perlroth explores China’s hacking talent pipeline and how the PRC shifted tasking for its most sensitive operations from slipshod PLA hackers to high-precision, digital ninjas.</description>
      <pubDate>Mon, 31 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6403aac4-0b68-11f0-a539-c3f660799f36/image/3dcafb2d7c768f09725b5cdf387f1ec8.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As Chinese hackers continue their raid of American companies, the threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.

Then, the Times’ outing of its own breach, and its Shanghai assailants, gives the White House an opening. The Obama Administration decides to indict the Chinese military hackers responsible for thousands of hacks on American businesses. But the naming-and-shaming only sends China’s hackers further underground. In Episode 4, host and former New York Times cybersecurity reporter, Nicole Perlroth explores China’s hacking talent pipeline and how the PRC shifted tasking for its most sensitive operations from slipshod PLA hackers to high-precision, digital ninjas.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As Chinese hackers continue their raid of American companies, the threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.</p>
<p>Then, the <em>Times’ </em>outing of its own breach, and its Shanghai assailants, gives the White House an opening. The Obama Administration decides to indict the Chinese military hackers responsible for thousands of hacks on American businesses. But the naming-and-shaming only sends China’s hackers further underground. In Episode 4, host and former <em>New York Times </em>cybersecurity reporter, Nicole Perlroth explores China’s hacking talent pipeline and how the PRC shifted tasking for its most sensitive operations from slipshod PLA hackers to high-precision, digital ninjas.</p>]]>
      </content:encoded>
      <itunes:duration>2418</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6403aac4-0b68-11f0-a539-c3f660799f36]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP7579254013.mp3?updated=1747175263" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BONUS: Live Panel with Top China &amp; Cyber Experts at The New York Stock Exchange</title>
      <description>For this special live recording of To Catch a Thief at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth sits down with those who have been directly targeted by, traced, or directly engaged China’s state-sponsored hackers, diplomatically, or in the cyber domain: Pulitzer Prize winning journalist David Barboza, the National Security Agency’s former Cybersecurity Director Rob Joyce, former Cybersecurity and Infrastructure Security Agency Director Jen Easterly, Jim Lewis, of the Center for Strategic and International Studies and Rubrik CEO Bipul Sinha. They discuss how the Chinese hacking threat has morphed from corporate espionage to insidious attacks on infrastructure, the strategic leverage China hopes to gain with these hacks, how Xi Jinping views Trump 2.0, and what levers the United States can still pull to salvage what’s left of its cyber defense.</description>
      <pubDate>Thu, 27 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/40d655e0-0a4d-11f0-ae3e-6310a71746ab/image/7849fa2340da0c646950147a9ef144a4.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>For this special live recording of To Catch a Thief at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth sits down with those who have been directly targeted by, traced, or directly engaged China’s state-sponsored hackers, diplomatically, or in the cyber domain: Pulitzer Prize winning journalist David Barboza, the National Security Agency’s former Cybersecurity Director Rob Joyce, former Cybersecurity and Infrastructure Security Agency Director Jen Easterly, Jim Lewis, of the Center for Strategic and International Studies and Rubrik CEO Bipul Sinha. They discuss how the Chinese hacking threat has morphed from corporate espionage to insidious attacks on infrastructure, the strategic leverage China hopes to gain with these hacks, how Xi Jinping views Trump 2.0, and what levers the United States can still pull to salvage what’s left of its cyber defense.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>For this special live recording of <em>To Catch a Thief </em>at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for <em>The New York Times</em>, Nicole Perlroth sits down with those who have been directly targeted by, traced, or directly engaged China’s state-sponsored hackers, diplomatically, or in the cyber domain: Pulitzer Prize winning journalist David Barboza, the National Security Agency’s former Cybersecurity Director Rob Joyce, former Cybersecurity and Infrastructure Security Agency Director Jen Easterly, Jim Lewis, of the Center for Strategic and International Studies and Rubrik CEO Bipul Sinha. They discuss how the Chinese hacking threat has morphed from corporate espionage to insidious attacks on infrastructure, the strategic leverage China hopes to gain with these hacks, how Xi Jinping views Trump 2.0, and what levers the United States can still pull to salvage what’s left of its cyber defense.</p>]]>
      </content:encoded>
      <itunes:duration>4085</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40d655e0-0a4d-11f0-ae3e-6310a71746ab]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP4729219396.mp3?updated=1743024878" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 3: The Most Dangerous Time in American History</title>
      <description>In Episode 3, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth visits a welding shop in rural Wisconsin where Chinese hackers have set up shop in a dusty, back-office server. Hackers are using the welding shop as staging grounds to attack a staggering range of American businesses, including a major American airline, fast-growing Silicon Valley start-ups, law firms and research labs, in search of capitalism’s crown jewels: Intellectual property.

Nicole revisits a period that cybersecurity experts now call “the most dangerous time in American history”-- a period in which the blueprints to airplanes, stealth fighter jets, turbines, genetically-modified seeds, oil exploration strategies, even the formula for white paint, were smuggled back to China.</description>
      <pubDate>Mon, 24 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/dce78708-064f-11f0-ae0b-8719b72a6d33/image/d388b6cbb30e0086e0685663c36ae199.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In Episode 3, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth visits a welding shop in rural Wisconsin where Chinese hackers have set up shop in a dusty, back-office server. Hackers are using the welding shop as staging grounds to attack a staggering range of American businesses, including a major American airline, fast-growing Silicon Valley start-ups, law firms and research labs, in search of capitalism’s crown jewels: Intellectual property.

Nicole revisits a period that cybersecurity experts now call “the most dangerous time in American history”-- a period in which the blueprints to airplanes, stealth fighter jets, turbines, genetically-modified seeds, oil exploration strategies, even the formula for white paint, were smuggled back to China.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In Episode 3, host and former lead cybersecurity and digital espionage reporter for <em>The New York Times</em>, Nicole Perlroth visits a welding shop in rural Wisconsin where Chinese hackers have set up shop in a dusty, back-office server. Hackers are using the welding shop as staging grounds to attack a staggering range of American businesses, including a major American airline, fast-growing Silicon Valley start-ups, law firms and research labs, in search of capitalism’s crown jewels: Intellectual property.</p>
<p>Nicole revisits a period that cybersecurity experts now call “the most dangerous time in American history”-- a period in which the blueprints to airplanes, stealth fighter jets, turbines, genetically-modified seeds, oil exploration strategies, even the formula for white paint, were smuggled back to China.</p>]]>
      </content:encoded>
      <itunes:duration>2507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dce78708-064f-11f0-ae0b-8719b72a6d33]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP1233342691.mp3?updated=1747175286" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 2: Then They Came for Us</title>
      <description>Google discloses its hack and points the finger squarely at Beijing, which spells the end for Google’s business ambitions in China. Other victims stay silent, too fearful to offend the gatekeepers to the world’s largest market. Nobody will talk. Until they came for The New York Times.
In Episode 2, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth outlines what happened when she learns hackers are inside the Times. Mandiant is called. The malware traces back to a Chinese military unit based in Shanghai. Hackers’ digital crumbs make clear they are after one reporter: David Barboza. Just as he is putting the finishing touches on a massive, years-long investigation on the secret wealth of Chinese leaders and their families. Nicole recounts the behind-the-scenes build-up to the hack that started edging victims into the light.</description>
      <pubDate>Mon, 17 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6cdc099a-00df-11f0-b68e-73a02226d2da/image/05148a84bf4fda50d12bd82ac382be5e.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Google discloses its hack and points the finger squarely at Beijing, which spells the end for Google’s business ambitions in China. Other victims stay silent, too fearful to offend the gatekeepers to the world’s largest market. Nobody will talk. Until they came for The New York Times.
In Episode 2, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth outlines what happened when she learns hackers are inside the Times. Mandiant is called. The malware traces back to a Chinese military unit based in Shanghai. Hackers’ digital crumbs make clear they are after one reporter: David Barboza. Just as he is putting the finishing touches on a massive, years-long investigation on the secret wealth of Chinese leaders and their families. Nicole recounts the behind-the-scenes build-up to the hack that started edging victims into the light.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google discloses its hack and points the finger squarely at Beijing, which spells the end for Google’s business ambitions in China. Other victims stay silent, too fearful to offend the gatekeepers to the world’s largest market. Nobody will talk. Until they came for <em>The New York Times</em>.</p><p>In Episode 2, host and former lead cybersecurity and digital espionage reporter for <em>The New York Times</em>, Nicole Perlroth outlines what happened when she learns hackers are inside the <em>Times</em>. Mandiant is called. The malware traces back to a Chinese military unit based in Shanghai. Hackers’ digital crumbs make clear they are after one reporter: David Barboza. Just as he is putting the finishing touches on a massive, years-long investigation on the secret wealth of Chinese leaders and their families. Nicole recounts the behind-the-scenes build-up to the hack that started edging victims into the light.</p>]]>
      </content:encoded>
      <itunes:duration>2095</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cdc099a-00df-11f0-b68e-73a02226d2da]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP9504349708.mp3?updated=1741990389" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ep 1: The Five Poisons</title>
      <description>Former NSA Director Keith Alexander called it “the greatest transfer of wealth in history.” Hillary Clinton, FBI Director James Comey and President Barack Obama also sounded the alarm on the biggest heist in human history.
In Episode 1, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth, pulls back the curtain on China’s sprawling hacking operations. To combat the “Five Poisons”, or the five groups the Chinese Communist Party deems existential threats, China builds an expansive domestic surveillance apparatus. As these dissidents fled China, China’s state-sponsored hackers followed closely behind, wiring the world for Chinese surveillance and paving the way for Operation Aurora.</description>
      <pubDate>Mon, 17 Mar 2025 07:55:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2cb4f818-00df-11f0-869c-d76ac101efdc/image/413cc2a29ddd64ddff185cbd91fbaad1.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Former NSA Director Keith Alexander called it “the greatest transfer of wealth in history.” Hillary Clinton, FBI Director James Comey and President Barack Obama also sounded the alarm on the biggest heist in human history.
In Episode 1, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth, pulls back the curtain on China’s sprawling hacking operations. To combat the “Five Poisons”, or the five groups the Chinese Communist Party deems existential threats, China builds an expansive domestic surveillance apparatus. As these dissidents fled China, China’s state-sponsored hackers followed closely behind, wiring the world for Chinese surveillance and paving the way for Operation Aurora.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Former NSA Director Keith Alexander called it “the greatest transfer of wealth in history.” Hillary Clinton, FBI Director James Comey and President Barack Obama also sounded the alarm on the biggest heist in human history.</p><p>In Episode 1, host and former lead cybersecurity and digital espionage reporter for <em>The New York Times,</em> Nicole Perlroth, pulls back the curtain on China’s sprawling hacking operations. To combat the “Five Poisons”, or the five groups the Chinese Communist Party deems existential threats, China builds an expansive domestic surveillance apparatus. As these dissidents fled China, China’s state-sponsored hackers followed closely behind, wiring the world for Chinese surveillance and paving the way for Operation Aurora.</p>]]>
      </content:encoded>
      <itunes:duration>2384</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2cb4f818-00df-11f0-869c-d76ac101efdc]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP7702023867.mp3?updated=1741980573" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coming Soon - To Catch a Thief: China’s Rise to Cyber Supremacy</title>
      <description>American companies, whole towns, have been eviscerated by Chinese cyberattacks. But their stories remain untold, even as the stakes get higher and the targets more reckless.

To Catch a Thief is a first-of-its-kind, documentary look at China’s rise to cyber supremacy. This podcast charts the evolution of China’s state-sponsored hackers, from their beginnings as “the most polite, mediocre hackers in cyberspace” to the “apex predator” that now haunts America’s critical infrastructure. 

Host Nicole Perlroth, bestselling author and former lead cybersecurity and digital espionage reporter for The New York Times, interviews those who were victimized, and instrumental in tracking, Chinese cyberattacks as the threat morphed from trade secret theft, to blanket surveillance, to pre-positioning in America’s critical infrastructure. For what purpose? To Catch a Thief interrogates the motives behind it all.</description>
      <pubDate>Tue, 04 Mar 2025 15:36:00 -0000</pubDate>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:author>Rubrik | Nicole Perlroth | Pod People</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>American companies, whole towns, have been eviscerated by Chinese cyberattacks. But their stories remain untold, even as the stakes get higher and the targets more reckless.

To Catch a Thief is a first-of-its-kind, documentary look at China’s rise to cyber supremacy. This podcast charts the evolution of China’s state-sponsored hackers, from their beginnings as “the most polite, mediocre hackers in cyberspace” to the “apex predator” that now haunts America’s critical infrastructure. 

Host Nicole Perlroth, bestselling author and former lead cybersecurity and digital espionage reporter for The New York Times, interviews those who were victimized, and instrumental in tracking, Chinese cyberattacks as the threat morphed from trade secret theft, to blanket surveillance, to pre-positioning in America’s critical infrastructure. For what purpose? To Catch a Thief interrogates the motives behind it all.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>American companies, whole towns, have been eviscerated by Chinese cyberattacks. But their stories remain untold, even as the stakes get higher and the targets more reckless.</p><p><br></p><p><em>To Catch a Thief</em> is a first-of-its-kind, documentary look at China’s rise to cyber supremacy. This podcast charts the evolution of China’s state-sponsored hackers, from their beginnings as “the most polite, mediocre hackers in cyberspace” to the “apex predator” that now haunts America’s critical infrastructure. </p><p><br></p><p>Host Nicole Perlroth, bestselling author and former lead cybersecurity and digital espionage reporter for <em>The New York Times</em>, interviews those who were victimized, and instrumental in tracking, Chinese cyberattacks as the threat morphed from trade secret theft, to blanket surveillance, to pre-positioning in America’s critical infrastructure. For what purpose? <em>To Catch a Thief </em>interrogates the motives behind it all.</p>]]>
      </content:encoded>
      <itunes:duration>164</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9da09c4e-f45a-11ef-84c3-6f578876eb0d]]></guid>
      <enclosure url="https://traffic.megaphone.fm/PDP4126520698.mp3?updated=1741294196" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
