The Rest Is Classified - 89. China vs Google: The Battle That Shaped the Internet (Ep 2)

Episode Date: October 7, 2025

When we left the team at Google's headquarters, they were deep inside their "war room," planning the counter-strike against the sophisticated adversary they now knew was coming from China. Their missi...on: to kick the hackers out permanently. But with the attackers deep inside the corporate network, this required a drastic, company-wide action. Join Gordon and David as they explain why Google - a company that had previously agreed to local censorship in China - made the shocking decision to use the attack to reaffirm their commitment to freedom of speech. This is the story of how an internal security incident escalated to a global geopolitical confrontation. ------------------- Join The Declassified Club: Start your free trial at ⁠⁠therestisclassified.com⁠⁠ - go deeper into the world of espionage with exclusive Q&As, interviews with top intelligence insiders, quarterly livestreams, ad-free listening, early access to episodes and live show tickets, and weekly deep dives into original spy stories. Members also get curated reading lists, special book discounts, prize draws, and access to our private chat community. To sign up to the free newsletter, go to: ⁠⁠https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up⁠ ⁠ ------------------- Order a signed edition of Gordon's latest book, The Spy in the Archive, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Order a signed edition of David's latest book, The Seventh Floor, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ------------------- Email: classified@goalhanger.com Twitter: ⁠⁠⁠⁠⁠⁠⁠@triclassified⁠⁠⁠⁠⁠⁠⁠ Video Editor: Nathan Copelin Social Producer: Emma Jackson Producer: Becki Hills Senior Producer: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 For exclusive interviews, bonus episodes, ad-free listening, early access to series, first look at live show tickets, a weekly newsletter, and discounted books, join the Declassified Club at the Rest is Classified.com. You know, we have security investigations from time to time. it's not such an unusual thing, but we quickly discovered that this was a very sophisticated adversary. And furthermore, the more troubling thing to me is that we discovered the motivation, which we believed to be to gain access to Gmail accounts, in particular for Chinese human rights activists. We have made a statement of intent that we intend to stop censoring, and if we can do that
Starting point is 00:00:50 within the confines of Chinese law and policy, we'd love to continue Google.c.N. and all of our operations there. And if we cannot, then we'll do as much as we can, but we don't want to run a service that's politically censored. Well, welcome to the rest is classified. I'm David McCloskey. And I'm Gordon Carrara. And that was Sergey Brin, one of the founders of Google. And he's speaking there just a few weeks after the discovery of a massive hack of Google and has been linked to China. and we are on the second part of our investigation into this cyber attack that has come to be known as Aurora, and that really marks, I think, Gordon, the beginning of a kind of new era of cyber attacks, state-sponsored cyberattacks and cyber espionage. And we had just left in our last episode, the security team in the Googleplex in Mountain View, California,
Starting point is 00:01:46 sitting out in this outbuilding, investigating what they now know to be an absolutely massive breach of Google systems. And they've just discovered this. It is Christmas time of 2009. It's clear it's very high-end cyber espionage. And the cliffhanger, Gordon, that we left them with last time was what in the world are they going to do about it? And the first thing they're going to try and do about it is kick the hackers out of the system. And, of course, you have to plan this carefully because these are very sophisticated hackers. We talked last time about how they have a different kind of resource, sophistication and motivation from your typical criminal hackers.
Starting point is 00:02:31 It is a different type of behavior where if you're dealing with a criminal, they basically are just looking around for any company where they can make money off and who they can get into. And if they can't get into one company, they'll go to another. But if they've gone for you as an espionage target, it's because they want something you've got. And then you've got a much bigger challenge to both find them and get rid of them and to do it without them realizing what you're planning. Because the crucial thing is you've got them in your system and you've got to try and eject them from the system and not leave them anywhere where they can hide.
Starting point is 00:03:08 And that is going to be the challenge for Google running this out. of the war room. They're keeping that investigation very secret. They've got it locked down. They've got a list of who can come in and come out of the room with a security guard on the floor, kind of speakeasy style. You've got to kind of know the right password to get in through the security guard. The cleaners are not allowed into the war room. So the pizza boxes, the coffee cups are mounting up. It's getting smelly in there. This is a terrible holiday season for the security team, isn't it? I mean, this is about as bad as it could possibly get. It is bad, isn't it? And it is approaching holiday time when you're trying to work out what to do about it,
Starting point is 00:03:46 which does make you wonder whether the hackers had deliberately picked that moment. The defenders are looking at the systems. They want to keep the element of surprise as much as possible. So they're working off their own separate network, which they've built in parallel to the Google corporate network, with this plan to cut them off instantly at one moment. And the idea is that they are going to, at one moment, purge the attackers off, the Google network by effectively switching every person who works for Google off the network
Starting point is 00:04:19 and booting them out of the network and initiating a password reset for the whole company. It's like Jurassic Park when they have to reset, do a hard reset on all of the electrical fences, right? It is just like Jurassic Park. It's just like Jurassic Park. But the idea is if you throw everyone off the network, then you ensure that the attackers kind of haven't kept a toehold, which is, we see. all last time. You just need one way in and then you can kind of reestablish yourself. So January
Starting point is 00:04:46 4th, they're going to initiate a company-wide password change. They haven't told anyone why. I mean, that is going to leave a lot of people grumpy, isn't it? I mean, if you basically come into work one day and you're locked out your machine by the security team, and they're still not at this point telling you why, I think you're going to be an unpopular person, aren't you, if you're the security team, if you're the IT workers. Yeah, and you've already spent so much time memorizing that like 15-digit password that's got all the lowercase and uppercase and special symbols and now you've got to come up with another one. Well, yeah, what do you use is your password, David? What's your, what's your profile? That's only available for club members, Gordon.
Starting point is 00:05:24 That's right, along with my home address. Yeah, exactly, along with your home address. If you're not a member of the club, you don't know what you're missing. It's really good stuff. But this is the crazy part, Gordon, is that, I mean, essentially Google on the 12th of January goes public with this eventually. After all of the secrecy, the company decides to just say what happened and to point a finger at who they think did it. I mean, that's the remarkable thing about this because the truth is defense companies,
Starting point is 00:05:51 others were getting hacked in this period, but no one talked about it. And I remember being a journalist around this time, and people were saying this cybersecurity stuff is really bad. You'd go, well, who's been hacked? Tell me. And of course, the answer was, I can't tell you.
Starting point is 00:06:04 No company would ever admit it got hacked. No government would admit it got hacked. No one wanted to admit it. No one wanted to admit they'd had their intellectual property and business secrets stolen because it might crater their share price. There was no incentive to be honest about these things. There were no regulations requiring anyone to do so. So even though there'd been a fair bit of hacking in the previous years, particularly as I said, defense companies and governments, no one admitted it, no one talked about it. And yet here, I think for the first time a major company is going to decide it's going to go public and it's going to issue a statement. saying it's got hacked. What's also amazing about it is they're not just going to say we got hacked, but they're going to say who they think did it. They're going to point the finger at China, and they're going to say the primary goal of the attackers
Starting point is 00:06:52 was accessing the Gmail accounts of Chinese human rights activists. And they're going to say they only believe they got into two accounts through the Google internal hack, all those we know. They'd got into some other activists accounts through other methods. But, you know, this is also a big deal to actually point. the finger at someone for having attacked you. That was unusual as well. It also suggests that Google had technical evidence that the attack had come from China, right? Because I think you're going to be really cautious about publicly pointing the finger at anybody solely based on circumstantial evidence
Starting point is 00:07:30 around the Gmail accounts that they're looking at, right? Because in theory, it could be anybody. They would have had to have some reason to say, no, it was China. Yeah. And I think there was technical evidence. As you remember last time, Dmitria Perrovich from McCaffee, some other cybersecurity researchers have all been kind of pouring over the code. They've been tracing it back. I mean, they can see it coming from two colleges in China, which is interesting. And it's not entirely clear whether those colleges' servers were being used by someone else or whether, which is possible, the hackers were based out of those colleges. Now, not that they were students, but that the colleges were a place where you've got technical expertise
Starting point is 00:08:07 and whether there were a team of hackers there. And I think there are other signs that not only was this Chinese intelligence, but it could have been hackers who Chinese intelligence had kind of coerced or persuaded or brought in to do it. And that was something Russia and China, I think, particularly in the 2000s, used to do a lot. They used to go to universities or to criminal groups and say, you're a really good hacker. Now you're going to work for us for the state and for the intelligence agency, whether it's the Chinese or whether it's the Russian FSB, recruits, coerce, persuade, pay some of those young hackers. to do it. And that seems to have been one possibility. Those responsible, the group called
Starting point is 00:08:42 Elderwood, sneaky panda, that's my favorite title for them. I hate how these names get attributed in these cyber stories, because essentially, I guess, what happens is it's done by cybersecurity researchers who are looking at essentially the mechanics of the attack, the code use things like that to kind of understand that, okay, this is a particular group that's doing this based on kind of the weaponry that they're deploying essentially, right? It's a cybersecurity researcher who's coming up with the name sneaky panda or in Russia. What was it? Fancy bear. You know, we covered in the North Korean billion dollar heist of the Central Bank of Bangladesh. I think one of the North Korean groups was like the Beagle Boys or something ridiculous like that.
Starting point is 00:09:30 So these names, they make all this sound ridiculous. And I honestly think the way this seeps into the popular consciousness is you actually think there's a group in China who name themselves sneaky panda and then start attacking start attacking Google. Yeah, Elderwood is better or APT-17s. I don't know. I agree. I couldn't agree more.
Starting point is 00:09:50 But whatever the case, Google are going public. And it's so interesting because this is a direct challenge to Beijing. This is a company accusing a government. And Google is going to, you know, in the same statement, say it's not just being hacked. It's not just pointing the finger at China, but it's going to do something about it. And it's no longer going to censor its search results in China. So this is a kind of big moment because as we looked at last time, there has been this battle within Google about do you go into China? Do you not?
Starting point is 00:10:22 What accommodations do you make with the Chinese? And now in the wake of being hacked, Google is saying, we are going to take it to you. you, and there's going to be consequences for this hack. So maybe there, Gordon, with the fallout from this attack getting intensely political, let's take a break, and when we come back, we will see how this turns into a massive confrontation between Google and the Chinese state. We'll see you after the break. Hi, David here from The Rest is Classified, the very exciting announcement for our U.S. listeners. My new novel, The Persian, is available now.
Starting point is 00:10:53 This book takes readers deep into the heart of the shadow war between Iran and Israel. The protagonist of this book, Cameron Svahani, is a dentist living out a dreary existence in Stockholm, and he agrees to spy for Israel's Foreign Intelligence Service, the Mossad. He proves to be a very skillful asset, helping Mossad smuggle weapons, run surveillance, conduct kidnappings. But when Cam tries to recruit an Iranian widow, seeking to avenge the death of her husband, the operation goes terribly wrong and lands him in prison under the watchful eyes of a sadistic officer whom he knows only as the general. Now, after enduring three years of torture and captivity, Cameron Svahani,
Starting point is 00:11:27 sits in an interrogation room across from the general, preparing to write his final confession. Now, Cam knows it is way too late to save himself, but he has managed to keep one secret, and if he can hold on to it, he might at long last find redemption. The book is available now and can be found wherever books are sold. Do be sure to stick around at the end of this episode, because I'll be reading an excerpt from the Persian. Welcome back. Google is about to take off the gloves, as it were, against the Chinese government. And Gordon, I think it's fair to say that many inside Google would be in particular in the wake of this attack be
Starting point is 00:12:09 sort of deeply uncomfortable with the accommodation that the company had reached about doing business in China just a few years before. Yeah, that's right. Last time we looked at how in 2006 Google had started operating its website in China, but agreed to be censored and agreed to these censorship requests. There'd been tension over it. Now, some of the staff inside the company had been unhappy about that even at the time and about the willingness to not just have pornography getting censored, but also politics, stuff about Tiananmen Square, what happened in 1989. So they'd already been this kind of internal debate in the company. And now the company as a whole, after the statement, are learning that they've been hacked. There are people going
Starting point is 00:12:50 around saying, we did a deal with them, China, and they still hacked us. That's how one person the company puts it at the time. Sergey Brim, one of the founders of Google, we talked about last time, born in the Soviet Union. So, you know, he'd seen surveillance is particularly upset. He'd never been very comfortable with the deal. Now he's really angry at China having tried to access human rights accounts through Gmail, as well as the kind of problems over censorship. He reminds other executives the motto, don't be evil. Also, as we said, the CIA's motto. CIA's unofficial motto. So Brin is going to describe Aurora as the straw that broke the camel's back, and he's going to say China has made great strides against poverty and whatnot, but nevertheless, in some aspects of their policy, particularly with respect to censorship, with respect to surveillance of dissidents, I see the same earmarks of totalitarianism. And I find that personally quite troubling. So I think that's an interesting statement, because I think where he's talking about the earmarks of totalitarianism and personally finding it quite troubling, it's
Starting point is 00:13:51 just this fact that you've got someone at the top of Google who's got personal experience of totalitarianism and is bothered by it. And there are differences in Google because Eric Schmidt, who has been brought in by the two founders as a kind of CEO business figure to help them grow and build a company. He is more of the view, which was a common view in the US, which is you have to comply with local law wherever you do business. That's the view as well from Bill Gates at Microsoft and others at the time, which is, you know, if you want to do business in China, you have to obey Chinese law. But squaring that with the kind of values of the company has clearly become an issue at this moment for the first time. And eventually the other kind of co-founder, Larry Page, is going to
Starting point is 00:14:31 agree with Sergei Britton. And they're going to shut down and announce they're going to stop censoring the Google.cN site. And then eventually that's going to lead to the offices in Beijing closing. And I love this. So a New Yorker reporter goes to the Google HQ in Beijing. So they used to have a Beijing office. On the day, it's going to be shut down. And well-wishers show up to lay flowers and candles in mock morning. And then they discovered that the flowers were promptly removed. A security guard from the neighborhood informed them that they would need to apply for permits at the relevant department. Otherwise, they were conducting an illegal flower tribute. I can't believe why Google's business didn't work in China, Gordon, in a place
Starting point is 00:15:13 where you need permits for flower tributes. This is the point. where it gets really injected into the bigger geopolitics between the U.S. and China. I mean, it's a spad between Google and China, first and foremost, but it's almost impossible for it to not end up laddering into the kind of the broader relationship between Washington and Beijing. Yeah, and Hillary Clinton, who's then U.S. Secretary of State, gives a big speech on the 21st of January 2010. So that's only a week or so after the announcement and a speech about Internet freedom.
Starting point is 00:15:46 that's going to be seen as part of Washington's response. So in Beijing, of course, they see this all as part of a plot. They see Google and Hillary Clinton, the State Department, the U.S. government, all working together in their minds to drive a certain vision of Internet freedom into China, which they don't want. And, you know, they view the Hillary Clinton speech as proof, if you like, that the two sides are working together. And it's interesting. Some of the leaked cables from this period give a feel for what was going on in the U.S. Embassy. And, you know, even though some of those in China who are Chinese and, if you like, supportive of Google in that view are worried that the speech is going to kind of play into the debate in Beijing which sees the internet as a tool of the US and Internet freedom and Google as a tool of the US. And turning it into a us versus them debate makes it harder for, if you like, Chinese voices to be heard because anyone who calls for Internet freedom is going to be seen as a US stew. effectively. And it's becoming very political. Interestingly enough, there's another leak cable in which a well-placed contact of the embassy in Beijing, the US embassy, tells American diplomats that the Aurora hack was directed from the very top. And they say that the Politburo standing committee was behind the hack and that one top official was also working not just with the Politburo, but also with potential competitors to Google. So already you can sense that that there's a kind of politics of technology is growing and the battle lines are being drawn,
Starting point is 00:17:22 which are going to kind of play out in the subsequent years. I mean, I went to Beijing 2013, so a couple of years after this and going to the foreign ministry, it's a kind of really interesting place to go. We're doing an interview with the cyber negotiator for the Chinese government, and you go to the foreign ministry. It's a really grand building where the guards click their heels and stand to attention as you approach as a visitor, which I kind of like, I feel like that's just like the BBC, right? Yeah. It's the kind of respect I'm due when I approach.
Starting point is 00:17:51 But anyway, I remember speaking to one of their top cyber officials. His argument was that all countries should be able to establish order over the flow of information. And they needed to balance the free flow of information with public security. And that was simply what China wanted, which is basically a different vision of the internet from the Google vision and that vision. espoused by Hillary Clinton, which is the internet should be free and it's going to set people free. And so I think you can start to see at this moment in 2010 the battle lines drawn over this really big fight about what the internet and what technology is going to do. We've been talking in this series about this distinction of Google's a private company
Starting point is 00:18:34 and sort of Google versus China in a way. It's interesting. I mean, the Chinese obviously have a sophisticated understanding of the American system and of the relationships between Washington and large corporations. But if I put on my Chinese official hat, I do wonder if there's much of a distinction drawn between the American state and Google or if it's that clear cut. Because if you look at even some of the information that they were after were these essentially Google being told by the American government to provide information on particular suspects, you know, counterintelligence cases, things like that. If I'm the Chinese watching this, could sort of say, look, well, Google's effectively an arm of the American government in a way,
Starting point is 00:19:21 right? And so what's the difference between us hacking defense companies or us going after American intelligence agencies or the state department and Google? Is there a distinction on the Chinese side? It seems like it could be kind of muddled. David, I guess this gets us back to our favorite subject, Edward Snowden. One of the things that Young Eddie revealed was that the U.S. and the UK, was able to kind of, to some extent, spy on the world and carry out surveillance through the fact people were using American corporations companies to communicate. And America was able to access some of that communication. So to some extent, there is a point there, which is that the relationship of American technology to espionage and the state is complicated.
Starting point is 00:20:07 And part of what China is bothered about, worried about is Western control of the internet. and that that creates a vulnerability for Beijing. I mean, they are not entirely wrong about that, are they? It's not like the U.S. government or the intelligence community has some kind of direct operational control over much of what Google does, and it's certainly not the same level of control that the Chinese state exercises over large Chinese corporations or state-owned enterprises in China. But it is true that the sort of presence of U.S. tech companies at the heights of the Internet
Starting point is 00:20:42 create a potential vulnerability or just a real vulnerability for the Chinese relative to Washington. That is absolutely true. But the view from Beijing would be totally different, right? It's just a reality of the power politics of the internet that we're seeing develop in this period. And I mean, I guess what's interesting is that at this point in 2010, when this story has taken place, it's clear that the West dominates technology and dominates the Internet, and American companies particularly. But we're going to see the start of that changing, because one of the things China is able to do is it's got its own companies, which, because it's excluded American social media companies, and now after Google is going to pull out American search engines, it's going to have
Starting point is 00:21:25 Baidu, which is a kind of Chinese search engine, it's going to have, you know, kind of WiiChat, it's going to have all these Chinese companies are kind of kind of grow behind the Great Firewall. But also, as well as growing domestically, some Chinese companies are going to kind of start to move out globally. So you're going to get Huawei and telecoms, which is going to kind of be the first Chinese tech company, I mean the telecoms company, to go global. And then, you know, years later, you're going to have TikTok as a kind of Chinese originally. The ownership is complicated, acknowledging that, moving out across the rest of the world. So suddenly you then have the picture reversed because you suddenly have America and allies worried about being dependent on Chinese technology.
Starting point is 00:22:07 Is Huawei going to be used to switches off or to spy on us, which of course the company denies? Is TikTok going to be used to influence us? And as a kind of vector for certain ideas to be pushed towards us, you know, company denies it. But it's the kind of mirror image of what the Chinese were worried about in this period, undermining social stability through social media companies. I mean, well, we worry about it with American companies over here as well as with Chinese companies. And that's the reality of it, isn't it now? The attack also led to massive changes just inside Google itself. They basically have to re-engineer and re-architect their entire network,
Starting point is 00:22:43 which is a years-long effort to create a better defense against these kind of state-sponsored attacks. Yeah, because Heather Adkins, who we mentioned, had been there since 2002. She's still there now as kind of vice president of security engineering, is one of those leading the kind of efforts to just change the way you do security in a company, a kind of zero trust model where you assume as adversaries will be able to get into your network and could be there. So you have to kind of segment it and protect it in a different way and think how you trust. Rather comically, though, they're also going to learn that the US government can occasionally hack their network. Because again, one of the things Snowden exposes is that
Starting point is 00:23:19 potentially not in the US, but an overseas site that the US government has hacked into some of the data cables that Google used to carry their traffic at points where it's unencrypted. And that's an interesting moment. So we keep going back to Snowden. Because then suddenly that changes the narrative again, doesn't it? Because it's kind of like, well, who's the threat to internet freedom? The Snowden argument and the libertarian argument suddenly starts to be, well, it's NSA and GCHQ and spy agencies. And it takes years for people to go, actually, maybe it's China and Chinese companies, which pose a challenge as well. And yet, Western companies and many tech companies are, I mean, even in the aftermath of this, continuing to go to China and to try to expand their business in China. I mean, there's the infamous visit by Zuck, Mark Zuckerberg, right, where he doesn't he go jogging in Tiananmen Square, something like that was about 10 years ago. I mean, there's obviously a wariness on the part of these, many of these tech companies
Starting point is 00:24:15 are just, I mean, I think broader Western enterprises in general to do business in China. And yet, going back to this point around, you know, the market is just so massive and potentially so lucrative, they just, even with the threat of this kind of cyber espionage, it doesn't seem to have sort of slowed the appetite for access to the market. That's right. I mean, I think Zuckerberg tries to learn Mandarin, and he goes jogging and he makes all these statements and goes to speak at Chinese colleges and things like that. You know, it's part of the effort to get Facebook into this massive market. And it's interesting, even Google, even Google is tempted to go back. So in the mid-2010s, news comes out
Starting point is 00:24:50 about something called Dragonfly, which is a project looking again at having a censored version of search, of Google's search, for the Chinese market. And it's interesting because there's anger within the company when this emerges. Don't be evil. And the plan is terminated. But it's so interesting, isn't it? This tension between, you know, your values and the way you're projecting yourself and we really care about privacy.
Starting point is 00:25:11 And then there's like the Chinese market. And, you know, you can see it with Apple as well because Apple basically agree to localize data storage. Apple make a big deal about privacy, you know, and privacy. And battling with the FBI and privacy and battling the FBI over access to data. But in China, they agreed to localize their data in data storage. storage centers in China, which certainly at least makes it more possible for China to get access to that data. So the relationship between companies and China is definitely complicated,
Starting point is 00:25:41 but the hacking continues. You start to see more of these nation-state hacks against companies. We mentioned Dmitriar Perevich, been at McCaffy at the time, investigated Aurora, came up with a name. He, I was talking to him, he realizes this isn't a one-off Aurora at that point. So he goes on to form the company CrowdStrike. And in turn, they're called him. by famously the Democratic National Committee in 2016 to discover that Russian intelligence has hacked their systems, you know, famously and leaked the data. And, you know, he told me that Aurora changed his kind of professional life, the canary in the coal mine, that there was a new Cold War and the Chinese were not a friendly actor. And he was saying that just recently he was
Starting point is 00:26:20 on this kind of cyber safety review board to look into the hack of Microsoft Exchange in 2003, which was used to get into emails of top officials at the State Department, Commerce Department, and he finds it's the same group who did Aurora 13 years on. They're still there. They're still doing it. They're still going to hack American companies to get the emails. So, you know, they're hacking telecoms companies. This is Salt Typhoon, which is a big hacking campaign against telcos, again, to do espionage against the United States by getting into company. So it's, in that sense, that's why I think Aurora is also really interesting, because it's the start of a story, which is just going to get bigger and which is still going on today.
Starting point is 00:27:00 It's funny as we're talking about this because so much of it in 2009, 2010, would have seemed very new. And yet, it is just fundamentally true that a state with a spy service is going to go after secrets held by other states. And if those secrets happen to exist inside companies. There's a bit of me that's thinking as you're just kind of reflecting on these last couple episodes of like, this is really nothing new. I mean, it's just you're after strategic information that your adversary or your competitor possesses.
Starting point is 00:27:35 And it just might exist in Google and not at the National Security Agency, but what's really the difference? You're after secrets. In some ways, it's just kind of old hat espionage, but it just happens to use new and shiny tools. Yeah, I think that's true. But I guess what's different is the extent to which so much interesting information to spy agencies is now held by private companies. That's true.
Starting point is 00:28:00 I guess in the past, the interesting information would have been maybe in defense companies. I think that is definitely true. If you go back to kind of Cold War days, you know, defense companies were always a target for human espionage and signals intelligence and maybe some technical companies as well. But I think the extent to which private companies are now the battlefield, cyber espionage, cyber attacks, because that's where the valuable data is. That's, again, I guess what's where this is an origin story about private companies being on the front line and the question being, who defends them, what do they do about it if they get hacked? You know, who do they turn to? How do they respond? And not all companies are going to be like Google with the resources to be able to deal with it.
Starting point is 00:28:41 But if you've got the valuable data, especially if it's something like dissidents, which the Chinese state we know is after, you know, you're going to be a target and that's going to happen, I think, isn't it? I think it also says something about this period in time, 2010-ish, being a major turning point, I mean, because I guess we're just a couple years before Snowden at this point. And it's kind of this short period where looking back on it, it's a tipping point where before that the Internet was going to. bring change and transparency on kind of a global scale, right, and that it would affect countries like China. It would affect countries like Russia. And it sort of tips that we're now in a much more competitive, darker version of cyberspace, where we're essentially seeing the same geopolitical kind of riffs just playing out in a different domain. And this moment with Aurora was really one of the points where it just tip over the cliff into the much kind of more frightening
Starting point is 00:29:44 version of cyberspace that we live in today. Yeah, I think that's right. I think that's why it is actually the hack that changed the world in that sense. I think it was one of the most significant that we've seen and one of the most consequential in terms of what it revealed and what it signaled, you know, and where we are now with a very different world in terms of technology and China. So, yeah, I think it's a kind of important story as well as a kind of fascinating. one about spies and tech companies. Gordon, I think that's a great place to end our investigation here into Google versus China and this hack that changed the world. But before we let everyone go, we'd be remiss if we didn't say, go sign up for the declassified club. Wouldn't you say, Gordon,
Starting point is 00:30:26 it is our members-only club where you can get early access to series, interviews, including a number we've done with former CIA directors, former directors of MI5, lots of goodies there, access to a newsletter, Gordon's home address, a whole bunch of personal information. And unlike Gordon, the Chinese intelligence services, we will not steal your personal information. So we can promise you that. Hope you enjoyed. We'll see you next time. That's a promise.
Starting point is 00:30:56 See you next time. Hey, this is David from The Rest is Classified again. Here's that short excerpt from my upcoming novel, The Persian, which is available now, wherever books are sold. And even though I'm the one reading right now, the audiobook is wonderfully narrated by Fajar al-Qa-ezy. I hope you enjoy. Where am I, General? Kamranes Fahani loads his questions with the tone of slavish deference, because,
Starting point is 00:31:23 though the man resembles a kindly Persian grandfather, he is, in the main, a psychopath. The general is looking hard at Cam. He plucks a sugar cube from the bowl on the table, tucks it between. between his teeth and sips his tea. Cam typically would not ask such questions, but during the three years spent in his care, hustled constantly between makeshift prisons, he has never once sat across from the general, clothed properly with a steaming cup of tea at his fingertips, a spoon on the table, and a window at his back. Something flashes through the general's eyes, and it tells Cam that he will deeply regret asking the question again. It has been over a year since the general
Starting point is 00:31:53 last beat him or strung him up in what his captors call the chicken kebab, but the memories are fresh each morning. Can can still see the glint of the pipe brought down on his leg, can still remember how the pain bent time into an arc that stretched into eternity, and how that glimpse into the void filled him with a despair so powerful that it surely has no name, at least not in Persian, Swedish, or English, the three languages he speaks. And he's got more than the memories, of course. He's got blurry vision in his left eye and a permanent hitch in his stride. What is the spoon doing here? A spoon? Two thousand seven hundred and twenty-one consecutive meals have been served, without utensils, rubber discs so Cam can help but blink suspiciously at the spoon. A mirage? An eyeball
Starting point is 00:32:33 scooper? A test? Perhaps the general plans to skin the fingers that pick it up. The general calms his fears with a nod, a genuine one, which Cam knows looks quite different from the version he uses for trickery, for lulling him into thinking there will be no physical harm. Cam puts a lump of sugar into his tea and slowly picks up the spoon. He stirs, savoring the cold metal on his fingertips. He sets it down on the table and waits, listening to the soft, metallic wobble as the bowl of the spoon comes to rest. You will write it down again, the general says. He is rubbing the gray bristle on his neck, and Cam follows his eye contact as it settles on the portraits of the two Ayatollah's looking down from the wall above. When Cam was a child,
Starting point is 00:33:11 the sight of the Ayatollah's frightened him, it still does. He looks away. You will write it again, and you will leave nothing out. It will be comprehensive and final. Final? Cam considers another question. The general's silent gaze screams, do not. The first, drafts. Right after his capture three years ago, were utter shit, like all first drafts. To call them stories would be like calling the raw ingredients spread across your counter a meal. No, they were just a bunch of facts. Information rung from his tortured lips and committed to bloodstained sheets of A4 paper. But Cam knows he's being too hard on himself. As a dentist, his writing had been limited to office memorandums and patient notes. As a spy, his cables adopted similarly
Starting point is 00:33:54 clinical tones. Just the facts, Glitzman, his handler, the man who recruited him to work for Mossad like to say, leave the story to someone else. Mossad had preferred he write in English, not Swedish. The general, of course, demands that he write in Persian, and it is in Persian that Cam has found his voice. Now the cell becomes Cam's scriptorium. In his dragging, tedious Persian script, he writes the Quranic inscription, In the name of God, honesty will save you across the top of the cover page. Cam knows that the general appreciates this self-talk reminder right up front. Beneath it, Cam titles this is the first part of his sworn confession, and then signs his name.
Starting point is 00:34:31 Someone will fill in the date later, because though he does not know the date today, he also knows not to ask. The general's men will fill in the location for their own files. He writes the number one in the top left corner. But which story should he tell? The general said it was to be his masterpiece. Perhaps the best of each, he thinks. He would also like to write something the general will let him finish. He would like to reach the end. Across hundreds of drafts, no matter the type of story, Cam has only managed to write one version of the end. It is the part he fears the most. Someday, he has told himself, someday he will write a new beginning to the bleakness of the end. Will he find it here on this
Starting point is 00:35:06 last attempt? A prisoner can dream, he thinks. As always, Cam completes a final ritual before he starts this draft. He imagines writing down his last remaining secret in crayon on one of these A4 sheets right in front of him. One secret. Three years in captivity, Cam has held on to only one. Then he pictures a wooden cigar box. He slides the paper with the secret inside. In the early days of his captivity, he locked the real secret written on imaginary paper in the imaginary cigar box into an imaginary safe. But the general's man broke into every physical safe in his apartment, and Cam thought he should also improve his mental defenses. He now pictures the cigar box with his secret incinerated on a monstrous pyre, the lights and heat so fierce that every dark corner of his brain burns bright as day. This way Cam's not lying when the general asks him if he's been truthful.
Starting point is 00:35:53 If the story is complete, he's written it all down, has he not? the prisoner cannot be held responsible for how management handles the papers. Cam presses the crayon to the paper and begins.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.