38 min

Why Should We Care About Beijing's Cyber Aggression‪?‬ Why Should We Care About the Indo-Pacific?

    • News Commentary

Ray and Jim are joined by retired Lieutenant General Lori Reynolds, former U.S. Marine Corps Deputy Commandant for Information, who provides insights into China's recently uncovered "Volt Typhoon" cyber operation and its implications for national security, both within the U.S. and across the free world. They discuss Beijing's shift from simple snatch-and-grab intellectual property theft to now conducting high-level cyber espionage and embedding its operatives within a nation's critical infrastructure. They also talk about the data security and cognitive threats posed by TikTok and the need for free countries to become more resilient, and to leverage their own asymmetric advantages by exposing the Chinese Communist Party's cyber aggressions.
00:00 Introduction and Background
05:12 China's Shifting Cyber Strategy: From Intellectual Property Theft to Critical Infrastructure Embedding
11:58 The Threat of TikTok: Data Access and Manipulation
22:23 The Threat of TikTok and the Need for Divestment
28:04 Leveraging Asymmetric Advantage: The Power of Truth and Strategic Narratives
32:44 Contesting Chinese Influence: Exposing and Countering Manipulation in Various Industries

Ray and Jim are joined by retired Lieutenant General Lori Reynolds, former U.S. Marine Corps Deputy Commandant for Information, who provides insights into China's recently uncovered "Volt Typhoon" cyber operation and its implications for national security, both within the U.S. and across the free world. They discuss Beijing's shift from simple snatch-and-grab intellectual property theft to now conducting high-level cyber espionage and embedding its operatives within a nation's critical infrastructure. They also talk about the data security and cognitive threats posed by TikTok and the need for free countries to become more resilient, and to leverage their own asymmetric advantages by exposing the Chinese Communist Party's cyber aggressions.
00:00 Introduction and Background
05:12 China's Shifting Cyber Strategy: From Intellectual Property Theft to Critical Infrastructure Embedding
11:58 The Threat of TikTok: Data Access and Manipulation
22:23 The Threat of TikTok and the Need for Divestment
28:04 Leveraging Asymmetric Advantage: The Power of Truth and Strategic Narratives
32:44 Contesting Chinese Influence: Exposing and Countering Manipulation in Various Industries

38 min