This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race book cover

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Hardcover – February 9, 2021

Price
$24.99
Format
Hardcover
Pages
528
Publisher
Bloomsbury Publishing
Publication Date
ISBN-13
978-1635576054
Dimensions
6.7 x 1.85 x 9.55 inches
Weight
2 pounds

Description

“Part John le Carré and more parts Michael Crichton ... spellbinding.” - The New Yorker “An intricately detailed, deeply sourced and reported history.” - The New York Times “Vivid and provocative.” - The New York Review of Books “Told in an enthrallingly cinematic style . . . a stark, necessary, thoroughly reported reminder that no matter how strong the safe is, there’ll always be someone who can come along and crack it.” - LitHub “Possibly the most important book of the year . . . Perlroth’s precise, lucid, and compelling presentation of mind-blowing disclosures about the underground arms race a must-read exposé.” - Booklist, starred review “An engaging and troubling account of ‘zero-day exploits’ . . . This secretive market is difficult to penetrate, but Ms. Perlroth has dug deeper than most and chronicles her efforts wittily.” - The Economist “[Perlroth] has delivered a five-alarm page turner that weighs the possibility of cyber-cataclysm.” - The Boston Globe “A masterful inside look at a highly profitable industry that was supposed to make us safer, but has ended up bringing us to the brink of the next world war.” - John Markoff, former New York Times cybersecurity reporter “Takes a complex subject that has been cloaked in techspeak and makes it dead real for the rest of us.” - Kara Swisher, host of the podcast On with Kara Swisher “100% gripping. For anyone interested in cybersecurity, whether as student, policymaker, or citizen, it is well worth your read.” - P.W. Singer, author of LIKEWAR “A rollicking fun trip, front to back, and an urgent call for action before our wired world spins out of our control.” - Garrett M. Graff, Wired, author of New York Times bestseller THE ONLY PLANE IN THE SKY “A whirlwind global tour that introduces us to the crazy characters and bizarre stories behind the struggle to control the internet. It would be unbelievable if it wasn't all so very true.” - Alex Stamos, Director of the Stanford Internet Observatory and former head of security for Facebook and Yahoo “The definitive history of cyberwarfare.” - Clint Watts, author of MESSING WITH THE ENEMY “A must-read tale of cloak-and-dagger mercenary hackers, digital weapons of mass destruction and clandestine, ne'er-do-well government agencies. Perlroth's intrepid reporting shows why the consequences could be frightening.” - Lawrence Ingrassia, author of BILLION DOLLAR BRAND CLUB “Will keep you up at night, both unable to stop reading, and terrified for what the future holds.” - Nick Bilton, Vanity Fair, author of AMERICAN KINGPIN “Nicole Perlroth tells a highly technical, gripping story as if over a beer at your favorite local dive bar. A page-turner.” - Nina Jankowicz, author of How to Lose the Information War “[A] wonderfully readable new book. Underlying everything Perlroth writes is the question of ethics: What is the right thing to do? Too many of the people she describes never seemed to think about that; their goals were short-term or selfish or both. A rip-roaring story of hackers and bug-sellers and spies that also looks at the deeper questions.” - Steven M. Bellovin, Professor of Computer Science, Columbia University “The murky world of zero-day sales has remained in the shadows for decades, with few in the trade willing to talk about this critical topic. Nicole Perlroth has done a great job tracing the origin stories, coaxing practitioners into telling their fascinating tales, and explaining why it all matters.” - Kim Zetter, author of COUNTDOWN TO ZERO DAY “From one of the literati, a compelling tale of the digerati: Nicole Perlroth puts arresting faces on the clandestine government-sponsored elites using 1s and 0s to protect us or menace us―and profit.” - Glenn Kramon, former New York Times senior editor “Lays bare the stark realities of disinformation, hacking, and software vulnerability that are the Achilles’ Heel of modern democracy. I work in this field as a scientist and technologist, and this book scared the bejesus out of me. Read it.” - Gary McGraw, PhD, founder, Berryville Institute of Machine Learning and author of Software Security “Usually, books like this are praised by saying that they read like a screenplay or a novel. Nicole Perlroth’s is better: her sensitivity to both technical issues and human behavior give this book an authenticity that makes its message―that cybersecurity issues threaten our privacy, our economy, and maybe our lives―even scarier.” - Steven Levy, author of Hackers and Facebook “You MUST read this book―every word.” - Tom Peters, author of In Search of Excellence “Exposes the motivations and misgivings of the people helping governments hack into our devices. After Perlroth's incisive investigation, there's no excuse for ignoring the costs of the cyber arms race. Indeed, we are already deeply vulnerable.” - Sarah Frier, Bloomberg, author of NO FILTER “A powerful case for strong cybersecurity policy that reduces vulnerabilities while respecting civil rights.” - Kirkus Reviews Nicole Perlroth is an award-winning cybersecurity journalist for The New York Times, where her work has been optioned for both film and television. She is a regular lecturer at the Stanford Graduate School of Business and a graduate of Princeton University and Stanford University. She lives with her family in the Bay Area, but increasingly prefers life off the grid in their cabin in the woods.

Features & Highlights

  • THE
  • NEW YORK TIMES
  • BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)“Part John le Carré and more parts Michael Crichton . . . spellbinding.”
  • The New Yorker
  • "Written in the hot, propulsive prose of a spy thriller" (
  • The New York Times),
  • the untold story of the cyberweapons market―the most secretive, government-backed market on earth―and a terrifying first look at a new kind of global warfare.
  • Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar―first thousands, and later millions of dollars― to hackers willing to sell their lock-picking code and their silence.Then the United States lost control of its hoard
  • and
  • the market.Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference,
  • This Is How They Tell Me the World Ends
  • is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews,
  • The
  • New York Times
  • reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

Customer Reviews

Rating Breakdown

★★★★★
60%
(2.2K)
★★★★
25%
(936)
★★★
15%
(562)
★★
7%
(262)
-7%
(-262)

Most Helpful Reviews

✓ Verified Purchase

Useful for cybersec nonprofessionals —scarce data, some salient facts and lots of opinions

This is an interesting effort — Ms. Perlroth is a skilled writer dealing with a complex set of topics. She spends considerable amount of time dealing with the drama of cybersecurity and cyber warfare. The author does provide some useful interviews with some cyber specialists, government figures and mercenary elements involved in intrusion of information systems. Unfortunately she omits several well less known cyber attacks and the various roles of non-state actors in our present cybersecurity environment. This is a useful read for nonprofessional cybersecurity readers. It's unfortunate that she sometimes renders some sensationalist opinions that are not backed by appropriate facts. In sum, I would recommend this book however, I urge some caution because some of her facts have scant attribution. I respect your opinions however in cybersecurity we have to make a clear differentiation between facts and opinions. I enjoy her skilled writing and varied perspectives.
126 people found this helpful
✓ Verified Purchase

Essentially worthless

I looked forward to receiving this book, but now I cannot return it fast enough. This is a retelling of old news about hackers and the dangers of our electronic dependent world, but no news.
The 61-page endnotes are organized by chapter and nothing else. Good luck finding a reference tied back to the narrative in a useful manner, which is supposedly what endnotes are designed for. Not in this book.
The author apparently hates the NSA, CIA, FBI, and many other US government agencies she believes are responsible for unleashing the evil internet and hackers on the world. The totalitarian nations have merely stolen the tools of destruction from the USA and now endanger us all. She could not resist the impulse to bash President Trump and blames him for numerous atrocities against humankind that are baseless and useless. And yes, he is/was colluding with the Russians in spite of evidence to the contrary.
What a waste of good paper.
74 people found this helpful
✓ Verified Purchase

Terrible writing

Too much about author, and terrible writing.
49 people found this helpful
✓ Verified Purchase

Complete baloney

I lead one of the largest cybersecurity firms in Europe and can confidently say this Author has no idea what she is writing about. If you want to read a legitimate well-researched and well-reasoned account on cyberwarfare, read Countdown to Zero Day. It is supported by well-known security researchers and hackers, i.e. Mitnick.
This book is nothing but an ignorantly biased version of US mass media, i.e. NY Times account.
I’m intimately familiar (technically) with the events she’s describing and what she presents in her book is largely just another West-centric propaganda and holds little to no truth or substance. You might as well just read a political science fiction novel.
27 people found this helpful
✓ Verified Purchase

A stupendous collection of commonplaces and banalities!

Another lazy, sloppy self-important book tossed off by a beat reporter trading on author’s credentials

Few insights, nothing new, lightweight

Compares very poorly with Sanger, Zetter, Schneier who wrote excellent must-read books on computer security and policy for the lay reader

I regret paying even one penny for this collection of commonplaces and banalities!
24 people found this helpful
✓ Verified Purchase

Too opinionated for me....

I was eager to read this book, but find it too politically biased to recommend it to anyone as worthwhile, unfortunately.

I like to read accurate factual assessments without bothersome opinions that are baseless, politically motivated, and without real merit that prove to be very irritating and distracting. No thanks
24 people found this helpful
✓ Verified Purchase

Her blatant political bias gets in her own way

Perlroth is a decent writer, and the topic at hand is vital to learn about in the modern age. With a neutral, solemn, realistic perspective and deep-dive into the topic, with her writing style, there's no reason why this should be anything short of a 5-star review.

Unfortunately, her willfully ignorant, blatant political bias gets in the way of that. She's very pro-America, big government, pro-CIA, pro-NSA, pro-uniparty, etc. She'll rightfully point out the obvious faults of other nations & interest groups using cyber-crime to attack other nations with the common man caught up as collateral damage, while turning a blind-eye towards when her own interest group does the same. This is from one sentence to the next, making you wonder if she's aware of it and just lacks integrity, or if she's that brainwashed.

Her New York/California/MSM background shows, and I personally believe she's just been in the entertainment industry for so long that this is just simply what she actually believes, living in an echo-chamber. It's sad really.

If you can overlook the obvious bias here & read this with a massive grain of salt, there's a lot of eye-opening, well researched info here. Just beware of that before buying.
15 people found this helpful
✓ Verified Purchase

A Tribute to the 0-Day

As a reporter from Silicon Valley hired by the New York Times to cover cyber (yes I called it cyber) for the past 10 years, Nicole Perlroth has been in a unique position to interview and report on the wave of cyber-attacks that have defined this decade. Starting with the realization of the threat from a nation state with something as sophisticated as the Stuxnet worm attack in 2010 and ending right after the SolarWinds attacks in 2020. she has chosen an active time to be covering the cyber beat and a great time to write it all down.

Her research is now accessible to us all. With the melodramatic title, “This is How They Tell Me the World Ends”, Perlroth dives into what can only be called a hyper extended NYT’s article about her investigation into the history of so the called “Zero-Day” exploit. And further, the creation of the “bug” bounty program that built a market and financed several generations of hackers working from their mother’s basement. Principally, in her mind, the 0-day exploit is her poster child for cyber attacks because the Stuxnet worm contained seven (7) of these 0-days (someone should do a fact check). As a result she was intrigued by what she was told by the multitudes of domestic and international computer savvy personalities (hackers?) she came across during her reporting travels.

Perlroth has presented a long history of the spy vs spy world depicting the dark underbelly of an underground eco-system she documented in an effort to unearth the 0-day feeding frenzy. She does this to place the blame for the failure of our government to keep us safe from cyber-attacks while at the same time placing blame on our government for paying the legions of hackers out there who are trying to find these 0-day’s which created the demand to sell on the black market to the highest bidder without scruples. Thus creating the plethora of vulnerabilities from which our country has now been left unprotected. It’s a lot more complicated then that. but that's the gist. Some of her sources provided her the proper insight and perspective. Some of her sources were speculating wildly about things of which they have little to no idea. It wasn’t clear to me if Perlroth could sort them out because she kept coming back to a reference to Salmon when she reached a dead end. Or the idea that no one would really talk to her about truly classified information. Furthering, in her mind, a grand conspiracy theory being guided by some unseen hand she couldn't label.

They say in my business, particularly as it relates to articles we read about in the media, I can neither confirm nor deny the facts surrounding these topics as they have been reported. So I’m not going to walk through point by point what’s she has written correctly and what she has wrong. She is clearly reporting on a story for which she has many sources who have been willing to talk to her. There is no use disputing much of what she is saying. What she hasn’t reported on, however, beyond the coveted 0-day, is everything else that could also comprise a cyber attack. SolarWinds, for instance, didn’t require a 0-day. Most of the security breaches that have taken down the big commercial companies of the past decade (I won’t list them) did not require an 0-day (Perlroth lists everything). Most breeches are the result of poor cyber-hygiene and persistent social engineering to find passwords for accounts through a hapless insider. This requires certain set of social skills more akin to a suave telemarketer than a her vision of a neckbeard who may never find a mate. After all, SolarWinds was a supply chain attack. Source code was modified from the inside. And that Trojan in the code left the back door unlocked and was calling home. No 0-day hacker or code researcher looking to defend that system is going to find what amounted to a single line of correctly operating code.

But what does this all mean? Is this how they told tell her, and she is now telling us, how the world ends? Throughout the read she makes the parallel to the development of nuclear weapons. During that phase of our existence starting with the Manhattan Project we hung under the Sword of Damocles. This is her weakest comparison. She continuously harkens back to the fact that we haven’t seen a cyber-derived mushroom cloud rising from some hacked nuclear reactor which will surely give us our own Chernobyl or Fukushima, yet. According to Perlroth it’s just a matter of time. For the record I don’t buy into this analogy nor am I worried about a cyber attack kicking off a mushroom cloud. She's mixing the threat of a meltdown at a nuclear facility with the threat of someone achieving a high yield detonation of a nuclear weapon at the hands of some hacker. That does not keep me up at night. Again, details are neither confirmed or denied.

At the end of the book, she argues, that the Cyber Pearl Harbor is a misnomer. The single event won’t happen because it’s actually already occurred through a thousand cyber cuts. Cyber vulnerabilities just crept up on us and we never noticed just like a frog doesn’t notice it’s being boiled. She can’t say both things. If a nuclear detonation produced by a cyber-attack in our own back yard isn’t a cyber-Pearl Harbor I don’t know what you would call it. Again, I’m able to sleep at night.

Towards the end of the book she turns political. She begins covering the presidential election and leaves 0-day cyber and begins commenting on the success and utility of Russian troll farms both in 2016 and again in 2020. Once again, the fabled 0-day of her reporting, was not a factor in the social influence game…but nevertheless social media provides huge surface for 0-day-less cyber attackers to work with.

So to complete my review I’ll start with for 4-stars as Perlroth does provide an informal history and retelling of a number of cyber stories. It’s a nice history of some fabled characters but it's not deeply technical. It’s not unlike the history of other malicious hacks as told in a multiple of cyber security pod casts such as the one called “Malicious Life”. Subtract 1-star for her unnecessary degradation into politics which added perhaps 100 unnecessary pages to the book. 3-stars for this accumulation of cyber history and tribute to the 0-day. By the way, it's pronounced "Oh-Day" if you want to blend in at DEFCON.
13 people found this helpful
✓ Verified Purchase

Slanted point of view

The book was interesting but the author chose to allow her political point of view to distract throughout. I was excited about the book after hearing stories on DarkNet Diaries. The more in depth you get, the more you just end up reading some person's political point of view. She lost me when she basically insinuated that the Obama administration ended Chinese hacking until big, bad Trump came along. This is a disingenuous retelling of history. One in which an administration from one political party is creating hackers, while another is saving the day and can do no wrong... *Dramatic eye roll* Both political parties are at fault. I'm just looking for facts. Leave the interpretation to the reader. If you make a compelling enough case, you wouldn't come off a political hack (pun intended).

Avoid this book and don't waste you money. I really regret buying this puppet's book. If I could I would give no stars.
11 people found this helpful
✓ Verified Purchase

A Fascinating Journey Into the World of Cyber Hacking, Espionage, and War

The author gives the reader a non-technical yet comprehensive introduction to the "Wild West" frontier where hackers and nations compete to discover and weaponize new vulnerabilities in computer systems worldwide. This book is well-written, detailed, and will probably frighten you. The author starts by describing the infamous Russian cyberattack on the entire country of Ukraine, perhaps a dry run for a possible future attack against the US. Although little known in the US, nearly every aspect of Ukrainian society was disrupted by the attack. The book then provides a brief history showing how early cyber hacking morphed into discoveries of serious security flaws (zero days) in commonly used computer software and systems. Major Silicon Valley companies, such as GOOGLE, had to scramble to respond to security breaches. One fascinating chapter describes how GOOGLE executives and engineers desperately tried to stop a very sophisticated intrusion, perhaps sponsored by the Chinese government, aimed at acquiring their source code. Individuals and governments sought to use security flaws to create tools for espionage, and also for offensive cyber weapons. A bizarre "arms market" emerged, populated by former NSA employees, individual hackers worldwide, shady government contractors, and intelligence agencies. It was shocking to learn that some of the most potent cyber weapons were stolen from the NSA, and then turned against the US. The author makes a persuasive case for a more coordinated US gov't response to the threats of cyberwar. Her research dramatically shows that this threat to our computerized society must be taken seriously.
8 people found this helpful