Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

This Is How They Tell Me the World Ends

The Cyberweapons Arms Race

ebook
1 of 3 copies available
1 of 3 copies available
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market-the most secretive, government-backed market on earth-and a terrifying first look at a new kind of global warfare.
Zero-day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero-day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).

For decades, under cover of classification levels and nondisclosure agreements, the United States government became the world's dominant hoarder of zero-days. U.S. government agents paid top dollar-first thousands, and later millions of dollars-to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero-days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.

Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyberarms race to heel.
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Reviews

    • Publisher's Weekly

      November 23, 2020
      New York Times cybersecurity reporter Perlroth debuts with a colorful rundown of threats to the world’s digital infrastructure. She pays particular attention to “zero-days,” a term for “a software or hardware flaw for which there is no existing patch.” Though she notes their rarity (98% of cyberattacks do not involve zero-days or malware), Perlroth argues that the destructive capacity of cyberweapons like Stuxnet, a code comprising seven zero-day exploits that was used by the U.S. and Israel to disable uranium centrifuges at an Iranian nuclear plant, makes them an existential threat. She details the underground market for cyberweapons, where hackers can earn millions of dollars by finding a flaw in commonly used technologies such as Microsoft Windows, and explains how the U.S. lost its global monopoly on zero-day exploits in 2016, when a group calling itself the Shadow Brokers released a trove of NSA hacking tools. Perlroth’s searing account of the role American hubris played in creating the zero-day market hits the mark, but she leaves many technical details about cyberweapons unexplained, and stuffs the book with superfluous details about getting her sources to spill. This breathless account raises alarms but adds little of substance to the debate over cyberweapons.

    • Kirkus

      January 1, 2021
      A New York Times cybersecurity writer delivers a sobering account of a thoroughly hacked and cyberattacked world. Perlroth opens with the 2017 attack of Ukraine's infrastructure on the part of Russian hackers who, employed directly by Vladimir Putin, had only two rules to follow: They couldn't attack inside Russia, and "when the Kremlin calls in a favor, you do whatever it asks." Apart from that, they were free to do as they pleased, and they detonated cyberbombs across the neighboring nation, bringing the power grid down, closing supply chains, and crashing computers, phones, and ATMs. As Perlroth writes, they attacked with poorly guarded tools developed by the American intelligence community. In the end, Russia could have done far worse "with the access it had and the American weapons at its disposal." But there are other players with the same tools, including Iran and China, who have the wherewithal to wreak greater havoc on the infrastructure of a thoroughly unprepared America. Some of Perlroth's interlocutors are rightfully paranoid while others are open in defying demands to make private information available to government agencies through back doors into those very tools--a recipe for a police state. One old-school hacker whom the author interviewed in Buenos Aires lamented a change of culture. "We were sharing exploits as a game," he tells her. "Now the next generation is hoarding them for a profit." Perlroth suggests that these latter-day hackers are capable of great evil against vulnerable nations--the U.S. foremost among the list of prime targets, not least because America is so addicted to technology. "There wasn't a single area of our lives that wasn't touched by the web," writes the author. "We could now control our entire lives, economy, and grid via a remote web control. And we had never paused to think that, along the way, we were creating the world's largest attack surface." A powerful case for strong cybersecurity policy that reduces vulnerabilities while respecting civil rights.

      COPYRIGHT(2021) Kirkus Reviews, ALL RIGHTS RESERVED.

    • Booklist

      Starred review from December 1, 2020
      Cybersecurity journalist Perlroth's terrifying revelation of how vulnerable American institutions and individuals are to clandestine cyberattacks by malicious hackers is possibly the most important book of the year. Perlroth spent seven years researching, traveling the world, and conducting hundreds of interviews about the elusive market for zero-day software bugs that allow a hacker to break into devices undetected and either implant malware, extract data, or take control of entire systems. Much of this hidden arms race is shrouded in secrecy behind government classification or nondisclosure agreements, which made her quest for the truth about cyber vulnerability difficult, yet ultimately she is able to reveal how hackers found and acquired zero-day bugs, how the U.S. government first cornered, then lost the market for them, and how this insidious technology has invaded our lives. From holding sensitive information hostage, which can lead to the shutting down of hospitals or the electric grid and disastrous meddling in elections, this new level of cyberwar poses threats unknown to most Americans. That makes Perlroth's precise, lucid, and compelling presentation of mind-blowing disclosures about the underground arms race a must-read expos�.

      COPYRIGHT(2020) Booklist, ALL RIGHTS RESERVED.

Formats

  • Kindle Book
  • OverDrive Read
  • EPUB ebook

subjects

Languages

  • English

Loading