Buy new:
$16.69$16.69
FREE delivery: Sunday, Nov 6 on orders over $25.00 shipped by Amazon.
Ships from: Amazon.com Sold by: Amazon.com
Buy used:: $14.68
Other Sellers on Amazon
& FREE Shipping
94% positive over last 12 months
+ $3.99 shipping
92% positive over last 12 months
Usually ships within 4 to 5 days.
& FREE Shipping
97% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera - scan the code below and download the Kindle app.
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Hardcover – February 9, 2021
| Nicole Perlroth (Author) Find all the books, read about the author, and more. See search results for this author |
| Price | New from | Used from |
|
Audible Audiobook, Unabridged
"Please retry" |
$0.00
| Free with your Audible trial | |
Enhance your purchase
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
“Part John le Carré and more parts Michael Crichton . . . spellbinding.” The New Yorker
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market―the most secretive, government-backed market on earth―and a terrifying first look at a new kind of global warfare.
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).
For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar―first thousands, and later millions of dollars― to hackers willing to sell their lock-picking code and their silence.
Then the United States lost control of its hoard and the market.
Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
- Print length528 pages
- LanguageEnglish
- PublisherBloomsbury Publishing
- Publication dateFebruary 9, 2021
- Dimensions6.7 x 1.85 x 9.55 inches
- ISBN-101635576059
- ISBN-13978-1635576054
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now
Frequently bought together

Customers who viewed this item also viewed
Ghost In The Wires: My Adventures as the World's Most Wanted HackerKevin D Mitnick Steve Wozniak,William L. Simon,Kevin Mitnick,KevinWilliam MitnickSimonPaperback
Editorial Reviews
Review
"An intricately detailed, deeply sourced and reported history of the origins and growth of the [cyberweapons] market and the global cyberweapons arms race it has sparked . . . This is no bloodless, just-the-facts chronicle. Written in the hot, propulsive prose of a spy thriller, Perlroth’s book sets out from the start to scare us out of our complacency." - Jonathan Tepperman, The New York Times
"The best kind of reportage . . . a rollicking fun trip, front to back, and an urgent call for action before our wired world spins out of our control. I've covered cybersecurity for a decade and yet paragraph after paragraph I kept wondering: 'How did she manage to figure *that* out? How is she so good?’ "- Garrett M. Graff, Wired, author of New York Times bestseller THE ONLY PLANE IN THE SKY
"A vivid and provocative chronicle of Perlroth’s travels through the netherworld of the global cyberweapons arms trade." - The New York Review of Books
"Told in an enthrallingly cinematic style . . . This is How They Tell Me the World Ends is a stark, necessary, thoroughly reported reminder that no matter how strong the safe is, there’ll always be someone who can come along and crack it." - LitHub
"A stemwinder of a tale of how frightening cyber weapons have been turned on their maker. Perlroth takes a complex subject that has been cloaked in techspeak and makes it dead real for the rest of us." - Kara Swisher, co-founder of Recode and host of the New York Times podcast "Sway"
"An engaging and troubling account of ‘zero-day exploits’ . . . This secretive market is difficult to penetrate, but Ms. Perlroth has dug deeper than most and chronicles her efforts wittily." - The Economist
"Possibly the most important book of the year . . . Perlroth’s precise, lucid, and compelling presentation of mind-blowing disclosures about the underground arms race a must-read exposé." - Booklist, starred review
"The definitive history of cyberwarfare." - Clint Watts, author of MESSING WITH THE ENEMY
"A must-read tale of cloak-and-dagger mercenary hackers, digital weapons of mass destruction and clandestine, ne'er-do-well government agencies. Perlroth's intrepid reporting shows why the consequences could be frightening." - Lawrence Ingrassia, author of BILLION DOLLAR BRAND CLUB
"Will keep you up at night, both unable to stop reading, and terrified for what the future holds." - Nick Bilton, Vanity Fair, author of AMERICAN KINGPIN
"An essential cautionary tale. After Perlroth's incisive investigation, there's no excuse for ignoring the costs of the cyber arms race. Indeed, we are already deeply vulnerable." - Sarah Frier, Bloomberg, author of NO FILTER
"100% gripping. For anyone interested in cybersecurity, whether as student, policymaker, or citizen, it is well worth your read." - P.W. Singer, author of LIKEWAR
"[A] wonderfully readable new book . . . a rip-roaring story of hackers and bug-sellers and spies that also looks at the deeper questions." - Steven M. Bellovin, Professor of Computer Science, Columbia University
"A whirlwind global tour that introduces us to the crazy characters and bizarre stories behind the struggle to control the internet. It would be unbelievable if it wasn't all so very true." - Alex Stamos, Director of the Stanford Internet Observatory and former head of security for Facebook and Yahoo
"A powerful case for strong cybersecurity policy that reduces vulnerabilities while respecting civil rights." - Kirkus Reviews
"[Perlroth] has delivered a five-alarm page turner that weighs the possibility of cyber-cataclysm." - The Boston Globe
About the Author
Product details
- Publisher : Bloomsbury Publishing; 1st edition (February 9, 2021)
- Language : English
- Hardcover : 528 pages
- ISBN-10 : 1635576059
- ISBN-13 : 978-1635576054
- Item Weight : 2 pounds
- Dimensions : 6.7 x 1.85 x 9.55 inches
- Best Sellers Rank: #14,755 in Books (See Top 100 in Books)
- #6 in Computer Hacking
- #19 in National & International Security (Books)
- #28 in Political Intelligence
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviewed in the United States on February 10, 2021
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Many people and institutions did not want the story to be told, but the author knew “that the only way to contain the spread of the world’s most secretive, invisible market was to shine a big fat light on it.” The author presents some scary information about just what is going on. Even the NSA was back-channeling with international agencies that set cryptographic standards, advocated for a flawed formula for generating the random numbers in encryption schemes that NSA computers could easily crack, paying off companies, infiltrating factories at leading encryption chip makers to insert backdoors, hacking into companies’ internal servers, and more. The Stuxnet incident brought a new highly sophisticated software into play. Now industrialized industries are a target.
We learn about companies that acted as advanced cyber threat alert systems for the big banks and government agencies. Bounties were paid for bugs and especially zero-day bugs in software. Eventually, a growing number of defense contracts, intelligence analysts, and cybercriminals began offering even greater rewards to hackers, and get this, made them promise to keep their bug discoveries secret! The author was able to talk to one of the market’s first brokers, and his stories read like a spy novel. There were cloak-and-dagger meetings, bags of cash, and murky middlemen, and this was not some TV show. This was reality. Some sensed an increasing potential for an all-out cyberwar. In time more governments started their own cyber offense programs and the cost of exploits exploded as did the number of contractors eager to traffic in them. Eventually, the author was able to talk to someone viewed as the father of American cyberwar who became the world’s most skilled exploiter in the digital realm. In time, American intelligence agencies were siphoning data from hundreds of strategically placed implants throughout the world, and so were other countries.
Some of the stuff the author reveals is almost unbelievable. For instance, the NSA had a program code-named Genie that eventually became implanted in “nearly every major make and model of internet router, switch, firewall, encryption device, and computer on the market.” Yikes!! And all sides were doing this. As American officials accused China of embedding trapdoors in Huawei’s products, the NSA had pried its way into Huawei’s headquarters. This is disturbing. As one official said, “In the race to exploit everything and anything we could, we painted ourselves into a dead end where there is no way out. It’s going to be a disaster for the rest of the country.” Stuxnet was a Rubicon in offensive warfare it seems. The scary thing now is where the biggest number of targets are found: Europe, Japan, and the United States. Remember 1945? “Somebody just used a new weapon, and this weapon will not be put back in the box.” Another scary point made was the number of NSA hackers that left the agency for various reasons. Some moved overseas to the Gulf, the story being to help American allies. The reality was grimmer and more sordid.
There’s more. Some companies in the business, such as Hacking Team sold exploits to various government agencies around the globe, “some with human rights records that were not just questionable but grotesque,” according to the author. And I am sure they were not the only ones. In the news as I write, is the Israeli company NSO, basically a gun for hire, and they were not the only one. Then there were the nation states. In an operation dubbed Aurora, Chinese hackers got into high-tech companies, defense contractors, and others. They were able to attack source code repositories. “With that access, they could surreptitiously change the code that made its way into commercial products and attack any customers who used the software.” Again, scary stuff. There is so much information here, I can only scratch the surface – the book clocks in at almost five hundred pages! Ergo, you need to read this book. Continuing, we see how the United States was falling behind. In the 2019 International Collegiate Programming Contest, the winners were Russian, Polish, Chinese, South Korean and Taiwanese. “A team from Iran beat Harvard, Stanford, and Princeton, which didn’t even break into the top twenty.” In 2012, two weeks after Iran hit Saudi Aramco, a major congressional effort was made to lock down U.S. critical infrastructure – note that this was 2012. It seemed promising until the U.S. Chamber of Commerce lobbyists started yelling overregulation and big government. Well, the standards became watered down and became voluntary. Fast forward to today when we see a major pipeline hacked. What is frightening is that a “carefully orchestrated cyberattack on the American grid could unleash outages for at least months, if not years.” Scores of new nation-states have moved into the invisible battlespace.
The author wants this book to be a wake-up call. Many are unaware of and even fewer truly understand the scope of what is going on. The author wonders if we will have the awareness to solve “what may be the most complex puzzle of our digital era. Let’s hope we are not on the precipice of a cyber catastrophe!”
There are few attacks here I'd not heard of, but one I'm surprised she didn't mention the East Coast Internet outage in the fall of 2016, performed by DDoS attack on the DNS backbone by 3 guys in a dorm hijacking IoT devices.
Long been an advocate of, for, more + better cyber sec awareness, education and training.
Was turned down when advocating such training be added to the curriculum of a coding training organization.
Yes, yes, yes to 2FA/MFA. Also, rebooting regularly, scans frequently, LONG passwords (because of rainbow tables) changed frequently, avoid IoTs if/when possible. You do have an antivirus on your mobile, right?
I'd also be stingy about putting apps on mobile devices, and definitely not banking apps.
Good luck! We're all gonna need it!
Top reviews from other countries
Not sure who the author was trying to write for, but the constant full front attack of hyperbole doesn't help anyone. The author is either confused, misinformed, or willingly oversimplified complex things to a few phrases that are so over the top as to be meaningless.
To give you an example, just in the Prologue the author says NotPetya was a major attack on Ukraine infrastructure by Russian state-sponsored hackers (true). She then goes on to say the USA is highly exposed to this kind of attack - because of the Internet of Things. You mean - the Nest thermostat? The alexa speaker?
The internet of things is a problem for cybersec, but the author makes it out to be some sort of sign of the incoming Apocalypse, which is nonsense. The author then refutes their own point by pointing out that the whole of infrastructure in Ukraine was already connected to the Internet. There is literally nothing or almost nothing to be salvaged from this. It's just poor writing, poor research, poor understanding - and it amounts to very little but a diatribe worthy of a tabloid about how cyberapocalypse is coming. No real understanding of the risks or dangers.
This is tabloid stuff, not worthy of a book in any genre.
"Discovering [a zero day] is like discovering the secret password to the world's data." That's where I put the book down. We need to educate people on these issues, but we do them a disservice if we oversell capabilities or exaggerate the danger of these tools.
For those who want to more seriously explore cybersecurity issues, I'd recommend The Hacker and the State by Ben Buchanan.
- The author tries to make the story about her. And some bits are cringeworthy - e.g. the descriptions of needing to get away from busy New York and going to Africa
- Various things she says make it seem like she is proud of her technical ignorance. Which perhaps explains why there are a lot of mistakes. E.g. 0day exploits are central to the book, but she doesn't understand what they are, describing them as giving access to anything and everything on a computer. Countless other similar examples
- The amount of repetition is mind boggling. How this got past an editor I can't imagine. Should be at most a quarter of its length.
Times have changed. Cyber warfare is the way to go these days, whether to interfere in elections or to bring an entire country to a standstill, and this book spells it all out.
The authoress rightly points out that in China and Russia the so-called governments can get one and all to act for them, whereas in the "free" west we depend on volunteers or those to whom we pay enough cash. The mind boggles at the amount of overlap there must be in the various intelligence agencies who, to make matters worse, do not/will not share with the other agencies. AS she says at one point: "All seventeen US intelligence agencies............." !!
The average "man in the street" (that's me these days) is totally unaware of what goes on "under the surface" and it might well affect our daily lives if some hacker stops services on which we depend in their tracks.
A great , and disturbing, read.










