
Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$32.94$32.94
FREE delivery: April 8 - 11 on orders over $35.00 shipped by Amazon.
Ships from: Amazon Sold by: NILE BOOK STORE NBS
Buy used: $17.08
Other Sellers on Amazon
FREE Shipping
99% positive over last 12 months
FREE Shipping
FREE Shipping

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.

Image Unavailable
Color:
-
-
-
- To view this video download Flash Player
-
-
VIDEO
-
Follow the author
OK
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Hardcover – February 9, 2021

Explore your book, then jump right back to where you left off with Page Flip.
View high quality images that let you zoom in to take a closer look.
Enjoy features only possible in digital – start reading right away, carry your library with you, adjust the font, create shareable notes and highlights, and more.
Discover additional details about the events, people, and places in your book, with Wikipedia integration.
Purchase options and add-ons
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations)
“Part John le Carré and more parts Michael Crichton . . . spellbinding.” The New Yorker
"Written in the hot, propulsive prose of a spy thriller" (The New York Times), the untold story of the cyberweapons market―the most secretive, government-backed market on earth―and a terrifying first look at a new kind of global warfare.
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).
For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar―first thousands, and later millions of dollars― to hackers willing to sell their lock-picking code and their silence.
Then the United States lost control of its hoard and the market.
Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
- Print length528 pages
- LanguageEnglish
- PublisherBloomsbury Publishing
- Publication dateFebruary 9, 2021
- Dimensions6.7 x 1.85 x 9.55 inches
- ISBN-101635576059
- ISBN-13978-1635576054
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.
Similar items that may deliver to you quickly
- “The most likely way for the world to be destroyed,” it read, “most experts agree, is by accident. That’s where we come in; we’re computer professionals. We cause accidents.”Highlighted by 348 Kindle readers
- “The most likely way for the world to be destroyed, most experts agree, is by accident. That’s where we came in; we’re computer professionals. We cause accidents.”Highlighted by 244 Kindle readers
- And so, in 2003, iDefense became the first shop to publicly open its doors to hackers and start paying bounties for zero-day bugs.Highlighted by 189 Kindle readers
From the Publisher
|
|
|
---|---|---|
|
|
|
Editorial Reviews
Review
“Part John le Carré and more parts Michael Crichton ... spellbinding.” - The New Yorker
“An intricately detailed, deeply sourced and reported history.” - The New York Times
“Vivid and provocative.” - The New York Review of Books
“Told in an enthrallingly cinematic style . . . a stark, necessary, thoroughly reported reminder that no matter how strong the safe is, there’ll always be someone who can come along and crack it.” - LitHub
“Possibly the most important book of the year . . . Perlroth’s precise, lucid, and compelling presentation of mind-blowing disclosures about the underground arms race a must-read exposé.” - Booklist, starred review
“An engaging and troubling account of ‘zero-day exploits’ . . . This secretive market is difficult to penetrate, but Ms. Perlroth has dug deeper than most and chronicles her efforts wittily.” - The Economist
“[Perlroth] has delivered a five-alarm page turner that weighs the possibility of cyber-cataclysm.” - The Boston Globe
“A masterful inside look at a highly profitable industry that was supposed to make us safer, but has ended up bringing us to the brink of the next world war.” - John Markoff, former New York Times cybersecurity reporter
“Takes a complex subject that has been cloaked in techspeak and makes it dead real for the rest of us.” - Kara Swisher, host of the podcast On with Kara Swisher
“100% gripping. For anyone interested in cybersecurity, whether as student, policymaker, or citizen, it is well worth your read.” - P.W. Singer, author of LIKEWAR
“A rollicking fun trip, front to back, and an urgent call for action before our wired world spins out of our control.” - Garrett M. Graff, Wired, author of New York Times bestseller THE ONLY PLANE IN THE SKY
“A whirlwind global tour that introduces us to the crazy characters and bizarre stories behind the struggle to control the internet. It would be unbelievable if it wasn't all so very true.” - Alex Stamos, Director of the Stanford Internet Observatory and former head of security for Facebook and Yahoo
“The definitive history of cyberwarfare.” - Clint Watts, author of MESSING WITH THE ENEMY
“A must-read tale of cloak-and-dagger mercenary hackers, digital weapons of mass destruction and clandestine, ne'er-do-well government agencies. Perlroth's intrepid reporting shows why the consequences could be frightening.” - Lawrence Ingrassia, author of BILLION DOLLAR BRAND CLUB
“Will keep you up at night, both unable to stop reading, and terrified for what the future holds.” - Nick Bilton, Vanity Fair, author of AMERICAN KINGPIN
“Nicole Perlroth tells a highly technical, gripping story as if over a beer at your favorite local dive bar. A page-turner.” - Nina Jankowicz, author of How to Lose the Information War
“[A] wonderfully readable new book. Underlying everything Perlroth writes is the question of ethics: What is the right thing to do? Too many of the people she describes never seemed to think about that; their goals were short-term or selfish or both. A rip-roaring story of hackers and bug-sellers and spies that also looks at the deeper questions.” - Steven M. Bellovin, Professor of Computer Science, Columbia University
“The murky world of zero-day sales has remained in the shadows for decades, with few in the trade willing to talk about this critical topic. Nicole Perlroth has done a great job tracing the origin stories, coaxing practitioners into telling their fascinating tales, and explaining why it all matters.” - Kim Zetter, author of COUNTDOWN TO ZERO DAY
“From one of the literati, a compelling tale of the digerati: Nicole Perlroth puts arresting faces on the clandestine government-sponsored elites using 1s and 0s to protect us or menace us―and profit.” - Glenn Kramon, former New York Times senior editor
“Lays bare the stark realities of disinformation, hacking, and software vulnerability that are the Achilles’ Heel of modern democracy. I work in this field as a scientist and technologist, and this book scared the bejesus out of me. Read it.” - Gary McGraw, PhD, founder, Berryville Institute of Machine Learning and author of Software Security
“Usually, books like this are praised by saying that they read like a screenplay or a novel. Nicole Perlroth’s is better: her sensitivity to both technical issues and human behavior give this book an authenticity that makes its message―that cybersecurity issues threaten our privacy, our economy, and maybe our lives―even scarier.” - Steven Levy, author of Hackers and Facebook
“You MUST read this book―every word.” - Tom Peters, author of In Search of Excellence
“Exposes the motivations and misgivings of the people helping governments hack into our devices. After Perlroth's incisive investigation, there's no excuse for ignoring the costs of the cyber arms race. Indeed, we are already deeply vulnerable.” - Sarah Frier, Bloomberg, author of NO FILTER
“A powerful case for strong cybersecurity policy that reduces vulnerabilities while respecting civil rights.” - Kirkus Reviews
About the Author
Product details
- Publisher : Bloomsbury Publishing; First Edition (February 9, 2021)
- Language : English
- Hardcover : 528 pages
- ISBN-10 : 1635576059
- ISBN-13 : 978-1635576054
- Item Weight : 1.92 pounds
- Dimensions : 6.7 x 1.85 x 9.55 inches
- Best Sellers Rank: #146,714 in Books (See Top 100 in Books)
- #23 in Arms Control (Books)
- #136 in National & International Security (Books)
- #198 in Political Intelligence
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviews with images

-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
“This Is How They Tell Me the World Ends” tells the gripping story of a new form of warfare that takes place in the digital realm and its impact on society. New York Times Bestselling author Nicole Perlroth provides readers with an eye-opening look into the cyberweapons race and our vulnerabilities. This fascinating 505-page book includes twenty-three chapters broken out by the following seven parts: I. Mission Impossible, II. The Capitalists, III. The Spies, IV. The Mercenaries, V. The Resistance, VI. The Twister, and VII. Boomerang.
Positives:
1. An exhaustively researched, well-organized book that reads like a spy novel.
2. The fascinating topic of cybersecurity.
3. The writing style is engaging and keeps your interest.
4. Defines key hacking terms such as zero-days, which are basically a software or hardware flaw for which there is no existing patch. They are called zero-days because the victims or good guys have zero days to fix them.
5. It provides a lot of insights into investigative journalism. Perlroth is a part of the story as she relates the challenges she faced to uncover the cybersecurity world. “The first rule of the zero-day market was: Nobody talks about the zero-day market. The second rule of the zero-day market was: Nobody talks about the zero-day market. I’d posed this question many times, and I knew it was the one question nobody in this business would answer.”
6. Does a great job of describing the hackers, their sponsors (if they have any) and state sponsors. “The New Hacker’s Dictionary, which offers definitions for just about every bit of hacker jargon you can think of, defines hacker as “one who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.””
7. Describes how hacking companies operate. “In the mid-1990s Sabien’s team started trafficking in digital access, searching for bugs and exploiting them for customers. The bulk of his company’s revenues—more than 80 percent—came from the Pentagon and intelligence agencies, with the remainder from law enforcement and other U.S. government agencies. The goal was to deliver their government customers secret tried-and-tested ways into every system used by the adversary, be it nation-states, terrorists, or low-level criminals.”
8. The purpose behind the zero-days. “Once his zero-day was in the agency’s hands, they could use it to spy on whomever they chose. In the United States, the likeliest targets were terrorists, foreign adversaries, or drug cartels, but there were never any guarantees that very same zero-day wouldn’t come back to haunt you.”
9. Uncovering the world of spies. “I asked nearly every single one of the men who guided the CIA and NSA through the turn of the century to name the father of American cyberwar, and none hesitated: “Jim Gosler.””
10. Great quotes that must be shared. “Organizations can’t stop the world from changing. The best they can do is adapt. The smart ones change before they have to. The lucky ones manage to scramble and adjust, when push comes to shove. The rest are losers, and they become history.”
11. Defines the role of the TAO (Tailored Access Operations) unit inside the NSA. “In the aftermath of 9/11, these hundreds turned to thousands as TAO accelerated its breaking-and-entering mission around the globe, through a combination of brute-force hacking, cracking passwords and algorithms, finding zero-days, writing exploits, and developing implants and malware that bent hardware and software to their will. Their job was to find every crack in every layer of the digital universe and plant themselves there for as long as possible.”
12. Describes the role of hacking with regards to the Natanz Nuclear Facility in Iran. “By late 2008 the joint operation known as Olympic Games had infiltrated Natanz’s PLCs, and nobody appeared to suspect a cyberattack.”
13. Global hacking described. “The NSA was finding evidence that Russian hackers were tampering with the same routers and switches it had exploited for years. Chinese hackers were breaking into American telecoms and internet companies and stealing passwords, blueprints, source code, and trade secrets that could be used to exploit these systems for their own ends.”
14. Describes some of the stars of cybersecurity. “Inside the agency, these men had been revered as “the Maryland Five,” and time and time again, they had proved indispensable. They were each members of a premier TAO access team that hacked into the systems nobody else could. If the target was a terrorist, an arms dealer, a Chinese mole, or a nuclear scientist, you wanted the Five on it. Rarely was there a system, or a target, they could not hack.”
15. Describes what happens when hackers attack corporations. “It was time to call in the specialists. Google’s first call was to a cybersecurity shop in Virginia called Mandiant. In the messy world of security breaches, Mandiant had carved out a niche for itself responding to cyberattacks, and was now on the speed dial of nearly every chief information officer in the Fortune 500.”
16. Describes famous hacks. “The Chinese had been inside OPM’s systems for more than a year by the time they were discovered in 2015.”
17. The impact of Snowden’s revelations. “Without the companies’ knowledge or cooperation, the Snowden revelations that fall showed that the NSA, and its British counterpart, GCHQ, were sucking up companies’ data from the internet’s undersea fiber-optic cables and switches.”
18. Cyber wars. “Three years after the United States and the Israelis reached across Iran’s borders and destroyed its centrifuges, Iran launched a retaliatory attack, the most destructive cyberattack the world had seen to date. On August 15, 2012, Iranian hackers hit Saudi Aramco, the world’s richest oil company—a company worth more than five Apples on paper—with malware that demolished thirty thousand of its computers, wiped its data, and replaced it all with the image of the burning American flag.”
19. Describes American vulnerabilities. “Their letter was blunt: “Virtually all of our civilian critical infrastructure—including telecommunications, water, sanitation, transportation, and health care—depend on the electric grid. The grid is extremely vulnerable to disruption caused by a cyber or other attack. Our adversaries already have the capability to carry out such an attack.”
20. The impact of Stuxnet (computer worm responsible for the destruction of Iranian centrifuges). “Stuxnet had inspired dozens of other countries to join the zero-day hunt, and the United States was losing control over the market it had once dominated.”
21. Describes many attacks and the impact of misspelling. “North Korea’s hackers had been caught—but never punished—for major cyber heists at banks in the Philippines, Vietnam, and at the Bangladesh Central Bank, where they’d made a $1 billion transfer request from the New York Federal Bank. Only a spelling error (they’d misspelled foundation as “fandation”) had kept bankers from transferring the full billion, but they’d still made off with $81 million, among the largest bank heists in history. WannaCry was the next evolution in North Korea’s efforts to generate badly needed income.”
22. The impact of hacks. “China was decades behind the United States in nuclear weapons development, but thanks to Legion Amber, it had stolen everything it needed to catch up. In 2018, U.S. officials watched in horror as Beijing successfully tested a new submarine-launched ballistic missile and began moving ahead with a new class of subs that could be equipped with nuclear-armed missiles.”
23. An excellent Epilogue that describes defenses against hacks. “So-called “password-spraying attacks” have surged in the past three years, in which hackers try common passwords (e.g. “password”) across multiple user accounts. It’s not rocket science, but it’s insanely effective. Password-spraying is all it took for Iranian hackers, working at the behest of the IRGC, to break into thirty-six private American companies, multiple U.S. government agencies, and NGOs. Multifactor authentication is the best defense against these attacks.”
24. Notes included.
Negatives:
1. This book was begging for some key supplementary material but to no avail. I can think of many examples. I would have added a table of state sponsored hacking and their main goals. Another would be list of the top hackers in the world and their strengths. List of the biggest known hacks in the world.
2. No formal bibliography.
3. At around 400 pages of main narrative, it will require an investment of your time.
4. With so many players and intersecting stories involved it can be easy to lose yourself.
5. A glossary would have been helpful.
In summary, this is an excellent book that describes the vulnerabilities of our digital world and how the modern arms race have moved away from the sea and air to said digital world. Perlroth identifies the major players and countries involved in the cybersecurity arena and what their main goals are. It also tells the story of how the US had become the world’s stockpiler of zero days and lost control of it. It reads like a spy novel but it’s real global warfare taking place in our digital realm with real-life consequences. Lack of supplementary material aside, I highly recommend this book.
Further recommendations: “Cyber War” by Richard A. Clark, “The Personal Cybersecurity Manual” by Marlon Buchanan, “The Hacker and the State” by Ben Buchanan, “The Smartest Person in the Room” by Christian Espinosa, “Hunting Cyber Criminals” by Vinny Troia and “Social Engineering: The Science of Human Hacking.
That said, the book makes a convincing case that both governments and private hackers are constantly crawling through the internet and software programs by major and minor companies looking for ways to penetrate the computers and devices of all sorts connected to the internet. The main reasons are: making money through extortion (ransomware) or selling the information about the "vulnerability" to others; espionage; potential sabotage.
The book does a nice job of explaining various attacks that have been in the press over the last decade and ones that fell below the public's radar. The story about Stuxnet that took out a lot of Iran's uranium enrichment centrifuges is extensive and revealing. That opened Pandora's box for active warfare in cyberspace. The book's main drawback is that it skips around these various events leaping forward and backward in time and across many characters. There does not seem to be a clear pattern of organization to the material; it is more a collection of stories. The writing is good but not stellar for a NYT contributor. For example, the title would be better written as: "They Tell Me This is How the World Ends." I am afraid that she is all too accurate in foretelling that future. Read it and you will see why.
Top reviews from other countries




