How the Cyberweapons Race Began
Nicole Perlroth spent years tracing a world that was built to stay hidden. Through interviews with hackers, intelligence officials, brokers, and security researchers, she uncovered a market where secret software flaws are bought, sold, and turned into tools for spying and sabotage. The result is a picture of a digital arms race that grew quietly while most people were busy moving their lives online.
A zero-day is a flaw in software or hardware that the maker does not know about yet. Because there is no fix available, anyone who finds one can use it like a master key. It can open a phone, a laptop, a bank server, a power plant network, or a government system without warning. That makes zero-days some of the most valuable items in modern intelligence work.
This race did not begin with smartphones or social media. During the Cold War, American officials discovered that Soviet intelligence had hidden sensors inside typewriters at the U.S. embassy in Moscow. Those devices captured what embassy staff typed before messages could be encrypted. That discovery changed how intelligence agencies thought about security. Instead of trying only to break codes, they learned to target the machines people trusted.
That lesson shaped the future of American cyber strategy. As computers and global networks spread, officials realized they could gain more by slipping through hidden weaknesses in hardware and software than by attacking encryption directly. The mission shifted from intercepting signals in the air to getting inside the devices, cables, and systems where data was created and stored.
After the September 11 attacks, this approach accelerated. American intelligence agencies were told to collect more, miss less, and never again fail because they lacked access. Teams at the National Security Agency, especially the unit known as Tailored Access Operations, were built to break into foreign systems and stay there. They looked for ways into routers, servers, smartphones, and industrial controls, combining advanced hacking with old-fashioned espionage like intercepted shipments and physical break-ins.
That success created a dangerous contradiction. The same flaws that let the government spy on rivals also existed in the products used by hospitals, banks, schools, and families. The digital world depended on common software and hardware shared across borders. Every time a government chose to keep a weakness secret, it left millions of ordinary users exposed. From the beginning, offense and public safety were tied together, and the gap between them kept widening.



