This Is How They Tell Me the World Ends

The Cyberweapons Arms Race

Nicole Perlroth

21 min read
1m 8s intro

Brief summary

This Is How They Tell Me the World Ends traces how governments and private firms turned hidden software flaws into weapons, creating a secret arms race that left the technology we all depend on dangerously exposed. It argues that the incentives rewarding secrecy over repair have made everyone less safe.

Who it's for

This book is for anyone who wants to understand the hidden history of cyberwarfare and its real-world consequences for civilians, companies, and nations.

This Is How They Tell Me the World Ends

Audio & text in the Readsome app

How the Cyberweapons Race Began

Nicole Perlroth spent years tracing a world that was built to stay hidden. Through interviews with hackers, intelligence officials, brokers, and security researchers, she uncovered a market where secret software flaws are bought, sold, and turned into tools for spying and sabotage. The result is a picture of a digital arms race that grew quietly while most people were busy moving their lives online.

A zero-day is a flaw in software or hardware that the maker does not know about yet. Because there is no fix available, anyone who finds one can use it like a master key. It can open a phone, a laptop, a bank server, a power plant network, or a government system without warning. That makes zero-days some of the most valuable items in modern intelligence work.

This race did not begin with smartphones or social media. During the Cold War, American officials discovered that Soviet intelligence had hidden sensors inside typewriters at the U.S. embassy in Moscow. Those devices captured what embassy staff typed before messages could be encrypted. That discovery changed how intelligence agencies thought about security. Instead of trying only to break codes, they learned to target the machines people trusted.

That lesson shaped the future of American cyber strategy. As computers and global networks spread, officials realized they could gain more by slipping through hidden weaknesses in hardware and software than by attacking encryption directly. The mission shifted from intercepting signals in the air to getting inside the devices, cables, and systems where data was created and stored.

After the September 11 attacks, this approach accelerated. American intelligence agencies were told to collect more, miss less, and never again fail because they lacked access. Teams at the National Security Agency, especially the unit known as Tailored Access Operations, were built to break into foreign systems and stay there. They looked for ways into routers, servers, smartphones, and industrial controls, combining advanced hacking with old-fashioned espionage like intercepted shipments and physical break-ins.

That success created a dangerous contradiction. The same flaws that let the government spy on rivals also existed in the products used by hospitals, banks, schools, and families. The digital world depended on common software and hardware shared across borders. Every time a government chose to keep a weakness secret, it left millions of ordinary users exposed. From the beginning, offense and public safety were tied together, and the gap between them kept widening.

Full summary available in the Readsome app

Get it on Google PlayDownload on the App Store

About the author

Nicole Perlroth

Nicole Perlroth is a leading expert on cybersecurity, having spent over a decade as the lead cybersecurity reporter for The New York Times, where she covered digital espionage and cyberattacks. Her work, which has been nominated for the Pulitzer Prize, investigated state-sponsored hacking campaigns and the global cyber arms race. She now advises the U.S. government's Cybersecurity and Infrastructure Security Agency (CISA) and invests in cybersecurity startups, continuing to shape policy and solutions in the field.

Similar book summaries

LikeWar cover

LikeWar

P.W. Singer, Emerson T. Brooking