61 pages 2-hour read

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Nonfiction | Book | Adult | Published in 2021

A modern alternative to SparkNotes and CliffsNotes, SuperSummary offers high-quality Study Guides with detailed chapter summaries and analysis of major themes, characters, and more.

Part 3Chapter Summaries & Analyses

Part 3: “The Spies”

Part 3, Chapter 6 Summary: “Project Gunman”

Project Gunman was a landmark development in US intelligence operations; it had a significant impact on modern American espionage activities and on attitudes toward information security. The project involved a six-month investigation into the efforts of the KGB (the Intelligence Service of the former Soviet Union) to bug the United States embassy in Moscow. In 1984, an NSA team led by Deputy Director of Communications Security Walter G. Deeley removed every piece of Soviet surveillance equipment in the US embassy, shipped it back to America, and disassembled it in a top-secret lab. Throughout the Cold War, the KGB had been blatant in their surveillance of any American citizens within the Soviet Union, and recording devices were often planted in offices, hotel rooms, and furnishings used by American government representatives. The NSA had long suspected that more sophisticated bugs were being used to spy on American communications from within the embassy in Moscow, but previous sweeps and investigations had been unsuccessful. Analysts on Project Gunman eventually discovered magnetometers and electrical units in several typewriters used by embassy staff. These devices were able of catalogue, analyze, and transmit keystrokes, allowing the KGB to read everything written on the typewriters before any form of encryption was applied. These were by far the most sophisticated espionage tools that US intelligence services had ever encountered, and their very existence proved the critical role of information security and taught the NSA not to underestimate their opponents’ sophistication.

Part 3, Chapter 7 Summary: “The Godfather”

Perlroth describes James R. Gosler as the architect of American cyberwarfare. He worked for various government intelligence agencies between 1979 and 2013 but was unable to share much about his decades-long, highly decorated career due to the top-secret nature of his work. He is, however, a legend in the field of information security for his work on establishing the CIA and NSA’s information security capabilities, which went from nonexistent to globally dominant on his watch. Perlroth characterizes him as an exceptionally skilled hacker who was unmatched in the NSA during his tenure for his ability to create, conceal, and weaponize vulnerabilities in even very simple computer programs. 


Gosler recognized the practical impossibility of securing the massively complex programs on which digital infrastructure and important computer systems relied, and he developed systems to exploit vulnerabilities in such systems for the purposes of intelligence-gathering. He also developed—and possibly implemented—plans to infiltrate the global manufacturing and supply chain of computer hardware components, in order to plant NSA bugs at the most fundamental levels of commercial devices. He admits that in the early 21st century, particularly following the 9/11 terrorist attacks, US intelligence agencies began hacking any and all devices that they could access so as to cast a wide net for data collection. The digital revolution provided the means and opportunity to collect unprecedented quantities of communications data from Americans and foreign citizens, as well as specific targets such as diplomats, officials, and journalists.

Part 3, Chapter 8 Summary: “The Omnivore”

In the early 2000s, the NSA began a major recruitment drive aimed at attracting hackers to work for its TAO (Tailored Access Operations) team. They began a project known as TIA (Total Information Awareness), which aimed to pair cyberespionage tools with conventional spying methods in order to learn every possible detail about suspected terrorists and potential threats to national security. The Patriot Act was used to justify the commandeering of phone records, as well as the invasion of privacy of millions of American citizens. The period in which the USA conducted the so-called “War on Terror” was a golden age for digital spying, as America enjoyed practically uncontested domination of the cyber sphere amid the launching of new commercial sources of digital information such as Facebook and smartphones. However, the NSA’s fatal flaw, developed during this period, was the assumption that they were smarter and better-equipped than all of their rivals. The fact was that if the NSA could hack a system, then it was possible for another hacker to do so as well. Thus began a cyber arms race that continues to the present day.

Part 3, Chapter 9 Summary: “The Rubicon”

In 2008, the United States crossed the figurative point of no return by using a cyberweapon against a rival nation. During the 2000s, Iran was dedicating significant resources to developing a nuclear program. Given the hostility between the two nations, Iran’s endeavor ran counter to US wishes and interests, posing a major perceived threat to Israel, a US ally. In order to dissuade the Israeli military from conducting a full-on bombing campaign against Iranian nuclear testing sites (an act of outright war that could escalate into a devastating conflict), the United States instead proposed using cyberweapons to sabotage computers at the nuclear base. (The specific cyberweapon employed was known as Stuxnet—a chain of zero-day exploits in Microsoft programs). This project was code-named Olympic Games. The chain of exploits (called a worm), was implanted in the sealed system of the nuclear facility via a tainted USB drive. Once it had invaded the system, the worm would cause nuclear reactors to spin too quickly for a period of time during which their sensors would continue to show normal readings. As a result, research was stalled and key equipment damaged. Ultimately, this project successfully prevented the progression of Iran’s nuclear program. However, Iranian analysts eventually discovered the existence of the bug, and in 2010, Stuxnet escaped from the closed system of the nuclear site and began infecting thousands of systems across the internet. The target of the NSA-designed bug was very specifically intended to only target systems with the specifications of the Iranian nuclear testing facilities, so the bug didn’t damage the other systems that it infected. However, its components—including the mechanisms by which it penetrated those systems—could be used more generally by hackers to pursue all sorts of unsavory motives. Stuxnet was clearly the product of sophisticated state-sponsored cyber-research facilities and hacking teams. The media focused initially on Israel and their intelligence agency, Mossad, as the likely culprits, but it soon became clear to the public that the United States and its NSA were also involved.

Part 3, Chapter 10 Summary: “The Factory”

As the world became increasingly digitized over the following years, the amount of information available for digital harvesting only grew. The NSA continued to focus investments in offensive capabilities and neglected defensive systems even as Russian agencies began hacking American systems. In 2008, five former NSA hackers set up a private cyberweapon development company called VRL (Vulnerability Research Labs), which was paid enormous sums by government agencies to develop sophisticated hacking tools. The NSA’s policy on which zero-days to report to manufacturers for patching and which to stockpile was guided by the NOBUS (Nobody But Us) principle, which proposed giving developers the low-hanging fruit that other less-advanced states could access, while holding onto more sophisticated hacks that they believed to be unavailable to rival agencies. By 2012, however, this justification proved increasingly thin as the cyber capabilities of foreign nations continued to close the gap with those of the United States.

Part 3 Analysis

This section builds on the developments described in Part 2, focusing on the other side of the buyer/seller dynamic. Its dramatic title, “The Spies,” is a pointed reference to Perlroth’s critique of the espionage activities that took place during this time frame, and she once again heads the section with a pointed quotation to illustrate her broader philosophical point. This time, her discussions are prefaced by a quote from the Dalai Lama about the enemy’s ability to teach valuable lessons. Perlroth appropriates this quote to point to the combative nature of state-level espionage in the wake of the Cold War. Specifically, Chapter 6 shows that the United States’ information security policies and perspectives were shaped by the more sophisticated tactics of the former Soviet Union. (In turn, enemies of America such as Iran and Russia will begin to adopt and modify the USA’s own digital espionage tricks and techniques.) The discussion adds considerable nuance to the text’s overall critique of The Impact of Digital Espionage on Privacy and Civil Liberties, as Perlroth details the willingness of American intelligence agencies to spy on American citizens in defiance of existing laws, civil liberties, and the human right to privacy. 


The Role of Hacking in Modern International Relations and Conflicts also features prominently in this section as Perlroth examines the intelligence work that informs and shapes foreign policy. Within this context, she makes it clear that the NSA’s hacking activities were highly influential in the development of international relations during this time. For example, the USA’s deployment of Stuxnet ushered in a new era of international conflict, one based in the digital sphere rather than the physical. In order to make her descriptions more accessible to a lay audience, Perlroth draws parallels to well-known historical events. This technique is made plain in the title of Chapter 9, “The Rubicon,” which references the idiom “crossing the Rubicon” and denotes the decision to commit to an irreversible course of action. This phrase alludes to Roman leader Julius Cesar’s crossing of the Rubicon River with his troops in the first century BCE—an act that caused the beginning of a major civil war. In this section, the NSA’s ambivalence toward defensive measures in digital security hints at the subthemes of neglect and urgency her focus on The Responsibility to Safeguard Digital Infrastructure.

blurred text
blurred text
blurred text

Unlock all 61 pages of this Study Guide

Get in-depth, chapter-by-chapter summaries and analysis from our literary experts.

  • Grasp challenging concepts with clear, comprehensive explanations
  • Revisit key plot points and ideas without rereading the book
  • Share impressive insights in classes and book clubs