61 pages • 2-hour read
A modern alternative to SparkNotes and CliffsNotes, SuperSummary offers high-quality Study Guides with detailed chapter summaries and analysis of major themes, characters, and more.
Perlroth attended a hacking conference in Buenos Aires, Argentina, to observe the new generation of young hackers rising to prominence there. (These young people have relied upon hacking skills to access many tools, games, and online services that are forbidden under government embargoes. Hacking also gives them a means of escaping poverty.) Perlroth visited two “godfather[s]” of the Argentine hacking scene, Alfredo Ortega and Ivan Arce. Both men worked at the cybersecurity company Core Security, which is inextricably linked to the development of the hacking scene in Argentina. Ortega and Arce also mentored the younger generation of hackers. Ortega is unwilling to involve himself with government agencies because he does not trust the authorities, and Arce laments that the youth value money over loyalty. Perlroth realized that during her time in Argentina, her laptop has been tampered with, so she immediately threw it away. It was clear to her in that moment that the USA has lost its monopoly on the zero-day market.
In 2012, government-backed Iranian hacking teams infiltrated the world’s biggest oil company, Saudi Aramco, destroying computers, scrubbing data, and leaving behind the image of a burning American flag. They then targeted major American banks by flooding their websites with junk traffic until the sites crashed in “denial of service” attacks. Next, the hacking teams took out the systems of Sands casino chain in retaliation for the owner’s incendiary remarks to Israeli leaders.
Similarly, North Korea attacked Sony Pictures to protest its new film release: a movie depicting the assassination of North Korean leader Kim Jon-un. The attack destroyed 70% of the movie studio’s computers and caused many theaters to refuse to show the movie. The North Koreans also leaked emails from private Sony Pictures accounts to the media, causing a major scandal for the company. In 2015, President Barack Obama negotiated agreements with both Iran and China, successfully curbing cyberattacks on America by two of the main perpetrators. Unfortunately, these ententes did not long outlast the duration of Obama’s presidency.
In 2012, the Department of Homeland Security discovered that the power grid of the United States was being infiltrated and mapped out by Russian hackers. In time, Russian hacking groups penetrated all manner of digital infrastructure, including gas suppliers and water systems. With a Trojan-horse style infiltration of a Microsoft update in 2014, they also infiltrated industrial control centers for dams and nuclear facilities all across the country. These actions were made possible because Congress had blocked any bill aiming to regulate critical infrastructure or hold it to federal standards of security. Because of this decision, which had left the nation vulnerable, Russia now had the ability to cause major disasters that could easily cause massive casualties and disrupt the American way of life; there was no preparedness plan capable of dealing with the aftermath.
In the field of information security, the concept of an attack on digital infrastructure like the power grid had long been seen as unrealistic fear-mongering, but in this moment, it became a real threat. Perlroth discussed the issue with Watters, who by this point was running a private counterintelligence company called iSight, which aimed to function as an early warning system for major clients. He agreed that Russian attacks on Ukraine—including the six-hour blackout caused in the Ivano-Frankivsk region in 2015—were tests for a potential attack on America and a deliberate threat to show what Russians were capable of.
In this section of the text, Perlroth deliberately shifts her figurative parallels from a historical and social focus and instead focuses more strongly upon systemic images. By labeling Part 6 “The Twister,” she invokes the idea of one of the most violent, unstoppable weather systems known. This extended metaphor illustrates the volatile, changing state of the zero-day market by characterizing it as a chaotic tornado that threatens to disrupt the status quo and subvert American interests. This dramatic title is also referenced directly in the final lines of Chapter 17, when Perlroth hears a thematically resonant song about a twister while riding in a cab in Buenos Aires. In this way, she continues to thread her broader argument with key moments from her own experience, simultaneously reinforcing her themes and boosting her own ethos as a reputable player within the field of cybersecurity and investigative journalism.
In a similarly dire parallel, Perlroth also invokes a quote from physicist Albert Einstein in which he laments his involvement in the development of atomic power. Again, this quote likens the development of cyberweapons to the creation of nuclear ones, using an implicit metaphor to convey the destructive potential of zero-day exploits. The quote also communicates the melancholy truth that even such transformative scientific developments as nuclear power and digital technologies cannot change the innate qualities of humanity and will instead themselves be used to perpetuate longstanding conflicts and selfish pursuits.
In this light, Perlroth’s examination of The Role of Hacking in Modern International Relations and Conflicts takes on a much greater sense of urgency, as tensions between the USA and other nations are played out in the cybersphere through cyberattacks and espionage activities. Her account is intended to stress that America’s waning political power on the global stage is reflected in its loss of primacy in the cyber arms race. In the modern world, major conflicts are played out entirely over the internet, with government agencies using zero-days and other hacking tools to enact significant damage and even hold rival nations hostage. As a result, The Responsibility to Safeguard Digital Infrastructure is depicted as a major concern, especially as the vulnerability of the USA’s digital infrastructure becomes apparent. Notably, Perlroth refrains from offering solutions at this point, saving those for her call to action in the Epilogue. Instead, she illustrates the very real danger posed by foreign hackers and firmly establishes the urgent need for action in order to mitigate the potential fallout of future attacks.



Unlock all 61 pages of this Study Guide
Get in-depth, chapter-by-chapter summaries and analysis from our literary experts.