61 pages 2-hour read

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Nonfiction | Book | Adult | Published in 2021

A modern alternative to SparkNotes and CliffsNotes, SuperSummary offers high-quality Study Guides with detailed chapter summaries and analysis of major themes, characters, and more.

Part 7Chapter Summaries & Analyses

Part 7: “Boomerang”

Part 7, Chapter 20 Summary: “The Russians Are Coming”

Over the years, Perlroth interviewed former Head of Cybersecurity for the Obama Administration J. Michael Daniel several times. Although Perlroth judges his efforts in this sphere to be insufficient, his work has involved crafting government policies designed to deal with major cyberattacks, and he has also led government agencies through several major hacking crises. One of the most impactful was the 2014 “Heartbleed” zero-day, which was discovered in an under-supervised open-source code that was used ubiquitously in many different critical programs and systems. As public trust in the NSA’s information security programs waned to an all-time low, Daniel made the unprecedented decision to provide the public with a basic explanation of the process by which the NSA decided whether a zero-day should be reported to the developer or stockpiled. Known as the VEP (Vulnerabilities Equities Process), this process involved representatives from numerous teams and agencies, who then weighed the potential uses of the exploit against the harm it could cause if it were to be weaponized against the United States. Approximately 90% of discovered exploits were reported for patching, but the actual number of zero-days that the NSA has remains unknown.


Toward the end of Obama’s second presidential term, Russian hackers working for the Internet Research Agency, the nation’s main propaganda machine, began targeting American voters through social media. Trolls and content farms produced huge volumes of polarizing content and posts that aimed to sow chaos and conflict in anticipation of the 2016 election. Russian hackers managed to infiltrate the US State Department and other government agencies through deceptive emails that lured staffers to click on infected links. They were also discovered inside systems holding voter registration list data. Finally, a state-backed Russian hacking group posing as a single unaffiliated hacker called “Guccifer 2.0” hacked the Democratic National Committee. They leaked emails from the presidential candidate, Hillary Clinton, causing a major scandal that discredited her campaign and harmed her chances of winning the election. As in the North Korean Sony hacks, media and public attention were too focused on the contents of the leak to question how the information came to light, playing directly into the hands of the hackers.

Part 7, Chapter 21 Summary: “The Shadow Brokers”

In 2016, a mysterious group calling themselves the Shadow Brokers hacked into the NSA’s cache of zero-days and published a portion of them online. These were some of the USA’s most sophisticated cyberweapons—powerful weapons of mass digital destruction that in many cases were ready to use. The Shadow Brokers offered to sell off the remaining exploits, first in an auction and then a la carte. They did not receive much in the way of payment, likely because potential buyers were aware that engaging would make them a target for espionage agencies all over the world. Out of spite, the angered hackers posted the NSA’s top 20 exploits online for free so that anyone could use them to wreak havoc. This list included a hack known as EternalBlue, which chained together several vulnerabilities in Windows software into a “point and click” weapon that could grant access to private systems all over the world. Technically, EternalBlue had no zero-days, since the NSA had informed Microsoft of the vulnerabilities and a software patch had been released. However, this patch relied on users to update their software, so millions of computers were still left vulnerable. In the weeks after the Shadow Brokers leaks, hundreds of thousands of computers in 150 countries were infected.


Jake Williams, who worked as a TAO (Tailored Access Operations ) exploitation specialist for the NSA between 2008 and 2013, worked for a company that helped to clear up the aftermath of cyber-attacks. He wrote a blog post on the Shadow Brokers leaks, claiming that state-sponsored Russian hackers with the goal of discrediting the US government were the likely culprits. The Shadow Brokers responded directly to his post, doxxing him as a former NSA agent. Williams was horrified and felt abandoned by the agency upon their lack of support; he even cancelled any plans to travel abroad, for fear that he would be targeted.

Part 7, Chapter 22 Summary: “The Attacks”

In 2017, hackers from North Korea’s Lazarus Unit released a ransomware attack that spread around the world with unprecedented speed. One target that was hugely disrupted was the British National Health Service (NHS). This attack was called “WannaCry” and used the EternalBlue hack to infiltrate systems and corrupt important files. The attack caused massive disruption but earned the North Koreans very little money because they failed to include any means of returning the uncorrupted data, making it pointless to pay the ransom. A young British hacker also figured out a trick to divert victims of the attack from North Korean servers, very quickly neutralizing the attacks. The FBI was criticized for arresting this young man for his heroism soon after he came to their attention, and Microsoft was indignant to be stuck with the task of cleaning up the NSA’s mess.


Russian hackers learnt from the mistakes made by WannaCry hackers and did not repeat them in the “NotPetya” attacks that occurred soon afterwards. This attack used NSA zero-days and EternalBlue to destroy computers in Kyiv, Ukraine, causing at least $10 billion in damage. Dymtro Shymkiv, the presidential deputy in charge of cybersecurity and a former Microsoft employee, was in New York when he was informed of the attack. He posted that the presidential office was still online so as to control the narrative and avoid panic, and he spent the next few months cleaning up the aftermath. This attack prompted Brad Smith to speak at the UN and promote a digital Geneva Convention to restrict the use of cyberweapons on civilian targets. Instead of following such suggestions, the NSA began planting bugs with the potential to cause catastrophic damage in Russian digital infrastructure.

Part 7, Chapter 23 Summary: “The Backyard”

Perlroth judges that due to mismanagement of foreign policy and cybersecurity policy, the 2016-2020 Trump administration caused unprecedented damage to American cybersecurity. Trump got rid of the position of Head of Cybersecurity and undermined his own government agencies by denying their findings in regard to foreign cyberthreats. He refused to admit that Russia interfered with the 2016 election, and as a result, the Russian government faced no consequences for the hacks. Trump also refused to acknowledge that Saudi leaders had murdered the Washington Post’s Jamal Khashoggi, then used hacking to try and silence those who were reporting on the crime. 


Additionally, the ententes with China and Iran that Obama negotiated were overturned, causing a massive upswing in the number of Iranian and Chinese hacks of American systems. China began targeting its own citizens with digital surveillance even more thoroughly than previously, making it illegal for Chinese hackers to report zero-days to anyone but the government. In the months preceding the 2020 election, Russian hacks caused chaos by targeting hospitals and holding the digital infrastructure of entire towns hostage. Their propaganda teams also sowed chaos and dissent in online American forums, just as they did prior to the 2016 election. Instead of condemning this interference, Trump supported a blatantly false conspiracy theory that blamed the hacks and disruption on Ukraine. Despite this obfuscation, Trump was ousted from office on election day.

Part 7 Analysis

By invoking the image of a “boomerang,” the Australian weapon famous for returning to the hand of its thrower, Perlroth highlights the fact that with the rise of the latest developments in cyberwarfare, America (the nation that first developed and deployed cyberweapons) has ironically become the target of its own tools. Just as a boomerang returns to its user, the tools and methods that the USA created have come back to plague the nation. The quote preceding this part was originally voiced by civil rights leader Martin Luther King Jr., who proposed that the Old Testament retributive justice of “An eye for an eye” only results in everyone becoming blind. This quote hints at Perlroth’s own attitude toward justice, implying that escalation and retribution in the field of cyberwarfare will only leave the world in worse circumstances. In light of her extensive examples on the threats of cyberwarfare, the quote is essentially her plea for forgiveness and restraint, especially given the increasingly hostile relations that arose both within the USA and between the USA and other nations during the first Trump presidency.


In her quest to promote The Responsibility to Safeguard Digital Infrastructure, the author discusses the very real threats that unrestrained hacking poses to critical systems. Although some responsibility to protect American infrastructure has been taken by government departments and corporations, these groups still contribute to the vulnerabilities in the systems, either through vice or carelessness. Perlroth’s discussions of foreign policy under the Trump administration therefore center on The Role of Hacking in Modern International Relations and Conflicts. Even when the those in charge refuse to acknowledge or address hacking activities, the hacks still affect international relations and conflicts, all while acting as a mirror to the attitudes and hostilities that arise between rival nations. 


This final part of the text’s main body ends with an account of the NotPetya attacks on Ukraine, one of the earliest cyberattacks discussed in the book’s Prologue. By returning to this key event at the close of the book, Perlroth creates a sense of finality and completeness to the narrative, as her exhaustive explanations have provided crucial context about the attack itself and the mechanisms by which it was conducted. As a whole, her in-depth analysis is designed to reveal the intricacies of an infinitely treacherous and largely invisible world and explain it to the average layperson, providing enough transparency that a widespread audience will be able to gain a keen understanding of the risks and imminent threats of cyberwarfare between nations. In this light, the title of the novel gains considerable weight, taking on the significance of an ominous prophecy that may yet come true.

blurred text
blurred text
blurred text

Unlock all 61 pages of this Study Guide

Get in-depth, chapter-by-chapter summaries and analysis from our literary experts.

  • Grasp challenging concepts with clear, comprehensive explanations
  • Revisit key plot points and ideas without rereading the book
  • Share impressive insights in classes and book clubs