61 pages • 2-hour read
Nicole PerlrothA modern alternative to SparkNotes and CliffsNotes, SuperSummary offers high-quality Study Guides with detailed chapter summaries and analysis of major themes, characters, and more.
Throughout the book, Perlroth provides a comprehensive analysis of globally significant events that illustrate the ways in which various governments and organizations have used digital espionage to interfere with issues of privacy and civil liberties. Zero-day exploits are commonly used in digital espionage campaigns, and Perlroth cites numerous examples of occasions when American and foreign government agencies used digital tools to spy on their own citizens and on foreign civilians, corporations, and diplomatic targets. For billions of people, everyday life is inextricably entwined with digital activities and devices, and cyberespionage therefore has the potential to provide hostile actors with unprecedented access to sensitive personal data and real-time surveillance information.
Perlroth also conducts an incisive examination of the activities of the NSA, which often works in conjunction with the CIA and stands as the premier intelligence agency of the United States. The NSA’s TAO (Tailored Access Operations) team develops and deploys countless zero-day exploits in both domestic and international espionage activities. Within this context, the 2013 Snowden Leaks showed the agency’s willingness to spy indiscriminately on private citizens and allies, a major violation of the fundamental human right to privacy. The outraged determination with which Silicon Valley tech companies changed their practices to combat government infiltration echoes the public outcry sparked by these revelations.
In addition to critiquing the faults and failures of the United States with regard to digital espionage, Perlroth also bemoans the case of Ahmed Mansoor, whose criticism of Emeriti royalty resulted in years of life-ruining government surveillance and persecution, even prior to his arrest. She then seasons her arguments with a powerful example from her own experience; when she personally broke the story of the Mexican president’s illegal hacking of critics and opponents, she consequently became a target of digital espionage herself. Thus, by combining broader analyses of key events with concrete evidence of her own expertise, Perlroth builds a strong case in support of her desire to reform modern approaches to cybersecurity.
To further illustrate the global impact of digital espionage, Perlroth also examines China’s corporate espionage practices in America, which were honed on Chinese citizens first, with the goal of suppressing “undesirable” minorities known as the Five Poisons. As Perlroth notes, the targeting of individual dissidents and demographics erodes the civil liberties of all citizens because it discourages dissent and opposition to the ruling powers. It also makes targets vulnerable to persecution, blackmail, and acts of violence. Privacy is a fundamental human right that protects the most vulnerable in society from the whims of the powerful, and Perlroth uses a variety of concrete examples to illustrate this point, as when she outlines the unequal need for secrecy in conservative Alabama (239).
However, Perlroth also shows that digital espionage can be used to defend civil liberties. For example, hacktivist Sinan Eren used hacking to gain intel on the movements of Turkish law enforcement in order to help his fellow Kurds escape persecution and detention. Espionage tools can also be used to access classified information, such as harmful government policies and activities, and leaking this information to the public can prompt reform. However, such leaks can also have an indirectly detrimental effect on civil liberties, as when the Shadow Brokers unleashed tools for oppression into the world. Ultimately, Perlroth aptly describes the tool of digital espionage as a double-edged sword that can either promote certain benefits or wreak widespread harm.
In today’s highly digitized and globalized world, hacking plays a major role in international relations. It is both a source of conflict between nations and a means by which nations interact with each other. Zero-day exploits can be made into tools or weapons, and at the very center of This Is How They Tell Me the World Ends is Perlroth’s belief that hacking has the potential to cause unprecedented destruction on a global level.
As her text acknowledges, espionage has always played a part in international relations; ever since the Cold War, information security has been a major concern for government agencies involved in intelligence work. Hacking is one of the major sources of foreign intelligence for government agencies like the NSA, and intelligence reports from these agencies naturally guide—or at least influence—foreign policy. State-sanctioned hacking activities can also cause international conflicts; a prime example can be found in Chapters 14 and 18, which explain the tension in Sino-American relations following certain Chinese corporate espionage campaigns. Similarly, when efforts to hack allies are revealed, such incidents can cause significant cooling in diplomatic relations, as was the case when the 2013 Snowden Leaks revealed the NSA’s efforts to hack the German Chancellor, Angela Merkel.
Hacking can also function as a means for hostile nation-states to attack each other without the need for conventional weapons. For example, North Korea and Iran both have difficulty competing with their enemies—particularly the global superpower that is America—in terms of nuclear weaponry, firepower, or wealth. As such, cyberwarfare is a method of international conflict that is uniquely suited to their more limited circumstances. Hacking allows less powerful nations to strike major global powers without taking on the perils or restrictions of conventional warfare. Even powerful nations use hacking as a means of resolving conflicts violently but with less risk of reprisals or escalation. For example, as Chapter 9 details, the USA deployed the Stuxnet cyberweapon against Iranian nuclear facilities partly to dissuade Israeli armed forces from bombing the facilities in an unequivocal act of war.
Hacking is a particularly major tool in the arsenal of Russian government agencies aiming to exert influence abroad. An organized state-sponsored campaign of hacking was key to Russian interference with the 2016 US election, most notably in the leaking of Democratic National Convention emails. Additionally, Perlroth notes that Russian incursion into critical digital infrastructure across America is a major pressure point deterring the USA from any acts of aggression against Russia. In the context of the war between Ukraine and Russia, Russia’s “NotPetya” attacks and other hacking activities against Ukraine were conducted in conjunction with other conventional acts of war such as bombings and invasion. By invoking these disparate examples, Perlroth creates a comprehensive overview of hacking as a dangerous and often volatile tool in the present-day conflicts between rival and enemy nations.
Perlroth is unequivocal about the need to safeguard digital infrastructure, predicting that hacking—if left unchecked—will be the means by which the world “ends.” She assigns responsibility for this state of affairs to the various individuals, institutions, and agencies involved in promoting irresponsible defensive practices in the cybersphere, and she also identifies those from whom American systems should be safeguarded. Her frank appraisal is intended to galvanize a widespread audience into action, and her epilogue accordingly outlines the steps that are necessary to protect the digital infrastructure of America.
Throughout the main body of the text, Perlroth refrains from assigning outright responsibility to specific groups or individuals; instead, she showcases those who have chosen to take up that responsibility of their own volition and those who have not. Many individuals hackers involved in the zero-day market—such as the young Argentinians described in Chapter 17—work without any sense of responsibility for the potential damage that their exploits could cause. They provide offensive tools and only deal with safeguarding from the perspective of someone who is trying to circumvent it.
Similarly, government agencies such as the NSA and digital penetration companies like VRL are responsible for the development of tools that actively endanger digital infrastructure. This dynamic is made abundantly clear in Perlroth’s descriptions of the use of leaked NSA tools like EternalBlue in the cyber-sabotage attacks following the Shadow Brokers leaks. Many major tech companies were initially ambivalent about their own responsibility to secure the critical systems supported by their products, as evidenced by Facebook’s dubious motto of “move fast and break things.” However, in the wake of several devastating and highly publicized attacks in the late 2000s and early 2010s, many major corporations began taking concrete steps to improve their security. Part 5 covers some of their most significant efforts, including Google’s “Project Zero” research venture and the collective “HackerOne” reporting platform.
Within the US government, the responsibility to safeguard digital infrastructure falls to the Department of Homeland Security, whose information security teams are chronically understaffed and underfunded in comparison to their offensive counterparts at the NSA. In Perlroth’s Epilogue, she identifies concrete steps that should be taken to improve the capabilities of defensive information security agencies in government, and she also suggests ways to protect the infrastructure from individual and corporate angles. Her argument is centered around the fact that everyone in the world will be affected by the ramifications of major cyberattacks that go unmitigated and unimpeded; by this logic, responsibility for taking action falls on anyone with the ability to do so. Perlroth herself has taken up the mantle of responsibility, both publishing This Is How They Tell Me the World Ends as an educational tool and by leaving her career in journalism to work directly in the information security sector.



Unlock every key theme and why it matters
Get in-depth breakdowns of the book’s main ideas and how they connect and evolve.