This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

99,00 EGP

Description

Price: $0.99
(as of Dec 06,2024 10:26:37 UTC – Details)


Customers say

Customers find the information in the book great, deep, and well-documented. They describe the book as a worthwhile read that reads like a spy novel. Readers praise the writing style as great, easily understandable, and suspenseful. They also say the story is riveting and authentic. However, some customers feel the reporting quality is a mess and too technical at times.

AI-generated from the text of customer reviews

This Post Has 10 Comments

  1. Gripping Story
    This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth“This Is How They Tell Me the World Ends” tells the gripping story of a new form of warfare that takes place in the digital realm and its impact on society. New York Times Bestselling author Nicole Perlroth provides readers with an eye-opening look into the cyberweapons race and our vulnerabilities. This fascinating 505-page book includes twenty-three chapters broken out by the following seven parts: I. Mission Impossible, II. The Capitalists, III. The Spies, IV. The Mercenaries, V. The Resistance, VI. The Twister, and VII. Boomerang.Positives:1. An exhaustively researched, well-organized book that reads like a spy novel.2. The fascinating topic of cybersecurity.3. The writing style is engaging and keeps your interest.4. Defines key hacking terms such as zero-days, which are basically a software or hardware flaw for which there is no existing patch. They are called zero-days because the victims or good guys have zero days to fix them.5. It provides a lot of insights into investigative journalism. Perlroth is a part of the story as she relates the challenges she faced to uncover the cybersecurity world. “The first rule of the zero-day market was: Nobody talks about the zero-day market. The second rule of the zero-day market was: Nobody talks about the zero-day market. I’d posed this question many times, and I knew it was the one question nobody in this business would answer.”6. Does a great job of describing the hackers, their sponsors (if they have any) and state sponsors. “The New Hacker’s Dictionary, which offers definitions for just about every bit of hacker jargon you can think of, defines hacker as “one who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.””7. Describes how hacking companies operate. “In the mid-1990s Sabien’s team started trafficking in digital access, searching for bugs and exploiting them for customers. The bulk of his company’s revenues—more than 80 percent—came from the Pentagon and intelligence agencies, with the remainder from law enforcement and other U.S. government agencies. The goal was to deliver their government customers secret tried-and-tested ways into every system used by the adversary, be it nation-states, terrorists, or low-level criminals.”8. The purpose behind the zero-days. “Once his zero-day was in the agency’s hands, they could use it to spy on whomever they chose. In the United States, the likeliest targets were terrorists, foreign adversaries, or drug cartels, but there were never any guarantees that very same zero-day wouldn’t come back to haunt you.”9. Uncovering the world of spies. “I asked nearly every single one of the men who guided the CIA and NSA through the turn of the century to name the father of American cyberwar, and none hesitated: “Jim Gosler.””10. Great quotes that must be shared. “Organizations can’t stop the world from changing. The best they can do is adapt. The smart ones change before they have to. The lucky ones manage to scramble and adjust, when push comes to shove. The rest are losers, and they become history.”11. Defines the role of the TAO (Tailored Access Operations) unit inside the NSA. “In the aftermath of 9/11, these hundreds turned to thousands as TAO accelerated its breaking-and-entering mission around the globe, through a combination of brute-force hacking, cracking passwords and algorithms, finding zero-days, writing exploits, and developing implants and malware that bent hardware and software to their will. Their job was to find every crack in every layer of the digital universe and plant themselves there for as long as possible.”12. Describes the role of hacking with regards to the Natanz Nuclear Facility in Iran. “By late 2008 the joint operation known as Olympic Games had infiltrated Natanz’s PLCs, and nobody appeared to suspect a cyberattack.”13. Global hacking described. “The NSA was finding evidence that Russian hackers were tampering with the same routers and switches it had exploited for years. Chinese hackers were breaking into American telecoms and internet companies and stealing passwords, blueprints, source code, and trade secrets that could be used to exploit these systems for their own ends.”14. Describes some of the stars of cybersecurity. “Inside the agency, these men had been revered as “the Maryland Five,” and time and time again, they had proved indispensable. They were each members of a premier TAO access team that hacked into the systems nobody else could. If the target was a terrorist, an arms dealer, a Chinese mole, or a nuclear scientist, you wanted the Five on it. Rarely was there a system, or a target, they could not hack.”15. Describes what happens when hackers attack corporations. “It was time to call in the specialists. Google’s first call was to a cybersecurity shop in Virginia called Mandiant. In the messy world of security breaches, Mandiant had carved out a niche for itself responding to cyberattacks, and was now on the speed dial of nearly every chief information officer in the Fortune 500.”16. Describes famous hacks. “The Chinese had been inside OPM’s systems for more than a year by the time they were discovered in 2015.”17. The impact of Snowden’s revelations. “Without the companies’ knowledge or cooperation, the Snowden revelations that fall showed that the NSA, and its British counterpart, GCHQ, were sucking up companies’ data from the internet’s undersea fiber-optic cables and switches.”18. Cyber wars. “Three years after the United States and the Israelis reached across Iran’s borders and destroyed its centrifuges, Iran launched a retaliatory attack, the most destructive cyberattack the world had seen to date. On August 15, 2012, Iranian hackers hit Saudi Aramco, the world’s richest oil company—a company worth more than five Apples on paper—with malware that demolished thirty thousand of its computers, wiped its data, and replaced it all with the image of the burning American flag.”19. Describes American vulnerabilities. “Their letter was blunt: “Virtually all of our civilian critical infrastructure—including telecommunications, water, sanitation, transportation, and health care—depend on the electric grid. The grid is extremely vulnerable to disruption caused by a cyber or other attack. Our adversaries already have the capability to carry out such an attack.”20. The impact of Stuxnet (computer worm responsible for the destruction of Iranian centrifuges). “Stuxnet had inspired dozens of other countries to join the zero-day hunt, and the United States was losing control over the market it had once dominated.”21. Describes many attacks and the impact of misspelling. “North Korea’s hackers had been caught—but never punished—for major cyber heists at banks in the Philippines, Vietnam, and at the Bangladesh Central Bank, where they’d made a $1 billion transfer request from the New York Federal Bank. Only a spelling error (they’d misspelled foundation as “fandation”) had kept bankers from transferring the full billion, but they’d still made off with $81 million, among the largest bank heists in history. WannaCry was the next evolution in North Korea’s efforts to generate badly needed income.”22. The impact of hacks. “China was decades behind the United States in nuclear weapons development, but thanks to Legion Amber, it had stolen everything it needed to catch up. In 2018, U.S. officials watched in horror as Beijing successfully tested a new submarine-launched ballistic missile and began moving ahead with a new class of subs that could be equipped with nuclear-armed missiles.”23. An excellent Epilogue that describes defenses against hacks. “So-called “password-spraying attacks” have surged in the past three years, in which hackers try common passwords (e.g. “password”) across multiple user accounts. It’s not rocket science, but it’s insanely effective. Password-spraying is all it took for Iranian hackers, working at the behest of the IRGC, to break into thirty-six private American companies, multiple U.S. government agencies, and NGOs. Multifactor authentication is the best defense against these attacks.”24. Notes included.Negatives:1. This book was begging for some key supplementary material but to no avail. I can think of many examples. I would have added a table of state sponsored hacking and their main goals. Another would be list of the top hackers in the world and their strengths. List of the biggest known hacks in the world.2. No formal bibliography.3. At around 400 pages of main narrative, it will require an investment of your time.4. With so many players and intersecting stories involved it can be easy to lose yourself.5. A glossary would have been helpful.In summary, this is an excellent book that describes the vulnerabilities of our digital world and how the modern arms race have moved away from the sea and air to said digital world. Perlroth identifies the major players and countries involved in the cybersecurity arena and what their main goals are. It also tells the story of how the US had become the world’s stockpiler of zero days and lost control of it. It reads like a spy novel but it’s real global warfare taking place in our digital realm with real-life consequences. Lack of supplementary material aside, I highly recommend this book.Further recommendations: “Cyber War” by Richard A. Clark, “The Personal Cybersecurity Manual” by Marlon Buchanan, “The Hacker and the State” by Ben Buchanan, “The Smartest Person in the Room” by Christian Espinosa, “Hunting Cyber Criminals” by Vinny Troia and “Social Engineering: The Science of Human Hacking.

  2. Great book on the rangers facing cyber space and of information!
    This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth is a compelling and informative exploration of the growing threat of cyber warfare. Perlroth, a seasoned investigative reporter, skillfully guides readers through the complex world of digital espionage, hacking, and the potential for catastrophic cyberattacks.The book offers a fascinating glimpse into the shadowy world of cyber criminals and nation-states engaged in digital warfare. Perlroth’s engaging writing style makes even the most technical concepts accessible to a general audience. She delves into high-profile cyberattacks, such as the Stuxnet worm and the SolarWinds hack, providing a detailed analysis of their impact and implications.Overall, *This Is How They Tell Me the World Ends* is a must-read for anyone interested in understanding the evolving landscape of cyber threats and the urgent need for global cooperation to address them.

  3. Solid glimpse into cyber-weapon history, exploitation, and potential future consequences.
    Great history of espionage, secret gathering, hacking, zero-day exploitation, and world events over the past few decades. Working in technology sales for the past 30 years, I can say that getting people to not only understand but address threats is a huge challenge. The author states “the cost of doing nothing now outweighs the cost of doing something” – I agree with this 100% – we see it all day everyday – in our all the businesses and entities we interact with. If you enjoyed Andy Greenberg’s Sandworm, this is a deeper dive into those groups and much more. Well written and well researched – easy to read. Could have definitely cut down the content a bit as some gets to be repetitive, and the main reason I knocked this down to 4 stars is b/c the author has obvious disdain for Trump – just totally unnecessary – stay focused on the topic. My personal thoughts are that no individual leader is solving this problem (or making it worse) – you have criminal enterprise making big bucks off these exploits, not to mention nation-state snooping – two things that WILL NOT STOP – have been around in one form or another since the dawn of humanity. The epilogue has some solid advice that is widely known in our industry – unfortunately, not widely implemented. There is much room for improvement in this field at an individual and corporate level – although so much of the software and hardware in use is global, it is good to see that there are certain countries making a concerted effort to build a culture of cybersecurity – raise the tide of all boats with better cyber-hygiene (would love to set that happen in the US along with a focus on health).

  4. Educational and Terrifying
    I love this book. I have learned so much about the history of cybersecurity, the culture and evolution of hacking, and how vulnerable we really are. It is eye opening. The writing style is like a suspense novel. I complete page turner. I almost feel like this should be mandatory reading for anyone under the age of 30. This is the world we are leaving them to wade through and protect.

  5. Definitely a good read
    Cyber attacks seem to be increasing. It seems like once a month I receive a notice that my private data has been hacked. The public seems to become cavalier about these attacks. This book is a wake up call. It is more serious than the general public realizes. Occasional disruptions seem to be brushed off. This book tells us this is just a precursor of a huge catastrophe. Selling hacks has become big business. Definitely worth a read.

  6. One of the very best books I have read this year. I fully recommend to understand today’s world or even Ukrainian war.

  7. Insanely well written and well researched book about the history, dangers and current standing regarding the cyber Domain. You’ll find anything from stuxnet to Lazarus Group in it.If you’re interested in this topic or want to know a bit about it, go for it.It’s not really technical at all, so you can easily understand it without having any prior knowledge of the subject

Leave a Reply

Your email address will not be published. Required fields are marked *