This Is How They Tell Me the World Ends cover art

This Is How They Tell Me the World Ends

The Cyberweapons Arms Race

Preview
Try Premium Plus free
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Unlimited access to our all-you-can-listen catalogue of 15K+ audiobooks and podcasts
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

This Is How They Tell Me the World Ends

By: Nicole Perlroth
Narrated by: Allyson Ryan
Try Premium Plus free

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £16.99

Buy Now for £16.99

About this listen

Bloomsbury presents This Is How They Tell Me the World Ends by Nicole Perlroth, read by Allyson Ryan.

WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021

The instant New York Times bestseller
A Financial Times and The Times Book of the Year

'A terrifying exposé' The Times
'Part John le Carré . . . Spellbinding' New Yorker

We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world’s largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable.

Filled with spies, hackers, arms dealers and a few unsung heroes, This Is How They Tell Me the World Ends is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.©2021 Nicole Perlroth (P)2021 Bloomsbury Publishing Plc
Freedom & Security Politics & Government Espionage National Security Computer Security Hacking Cyber Warfare Scary Thought-Provoking Cybersecurity Russia Military Middle East Government Iran

Listeners also enjoyed...

The Cuckoo's Egg cover art
Countdown to Zero Day cover art
The Ransomware Hunting Team cover art
Ghost in the Wires cover art
If It's Smart, It's Vulnerable cover art
The Art of Invisibility cover art
Cult of the Dead Cow cover art
Social Engineering, Second Edition cover art
The Lazarus Heist cover art
Crime Dot Com cover art
How I Rob Banks cover art
Manipulated cover art
Influence Empire cover art
The Hacker and the State cover art
No Place to Hide cover art
The Fifth Domain cover art
All stars
Most relevant
It's a great title and, bottom line: it's really worth listening to and the narrator is great, playing the roll of tough female investigator in a male world. Yet it suffers from not being edited harder and not developing its story to its full potential. But - full disclosure - I found I edited it quite well by falling asleep in the many repetitive sections. That did it no end of good because the bits I did take in gave me information that everyone should know and add to our big list of things that are going to destroy us. This was never explicitly spelt out, unless I missed it when I was unconscious, but I think what is implied is that some idiot will hack a control system that ACCIDENTALLY starts a nuclear war. Of all the things that will cause the apocalypse CARELESSNESS like that seems to me to be the most plausible human foible to finish us all. It’s a close race though between that and global warming, artificial intelligence and intentional war, though really what is the point of betting on which threat will get us first when there will be no one here to pay out or collect?
So anyway you will learn the idea of ‘Zero Days’ – the point at which software is released to the public (day zero) that has become a pseudonym with the most vulnerable time in the life cycle of software as that is when it hasn’t been publicly tested by a wider world than just the nerd centre that made it and when there are therefore potentially the most undiscovered bugs, or more accurately sections of weak code, that can be exploited. Somehow the term Zero Days has now also mutated into a name for a vulnerable piece of code, a phrase has become a noun, and so there are obviously Zero Days within language itself too, but that’s by the by. You will learn that one common way that software vulnerabilities are exploited is to rewrite little bits of code within software updates - you know the ones we are always being asked to install to make the software better, which is ironic to say the least. And, blow me, the people, the hackers, that can find and exploit these Zero Days can get paid for them handsomely, both so they can be fixed or weaponised, according to which side of the evil equation you are on. Who knew that governments would like to use them as weapons against other governments? There then follows many chapters in which we hear examples of various people selling various Zero Days for various large amounts of money, but essentially it’s just the same thing and the story never develops.
The level at which the information is tackled is pretty superficial at times and a bit suspect in terms of journalistic rigour. For a start Martin Luther King is credited with the brilliant saying ‘ An eye for an eye will make the whole world blind’ when a simple search on Google will confirm that it is a quote generally attributed to Gandhi about thirty years earlier. This level of checking also applies to the story of Stuxnet – the software that was supposed to have brought down the Iranian nuclear programme. I have read about code breakers in Bletchley Park that managed to keep their work secret for over sixty years - so if it is public knowledge, and Stuxnet was general knowledge about a couple of years after its supposed use, somebody probably wants you to know about it or wants you to think you know about it. Stuxnet was a bit of incredibly short code that infected many computerised controllers – not only in Iran, but all over the Middle East and central Asia pretty much simultaneously. It could be that Iran’s anti-virus software just wasn’t as good as other countries and that it wasn’t directly targeted at all. Also it was supposed to have lain dormant and switched itself on at the right moment and off when being scrutinised – very complex things to do with just about 500k of code – is it really possible? – what are the code size vs. complexity of behaviour limits? The author doesn’t know or discuss such theoretical computing concepts, and so misses another important line of evidence. Also it’s reported that 2000 of 70,000 centrifuges were disabled – or 68,000 were still in action – enough to do the job of uranium purification, with only a minor inconvenience one would have thought. It’s not that I am a conspiracy theorist; I don’t think I am anyway, and besides the conventional view of Stuxnet sounds like it could itself stem from conspiracy theory or at least ‘to good to be true’ theory. It’s just that a book of this length demands detailed rigour and we don’t get it.
Most of all I would have liked this book to gradually focus on the possibility of the accidental detonation of nuclear weapons – something it is surely vital to understand for the whole world’s safety, and giving it that much missed story development - but it never delivers on its title – only goes on about the many ways in which people will try to profit from other people’s mistakes. We know. Even so it causes you to think about all the things I've mentioned, which is why it’s well worth listening.

I still don't know how the world ends

Something went wrong. Please try again in a few minutes.

If you're at all interested in how the world works and who deals with who then this is essential listening. It's as much a global politics book as it is a warning about cyber security and our safety in a future where everything is connected.
The book is a post Snowdon milestone, one that can and should be referenced in 10 years time just to keep track of how things have moved on.

Another Piece Of The Jigsaw

Something went wrong. Please try again in a few minutes.

Very good but for more technical view read Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg.

thx to Jack Rhysider from Darknet diaries for recommending

Good history of cyber warfare with context

Something went wrong. Please try again in a few minutes.

As someone with little knowledge of the field, I found this book thorough, well-researched and insightful. It provides a great tale of the people involved, their motives, and how the unwillingness of corporations and governments to consider the longer term consequences of their actions has led us to our current situation. However, I agree with other reviewers that it could be much shorter. The last few hours in particular felt highly repetitive - driving home the message with very little new information. I also found her judgments throughout about which nations are good or bad somewhat frustrating as she is coming from a fully American perspective. Listeners from elsewhere (like myself) might have are more nuanced view of good guys vs bad guys.

Well-researched and insightful but unnecessarily long

Something went wrong. Please try again in a few minutes.

Very informative book. Loved how the author tied the secretive to the publicly known events. It was a bit of a wake up call.

Where do I hide?

Something went wrong. Please try again in a few minutes.

See more reviews