2021-03-10 00:00:00

Books|Securityarms|attack|breach|cyber|hacker|race|software|weapon|zero-day

We are doomed: cyber arms race affects our daily life and work

The book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race is both fabulously entertaining and scary to read. The author, The New York Times journalist Nicole Perlroth, spent seven years researching and talking to hackers, security business leaders, and national intelligence officers. She wanted to understand how the world of hacking, cyber spying and attacking computer systems works. Well, it works. And it reaches everywhere.

No computer expertise is required to read the book, all technical concepts are explained. The key lead the author follows in the book is zero-day flaws in computer software. A zero-day means an error in software that lets experts to exploit it freely because no patches for the error exist yet. Usually, the software or hardware vendor is not yet aware of the error.

In the early days of hacking, people who were the first to discover an error in commercial software tried to inform the vendor or posted the information on an online forum. This changed when a hacker realized the high value of the information. Market for trading zero-day information was gradually established. Today, sellers, middlemen, and buyers operate behind the scenes, but as described in the book, a single zero-day can be valued at million dollars today.

A hacker who discovers an error in software, and realizes it is a zero-day, can sell the information to the highest bidder. Even more money can be made from the same zero-day flaw if the hacker or today, often a business, develops a software package that lets the buyer to exploit the zero-day for breaking into computer systems.

Who are the buyers who can pay thousands or even million dollars for cyber weapon information and tools? Sure, buyers can be criminals who have their own motives for using the information, for instance, for breaking in to a hotel booking system, locking it down, and demanding a ransom. Yet, the big money and the most potential buyers for attack tools are national intelligence agencies. It is the market the book primarily examines.

The biggest breaches in the history of computer security have been executed by national military forces or intelligence agencies. They have the resources - money, educated workforce, computers, code of conduct - to run operations that can take years to complete.

The entertaining aspect of the book is the stories of hackers who let the author glimpse into their secret world. The author has been able to compose a narrative of some the world's greatest hacks. My favorite stories were:

  • Electronic typewriters in the US Moscow Embassy were hacked. It was discovered in 1984. The IBM Selectric machines sent everything that was typed to a nearby recording post outside the embassy. The typewriters had an additional wire and radio transmitter to suck information right from the source. Similar idea was used later by NSA when the agency tapped directly into intercontinental data cables.
  • The incredible story of Stuxnet worm that made its way to Iranian nuclear plant and managed to break machines required for the plant to run. The president of the US blessed the years-long project for creating the software for the attack. The first pieces of information about Stuxnet were published in 2011. We know about it because the program was so resilient that after successful attack in Iran it managed to break out from the plant and spread across the world.
  • Russia's grip over Ukraine's critical infrastructure is strong. Russian hackers have been able to sneak so deep into Ukraine's power plants that they can turn off power in a city they want when they see fit (Christmas seems to be a popular period to do it).

A nasty consequence from selling zero-day exploits to intelligence agencies is that patching serious flaws is often significantly delayed. Agencies want exclusive rights to the zero-days they buy. Meanwhile, other parties can utilize the same flaws in software for breaking into computer systems. The worst scenario is that an intelligence agency loses its hacking tools to a criminal group or another agency that quickly deploys it for its own projects. Such a leak happened at NSA.

The epilogue of the book summarizes the reality of the modern world. The author is talking with David Retz, one of the pioneers of the internet who famously sent the first email message from one computer to another in 1976:

I asked Retz what, if anything, he would take back. His reply was immediate and unequivocal. “Everything can be intercepted,” he told me. “ Everything can be captured. People have no way of verifying the integrity of these systems. We weren’t thinking about this back then. But the fact is,” he added ruefully, “everything is vulnerable.”

keys on laptop keyboard, screen displays program code

What can we do to avoid being accidental targets?

The key points of the book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race are gloomy. The world doesn't run without computers and software that makes the networks and applications work. Unfortunately, there is no such thing as software without errors. It is only a question when and what kind of exploitable holes someone discovers in every piece of software.

What the discoveries presented in Nicole Perlroth's book mean to the rest of us who not in the business of hacking, trading zero days, or exploiting computer vulnerabilities? What can we do? Can we protect ourselves from nasty surprises?

Our computers, tablets, and phones

All computers and mobile devices can be hacked. The book tells the story of Israeli hackers who found a way to do whatever they wanted on Apple iPhones. The sale price of the method was million dollars. No matter which operating system your device has, it is vulnerable one way or the other.

Of course, national intelligence agencies may not be after your computers, but criminals have access to (some of) the same tools. For instance, NSA has leaked them. Criminals that randomly search the internet for vulnerable devices, can try to utilize your computer/mobile device for their own purposes, or lock it down and ask for ransom.

Our cars

The computer system in modern vehicles is a closed system that we are supposed to access only via the dashboard. Since cars are connected to the vendor's network (and in China to the government offices as well) there is a door for possible attacks without having physical access to the vehicle.

Our home network and IoT devices

Hacking Ring door cameras, Wi-fi routers, security cameras and other connected devices at homes has been relatively easy so far. The security of IoT (Internet of Things) devices will improve but there will always be manufacturers who don't care about security.

We don't have to be doomed

Securing your network traffic, updating software regularly, downloading apps from trusted sources only, not clicking links provided in messages received from unknown people, not revealing anything to unknown people who call and request personal information, using long password, and all other, often repeated advice is crucial. It significantly decreases the risk of being a target of a successful attack.

When thinking about this, a fresh perspective can be helpful. Envision the moment you realize you or your business has been hacked. Step by step, backtrack from that desperate moment to this day. Surprising security holes are easily found. I had to screen lock my tablets and phones, remove all personal data from them, and do a number of other, bigger improvements to my computer security after carefully examining all my computing devices, usage routines and habits.

After I had completed my "I have been hacked, now what?" planning process, two things stood out:

  1. Backup everything to multiple locations. Every device that has valuable data should be backed up to an online and offline storage. A backup that is not continuously connected to a computer can't be tampered with, stolen, or locked by criminals.
  2. Store all passwords in a password manager application. This is because every service and device you use has a different password. I only remember one password: the key to the password manager app.

Even if everything goes wrong, and your computing devices are breached, the most valuable thing - your data - can be recovered.

But there are three fortresses on the other side of border.

2025-07-08 16:06:04

But there are three fortresses on the other side of border.


Border town safety net.

2025-07-07 18:24:59

arihak

Border town safety net.


News

2025-07-07 16:16:00

Instead of fumbling with plastic chips, you download a mobile profile directly onto the secure micro-chip already soldered inside most recent phones (think iPhone XR and newer, Google Pixel 3+, Samsung Galaxy S20 series and up). #phone #travelhttps://klaava.com/esim-the-tiny-tech-that-makes-big-adventures-stress-free/


News

2025-07-01 16:15:00

Canyon road is a magnet for cyclists and motorists.#photography #travelphotography #europeflic.kr/p/2rdW4Mfhttps://flic.kr/p/2rdW4Mf


The historic center of Krakow in Poland features castles, churches, palaces ... and tourists.

2025-06-23 13:31:04

The historic center of Krakow in Poland features castles, churches, palaces ... and tourists.


A man with his donkey.

2025-06-19 15:54:21

arihak

A man with his donkey.


News

2025-06-19 15:11:00

An eye-catching place for a painting.#streetphotographyhttps://wordpress.org/photos/photo/9536554ee4/


News

2025-06-15 15:33:00

There are many ways to classify the best countries for road trips, and that is why we are going to take a look at a few different types of ways to select the best here. #roadtrip #Europehttps://klaava.com/which-countries-in-europe-are-the-best-for-road-trips/


News

2025-06-11 16:24:00

Let's go.#streetphotographyflic.kr/p/2r3EuJNhttps://flic.kr/p/2r3EuJN


News

2025-06-04 18:08:00

A #photographer has been using sunglasses with a camera and loudspeakers for 8 months: "I quite enjoy them, and they’ve quickly become my daily wear as far as sunglasses are concerned."https://fstoppers.com/artificial-intelligence/ray-ban-meta-glasses-photographers-perspective-701899


News

2025-06-02 14:42:00

Today, digital nomads recognize the benefits but also risks of their lifestyle. An extensive study among traveling workers reveals the highs and lows of the nomad life. #remotework #digitalnomadhttps://klaava.com/digital-nomads-feel-powered-by-their-lifestyle-but-recognise-inevitable-downsides-as-well/


Aland archipelago

2025-05-30 16:59:41

Aland archipelago


Highway across a swamp.

2025-05-30 11:14:51

arihak

Highway across a swamp.


News

2025-05-26 16:29:00

Flower market, but she is selling fruit trees.#streetphotographyhttps://unsplash.com/photos/TfQ6uYmI9QQ


News

2025-05-22 14:19:00

In Spain, the Balearic government asked influencers to help ease pressure on overcrowded hotspots by promoting less-visited areas. Instead, influencers have unintentionally drawn large crowds of tourists to remote, ecologically sensitive locations. #photography #selfiehttps://petapixel.com/2025/05/21/spanish-islands-ban-influencers-after-4000-tourists-flock-to-tiny-beach-for-selfies/


News

2025-05-18 18:23:00

Most travelers already knew that south Europe is the warm and sunny zone of #Europe, and this ranking confirms it. Spain and Italy have most cities in the top 30, followed by France and Portugal. #travelhttps://klaava.com/sunniest-cities-in-europe/


Popular sight in Sevilla

2025-05-16 17:51:34

Popular sight in Sevilla


News

2025-05-14 16:03:00

Bordeaux is ready for hot summer days.#streetphotographyhttps://pixelfed.social/p/arihak/827854641319295061


Cooling zone.

2025-05-13 12:38:47

arihak

Cooling zone.


Hochosterwitz castle

2025-05-10 15:23:05

Hochosterwitz castle