The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Cuckoo's Egg Tracking a Spy Through the Maze of Computer Espionage Author:Clifford Stoll, Cliff Stoll Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dr... more »amatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.« less
The Market's bargain prices are even better for Paperbackswap club members!
Retail Price:$16.99 Buy New (Paperback): $13.29 (save 21%) or Become a PBS member and pay $9.39+1 PBS book credit (save 44%)
tani reviewed The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage on
Non-fiction. A new worker at a huge central computer at a Berkeley lab was given the job of finding out why user accounts were out by 75 cents. He ended up in a hunt for a hacker who was using the Californian computer to infiltrate dozens of other systems with an aim that was very dangerous to U.S. security. This is a gripping thriller, all the better because it is true.
The author is "an astronomer by training and a computer security expert by accident."
An odd-sounding title to be sureuntil you learn its derivation and how it relates to a book about computer espionage in the dark ages of dial-up, 1200 baud modems and DEC VAX mainframes. But, just because the book deals with events that took place twenty-two years ago, hardly makes it irrelevant. Even now, notwithstanding that technology has vastly overtaken what was high tech in 1986, Cliff Stolls exacting scientific method of tracking a spy through the maze of computer espionage is surprisingly current and most entertaining reading. The Chicago Times called it A true spy thriller . . . . the hunt is gripping. And, the Seattle Times adds: Fascinating . . . . A nonfiction account that reads like a Le Carré spy novel. I heartily agree!
EXCELLENT book. Great example of how the smallest of errors, often overlooked, actually signify a great danger. very interesting book and a must read for anyone interested in IT systems security. Highly recommend. Great thirller, especially considering it is based on true facts. Enjoyed it from cover to cover.