The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
by Cliff Stoll
Paperback: 399 pages
Publisher: Pocket Books
List Price: $16.99
Your Price: $10.61
Availability: Usually ships in 24 hours
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
A sentimental favorite, The Cuckoo's Egg seems to have inspired a whole category of books exploring the quest to capture computer criminals. Still, even several years after its initial publication and after much imitation, the book remains a good read with an engaging story line and a critical outlook, as Clifford Stoll becomes, almost unwillingly, a one-man security force trying to track down faceless criminals who've invaded the university computer lab he stewards. What first appears as a 75-cent accounting error in a computer log is eventually revealed to be a ring of industrial espionage, primarily thanks to Stoll's persistence and intellectual tenacity.
- Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
- Secrets and Lies: Digital Security in a Networked World
- Cyber War: The Next Threat to National Security and What to Do About It
- Computer and Information Security Handbook, Second Edition
Scribendi offers Books and Software in association with Amazon.com. Portions copyright Amazon Inc. and its affiliates used under license.