Click on a thumbnail to go to Google Books.
Loading... The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (original 1989; edition 2005)by Cliff Stoll (Author)
Work InformationThe Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Clifford Stoll (1989)
Loading...
Sign up for LibraryThing to find out whether you'll like this book.
This was a fun read. As an IT professional, especially years down the road, it’s interesting to look back at the roots of many of the issues we deal with today. But mostly it’s just an interesting story of a guy using whatever meager tools he could scrape together to stop someone invading his territory. I can’t say whether a non–IT-type would enjoy it, but I suspect they might. His cheeky tone helps, though I’m sure it would have grown old if the book had been much longer. There’s a great insight near the end, by the way, about the ways that computer hacking has damaged our individual autonomy—precisely the thing most hackers claim they’re trying to defend, in their righteously defensive moments. Stoll’s insights on this actually stand the test of time—they’re at least as true now as they were when he wrote this book. I found this to be an enjoyable true story of tracking a hacker in the early days if the Internet, setting up alarms, putting in traps, and working with numerous agencies and telcos. It was a bit drawn out at times but I still enjoyed it. Good storytelling from a first person perspective of the hunt. no reviews | add a review
Belongs to Publisher SeriesFischer Taschenbuch (13984) Notable Lists
Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB. No library descriptions found. |
Current DiscussionsNonePopular covers
Google Books — Loading... GenresMelvil Decimal System (DDC)364.1680973Social sciences Social problems & social services Criminology Criminal offenses Crimes of propertyLC ClassificationRatingAverage:
Is this you?Become a LibraryThing Author. |
Hacking was seemingly almost unknown at the time and, in essence, nobody in authority really took Stohl seriously when he began to report what was going on.
Recounted in a loose and easygoing style the book is a surprsingly gripping detective story as Stohl almost singelhandedly tracks and battles the determined hacker. We painlessly pick up a basic familiarity with Unix operating systems as we go along.
We learn that computer security was disturbingly lax at the time which was a time of dial-up modems and all manner of now obsolete technologies. These echoes of a bygone era are fascinating in themselves.
The details of Stohl's domestic life are perhaps unnecessary but these do contribute a sense of the man and his social environment which is not unwlecome.
The style of the book, and its tale of early cyber-espionage, are jauntily amateurish - Stohl comes across as a likeable and liberal minded protegé of the Berkeley ethos of the period.
Overall, it's an entertaining yarn which has no pretensions towards literary excellence and provides a relaxing and enjoyable reading experience.