The Cuckoo’s Egg

Tracking a Spy Through the Maze of Computer Espionage

Paperback, 399 pages

English language

Published Sept. 13, 2005 by Pocket.

ISBN:
978-1-4165-0778-9
Copied ISBN!

View on OpenLibrary

4 stars (8 reviews)

In the days when the presence of a computer did NOT presume the presence of a network (they used to be freestanding units that could not easily communicate with another system), accounts to use the computer were expensive to maintain and heavily scrutinized by management. When the Accounting staff of Stoll's university employer discovered 75 cents' worth of time used with which no user was associated, they called him and demanded that he locate the "phantom" user. Stoll wasn't even a computing pro - he was an astronomer that used the computer to run programs that pointed telescopes properly. But he was a member of a club that exists today - that person elected to do network administration because he drew the short straw. Stoll tells the ensuing circa 1985 tale of analysis when people worldwide were only just discovering what networks could reveal... and hide. Rather like today.

12 editions

Engrossing Read On the History of Cybersecurity Incident Response

4 stars

I've had this book recommended to me personally as well on several lists of "cybersecurity books everyone should read" so I finally got around to reading it.

The story, while slightly repetitive, unfolds in a first person, linear style. I found the book easy to read, and while the cybersecurity ideas presented seems commonplace today, I think they were probably groundbreaking when the book came out.

I found it fascinating that Cliff's use of a logbook, external monitoring systems, a pager, a very early form of a "canary token," and a few other technical ideas are still in use today. (OK, maybe not the pager exactly but lots of IT people get text alerts on their phones!)

His inability to get any help from the 3 Letter Federal Agencies was not surprising. It took 9/11 to fix some of those communication problems (but not all from what I understand).

Anyways, …

Subjects

  • Security - General
  • Political Science
  • Computer Crime
  • Intelligence Agencies
  • True Crime / Espionage
  • Literary Criticism
  • Politics/International Relations
  • Conspiracy & Scandal Investigations
  • Espionage
  • Political Freedom & Security - Intelligence

Lists