Audiobook12 hours
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Written by Cliff Stoll
Narrated by Will Damron
Rating: 4.5 out of 5 stars
4.5/5
()
About this audiobook
Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping"-Smithsonian.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Related to The Cuckoo's Egg
Related audiobooks
Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Alice and Bob Learn Application Security Rating: 5 out of 5 stars5/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5ETHICAL HACKING FOR BEGINNERS: HOW TO BUILD YOUR PEN TEST LAB FAST Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Coders at Work: Reflections on the Craft of Programming Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5The Pattern on The Stone: The Simple Ideas That Make Computers Work Rating: 4 out of 5 stars4/5Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Weaving the Web Rating: 4 out of 5 stars4/5Life in Code: A Personal History of Technology Rating: 4 out of 5 stars4/5Artificial Unintelligence: How Computers Misunderstand the World Rating: 4 out of 5 stars4/5HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass Rating: 4 out of 5 stars4/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5The World's Most Dangerous Geek: And More True Hacking Stories Rating: 4 out of 5 stars4/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5
Politics For You
All the Sinners Bleed: A Novel Rating: 5 out of 5 stars5/5Behold a Pale Horse Rating: 5 out of 5 stars5/5The 48 Laws of Power Rating: 5 out of 5 stars5/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5You Can't Joke About That: Why Everything Is Funny, Nothing Is Sacred, and We’re All in This Together Rating: 4 out of 5 stars4/5The Radium Girls: The Dark Story of America's Shining Women Rating: 4 out of 5 stars4/5An Indigenous Peoples' History of the United States Rating: 4 out of 5 stars4/5Cobalt Red: How the Blood of the Congo Powers Our Lives Rating: 5 out of 5 stars5/5The Nazi Conspiracy: The Secret Plot to Kill Roosevelt, Stalin, and Churchill Rating: 4 out of 5 stars4/5The Vision of the Anointed: Self-congratulation as a Basis for Social Policy Rating: 5 out of 5 stars5/5How to Hide an Empire: A History of the Greater United States Rating: 5 out of 5 stars5/5Jesus and John Wayne: How White Evangelicals Corrupted a Faith and Fractured a Nation Rating: 5 out of 5 stars5/5Razorblade Tears: A Novel Rating: 5 out of 5 stars5/5The Color of Law: A Forgotten History of How Our Government Segregated America Rating: 5 out of 5 stars5/5The Overstory Rating: 4 out of 5 stars4/5The Cult of Trump: A Leading Cult Expert Explains How the President Uses Mind Control Rating: 4 out of 5 stars4/5The Righteous Mind: Why Good People Are Divided by Politics and Religion Rating: 5 out of 5 stars5/5While Time Remains: A North Korean Girl's Search for Freedom in America Rating: 4 out of 5 stars4/5Elon Musk Rating: 5 out of 5 stars5/5The Kingdom, the Power, and the Glory: American Evangelicals in an Age of Extremism Rating: 5 out of 5 stars5/5The Only Plane in the Sky: An Oral History of September 11, 2001 Rating: 5 out of 5 stars5/5People Love Dead Jews: Reports from a Haunted Present Rating: 5 out of 5 stars5/5Small Mercies: A Novel Rating: 4 out of 5 stars4/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5Leave the World Behind: A Novel Rating: 3 out of 5 stars3/5Black AF History: The Un-Whitewashed Story of America Rating: 5 out of 5 stars5/5American Nations: A History of the Eleven Rival Regional Cultures of North America Rating: 4 out of 5 stars4/5
Reviews for The Cuckoo's Egg
Rating: 4.6909090909090905 out of 5 stars
4.5/5
55 ratings3 reviews
- Rating: 5 out of 5 stars5/5Wow, I could not stop until I finished. Great information.
2 people found this helpful
- Rating: 5 out of 5 stars5/5Exciting from beginning to end! I highly recommend this book!
1 person found this helpful
- Rating: 5 out of 5 stars5/5How big corporations ( in the early age of modern computing) ignorance on cyber security allowed cyber criminals to penetrate and steal highly classified information without even noticing .
Crime doesn’t pay but it surely gets highly rewarded when gets away with classified information.
Love this book , and how one guy with a little computer knowledge, single handed uncovered a ring of cyber criminals, with the FBI hesitation of course, helped him to finally uncovered the elusive Ring of early internet Hackers.