Audiobook12 hours
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Written by Cliff Stoll
Narrated by Will Damron
Rating: 4.5 out of 5 stars
4.5/5
()
About this audiobook
Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping"-Smithsonian.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Related to The Cuckoo's Egg
Related audiobooks
Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Coders at Work: Reflections on the Craft of Programming Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5The Pattern on The Stone: The Simple Ideas That Make Computers Work Rating: 4 out of 5 stars4/5Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Weaving the Web Rating: 4 out of 5 stars4/5Life in Code: A Personal History of Technology Rating: 4 out of 5 stars4/5Artificial Unintelligence: How Computers Misunderstand the World Rating: 4 out of 5 stars4/5HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5The World's Most Dangerous Geek: And More True Hacking Stories Rating: 4 out of 5 stars4/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5
Politics For You
Enough Rating: 4 out of 5 stars4/5Leave the World Behind: A Novel Rating: 3 out of 5 stars3/5The Warmth of Other Suns: The Epic Story of America's Great Migration Rating: 5 out of 5 stars5/5The 48 Laws of Power Rating: 5 out of 5 stars5/5All the Sinners Bleed: A Novel Rating: 5 out of 5 stars5/5The Overstory Rating: 4 out of 5 stars4/5Behold a Pale Horse Rating: 5 out of 5 stars5/5Black AF History: The Un-Whitewashed Story of America Rating: 5 out of 5 stars5/5Jesus and John Wayne: How White Evangelicals Corrupted a Faith and Fractured a Nation Rating: 5 out of 5 stars5/5Elon Musk Rating: 5 out of 5 stars5/5The Radium Girls: The Dark Story of America's Shining Women Rating: 4 out of 5 stars4/5Cobalt Red: How the Blood of the Congo Powers Our Lives Rating: 5 out of 5 stars5/5The Kingdom, the Power, and the Glory: American Evangelicals in an Age of Extremism Rating: 5 out of 5 stars5/5Out of the Wreckage Rating: 4 out of 5 stars4/5The Only Plane in the Sky: An Oral History of September 11, 2001 Rating: 5 out of 5 stars5/5While Time Remains: A North Korean Girl's Search for Freedom in America Rating: 4 out of 5 stars4/5The Color of Law: A Forgotten History of How Our Government Segregated America Rating: 5 out of 5 stars5/5An Indigenous Peoples' History of the United States Rating: 4 out of 5 stars4/5Dragonfire: Four Days That (Almost) Changed America Rating: 4 out of 5 stars4/5The Vision of the Anointed: Self-congratulation as a Basis for Social Policy Rating: 5 out of 5 stars5/5You Can't Joke About That: Why Everything Is Funny, Nothing Is Sacred, and We’re All in This Together Rating: 4 out of 5 stars4/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5Razorblade Tears: A Novel Rating: 5 out of 5 stars5/5The Cult of Trump: A Leading Cult Expert Explains How the President Uses Mind Control Rating: 4 out of 5 stars4/5Blackout: How Black America Can Make Its Second Escape from the Democrat Plantation Rating: 4 out of 5 stars4/5Manufacturing Consent: The Political Economy of the Mass Media Rating: 4 out of 5 stars4/5Small Mercies: A Novel Rating: 4 out of 5 stars4/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5An American Marriage: A Novel Rating: 4 out of 5 stars4/5
Reviews for The Cuckoo's Egg
Rating: 4.6909090909090905 out of 5 stars
4.5/5
55 ratings3 reviews
- Rating: 5 out of 5 stars5/5Wow, I could not stop until I finished. Great information.
2 people found this helpful
- Rating: 5 out of 5 stars5/5Exciting from beginning to end! I highly recommend this book!
1 person found this helpful
- Rating: 5 out of 5 stars5/5How big corporations ( in the early age of modern computing) ignorance on cyber security allowed cyber criminals to penetrate and steal highly classified information without even noticing .
Crime doesn’t pay but it surely gets highly rewarded when gets away with classified information.
Love this book , and how one guy with a little computer knowledge, single handed uncovered a ring of cyber criminals, with the FBI hesitation of course, helped him to finally uncovered the elusive Ring of early internet Hackers.