Buy new:
$37.80$37.80
Delivery December 18 - 24
Ships from: Amazon Sold by: live love matter
Save with Used - Good
$13.06$13.06
Delivery Saturday, December 13
Ships from: Amazon Sold by: 2nd Life Aloha
Return this item for free
Free returns are available for the shipping address you chose. You can return the item for any reason in new and unused condition: no return shipping charges.
Learn more about free returns.- Go to your orders and start the return
- Select your preferred free shipping option
- Drop off and leave!
Sorry, there was a problem.
There was an error retrieving your Wish Lists. Please try again.Sorry, there was a problem.
List unavailable.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Paperback – October 1, 2000
Purchase options and add-ons
- Print length416 pages
- LanguageEnglish
- PublisherGallery Books
- Publication dateOctober 1, 2000
- Dimensions5.31 x 1 x 8.25 inches
- ISBN-100743411463
- ISBN-13978-0743411462
The chilling story of the abduction of two teenagers, their escape, and the dark secrets that, years later, bring them back to the scene of the crime. | Learn more
Frequently bought together

What do customers buy after viewing this item?
Customers also bought or read
- Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Paperback$14.05$14.05Delivery Tuesday - Ghost in the Wires: My Adventures as the World's Most Wanted Hacker#1 Best SellerComputer Hacking
Paperback$16.99$16.99Delivery Tuesday - This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Paperback$13.21$13.21Delivery Tuesday - Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Paperback$12.61$12.61Delivery Tuesday - Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Paperback$15.96$15.96Delivery Tuesday - The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Paperback$8.99$8.99Delivery Tuesday - Spam Nation: The Inside Story of Organized Cybercrime―from Global Epidemic to Your Front Door
Paperback$19.93$19.93Delivery Fri, Dec 19 - The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Paperback$16.82$16.82Delivery Tuesday - Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
Hardcover$14.59$14.59Delivery Tue, Dec 30 - The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Paperback$21.00$21.00Delivery Tuesday - The Art of Deception: Controlling the Human Element of Security
Paperback$12.50$12.50Delivery Tuesday - Intelligence-Driven Incident Response: Outwitting the Adversary
Paperback$44.94$44.94Delivery Tuesday - Takedown: The Pursuit and Capture of Kevin Mitnick by the Man Who Did It
Hardcover$24.34$24.34Delivery Sat, Dec 20 - Cyber War: The Next Threat to National Security and What to Do About It
Paperback$10.99$10.99Delivery Thursday - Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Paperback$42.97$42.97Delivery Thursday - Silicon Snake Oil: Second Thoughts on the Information Highway
Paperback$10.85$10.85Delivery Wednesday - Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Paperback$19.59$19.59Delivery Tuesday
Editorial Reviews
Review
Chicago Tribune The Cuckoo's Egg is "reader friendly," even for those who have only the vaguest familiarity with computers...a true spy thriller...The hunt is gripping.
The Philadelphia Inquirer Stoll's is the ever-appealing story of the little man bucking the system...great fun to read...lively and thoroughly absorbing.
The Seattle Times Fascinating...a nonfiction account that reads like a le Carré spy novel.
Cosmopolitan Nothing short of fascinating...Even if you don't know a byte from a bagel, The Cuckoo's Egg will grip you on page one and hold you as ferociously as the best mystery...It's the intensely human, often funny voice of the man on the trail that makes this book so wonderful.
The New York Times Book Review As exciting as any action novel...A gripping spy thriller.
New York Newsday Stoll is the electronic equivalent of Indiana Jones...Grab the book.
About the Author
An astronomer by training and a computer expert by accident, Cliff Stoll has become a leading authority on computer security, an issue recognized everywhere as among the most important security problems of our times. He has given talks for the FBI, CIA, and NSA, and has appeared before the U.S. Senate. Stoll is an astronomer at the Harvard-Smithsonian Center for Astrophysics and lives in Cambridge, Massachusetts.
Excerpt. © Reprinted by permission. All rights reserved.
Me, a wizard? Until a week ago, I was an astronomer, contentedly designing telescope optics. Looking back on it, I'd lived in an academic dreamland. All these years, never planning for the future, right up to the day my grant money ran out.
Lucky for me that my laboratory recycled used astronomers. Instead of standing in the unemployment line, I found myself transferred from the Keck Observatory at the Lawrence Berkeley Lab, down to the computer center in the basement of the same building.
Well, hell, I could fake enough computing to impress astronomers, and maybe pick it up fast enough that my co-workers wouldn't catch on. Still, a computer wizard? Not me -- I'm an astronomer.
Now what? As I apathetically stared at my computer terminal, I still thought of planetary orbits and astrophysics. As new kid on the block, I had my choice of a cubicle with a window facing the Golden Gate Bridge, or an unventilated office with a wall of bookshelves. Swallowing my claustrophobia, I picked the office, hoping that nobody would notice when I slept under the desk. On either side were offices of two systems people, Wayne Graves and Dave Cleveland, the old hands of the system. I soon got to know my neighbors through their bickering.
Viewing everyone as incompetent or lazy, Wayne was crossthreaded with the rest of the staff. Yet he knew the system thoroughly, from the disk driver software up to the microwave antennas. Wayne was weaned on Digital Equipment Corporation's Vax computers and would tolerate nothing less: not IBM, not Unix, not Macintoshes.
Dave Cleveland, our serene Unix buddha, patiently listened to Wayne's running stream of computer comparisons. A rare meeting didn't have Wayne's pitch, "Vaxes are the choice of scientists everywhere and help build strong programs twelve ways." Dave retorted, "Look, you keep your Vax addicts happy and I'll handle the rest of the world." Dave never gave him the satisfaction of getting riled, and Wayne's complaints eventually trailed off to a mutter.
Great. First day on the job, sandwiched between two characters who were already ruining my daydreams with their periodic disputes.
At least nobody could complain about my appearance. I wore the standard Berkeley corporate uniform: grubby shirt, faded jeans, long hair, and cheap sneakers. Managers occasionally wore ties, but productivity went down on the days they did.
Together, Wayne, Dave, and I were to run the computers as a lab-wide utility. We managed a dozen mainframe computers -- giant workhorses for solving physics problems, together worth around six million dollars. The scientists using the computers were supposed to see a simple, powerful computing system, as reliable as the electric company. This meant keeping the machines running full time, around the clock. And just like the electric company, we charged for every cycle of computing that was used.
Of four thousand laboratory employees, perhaps a quarter used the main computers. Each of these one thousand accounts was tallied daily, and ledgers kept inside the computer. With an hour of computing costing three hundred dollars, our bookkeeping had to be accurate, so we kept track of every page printed, every block of disk space, and every minute of processor time. A separate computer gathered these statistics and sent monthly bills to laboratory departments.
And so it happened that on my second day at work, Dave wandered into my office, mumbling about a hiccup in the Unix accounting system. Someone must have used a few seconds of computing time without paying for it. The computer's books didn't quite balance; last month's bills of $2,387 showed a 75-cent shortfall.
Now, an error of a few thousand dollars is obvious and isn't hard to find. But errors in the pennies column arise from deeply buried problems, so finding these bugs is a natural test for a budding software wizard. Dave said that I ought to think about it.
"First-degree robbery, huh?" I responded.
"Figure it out, Cliff, and you'll amaze everyone," Dave said.
Well, this seemed like a fun toy, so I dug into the accounting program. I discovered our accounting software to be a patchwork of programs written by long-departed summer students. Somehow, the hodgepodge worked well enough to be ignored. Looking at the mixture of programs, I found the software in Assembler, Fortran, and Cobol, the most ancient of computer languages. Might as well have been classical Greek, Latin, and Sanskrit.
As with most home-brew software, nobody had bothered to document our accounting system. Only a fool would poke around such a labyrinth without a map.
Still, here was a plaything for the afternoon and a chance to explore the system. Dave showed me how the system recorded each time someone connected to the computer, logging the user's name, and terminal. It timestamped each connection, recording which tasks the user executed, how many seconds of processor time he used, and when he disconnected.
Dave explained that we had two independent accounting systems. The ordinary Unix accounting software just stored the timestamped records into a file. But to satisfy some bureaucrat, Dave had built a second accounting system which kept more detailed records of who was using the computer.
Over the years, a succession of bored summer students had written programs to analyze all this accounting information. One program collected the data and stashed it into a file. A second program read that file and figured how much to charge for that session. Yet a third program collected all these charges and printed out bills to be mailed to each department. The last program added up all user charges and compared that total to the result from the computer's internal accounting program. Two accounting files, kept in parallel by different programs, ought to give the same answer.
For a year, these programs had run without a glitch, but weren't quite perfect this week. The obvious suspect was round-off error. Probably each accounting entry was correct, but when added together, tenths of a penny differences built up until an error of 75 cents accumulated. I ought to be able to prove this either by analyzing how the programs worked, or by testing them with different data.
Rather than trying to understand the code for each program, I wrote a short program to verify the data files. In a few minutes, I had checked the first program: indeed, it properly collected the accounting data. No problem with the first.
The second program took me longer to figure out. In an hour I had slapped together enough makeshift code to prove that it actually worked. It just added up time intervals, then multiplied by how much we charge for computer time. So the 75-cent error didn't come from this program.
And the third program worked perfectly. It looked at a list of authorized users, found their laboratory accounts, and then printed out a bill. Round-off error? No, all of the programs kept track of money down to the hundredths of a penny. Strange. Where's this 75-cent error coming from?
0 Well, I'd invested a couple hours in trying to understand a trivial problem. I got stubborn: dammit, I'd stay there till midnight, if I had to.
Several test programs later, I began actually to have confidence in the mishmash of locally built accounting programs. No question that the accounts didn't balance, but the programs, though not bulletproof, weren't dropping pennies. By now, I'd found the lists of authorized users, and figured out how the programs used the data structures to bill different departments. Around 7 P.M. my eye caught one user, Hunter. This guy didn't have a valid billing address.
Ha! Hunter used 75 cents of time in the past month, but nobody had paid for him.
Here's the source of our imbalance. Someone had screwed up when adding a user to our system. A trivial problem caused by a trivial error.
Time to celebrate. While writing this first small triumph into the beginning pages of my notebook, Martha, my sweetheart, stopped by and we celebrated with late-night cappuccinos at Berkeley's Cafe Roma.
A real wizard would have solved the problem in a few minutes. For me, it was unknown territory, and finding my way around hadn't been easy. As a consolation, I'd learned the accounting system and practiced a couple obsolete languages. Next day, I sent an electronic mail message to Dave, preening my feathers by pointing out the problem to him.
Around noon, Dave stopped by to drop off a pile of manuals, and casually mentioned that he had never added a user named Hunter -- it must have been one of the other system managers. Wayne's curt response: "It wasn't me. RTFM." Most of his sentences ended with acronyms, this one meaning, "Read the fucking manual."
But I'd read the manuals. Operators weren't supposed to add a new user without an account. At other computer centers, you just log into a privileged account and tell the system to add a new user. Since we also had to make several bookkeeping entries, we couldn't run such a vanilla system. Ours was complex enough that we had special programs which automatically did the paperwork and the systems juggling.
Checking around, I found that everyone agreed the automatic system was so superior that nobody would have manually added a new user. And the automatic system wouldn't make this mistake.
Well, I couldn't figure out who had made this goof. Nobody knew Hunter, and there wasn't an account set for him. So I erased the name from the system -- when he complained, we could set him up properly.
A day later, an obscure computer named Dockmaster sent us an electronic mail message. Its system manager claimed that someone from our laboratory had tried to break into his computer over the weekend.
Dockmaster's return address might have been anywhere, but signs pointed to Maryland. The e-mail had passed through a dozen other computers, and each had left a postmark.
Dave answered the message with a noncommittal "We'll look into it." Uh, sure. We'd look when all our other problems disappeared.
Our laboratory's computers connect to thousands of other systems over a dozen networks. Any of our scientists can log into our computer, and then connect to a distant computer. Once connected, they can log into the distant computer by entering an account name and password. In principle, the only thing protecting the networked computer is the password, since account names are easy to figure out. (How do you find account names? Just use a phone book -- most people use their names on computers.)
Dockmaster's electronic mail message was a curiosity, and Dave passed it to Wayne, attaching a question, "Who's Dockmaster?" Wayne forwarded it to me with his guess -- "Probably some bank."
Eventually, Wayne bounced the message to me. I guessed Dockmaster was some Navy shipyard. It wasn't important, but it seemed worth spending a few minutes looking into.
The message gave the date and time when someone on our Unix computer tried to log into Dockmaster's computer. So I scrabbled around the accounting files, looking at Saturday morning's records. Again, the two accounting systems disagreed. The stock Unix accounting file showed a user, Sventek, logging in at 8:25, doing nothing for half an hour, and then disconnecting. No timestamped activity in between. Our home-brew software also recorded Sventek's activity, but it showed him using the networks from 8:31 until 9:01 A.M.
Jeez. Another accounting problem. The time stamps didn't agree. One showed activity when the other account said everything was dormant.
Other things seemed more pressing, so I dropped the problem. After wasting an afternoon chasing after some operator's mistake, I wasn't about to touch the accounting system again.
Over lunch with Dave, I mentioned that Sventek was the only one connected when Dockmaster reported the break-in. He stared and said, "Joe Sventek? He's in Cambridge. Cambridge, England. What's he doing back?" Turned out that Joe Sventek had been the laboratory's Unix guru, a software wizard who built a dozen major programs over the past decade. Joe had left for England a year ago, leaving behind a glowing reputation throughout the California computer community.
Dave couldn't believe Joe was back in town, since none of Joe's other friends had heard from him. "He must have entered our computer from some network," Dave said.
"So you think Joe's responsible for this problem?" I asked Dave.
"No way," Dave replied. "Joe's a hacker of the old school. A smart, quick, capable programmer. Not one of those punks that have tarnished the word 'hacker.' In any case, Sventek wouldn't try to break into some Maryland computer. And if he did try, he'd succeed, without leaving any trace."
Curious: Joe Sventek's been in England a year, yet he shows up early Saturday morning, tries to break into a Maryland computer, disconnects, and leaves behind an unbalanced accounting system. In the hallway I mention this to Wayne, who's heard that Joe's on vacation in England; he's hiding out in the backwoods, far away from any computers. "Forget that message from Dockmaster. Sventek's due to visit Berkeley RSN and he'll clear it up."
RSN? Real Soon Now. Wayne's way of saying, "I'm not sure when."
My worry wasn't Sventek. It was the unbalanced accounts. Why were the two accounting systems keeping different times? And why was some activity logged in one file without showing up in the other?
Back to the accounting system for an afternoon. I found that the five-minute time difference between the time stamps came from our various computers' clocks drifting over the months. One of our computer's clocks lost a few seconds every day.
But all of Sventek's activities should have appeared in both tallies. Was this related to last week's accounting problem? Had I screwed things up when I poked around last week? Or was there some other explanation?
Copyright © 1989, 1990 by Clifford Stoll
Product details
- Publisher : Gallery Books
- Publication date : October 1, 2000
- Edition : 1st
- Language : English
- Print length : 416 pages
- ISBN-10 : 0743411463
- ISBN-13 : 978-0743411462
- Item Weight : 12.8 ounces
- Dimensions : 5.31 x 1 x 8.25 inches
- Best Sellers Rank: #3,219,656 in Books (See Top 100 in Books)
- #2 in Espionage True Accounts
- #1,926 in Privacy & Online Safety
- #5,125 in Internet & Telecommunications
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book engaging and well-written, with a gripping narrative that reads like a mystery novel. Moreover, they appreciate its educational value as a historical document and its detailed technical content that remains relevant today. Additionally, the book provides valuable insights into computer security, covering principles of hacking and defense, and customers enjoy its humor. While some customers find it timeless, others note that the technology is dated.
AI Generated from the text of customer reviews
Customers find the book incredibly engaging and thoroughly readable, noting that it reads like a mystery novel.
"great read that anyone in the security industry should read. book shows the first types of ID systems and some of the processes are still used today." Read more
"...book to be informative and also riveting. I found it to be a good read. I would recommend this to anyone even "Non Techies"" Read more
"Fun read from the days before firewalls and early sysadmins coming to the realization that you can't trust everyone on the network." Read more
"Excellent Read. I thoroughly enjoyed the storyline. It's great for any IT Security Consultant like myself...." Read more
Customers find the book's story engaging and well-paced, describing it as a gripping first-person true narrative.
"Stoll writes a good story, well-documented, factual and credible, in contrast to Masters of Deception (Slatalla and Quittner), which I just panned...." Read more
"This is a great story if you are a computer geek, or even if you aren't.... it follows a systems administrator who broke a spy ring because of a $..." Read more
"Gripping book for those who work with computers. This adaptation of a true story really brings to light where com0uter security started." Read more
"...THE CUCKOO'S EGG is a fascinating story that began with a minor discrepancy on a small computer network in Berkeley and ended in an international..." Read more
Customers find the book thought-provoking and fascinating as a historical document, with one customer noting that the lessons are still relevant today.
"...Stoll's writing is both accessible and insightful...." Read more
"...This is a really, really good, entertaining and enlightening read...." Read more
"Very good. Even years later this book is thought provoking...." Read more
"...Read this fascinating account to understand the convoluted trail of connections some young digital commandos followed to a surprising international..." Read more
Customers appreciate the writing style of the book, with several noting it is well written, and one customer highlighting how effectively it portrays student life.
"...It was a very different world back then. The book is well written and doesn't get bogged down in code or anything like that...." Read more
"...It reads something like a Ken Follett novel. It's very well written and I believe it's as fascinating for a computer dummy as it is for a real..." Read more
"...He writes well which is a relief because the book could have bogged down as he had to explain what was going on over the networks...." Read more
"...Cliff Stoll is a good writer with a somewhat eccentric point of view. I enjoyed his humor as well as the humorous situations he gets into...." Read more
Customers appreciate the book's technical details, with one customer noting that the material remains relevant today.
"I have read this book four times. It is so intriguing and informative, yet written in a way that is a combination of detailed information and..." Read more
"An interesting read and very informative. I recommend this book for a look into understanding process of tracking a hacker...." Read more
"...Excellent descriptions on how Clif managed to assist in the tracking of the hacker..." Read more
"Provides an entertaining but informative look at one of the most documented initial hacking cases, and gives the reader a glimpse of the security..." Read more
Customers appreciate the cybersecurity content of the book, which provides sound information and puts readers in the history of cybersecurity, making it a must-read for those in the field.
"...Again, a must read for anyone interested in cyber security, digital forensics or espionage." Read more
"...is a must-read for anyone interested in the history of computing, cybersecurity, or simply a good old-fashioned mystery...." Read more
"Great book and a must read for security professionals" Read more
"Great detective story about the beginning of hacking and digital forensics...." Read more
Customers enjoy the book's humor, describing it as an amusing account that is fun to read, with one customer noting the entertaining word choices.
"...Cuckoo's Egg is a well written, humorous, Thriller. I highly recommend this book. A fun, fun read." Read more
"...It also has its funny moments, got to love the shower scene. At times gets a little dull, running back and forth but overall READ IT." Read more
"As a required text for my Grad school class, I enjoyed the wit and playfulness of the book. I've read enough stuffy stories lately!..." Read more
"...to tell and Cliff Stoll tells it in an extremely accessible and entertaining way." Read more
Customers have mixed opinions about the technology in the book, with some finding it timeless and still relevant to today, while others note that it feels dated.
"...Thanks Cliff Stoll this book really is both about technology and timeless." Read more
"The technology is a bit dated, but very cool glimpse back to the early days of tracking hacker activities when law enforcement wasn't up to speed on..." Read more
"...A period piece and still relevant." Read more
"This is a great book/story about catching a hacker. It's a bit dated and goes a bit too much into the hippy/lover side where I wanted just the..." Read more
Reviews with images
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on December 9, 2024Format: KindleVerified PurchaseClifford Stoll's "The Cuckoo's Egg" isn't just a cybersecurity thriller; it's a captivating journey into the dawn of the internet, a time of dial-up connections and nascent networks. Stoll, a meticulous astronomer, stumbled upon a minor accounting discrepancy that led him down a rabbit hole of international intrigue.
What follows is a thrilling cat-and-mouse game as Stoll, armed with little more than his wits and a deep understanding of Unix systems, tracks a sophisticated hacker across continents. The book masterfully blends technical details with human drama, offering a glimpse into the anxieties and excitement of a rapidly evolving technological landscape.
Stoll's writing is both accessible and insightful. He explains complex technical concepts with clarity, making them understandable even for non-technical readers. But more than just a technical manual, "The Cuckoo's Egg" is a poignant reflection on the changing nature of privacy, the power of information, and the interconnectedness of our world.
This book is a must-read for anyone interested in the history of computing, cybersecurity, or simply a good old-fashioned mystery. It's a thrilling, insightful, and thought-provoking read that has stayed with me long after I turned the final page.
I haven't been this captivated by a book in years. Stoll's masterful storytelling and the profound implications of his discoveries make "The Cuckoo's Egg" a truly unforgettable reading experience.
- Reviewed in the United States on May 5, 2014Format: KindleVerified PurchaseI read this book when it was first published but lost my copy somewhere along the way. I recently picked up another copy to see if it would stand the test of time. I wondered if the technological developments of the past couple decades would turn this book into a dull history lesson or if it would still capture my attention. I found it every bit as fascinating and probably more so now that I'm older and have a different perspective.
At the time the events depicted in this book were taking place, I was starting my career as an IT professional. My first assignment involved supporting a Bellcore (Bell Labs) developed application running on AT&T Unix (sorry Cliff, I'm a "heathen" though I appreciate BSD too!). I got to experience working with DEC PDP-11/70s, 11/34s, VAX 8650s, Decwriters, and RP06/RP8x DASD. Some of that stuff was considered dated at the time and by today's standards they are prehistoric. So, I can relate to Cliff's experience, except for the part of having to track down an international spy, LOL. I missed out on that, thank goodness!
I look at this book differently now than I did in 1989. Even if the reader doesn't care about the origins of the Internet or the finer points of Unix system administration and telecommunications, the depiction of the government's response to the situation is interesting and informative. Of note is the revelation that a particular agency was aware of existing security vulnerabilities but did nothing to address them because they were likely exploiting the vulnerabilities themselves.
This time around, I had more interest in the personal drama surrounding the incident. I could more easily identify with, and laugh at, some of the crazy personalities involved. And, I could empathize with Cliff over the disruption it was causing in his personal life. I also appreciate Cliff's commentary on the philosophy and ethics of computing and how a few bad apples can spoil it for everyone. These concepts are still relevant today despite advancements in technology. After all, the weakest link in the system is the same today as it was back then.
I would recommend this book to anyone getting started in Information Technology and to old school Unix guys and gals who have ever fixed a paper jam on a Decwriter.
- Reviewed in the United States on June 27, 2013Format: KindleVerified PurchaseThe amazon review somewhat over-dramatizes this book, but it's still
pretty interesting if you're curious about the mechanics of hacking networks and the
earliest days of the internet... back when it was the hobby of a handful of geeks
and not the omnipresent household fixture of today.
The author is a programmer and astronomer who is tasked with writing the occasional
useful app for his department and otherwise helping maintain the network. Having a curious
and dogged nature, he invests some hours looking into a minor accounting error
that eventually reveals the presence of a hacker on his system. He decides that simply
plugging the security hole won't be sufficient, as there are bound to be others and the hacker
will be a threat unless he's caught.
What follows is a detailed account of the months Mr. Stoll invested tracking this hacker as he
quietly jumps from one system to the next, probing for weaknesses and downloading
whatever sensitive or interesting info he can find.
The recurring theme of the story is our hero's frustration at the lack of cooperation
he gets from the government. Nobody wants to take responsibility for it.
Nobody seems to understand the magnitude of the threat.
The CIA, FBI, and military all take turns stonewalling him and refuse to keep him in the loop
when they finally decide to take action. But he methodically continues tracking
the hacker at some cost to his job and personal life.
Being a true story makes this very engaging, but those are not into computers and hacking
may find it a bit dry. There really isn't any James bond stuff, despite the promises of international
espionage, drugs and missile bases in the blurb. Everything away from the keyboard is domestic
scenery, not gunfights. But the meat of the book is spent at the computer and any enthusiast
will have no problem burning through the pages.
Top reviews from other countries
-
MelissaReviewed in Spain on March 6, 20165.0 out of 5 stars Lástima que no lo hayan traducido, porque sería un éxito en más países
Format: PaperbackVerified PurchaseSé inglés nativo, por lo que no he tenido problema alguno, pero es una pena que no lo hayan traducido. Me gustaría recomendárselo a familiares y amigos, pero no saben ingles.
Sobre el libro en sí; es educativo, interesante entretenido e intrigante. Me encanta.
DiegoReviewed in Mexico on October 8, 20225.0 out of 5 stars Great book
A great book that tells a real story of the beginning of cyber security forensics
Ryan FReviewed in Canada on July 27, 20255.0 out of 5 stars Its reads exactly like CLiff Stoll talks
Cliff Stoll is an amazing storyteller, and I've seen a couple of YouTube videos where he touches on this story. If you've seen talk you know he's infectious with his enthusiasm.
The book goes into so much detail about the first real detected 'hacking' of computer systems. Its a great story and its told so well. Definite recommendation
Lorenzo C.Reviewed in Italy on August 23, 20255.0 out of 5 stars great story telling
Format: KindleVerified PurchaseHow do you stop turning pages while reading this book?
You keep reading to find out what happens next and then move forward to yet another trick unfolding
Great reading and still telling a story that is modern after many years
How many people choose dictionary passwords or maybe just 'password'?
Jitendra AdhikariReviewed in India on June 11, 20195.0 out of 5 stars Excellent book
A must read for hackers and people generally interested in computer technology.





















