Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
-33% $12.69$12.69
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Acceptable
$9.05$9.05
Ships from: Amazon Sold by: Shakespeare Book House
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Paperback – January 1, 2005
Purchase options and add-ons
When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information.
Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.
- Print length399 pages
- LanguageEnglish
- Publication dateJanuary 1, 2005
- Dimensions5.31 x 1.2 x 8.25 inches
- ISBN-101416507787
- ISBN-13978-1416507789
Frequently bought together

Similar items that may ship from close to you
Editorial Reviews
Review
-- The Seattle Times
"Stoll's is the ever-appealing story of the little man bucking the system...great fun to read...lively and thoroughly absorbing."
-- The Philadelphia Inquirer
"The Cuckoo's Egg is 'reader friendly,' even for those who have only the vaguest familiarity with computers...a true spy thriller....The hunt is gripping."
-- Chicago Tribune
"As exciting as any action novel....A gripping spy thriller."
-- The New York Times Book Review
About the Author
Excerpt. © Reprinted by permission. All rights reserved.
Me, a wizard? Until a week ago, I was an astronomer, contentedly designing telescope optics. Looking back on it, I'd lived in an academic dreamland. All these years, never planning for the future, right up to the day my grant money ran out.
Lucky for me that my laboratory recycled used astronomers. Instead of standing in the unemployment line, I found myself transferred from the Keck Observatory at the Lawrence Berkeley Lab, down to the computer center in the basement of the same building.
Well, hell, I could fake enough computing to impress astronomers, and maybe pick it up fast enough that my co-workers wouldn't catch on. Still, a computer wizard? Not me -- I'm an astronomer.
Now what? As I apathetically stared at my computer terminal, I still thought of planetary orbits and astrophysics. As new kid on the block, I had my choice of a cubicle with a window facing the Golden Gate Bridge, or an unventilated office with a wall of bookshelves. Swallowing my claustrophobia, I picked the office, hoping that nobody would notice when I slept under the desk. On either side were offices of two systems people, Wayne Graves and Dave Cleveland, the old hands of the system. I soon got to know my neighbors through their bickering.
Viewing everyone as incompetent or lazy, Wayne was crossthreaded with the rest of the staff. Yet he knew the system thoroughly, from the disk driver software up to the microwave antennas. Wayne was weaned on Digital Equipment Corporation's Vax computers and would tolerate nothing less: not IBM, not Unix, not Macintoshes.
Dave Cleveland, our serene Unix buddha, patiently listened to Wayne's running stream of computer comparisons. A rare meeting didn't have Wayne's pitch, "Vaxes are the choice of scientists everywhere and help build strong programs twelve ways." Dave retorted, "Look, you keep your Vax addicts happy and I'll handle the rest of the world." Dave never gave him the satisfaction of getting riled, and Wayne's complaints eventually trailed off to a mutter.
Great. First day on the job, sandwiched between two characters who were already ruining my daydreams with their periodic disputes.
At least nobody could complain about my appearance. I wore the standard Berkeley corporate uniform: grubby shirt, faded jeans, long hair, and cheap sneakers. Managers occasionally wore ties, but productivity went down on the days they did.
Together, Wayne, Dave, and I were to run the computers as a lab-wide utility. We managed a dozen mainframe computers -- giant workhorses for solving physics problems, together worth around six million dollars. The scientists using the computers were supposed to see a simple, powerful computing system, as reliable as the electric company. This meant keeping the machines running full time, around the clock. And just like the electric company, we charged for every cycle of computing that was used.
Of four thousand laboratory employees, perhaps a quarter used the main computers. Each of these one thousand accounts was tallied daily, and ledgers kept inside the computer. With an hour of computing costing three hundred dollars, our bookkeeping had to be accurate, so we kept track of every page printed, every block of disk space, and every minute of processor time. A separate computer gathered these statistics and sent monthly bills to laboratory departments.
And so it happened that on my second day at work, Dave wandered into my office, mumbling about a hiccup in the Unix accounting system. Someone must have used a few seconds of computing time without paying for it. The computer's books didn't quite balance; last month's bills of $2,387 showed a 75-cent shortfall.
Now, an error of a few thousand dollars is obvious and isn't hard to find. But errors in the pennies column arise from deeply buried problems, so finding these bugs is a natural test for a budding software wizard. Dave said that I ought to think about it.
"First-degree robbery, huh?" I responded.
"Figure it out, Cliff, and you'll amaze everyone," Dave said.
Well, this seemed like a fun toy, so I dug into the accounting program. I discovered our accounting software to be a patchwork of programs written by long-departed summer students. Somehow, the hodgepodge worked well enough to be ignored. Looking at the mixture of programs, I found the software in Assembler, Fortran, and Cobol, the most ancient of computer languages. Might as well have been classical Greek, Latin, and Sanskrit.
As with most home-brew software, nobody had bothered to document our accounting system. Only a fool would poke around such a labyrinth without a map.
Still, here was a plaything for the afternoon and a chance to explore the system. Dave showed me how the system recorded each time someone connected to the computer, logging the user's name, and terminal. It timestamped each connection, recording which tasks the user executed, how many seconds of processor time he used, and when he disconnected.
Dave explained that we had two independent accounting systems. The ordinary Unix accounting software just stored the timestamped records into a file. But to satisfy some bureaucrat, Dave had built a second accounting system which kept more detailed records of who was using the computer.
Over the years, a succession of bored summer students had written programs to analyze all this accounting information. One program collected the data and stashed it into a file. A second program read that file and figured how much to charge for that session. Yet a third program collected all these charges and printed out bills to be mailed to each department. The last program added up all user charges and compared that total to the result from the computer's internal accounting program. Two accounting files, kept in parallel by different programs, ought to give the same answer.
For a year, these programs had run without a glitch, but weren't quite perfect this week. The obvious suspect was round-off error. Probably each accounting entry was correct, but when added together, tenths of a penny differences built up until an error of 75 cents accumulated. I ought to be able to prove this either by analyzing how the programs worked, or by testing them with different data.
Rather than trying to understand the code for each program, I wrote a short program to verify the data files. In a few minutes, I had checked the first program: indeed, it properly collected the accounting data. No problem with the first.
The second program took me longer to figure out. In an hour I had slapped together enough makeshift code to prove that it actually worked. It just added up time intervals, then multiplied by how much we charge for computer time. So the 75-cent error didn't come from this program.
And the third program worked perfectly. It looked at a list of authorized users, found their laboratory accounts, and then printed out a bill. Round-off error? No, all of the programs kept track of money down to the hundredths of a penny. Strange. Where's this 75-cent error coming from?
0 Well, I'd invested a couple hours in trying to understand a trivial problem. I got stubborn: dammit, I'd stay there till midnight, if I had to.
Several test programs later, I began actually to have confidence in the mishmash of locally built accounting programs. No question that the accounts didn't balance, but the programs, though not bulletproof, weren't dropping pennies. By now, I'd found the lists of authorized users, and figured out how the programs used the data structures to bill different departments. Around 7 P.M. my eye caught one user, Hunter. This guy didn't have a valid billing address.
Ha! Hunter used 75 cents of time in the past month, but nobody had paid for him.
Here's the source of our imbalance. Someone had screwed up when adding a user to our system. A trivial problem caused by a trivial error.
Time to celebrate. While writing this first small triumph into the beginning pages of my notebook, Martha, my sweetheart, stopped by and we celebrated with late-night cappuccinos at Berkeley's Cafe Roma.
A real wizard would have solved the problem in a few minutes. For me, it was unknown territory, and finding my way around hadn't been easy. As a consolation, I'd learned the accounting system and practiced a couple obsolete languages. Next day, I sent an electronic mail message to Dave, preening my feathers by pointing out the problem to him.
Around noon, Dave stopped by to drop off a pile of manuals, and casually mentioned that he had never added a user named Hunter -- it must have been one of the other system managers. Wayne's curt response: "It wasn't me. RTFM." Most of his sentences ended with acronyms, this one meaning, "Read the fucking manual."
But I'd read the manuals. Operators weren't supposed to add a new user without an account. At other computer centers, you just log into a privileged account and tell the system to add a new user. Since we also had to make several bookkeeping entries, we couldn't run such a vanilla system. Ours was complex enough that we had special programs which automatically did the paperwork and the systems juggling.
Checking around, I found that everyone agreed the automatic system was so superior that nobody would have manually added a new user. And the automatic system wouldn't make this mistake.
Well, I couldn't figure out who had made this goof. Nobody knew Hunter, and there wasn't an account set for him. So I erased the name from the system -- when he complained, we could set him up properly.
A day later, an obscure computer named Dockmaster sent us an electronic mail message. Its system manager claimed that someone from our laboratory had tried to break into his computer over the weekend.
Dockmaster's return address might have been anywhere, but signs pointed to Maryland. The e-mail had passed through a dozen other computers, and each had left a postmark.
Dave answered the message with a noncommittal "We'll look into it." Uh, sure. We'd look when all our other problems disappeared.
Our laboratory's computers connect to thousands of other systems over a dozen networks. Any of our scientists can log into our computer, and then connect to a distant computer. Once connected, they can log into the distant computer by entering an account name and password. In principle, the only thing protecting the networked computer is the password, since account names are easy to figure out. (How do you find account names? Just use a phone book -- most people use their names on computers.)
Dockmaster's electronic mail message was a curiosity, and Dave passed it to Wayne, attaching a question, "Who's Dockmaster?" Wayne forwarded it to me with his guess -- "Probably some bank."
Eventually, Wayne bounced the message to me. I guessed Dockmaster was some Navy shipyard. It wasn't important, but it seemed worth spending a few minutes looking into.
The message gave the date and time when someone on our Unix computer tried to log into Dockmaster's computer. So I scrabbled around the accounting files, looking at Saturday morning's records. Again, the two accounting systems disagreed. The stock Unix accounting file showed a user, Sventek, logging in at 8:25, doing nothing for half an hour, and then disconnecting. No timestamped activity in between. Our home-brew software also recorded Sventek's activity, but it showed him using the networks from 8:31 until 9:01 A.M.
Jeez. Another accounting problem. The time stamps didn't agree. One showed activity when the other account said everything was dormant.
Other things seemed more pressing, so I dropped the problem. After wasting an afternoon chasing after some operator's mistake, I wasn't about to touch the accounting system again.
Over lunch with Dave, I mentioned that Sventek was the only one connected when Dockmaster reported the break-in. He stared and said, "Joe Sventek? He's in Cambridge. Cambridge, England. What's he doing back?" Turned out that Joe Sventek had been the laboratory's Unix guru, a software wizard who built a dozen major programs over the past decade. Joe had left for England a year ago, leaving behind a glowing reputation throughout the California computer community.
Dave couldn't believe Joe was back in town, since none of Joe's other friends had heard from him. "He must have entered our computer from some network," Dave said.
"So you think Joe's responsible for this problem?" I asked Dave.
"No way," Dave replied. "Joe's a hacker of the old school. A smart, quick, capable programmer. Not one of those punks that have tarnished the word 'hacker.' In any case, Sventek wouldn't try to break into some Maryland computer. And if he did try, he'd succeed, without leaving any trace."
Curious: Joe Sventek's been in England a year, yet he shows up early Saturday morning, tries to break into a Maryland computer, disconnects, and leaves behind an unbalanced accounting system. In the hallway I mention this to Wayne, who's heard that Joe's on vacation in England; he's hiding out in the backwoods, far away from any computers. "Forget that message from Dockmaster. Sventek's due to visit Berkeley RSN and he'll clear it up."
RSN? Real Soon Now. Wayne's way of saying, "I'm not sure when."
My worry wasn't Sventek. It was the unbalanced accounts. Why were the two accounting systems keeping different times? And why was some activity logged in one file without showing up in the other?
Back to the accounting system for an afternoon. I found that the five-minute time difference between the time stamps came from our various computers' clocks drifting over the months. One of our computer's clocks lost a few seconds every day.
But all of Sventek's activities should have appeared in both tallies. Was this related to last week's accounting problem? Had I screwed things up when I poked around last week? Or was there some other explanation?
Copyright © 1989, 1990 by Clifford Stoll
Product details
- Publisher : Pocket Books (January 1, 2005)
- Language : English
- Paperback : 399 pages
- ISBN-10 : 1416507787
- ISBN-13 : 978-1416507789
- Item Weight : 2.31 pounds
- Dimensions : 5.31 x 1.2 x 8.25 inches
- Best Sellers Rank: #19,777 in Books (See Top 100 in Books)
- #6 in Computer Hacking
- #20 in Espionage True Accounts
- #37 in Political Intelligence
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book enjoyable, easy to read, and fun in its spy-chasing characteristics. They also say the storyline is interesting, eye-opening, and captures a weird time during the early internet years. Readers praise the writing style as well-written and hard to put down. They find the content interesting and relevant for cyber security and hacking today. Additionally, customers describe the book as extremely interesting and fantastic. Opinions are mixed on complexity and relevance, with some finding it peppered with enough details and observations to make it engaging, while others say it's un sophisticated.
AI-generated from the text of customer reviews
Customers find the book enjoyable, easy to understand, and fun in its spy-chasing characteristics. They say it enhances their knowledge and appreciation for the operating system. Readers also mention that the book is hard to put down.
"...detailed in the book enhances our knowledge and enriches our appreciation for the operating system, as wells as stamping it with technical..." Read more
"A great read. If you're a Unix sysadmin, like myself, you will recognize and emphathize with a lot of the concepts...." Read more
"...can be infected by espionage, viruses or worms to read this highly entertaining and groundbreaking story of a man on the pioneering edge of computer..." Read more
"...An amazing read." Read more
Customers find the storyline interesting, eye-opening, and a Sherlock Holmes romp. They also describe the book as an amazing walk down memory lane, quirky, and well-written. Readers also say it's a great piece of computer history and well worth the read.
"...age and with just the right experience for this to be an amazing walk down memory lane...." Read more
"...who was on the trail of the mysterious hacker, and he tells the story quite well...." Read more
"Very realistic wonderfully true modern mystery. I heard the author speak at the City of Berkeley Main Public Library...." Read more
"...Being a true story makes this very engaging, but those are not into computers and hackingmay find it a bit dry...." Read more
Customers find the writing style intriguing, well-written, and hard to put down. They also appreciate the excellent descriptions and detailed explanations that do not feel overdone or drawn out. Customers also mention that the book stays true to reality.
"...I like that the author includes relevant details from his personal life to help put the suspense in context and make it more real and engaging...." Read more
"...He was as energetic and bold as this book." Read more
"...terms, but as others have pointed out the book itself reads like a spy novel of sorts, and there's also quite a bit of humor thrown in, so it's..." Read more
"...I enjoyed the book, and read it pretty quickly - in just a few days...." Read more
Customers find the book interesting, essential reading for anyone in cybersecurity. They also say it's a great history book about how things worked before the age of the Internet. Readers also mention that the book inspires them to do their job better and helps them understand the importance of strong passwords.
"...of the government's response to the situation is interesting and informative...." Read more
"This is an absolutely riveting true account of computer hacking in the early days (mid 80s) when PCs had not yet become widely used in peoples homes..." Read more
"...He mixes in some human interest elements and tells a good story...." Read more
"I have read this book four times. It is so intriguing and informative, yet written in a way that is a combination of detailed information and..." Read more
Customers find the book extremely interesting, riveting, and exciting. They also say it keeps them solidly engaged.
"...the depiction of the government's response to the situation is interesting and informative...." Read more
"...informative, yet written in a way that is a combination of detailed information and entertainment...." Read more
"...Great book; fascinating times - sort of the Wild West days of computer networking." Read more
"...It slows down a bit in the final 1/3rd but is still fascinating. One of the best straight non-fiction books I've ever read." Read more
Customers are mixed about the complexity of the book. Some mention that it's peppered with enough details and observations to make it engaging, and accessible to non-technical people. However, others say that the writing style is un sophisticated, computers have gotten more complex, and even harder to secure. They also say that poor systems administrators still exist.
"...The book was written in a way that makes it accessible to non-technical people, but still interesting to those of us who are technical...." Read more
"The problems that Cliff talk about still exist today. Computers have gotten more complex and even harder to secure...." Read more
"...that he speaks about in very easy to understand terms, and uses a lot of good analogies...." Read more
"Good read hard to put it down. Ends up all the bureaucracy is BS Just to show you how all departments work against each other." Read more
Customers are mixed about the relevance of the book. Some mention that it's still relevant today, and has aged very well. They also appreciate the fresh and modern ideas and techniques. However, some customers feel that the tech is dated but the message is still valid.
"...It is a great starting point although methods are dated. An engaging page turner...." Read more
"...It aged very well." Read more
"...Much of the tech is dated but the message is just as valid." Read more
"...Even though at this point the technology is a bit dated, the story is still relevant and it gives a history of the older VAX/VMS and UNIX flavors." Read more
Customers find the book repetitive and dull at times.
"...I have to take off one star for the somewhat repetitive nature of Cliff's investigation...." Read more
"...This made some chapters boring to read, or I just felt boring since I wanted to know what would happen with the hacker..." Read more
"...My only issue is that it was a bit repetitive and could probably have benefitted from reduction of about 20 pages." Read more
"...I would give the book 5 stars, but I felt that some parts were very repetitive, but I understand that it is repetive since the activity that the..." Read more
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The delivery of the voice actor on the audio book is great and made a 2-day car trip go by much faster!
Although the story is somewhat dated, starting in the late 80’s, there are still many lessons to be learned from it today. Continually reviewing audit logs is critical to the security of any system and without doing that, the protagonist would not have found the intrusion and been able to track the duplicitous activities of the hacker. Cliff also wrote many scripts and developed some innovative methods to secure and keep track of the intrusion continuously. Although he worked hard at his job, he was also good at communicating and reaching out to many other folks within his organization at Lawrence Berkeley Labs, as well as many others beyond, including commercial, military, federal, and international agencies. Lastly, he was meticulous in his documentation, which helped to solve the case and ultimately provided proof of everything he did to people that he needed help from.
Cliff Stoll is a good writer with a somewhat eccentric point of view. I enjoyed his humor as well as the humorous situations he gets into. This is probably the first documented case of an Advanced Persistent Threat (APT) on a multi-organizational scale. I had a very hard time putting this book down and highly recommend it as an important history lesson to all within the computer security or information technology (IT) field.
THE CUCKOO'S EGG is a fascinating story that began with a minor discrepancy on a small computer network in Berkeley and ended in an international sting operation. Cliff Stoll was the astronomer-turned-programmer who was on the trail of the mysterious hacker, and he tells the story quite well. This is a suspense filled tale of tracking this burglar to his lair, of frustrating red herrings and of maddening bureaucracy that stands in the scientist's way.
There are one or two places that don't flow quite as smoothly as they would have had the author been a professional writer and not an astronomer/computer-engineer. He also tends to be a bit repetitive in his discussions and his repeating of his philosophies. But, as I mentioned, this is from a scientist, not an English major, and his style does have a charm of its own. It helps the story feel more like something that's happening to just an average kind of guy, which is a great aid to heightening tension, and also helps carry the computer-illiterate reader. Despite having to convey some relatively difficult concepts, Stoll does an excellent job at explaining networks, operating systems, programming logic and other computer activities with a minimum of confusion. And while the average reader is gaining insight into the world of computer, the advanced, 21st Century computer operator may find something to feel nostalgic about in this story of late-80's computer networks.
I can easily recommend this book to anyone regardless of his or her prior knowledge of computers. While on the surface this is a story about breaking into electronic equipment, the appealing aspects of the story lie in the mystery itself, not necessarily in the tools of the trade. What this all boils down to is a good old-fashioned game of cops-and-robbers, when computer networks and Internet security were still only in their infancy.
The book is an engrossing detective story about how these criminals were tracked down and stopped. Anyone who enjoys a “techno thriller” will enjoy the book. Those in the business will find that hacking is nothing new. This should be required reading for all cybersecurity students and practitioners.
Top reviews from other countries
Reviewed in India on June 4, 2023
Aside from that, this book is his account of discovering and tracking down a hacker who'd gotten into a university mainframe, it's properly old school with terminals, modems and dot matrix printers but it's a heck of a story and worth the investment of your time.
Bonus, the 2nd hand copy I got came with a folded up newspaper article from the original reports of the case!
Well worth a read.








