Select delivery location
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Paperback – January 1, 2005

4.6 4.6 out of 5 stars 2,906 ratings

In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB.

When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information.

Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.

The Amazon Book Review
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now.

Editorial Reviews

Review

"Fascinating...a nonfiction account that reads like a le Carré novel."
--
The Seattle Times

"Stoll's is the ever-appealing story of the little man bucking the system...great fun to read...lively and thoroughly absorbing."
--
The Philadelphia Inquirer

"The Cuckoo's Egg is 'reader friendly,' even for those who have only the vaguest familiarity with computers...a true spy thriller....The hunt is gripping."
--
Chicago Tribune

"As exciting as any action novel....A gripping spy thriller."
--
The New York Times Book Review

About the Author

An astronomer by training and a computer expert by accident, Cliff Stoll became a leading authority on computer security and the internet. He has given talks for the FBI, CIA, and NSA, and has appeared before the US Senate. He lives in Oakland, California.

Product details

  • Publisher ‏ : ‎ Pocket Books (January 1, 2005)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 399 pages
  • ISBN-10 ‏ : ‎ 1416507787
  • ISBN-13 ‏ : ‎ 978-1416507789
  • Item Weight ‏ : ‎ 2.31 pounds
  • Dimensions ‏ : ‎ 5.31 x 1.2 x 8.25 inches
  • Customer Reviews:
    4.6 4.6 out of 5 stars 2,906 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Clifford Stoll
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Customer reviews

4.6 out of 5 stars
2,906 global ratings

Customers say

Customers find the book highly interesting, well-written, and hard to put down. They also describe it as eye-opening and a great hacking history read. Readers mention the information value is essential for anyone in cybersecurity. They say the lessons are timeless and relevant. Opinions are mixed on the pacing and dated content.

AI-generated from the text of customer reviews

261 customers mention "Readability"256 positive5 negative

Customers find the book highly interesting and entertaining. They say it's well-written and a great page-turner. Readers also mention the book reads like a spy novel.

"Exceptionally written, a journey through an electronic chase that started in the most simple of terms and ended in the most dramatic consequences..." Read more

"...the depiction of the government's response to the situation is interesting and informative...." Read more

"...Being a true story makes this very engaging, but those are not into computers and hackingmay find it a bit dry...." Read more

"...detailed in the book enhances our knowledge and enriches our appreciation for the operating system, as wells as stamping it with technical..." Read more

64 customers mention "Intrigue"64 positive0 negative

Customers find the book interesting, fascinating, and eye-opening. They also say it's quirky and mixes in some human interest elements. Readers mention the book is fantastic and inspiring.

"...pretty interesting if you're curious about the mechanics of hacking networks and the..." Read more

"...itself reads like a spy novel of sorts, and there's also quite a bit of humor thrown in, so it's quite entertaining overall." Read more

"...that he speaks about in very easy to understand terms, and uses a lot of good analogies...." Read more

"...This book is written in a fast paced and engrossing style. Stoll has a gift for making even complex computer and physics easy to understand...." Read more

39 customers mention "Information value"39 positive0 negative

Customers find the book informative, relevant, and entertaining. They say it does an excellent job explaining hacking to laymen. Readers also mention it's a great history book about how things worked before the age of computers.

"...of the government's response to the situation is interesting and informative...." Read more

"This is an absolutely riveting true account of computer hacking in the early days (mid 80s) when PCs had not yet become widely used in peoples homes..." Read more

"I have read this book four times. It is so intriguing and informative, yet written in a way that is a combination of detailed information and..." Read more

"...The book entertains in its writing, informs on securing computers, and instructs on the wider social and other consequences of hacking." Read more

17 customers mention "Ease of understanding"17 positive0 negative

Customers find the book easy to understand and fun to read. They say it's technical enough to understand the technology of the era but not bogged down with too much detail. Readers also mention the narrative is simple and agile.

"...explains all of the technology that he speaks about in very easy to understand terms, and uses a lot of good analogies...." Read more

"...Stoll has a gift for making even complex computer and physics easy to understand...." Read more

"Simply written, easy to follow and remember every part of the story and technical terms are explained in a way that is understandable for anyone...." Read more

"...keeps the interest in what many think is boring, but this was hard to put down. Great book!" Read more

19 customers mention "Pacing"12 positive7 negative

Customers have mixed opinions about the pacing of the book. Some mention it's quick and pleasant, while others say it tends to drag on for the first few chapters.

"...I enjoyed the book, and read it pretty quickly - in just a few days...." Read more

"...I felt the ending was unsatisfactory, but that is because the real world is not Hollywood, and he was relating what happened in the real world...." Read more

"...This book is written in a fast paced and engrossing style. Stoll has a gift for making even complex computer and physics easy to understand...." Read more

"...it’s a very good read nonetheless and he writes well and keeps you interested to the end." Read more

15 customers mention "Dated content"5 positive10 negative

Customers have mixed opinions about the dated content of the book. Some mention it's still relevant today, while others say the technology and methods are dated.

"...It is a great starting point although methods are dated. An engaging page turner...." Read more

"...It aged very well." Read more

"...Much of the tech is dated but the message is just as valid." Read more

"...Even though at this point the technology is a bit dated, the story is still relevant and it gives a history of the older VAX/VMS and UNIX flavors." Read more

13 customers mention "Accessibility"7 positive6 negative

Customers have mixed opinions about the accessibility of the book. Some mention it's accessible to non-technical people, making the technical information understandable. Others say the writing style is unprofessional and can be a bit technical.

"...This makes the technical information understandable. Highly recommended!" Read more

"The problems that Cliff talk about still exist today. Computers have gotten more complex and even harder to secure...." Read more

"...The book was written in a way that makes it accessible to non-technical people, but still interesting to those of us who are technical...." Read more

"...at times it reads as more of a journal of sorts and can be a bit technical (although the author does his best to explain all the rough stuff)...." Read more

10 customers mention "Repetition"0 positive10 negative

Customers find the book repetitive and boring to read. They say the pages have a lot of repeated sentences, making it difficult to read.

"...I have to take off one star for the somewhat repetitive nature of Cliff's investigation...." Read more

"...This made some chapters boring to read, or I just felt boring since I wanted to know what would happen with the hacker..." Read more

"...My only issue is that it was a bit repetitive and could probably have benefitted from reduction of about 20 pages." Read more

"...I would give the book 5 stars, but I felt that some parts were very repetitive, but I understand that it is repetive since the activity that the..." Read more

Sin ningún problema
5 out of 5 stars
Sin ningún problema
Excelente
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

Reviewed in the United States on July 9, 2024
Exceptionally written, a journey through an electronic chase that started in the most simple of terms and ended in the most dramatic consequences exposed.

An excellent testimony of an inept Big Government at work.

I only wish he had written the Cuckoo's Egg Hatches...
One person found this helpful
Report
Reviewed in the United States on May 5, 2014
I read this book when it was first published but lost my copy somewhere along the way. I recently picked up another copy to see if it would stand the test of time. I wondered if the technological developments of the past couple decades would turn this book into a dull history lesson or if it would still capture my attention. I found it every bit as fascinating and probably more so now that I'm older and have a different perspective.

At the time the events depicted in this book were taking place, I was starting my career as an IT professional. My first assignment involved supporting a Bellcore (Bell Labs) developed application running on AT&T Unix (sorry Cliff, I'm a "heathen" though I appreciate BSD too!). I got to experience working with DEC PDP-11/70s, 11/34s, VAX 8650s, Decwriters, and RP06/RP8x DASD. Some of that stuff was considered dated at the time and by today's standards they are prehistoric. So, I can relate to Cliff's experience, except for the part of having to track down an international spy, LOL. I missed out on that, thank goodness!

I look at this book differently now than I did in 1989. Even if the reader doesn't care about the origins of the Internet or the finer points of Unix system administration and telecommunications, the depiction of the government's response to the situation is interesting and informative. Of note is the revelation that a particular agency was aware of existing security vulnerabilities but did nothing to address them because they were likely exploiting the vulnerabilities themselves.

This time around, I had more interest in the personal drama surrounding the incident. I could more easily identify with, and laugh at, some of the crazy personalities involved. And, I could empathize with Cliff over the disruption it was causing in his personal life. I also appreciate Cliff's commentary on the philosophy and ethics of computing and how a few bad apples can spoil it for everyone. These concepts are still relevant today despite advancements in technology. After all, the weakest link in the system is the same today as it was back then.

I would recommend this book to anyone getting started in Information Technology and to old school Unix guys and gals who have ever fixed a paper jam on a Decwriter.
19 people found this helpful
Report
Reviewed in the United States on June 27, 2013
The amazon review somewhat over-dramatizes this book, but it's still
pretty interesting if you're curious about the mechanics of hacking networks and the
earliest days of the internet... back when it was the hobby of a handful of geeks
and not the omnipresent household fixture of today.

The author is a programmer and astronomer who is tasked with writing the occasional
useful app for his department and otherwise helping maintain the network. Having a curious
and dogged nature, he invests some hours looking into a minor accounting error
that eventually reveals the presence of a hacker on his system. He decides that simply
plugging the security hole won't be sufficient, as there are bound to be others and the hacker
will be a threat unless he's caught.

What follows is a detailed account of the months Mr. Stoll invested tracking this hacker as he
quietly jumps from one system to the next, probing for weaknesses and downloading
whatever sensitive or interesting info he can find.

The recurring theme of the story is our hero's frustration at the lack of cooperation
he gets from the government. Nobody wants to take responsibility for it.
Nobody seems to understand the magnitude of the threat.
The CIA, FBI, and military all take turns stonewalling him and refuse to keep him in the loop
when they finally decide to take action. But he methodically continues tracking
the hacker at some cost to his job and personal life.

Being a true story makes this very engaging, but those are not into computers and hacking
may find it a bit dry. There really isn't any James bond stuff, despite the promises of international
espionage, drugs and missile bases in the blurb. Everything away from the keyboard is domestic
scenery, not gunfights. But the meat of the book is spent at the computer and any enthusiast
will have no problem burning through the pages.
6 people found this helpful
Report

Top reviews from other countries

Translate all reviews to English
Davor
5.0 out of 5 stars A must read
Reviewed in Canada on July 29, 2024
Outdated, but a great read.
Diego
5.0 out of 5 stars Great book
Reviewed in Mexico on October 8, 2022
A great book that tells a real story of the beginning of cyber security forensics
शुभम चौहान
5.0 out of 5 stars Great condition of the used book
Reviewed in India on June 4, 2023
The media could not be loaded.
If not for the yellowish tint on the pages i would've confused it for new.
Customer image
शुभम चौहान
5.0 out of 5 stars Great condition of the used book
Reviewed in India on June 4, 2023
If not for the yellowish tint on the pages i would've confused it for new.
Images in this review
Customer image
Customer image
Mostly Harmless
5.0 out of 5 stars A great read, from 1986 but even more relevant today.
Reviewed in the United Kingdom on July 8, 2021
It's the account of a mid eighties astronomer who gets a junior job in the IT department of Berkley. Just to give him something to do they ask him to look into a 75 cent discrepancy in the billing for computer time. He gets obsessed with this and it ends up a year long mission involving every three letter agency you've ever heard of, and a bunch you haven't, and capturing a German hacker selling secrets to the KGB.

From the very early days of the internet, long before the world wide web, when nobody took IT security seriously, all those TLA were fighting each other and passing the buck and hackers were learning to exploit weaknesses and lax security. A fascinating read. Enough technical detail to let you know what is happening but simple enough for any layman to understand.
And a warning about lax security procedures that are even more relevant today now that everything is online.
Dirk W.
5.0 out of 5 stars Tolles Buch, macht Spaß zu lesen
Reviewed in Germany on March 30, 2020
Tolles Buch, macht Spaß zu lesen. Als IT'ler empfinde ich es als sehr angenehm, dass hier keine übertriebenen Hacks passieren, sondern eine reale Geschichte spannend aber unaufgeregt wiedergegeben wird. Mir hat der Blick in die Vergangenheit des Internets und gerade auch die kleine Einsicht in die astronomische Forschung, in der ja viele Ideen der Computergeschichte ihren Anfang hatten, gut gefallen.