The Cuckoo's Egg cover art

The Cuckoo's Egg

Tracking a Spy Through the Maze of Computer Espionage

Preview
Get this deal Try Premium Plus free
Offer ends 29 January 2026 at 11:59PM GMT.
Prime members: New to Audible? Get 2 free audiobooks during trial.
Just £0.99/mo for your first 3 months of Audible.
1 bestseller or new release per month—yours to keep.
Listen all you want to thousands of included audiobooks, podcasts, and Originals.
Auto-renews at £8.99/mo after 3 months. Cancel monthly.
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£8.99/month after 30 days. Renews automatically.

The Cuckoo's Egg

By: Cliff Stoll
Narrated by: Will Damron
Get this deal Try Premium Plus free

£8.99/mo after 3 months. Cancel monthly. Offer ends 29 January 2026 at 11:59PM GMT.

£8.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £12.99

Buy Now for £12.99

LIMITED TIME OFFER | £0.99/mo for the first 3 months

Premium Plus auto-renews at £8.99/mo after 3 months. Terms apply.

About this listen

Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75 cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" - a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases - a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

©1989 Clifford Stoll (P)2020 Tantor
Espionage Freedom & Security Politics & Government Security & Encryption True Crime War & Crisis Exciting Thought-Provoking Inspiring Computer Security

Listeners also enjoyed...

Cult of the Dead Cow cover art
Countdown to Zero Day cover art
Ghost in the Wires cover art
The Ransomware Hunting Team cover art
The Lazarus Heist cover art
The Art of Deception cover art
How I Rob Banks cover art
The Art of Invisibility cover art
If It's Smart, It's Vulnerable cover art
Social Engineering, Second Edition cover art
Hackers: Heroes of the Computer Revolution cover art
Cyber Wars cover art
Crime Dot Com cover art
GCHQ: Centenary Edition cover art
The Hacker and the State cover art
Where Wizards Stay Up Late cover art
All stars
Most relevant
Very interesting to hear the details of how the hacker was detected and tracked. The story could have been edited down, for example the listing of arbitrary file names was completely unnecessary. The whole story could have been distilled down into 5 hrs or less.

Very well narrated.

Great storey

Something went wrong. Please try again in a few minutes.

This was an excellent story that was told beautifully, the author and narrator put you right there, highly recommend.

I loved it

Something went wrong. Please try again in a few minutes.

The story has not dated, although the technology has changed. It's still a story of creative thinking and puzzle solving, by real humans. The evocation of San Frank in the 80s is powerful and warm

. Essential listening for those who want to understand the Internet or who enjoy a good tale

Something went wrong. Please try again in a few minutes.

This is indeed a fascinating and enjoyable true-life yarn. Because of the immense advances in computer technology since 1990 many features of the book are now superseded - there was no internet as we know it today and this was the world of dial-up modems. The author recounts engagingly his fortuitous discovery of and subsequent efforts to trace one of the first known instances of espionage by a computer hacker. Even 30 years down the line this is an engrossing story, well written and narrated.

I must point out that the version being read here is very far from unabridged, contrary to what is claimed.
In the original book the author took considerable care to set out exactly what he observed the hacker typing as he attempted to break into various Unix computer systems. These interesting insertions afforded additional insight into the methods of the hacker as well as adding real depth to one's understanding of what was happening.

For some unknown reason all of this material has been excised from the version being read, along with the sentences which immediately preceded, introduced and anticipated these quotations. This is unexplained and unneccesary.

Thus, this is not an unabridged version of the original book and it should not be described as unabridged.

A very entertaining and interesting story

Something went wrong. Please try again in a few minutes.

Very fun. With the speed of technological progress and now wide spread IT literacy, this no longer reads as a tale of computer wizardry. However, this simplicity makes it one of the easiest to understand ‘hacker tales’, and it is a well told and enormously engaging ‘sleuth’ story. The peek into the world of academia and Berkeley liberalism of the time is also fascinating and remains relevant today. Strong recommend!

Very enjoyable lesson from recent history

Something went wrong. Please try again in a few minutes.

See more reviews