The Cuckoo's Egg
Tracking a Spy Through the Maze of Computer Espionage
Failed to add items
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 3 months for £0.99/mo
Buy Now for £12.99
-
Narrated by:
-
Will Damron
-
By:
-
Cliff Stoll
About this listen
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75 cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" - a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases - a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
©1989 Clifford Stoll (P)2020 TantorVery well narrated.
Great storey
Something went wrong. Please try again in a few minutes.
I loved it
Something went wrong. Please try again in a few minutes.
. Essential listening for those who want to understand the Internet or who enjoy a good tale
Something went wrong. Please try again in a few minutes.
I must point out that the version being read here is very far from unabridged, contrary to what is claimed.
In the original book the author took considerable care to set out exactly what he observed the hacker typing as he attempted to break into various Unix computer systems. These interesting insertions afforded additional insight into the methods of the hacker as well as adding real depth to one's understanding of what was happening.
For some unknown reason all of this material has been excised from the version being read, along with the sentences which immediately preceded, introduced and anticipated these quotations. This is unexplained and unneccesary.
Thus, this is not an unabridged version of the original book and it should not be described as unabridged.
A very entertaining and interesting story
Something went wrong. Please try again in a few minutes.
Very enjoyable lesson from recent history
Something went wrong. Please try again in a few minutes.