The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Audible Audiobook – Unabridged
|New from||Used from|
Audible Audiobook, Unabridged
|Free with your Audible trial|
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75 cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" - a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases - a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
- One credit a month to pick any title from our entire premium selection to keep (you’ll use your first credit now).
- Unlimited listening on select audiobooks, Audible Originals, and podcasts.
- You will get an email reminder before your trial ends.
- $14.95 a month after 30 days. Cancel online anytime.
|Listening Length||12 hours and 46 minutes|
|Audible.com Release Date||January 31, 2020|
|Best Sellers Rank|| #6,124 in Audible Books & Originals (See Top 100 in Audible Books & Originals) |
#4 in Espionage True Crime
#5 in Computer Security & Encryption (Audible Books & Originals)
#7 in Terrorism (Audible Books & Originals)
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Anyway, a lot of sysadmins learn their trade because they are thrown into the fire without any prior experience, as happened to the author of this book, and it's entertaining to see him, a computer novice, teach himself what he needed to know to track down a hacker and to educate the U.S. military people in the process. I also found it interesting that, despite the fact that the author was basically a liberal, "anti-establishment", ex-hippie, he nonetheless felt such a sense of pride in his computer network that he was offended that a hacker should be in there mucking around, and this feeling of "ownership" and "responsibility" for his network spurred him on to try to catch the guy.
If you don't know anything about computers, you'll enjoy the book because, not only does the author explain concepts in layman terms, but as others have pointed out the book itself reads like a spy novel of sorts, and there's also quite a bit of humor thrown in, so it's quite entertaining overall.
If you are not a "techy", don't let it deter you. The author explains all of the technology that he speaks about in very easy to understand terms, and uses a lot of good analogies. I would put this book up against just about any spy novel out there.....The only difference is that THIS IS TRUE!
..and it all started with a 75 cent discrepancy.
*Note: Just a few weeks ago in 2017 Equifax, one of the largest credit reporting bureaus in the U.S., allowed a back door to their data and over 141 million records were stolen, including mine. Think your personal information is safe online? As long as businesses and government politicians continue to deny problems and under fund data security none of our personal information is safe.
Top reviews from other countries
From the very early days of the internet, long before the world wide web, when nobody took IT security seriously, all those TLA were fighting each other and passing the buck and hackers were learning to exploit weaknesses and lax security. A fascinating read. Enough technical detail to let you know what is happening but simple enough for any layman to understand.
And a warning about lax security procedures that are even more relevant today now that everything is online.
If i was a teacher, lecturer or mentor in Cyber security/Network Security this would be a compulsory read!