The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage by Clifford Stoll

774 Words4 Pages
The book, The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage is a 1990 novel written by Clifford Stoll. Published by arrangement with Doubleday, a division of Bantam Doubleday Dell Publishing Group, Inc, the main idea of the book is a first-person account of the hunt for a computer cracker who broke into a computer at the Lawrence Berkley National Library. Winding up on the front page of The New York Times, the astronomer trained and accidental computer expert, Cliff Stoll became an unexpected American hero. After catching his spy in 1989, Stoll been giving talks for the FBI, CIA, and NASA, as well as speaking to the US Senate and the World Economic Forum. Stoll is now making Klein Bottles for mathematics and rebuilds…show more content…
Stoll went to the computer police, also known as the FBI, many times and was shut down just as many because it held little concern for them. Finally receiving a trace from the other side of the country, Stoll caught the attention of the CIA, especially since it came from their system. The racing of the hacker lead Stoll to many places, finding them to be dead ends and making him question whether or not the CIA was actually not a victim, but a part of this. Between using the MITRE system and also the LBL, Stoll thought he had foiled the hacker, until he had figured out that the hacker was coming from Germany. The leads are finally spent, to where the boss and Stoll’s department want to pull the plug. They believed that too many hours and too much money were flowing out, without any results. They change their minds and postpone the deadline until the New Year, because they start to believe that Stoll is actually getting closer to the hacker. Stoll becomes inspired and sets a trap for the unsuspecting hacker, using a technique called the SDINET (Strategic Defense Initiative Network Office). This technique is a program that is filled with a lot of tempting and false information. This information would get the hacker’s interest long enough to allow the German Bundespost enough time to trace. By this time it became painfully obvious that the simple hacking of $0.75 was the actual hacking of military information. The

More about The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage by Clifford Stoll

Open Document