Kindle Price: $13.99

Save $5.00 (26%)

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Audiobook Price: $19.93

Save: $17.27 (87%)

You've subscribed to ! We will preorder your items within 24 hours of when they become available. When new books are released, we'll charge your default payment method for the lowest price available during the pre-order period.
Update your device or payment method, cancel individual pre-orders or your subscription at
Your Memberships & Subscriptions

Buy for others

Give as a gift or purchase for a team or group.
Learn more

Buying and sending eBooks to others

  1. Select quantity
  2. Buy and send eBooks
  3. Recipients can read on any device

These ebooks can only be redeemed by recipients in the US. Redemption links and eBooks cannot be resold.

Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Something went wrong. Please try your request again later.

CUCKOO'S EGG Kindle Edition

4.7 4.7 out of 5 stars 2,822 ratings

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).

Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Read more Read less

Add a debit or credit card to save time when you check out
Convenient and secure with 2 clicks. Add your card

Editorial Reviews

Amazon.com Review

A sentimental favorite, The Cuckoo's Egg seems to have inspired a whole category of books exploring the quest to capture computer criminals. Still, even several years after its initial publication and after much imitation, the book remains a good read with an engaging story line and a critical outlook, as Clifford Stoll becomes, almost unwillingly, a one-man security force trying to track down faceless criminals who've invaded the university computer lab he stewards. What first appears as a 75-cent accounting error in a computer log is eventually revealed to be a ring of industrial espionage, primarily thanks to Stoll's persistence and intellectual tenacity.

From Publishers Weekly

A 75-cent discrepancy in billing for computer time led Stoll, an astrophysicist working as a systems manager at a California laboratory, on a quest that reads with the tension and excitement of a fictional thriller. Painstakingly he tracked down a hacker who was attempting to access American computer networks, in particular those involved with national security, and actually reached into an estimated 30 of the 450 systems he attacked. Initially Stroll waged a lone battle, his employers begrudging him the time spent on his search and several government agencies refused to cooperate. But his diligence paid off and in due course it was learned that the hacker, 25-year-old Markus Hess of Hanover, Germany, was involved with a spy ring. Eight members were arrested by the West German authorities but all but one were eventually released. Although the book will be best appreciated by the computer literate, even illiterates should be able to follow the technical complexities with little difficulty. Literary Guild selection.
Copyright 1989 Reed Business Information, Inc.

Product details

  • ASIN ‏ : ‎ B0083DJXCM
  • Publisher ‏ : ‎ Doubleday; 1st edition (May 23, 2012)
  • Publication date ‏ : ‎ May 23, 2012
  • Language ‏ : ‎ English
  • File size ‏ : ‎ 3965 KB
  • Text-to-Speech ‏ : ‎ Enabled
  • Screen Reader ‏ : ‎ Supported
  • Enhanced typesetting ‏ : ‎ Enabled
  • X-Ray ‏ : ‎ Not Enabled
  • Word Wise ‏ : ‎ Enabled
  • Sticky notes ‏ : ‎ On Kindle Scribe
  • Print length ‏ : ‎ 418 pages
  • Page numbers source ISBN ‏ : ‎ 1416507787
  • Customer Reviews:
    4.7 4.7 out of 5 stars 2,822 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Clifford Stoll
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read author blogs and more

Customer reviews

4.7 out of 5 stars
4.7 out of 5
2,822 global ratings

Top reviews from the United States

Reviewed in the United States on February 8, 2024
This account of early-days Internet forensics was fascinating, and explained for me why password hygiene is so important. If that sounds too geeky for you, then do you like a good detective mystery? It works well that way, too.
One person found this helpful
Report
Reviewed in the United States on May 5, 2014
I read this book when it was first published but lost my copy somewhere along the way. I recently picked up another copy to see if it would stand the test of time. I wondered if the technological developments of the past couple decades would turn this book into a dull history lesson or if it would still capture my attention. I found it every bit as fascinating and probably more so now that I'm older and have a different perspective.

At the time the events depicted in this book were taking place, I was starting my career as an IT professional. My first assignment involved supporting a Bellcore (Bell Labs) developed application running on AT&T Unix (sorry Cliff, I'm a "heathen" though I appreciate BSD too!). I got to experience working with DEC PDP-11/70s, 11/34s, VAX 8650s, Decwriters, and RP06/RP8x DASD. Some of that stuff was considered dated at the time and by today's standards they are prehistoric. So, I can relate to Cliff's experience, except for the part of having to track down an international spy, LOL. I missed out on that, thank goodness!

I look at this book differently now than I did in 1989. Even if the reader doesn't care about the origins of the Internet or the finer points of Unix system administration and telecommunications, the depiction of the government's response to the situation is interesting and informative. Of note is the revelation that a particular agency was aware of existing security vulnerabilities but did nothing to address them because they were likely exploiting the vulnerabilities themselves.

This time around, I had more interest in the personal drama surrounding the incident. I could more easily identify with, and laugh at, some of the crazy personalities involved. And, I could empathize with Cliff over the disruption it was causing in his personal life. I also appreciate Cliff's commentary on the philosophy and ethics of computing and how a few bad apples can spoil it for everyone. These concepts are still relevant today despite advancements in technology. After all, the weakest link in the system is the same today as it was back then.

I would recommend this book to anyone getting started in Information Technology and to old school Unix guys and gals who have ever fixed a paper jam on a Decwriter.
15 people found this helpful
Report
Reviewed in the United States on May 30, 2002
Truth is often stranger than fiction, though it isn't always as interesting. THE CUCKOO'S EGG is the exception, giving us a tale just as exciting as any best-selling, fictional thriller and yet is entirely factual. Who would have guessed that such an exhilarating adventure could be totally enclosed in the not-entirely-sexy world of computer networks and security?
THE CUCKOO'S EGG is a fascinating story that began with a minor discrepancy on a small computer network in Berkeley and ended in an international sting operation. Cliff Stoll was the astronomer-turned-programmer who was on the trail of the mysterious hacker, and he tells the story quite well. This is a suspense filled tale of tracking this burglar to his lair, of frustrating red herrings and of maddening bureaucracy that stands in the scientist's way.
There are one or two places that don't flow quite as smoothly as they would have had the author been a professional writer and not an astronomer/computer-engineer. He also tends to be a bit repetitive in his discussions and his repeating of his philosophies. But, as I mentioned, this is from a scientist, not an English major, and his style does have a charm of its own. It helps the story feel more like something that's happening to just an average kind of guy, which is a great aid to heightening tension, and also helps carry the computer-illiterate reader. Despite having to convey some relatively difficult concepts, Stoll does an excellent job at explaining networks, operating systems, programming logic and other computer activities with a minimum of confusion. And while the average reader is gaining insight into the world of computer, the advanced, 21st Century computer operator may find something to feel nostalgic about in this story of late-80's computer networks.
I can easily recommend this book to anyone regardless of his or her prior knowledge of computers. While on the surface this is a story about breaking into electronic equipment, the appealing aspects of the story lie in the mystery itself, not necessarily in the tools of the trade. What this all boils down to is a good old-fashioned game of cops-and-robbers, when computer networks and Internet security were still only in their infancy.
4 people found this helpful
Report
Reviewed in the United States on May 12, 2022
When a computer "bug" shows up on our home computer, we are never quite sure if it's a HW, SW or pilot-error problem so we try different things to isolate the cause.

Like is the computer plugged in.

If we are smart and/or lucky we find the cause soon...but often it's not soon.

In 1955, I worked at MIT’s Whirlwind computer when the WEB was being conceived. We kept a daily log of every bug, maintenance task, new cable run, air conditioning, power interrupts and as well as users.

When computer is networked to thousands of computers worldwide whose passwords are easily compromised, how lucky do we need to be to find a bug…especially if it is designed to avoid our attempts.

Finding an intentional (smart) network bug requires hundreds of different isolation setups to narrow its possible cause and source…so you better keep a log of your every move if you want to get “lucky.”

Such was the problem faced by author Stoll to find what each bug appearance had in common, or not…same time? same targets? same on-line duration?

Only a log could keep track these many attempts…and later become The Cuckoo’s Egg an exciting computer detective story that, indeed, tracks a complex search…to get lucky.

Charles Muhle
6 people found this helpful
Report
Reviewed in the United States on December 2, 2023
Very realistic wonderfully true modern mystery. I heard the author speak at the City of Berkeley Main Public Library. He was as energetic and bold as this book.
3 people found this helpful
Report

Top reviews from other countries

Translate all reviews to English
Diego
5.0 out of 5 stars Great book
Reviewed in Mexico on October 8, 2022
A great book that tells a real story of the beginning of cyber security forensics
Shubham Chauhan
5.0 out of 5 stars Great condition of the used book
Reviewed in India on June 4, 2023
The media could not be loaded.
 If not for the yellowish tint on the pages i would've confused it for new.
Customer image
Shubham Chauhan
5.0 out of 5 stars Great condition of the used book
Reviewed in India on June 4, 2023
If not for the yellowish tint on the pages i would've confused it for new.
Images in this review
Customer image
Customer image
Purple People Eater
5.0 out of 5 stars Excellent read.
Reviewed in the United Kingdom on May 16, 2022
If you've never heard of Cliff Stoll then you should check him out, he's an incredibly interesting bloke.

Aside from that, this book is his account of discovering and tracking down a hacker who'd gotten into a university mainframe, it's properly old school with terminals, modems and dot matrix printers but it's a heck of a story and worth the investment of your time.

Bonus, the 2nd hand copy I got came with a folded up newspaper article from the original reports of the case!
2 people found this helpful
Report
Dirk W.
5.0 out of 5 stars Tolles Buch, macht Spaß zu lesen
Reviewed in Germany on March 30, 2020
Tolles Buch, macht Spaß zu lesen. Als IT'ler empfinde ich es als sehr angenehm, dass hier keine übertriebenen Hacks passieren, sondern eine reale Geschichte spannend aber unaufgeregt wiedergegeben wird. Mir hat der Blick in die Vergangenheit des Internets und gerade auch die kleine Einsicht in die astronomische Forschung, in der ja viele Ideen der Computergeschichte ihren Anfang hatten, gut gefallen.
Ivy
5.0 out of 5 stars Brilliant
Reviewed in Australia on October 30, 2019
Fantastic book, even though after all these years, what is told in this book is a good basis for infoSEC today.

Well worth a read.
Report an issue

Does this item contain inappropriate content?
Do you believe that this item violates a copyright?
Does this item contain quality or formatting issues?