

#4041
Mentioned in 12 episodes
The Cuckoo’s Egg
Tracking a Spy Through the Maze of Computer Espionage
Book • 1989
In this book, Clifford Stoll recounts his unexpected adventure as a computer systems manager at the Lawrence Berkeley National Laboratory.
A 75-cent accounting error leads him to discover an unauthorized user on the system, later identified as a hacker named 'Hunter' who was stealing sensitive military information.
Stoll's one-man investigation involves a high-stakes game of deception, broken codes, satellites, and missile bases, eventually gaining the attention of the CIA. The book details the early days of cybersecurity, the challenges of persuading government agencies to cooperate, and the race against time to safeguard sensitive information from falling into the wrong hands.
A 75-cent accounting error leads him to discover an unauthorized user on the system, later identified as a hacker named 'Hunter' who was stealing sensitive military information.
Stoll's one-man investigation involves a high-stakes game of deception, broken codes, satellites, and missile bases, eventually gaining the attention of the CIA. The book details the early days of cybersecurity, the challenges of persuading government agencies to cooperate, and the race against time to safeguard sensitive information from falling into the wrong hands.
Mentioned by
















Mentioned in 12 episodes
Recommended by 

as a classic hacker story.


Jack Rhysider

243 snips
169: MoD
Mentioned by 

as an example of a book whose content could be ingested into a knowledge graph for conversational AI.


Chris Benson

69 snips
Explainable AI that is accessible for all humans
Mentioned by ![undefined]()

as a firsthand account of tracking a spy through computer espionage.

Christopher Bailey

53 snips
Manage Projects With pyproject.toml & Explore Polars LazyFrames
Mentioned by 

when referencing Bill Cheswick's pioneering work and the early history of honeypots.


Steve Gibson
43 snips
SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN
Mentioned by ![undefined]()

, referring to Cliff Stoll's famous book about tracking a spy through computer espionage.

Patrick Gray

32 snips
How the World Got Owned Episode 1: The 1980s
Mentioned by ![undefined]()

as historically relevant and still super important in cybersecurity.

Helen Patton
12 snips
The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416
Mentioned by 

when recalling an early hacking story and recommending it as a classic account of intrusion detection.


Matt Coyote

AI agents and the future of cyber
Mentioned by 

when introducing 

as the author of the book about computer espionage.


Sally Helm


Cliff Stoll

An Astronomer Hunts a KGB Hacker
Mentioned as a first-person account of Stoll's investigation of a hacking campaign carried out by government hackers.

How the classic anime ‘Ghost in the Shell’ predicted the future of cybersecurity 30 years ago
Mentioned by ![undefined]()

in the context of a discussion about the importance of data consistency and the trade-off between having a perfectly correct view versus a useful one.

Jeffrey Fredrick

Learning to Love Inconsistent Data



