Goodreads helps you keep track of books you want to read.
Start by marking “The Cuckoo's Egg” as Want to Read:
The Cuckoo's Egg
Enlarge cover
Rate this book
Clear rating

The Cuckoo's Egg

4.18 of 5 stars 4.18  ·  rating details  ·  4,195 ratings  ·  370 reviews
A sentimental favorite, The Cuckoo's Egg seems to have inspired a whole category of books exploring the quest to capture computer criminals. Still, even several years after its initial publication and after much imitation, the book remains a good read with an engaging story line and a critical outlook, as Clifford Stoll becomes, almost unwillingly, a one-man security force...more
Paperback, 394 pages
Published 1991 by Pan Books (first published 1989)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about The Cuckoo's Egg, please sign up.

Be the first to ask a question about The Cuckoo's Egg

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 3,000)
filter  |  sort: default (?)  |  rating details
Brian Rosenblat
I really enjoyed this book. Loved the references to Berkeley, the hacker chase, but most interestingly, it takes you back to an earlier time in computing (in 1989)- which I thought was a fascinating reminder of what things were like. For example, I love the explanation of 'electronic mail.' At this point, I think most people have forgotten what the 'e' in email stands for.

Also, a favorite passage, as he explains what the "Internet" is:

"At first, DARPA's network [the Internet] was simply a test
Eric Lin
Great book. The FBI was incredibly frustrating to read about. Not many people would have been persistent enough to stick with this. I'm impressed with how diligently the author worked to track this guy down.

One small gripe though - the author seemed way too self conscious about his political identity add a result of cooperating with the guys in suits. Was he trying to spin it as an internal struggle between who he was, and who this experience made him become? Not buying it, Cliff.
I read this book first around sixth grade and again last month. It was wicked good the first time and so-so the second time. I think as I've gotten older and wiser and more discerning, and as technology has progressed, this book hasn't aged well.

Here's the synop: Cliff Stoll is an astrophysicist who knows just a little something about computers (obviously a lot). He's living at UC Berkeley in the early days of the internets. One day he discovers a 75 cent accounting error (this is back before AO...more
Executive Summary: A truly excellent and fascinating tale of hacking in the early days of the internet.

Full Review
I'm fascinated with computer crime. I have for as long as I can remember being interested in computers. Somehow I had never managed to read this book.

I'm glad I finally got around to it. It might be my new favorite. Cliff Stoll tells an engaging and personal story of his discovery of computer networks, security exploits and computer crime that reads more like a spy novel than a tec...more
Por razones laborales he estado revisando temas de seguridad informática, eso me llevó a releer un texto que escribí y publiqué en Revista Red hace como diez años. Los temas de seguridad han evolucionado y hoy estamos inmersos en temas muy interesantes de biometría para autenticación de usuarios, como platicaba hace unos días con mi amigo Enrique Daltabuit, experto nacional en el tema. Sin embargo el texto de hace diez años tiene vigencia en la medida en la que comenta un libro fascinante, uno d...more
Jonathan Leblang
Interesting book, especially since I worked at MITRE at the time, and had first-hand knowledge of the method the hacker used to go through the systems. Also met him at a security conference -- he gave a nice presentation.
Here is the story of how I came to read The Cuckoo’s Egg: I purchased it at a library book sale because it looked interesting, tossed it in a box because I didn’t have time to read it, and promptly forgot about it.

Then I got married, and we got real bookshelves instead of boxes, and I put the book on the shelf because it was hardbound and hardbound books show that you are a serious, thoughtful person.

Then my Uncle Steve came over from Florida and started telling me about a book he had read, a tr...more
(5.0) So much fun! (may need to be a little computer-geeky to really love it)

Crazy cool true story about an astronomer-turned-sysadmin at Berkeley in the 1980s who decides to track down a 75 cent accounting discrepancy in server usage, and turns into a year-long hunt to track down a sneaky computer spy operating for the KGB. Covers several severe holes in Unix security, but emphasizes that the weakest link in security is almost always from human operators.

Very engaging read, tore right through i...more
Mister E
This is one of the books that really defined my life.

While in the astrophysics program at Berkalurk, young Clifford Stoll is asked to look into an extra couple cents being charged for their computer use. What follows is the discovery of an East German (Cold War era mind you) hacker using Berkeley's computer network to enter private miliary networks.

This is one of the most realistic novels on hacking you could find. Forget the deck's of Gibson and the 3D, motorcycle racing or Stephenson, this is...more
I read this in 1998... My dad had given me a copy so I could understand better what he did for work. It was weird to read...I kept thinking of the gifts he had brought me from his business trips to San Francisco and New Mexico when i was a kid. Anyway, it's a good book. Not the most literary writing, but that doesn't really matter. It's a real-life thriller about one of the first major hacking cases of the Information Age. It's intense. I won't tell you whodunnit. You have to read it yourself.
James Swenson
Highly recommended, especially for anyone who's been a computer aficionado for a while. The Cuckoo's Egg is a real-life spy thriller that takes us back to the pre-Internet era of networked computing. The author, on his first day at work as a network administrator, is assigned to track down a 75-cent error in the accounting system that bills users for their computer time. It turns out that the 9 seconds in question were used by a hacker passing through. Gradually, Stoll's life is taken over by th...more
Wilson Lanue
For some years after its 1989 debut, The Cuckoo's Egg was the book to read about computer hacking (or, more specifically, counter-hacking). But this superb read is much more than the memoir of an astronomer who followed a 75-cent accounting "error" to a Soviet spy and sudden fame as the world's top computer security expert.

It's the story of a sincere Berkeley liberal who came to see conservative establishment types as fellow human beings, to the confusion of those closest to him. Candid, thought...more
I've read this book already several times over the last decades (in the german translation), but this new reread was every bit as enjoyable as all the times (5-7, i don#t really know and still i'm every time surprised about the afterword with it's second story... oops spoilers! :D) in the past. Cuckoos Egg still is one of my favorite books, mainly because of the weird mixture of computer talk, spy story, historic episode and truly mind boggling circumstances described.

Cliff Stoll simply found a...more
Joan Szechtman
THE CUCKOO’S EGG is a quirky tale of computer hacking and espionage. When the grant money ran out, Stoll, an astronomer at the Keck Observatory at the Lawrence Berkeley Lab (LBL) suddenly had a choice—collect unemployment or develop programs in LBL’s basement for the astronomers who still had grants. He chose to program. One task Stoll was assigned had nothing to do with astronomy, but rather to keep track of computer usage. In other words, he had to work on the accounting software. He soon stum...more
I really appreciated this book, and Cliff Stoll is an excellent storyteller. I think he's fabulous. He and wife are a combination to be remembered! It was almost like a musical portrayal, building up the pressure, adding the proper elements to ease and balance and really coming into a crashing ending which I haven't quite reached yet.
It's also sort of like a movie I would have loved to have seen. I can just imagine the full hippie scene..."Be Polite Now" to the "expensive suits with no sense of...more
Feb 13, 2008 Jared rated it 4 of 5 stars  ·  review of another edition
Recommends it for: computer geeks, network security geeks, and mystery lovers
This book is an entertaining, true-story look at tracking hackers down in the early days of computer networking. It's a must-read for computer and network security professionals to demonstrate the importance of logging, auditing, and persistence in catching clever black-hats.

Cliff Stoll, an astrophysicist, had to take a job running computers for the Lawrence Berkeley Lab when the funding ran out for his research. One of his first assignments was to track down the source of an accounting error th...more
Borrowed this from my brother a few months ago & it seemed a fitting follow-up to Cryptonomicon.

Published in 1989, it details Stoll's attempts at tracking down a hacker who has broken into the Lawrence Berkeley Labs computer system. As Stoll fell into the role of systems manager almost by accident (he was an astronomer by training) he does an excellent job of covering the then-current state of networking at a fairly basic level. Anyone with general computer knowledge should be able to follo...more
Aug 29, 2010 D. rated it 4 of 5 stars  ·  review of another edition
Recommends it for: Geeks, anybody with an interest in computer networking and security.
Very interesting and insightful account of a hacker's attack (from the good guys' perspective) which was hardly taken seriously in a time way before the Internet as we know it. I do agree with some of the other reviewers stating little Cliff is a bit too whiny about not being supported by the various "three-letter agencies" in his crusade against this spy and it does get a bit repetitive after a while. Same goes for the parts about his personal life, although it was interesting to see how far hi...more
Stephen Adams
This book is a must-read for any system admin/computer tech. I've never had so much fun reading terminal output than when I had this book in my hands. Cliff Stoll tells the story of how, through a simple accounting error, he discovered that a hacker was trying to find his way into government computer systems. In a time where there were no such thing as "computer crimes" he goes from local police, to FBI, to the CIA trying to find somebody who can help him track down this guy. This book is simply...more
Mike Ivanov
I read this book by the hot overhead spotlight of my airplane seat on business trips back and forth between California and DC to meet with acronym agencies and defense contractors. I think that made a good setting for getting absorbed in this very unique book. It's a thriller, yes, but it happened, out there in primordial cyberspace: the first encounter between a system administrator and a ghostly attacker. Lucky for us, the system administrator was Cliff Stoll. Upon finding himself thrust into...more
This firsthand account of a major hacking incident from the 1980s is really interesting. Once you get into the story, it's a page turner, like a good mystery novel. I found it interesting to compare and contrast the network and computing environment of the '80s with that of today, but it's equally intriguing as a psychological study of the author, a conflicted anti-establishment liberal trying to do the right thing but wondering if he's become a turncoat by cooperating with the federal authoriti...more
Noah Preszler
Reads like a (neo-)noir novel. More like Jeff Lebowski than Sam Spade, a Deadhead with long hair, left-leaning politics, and a bicycle rather than a car, the dogged protagonist perseveres against budget constraints, bosses who continuously threaten to pull the plug, entirely unhelpful TLA government agencies, and colleagues who find his chase to be a waste of time to eventually bring down a German hacker selling US military secrets to the Soviet Union. And it all starts his first day on the job...more
Stuart Langridge

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).Cliff Stoll was an ast

This is a real-life spy thriller centered on computer hacking and espionage on high-end military and research establishments in the US. Because it is real-life, we don't see hot blondes, wild car chases and big-time shoot-outs. Instead, we read about painstaking hours spent by the author, stalking an intruder through computer terminals and communication hardware and experiencing indifference from the FBI, the NSA, the CIA and the Air force and the Army even though it is these institutions' compu...more
I have always been highly interested in the techno-thriller genre and have quite a collection of such novels in the 'currently reading' or 'to be read' stages. After Neal Stephenson's Cryptonomicon, I needed something a little less taxing on my brain and decided to go ahead with The Cuckoo's Egg.
The book is based on the author's encounter with a German hacker way back in the 80's. It starts with the author, an astronomer at The Lawrence Berkeley lab, getting intrigued by a 75 cent error thrown b...more
Bev Walkling
Who knew that I would find a non-fiction book about tracking down a computer hacker/spy so fascinating? Certainly not me, but I was hooked early on as Clifford Stoll explains how he started a new position and was assigned to track down a missing 75 cents. What they thought would be a quick fix led to a fascinating story of the early days of computers and email. Stoll was a rather free spirit and tells his story with a liberal sprinkling of humour. What originally sounded as if it might be somewh...more
Nancy Schober
The parallels between this and the last book I read 'Against all Enemies' were chilling.

Absolutely fabulous'd expect - from the subject matter - that this would be as dry as a bone. But it's not. NOT AT ALL!

Sometimes I have trouble following a whodunit. But not here -- it's all laid our it clear, concise lucid writing that Stoll also manages to make engaging through his characters.
Rickard Andersson
As I'm typing this I feel conflicted.

I do like the story and I think it's at least fairly well paced and well written, with some carefully chosen spots for short diversions into completely unrelated moments that only serve as contrasts to the main theme of the book.

There is a big amount of repetition in the book, however. Not just of happenings (can we blame Stoll for noting that his intruders only logged in a few minutes... again...?) but of phrases and remarks about people and agencies. Stoll...more
Zachary Kjellberg
Interesting non-fiction book documenting a hacker prowling the early computer networks of 1986. The book is quite interesting as you learn a great deal about early networks and vulnerabilities. Being a fan of Linux, much of the content was very familiar but the book presents each topic so non-technical readers understand what is occurring. This results in some comical explanations, as he refers to things like Ethernet as advanced new technologies. As the book progresses, Cliff desires to find ou...more
David B
When astronomer/computer administrator Clifford Stoll discovered a 75-cent discrepency in an accounting program, he decided not to overlook it. From this insignificant starting point, the trail led to a computer hacker in contact with the KGB and working out of Germany who was systematically targeting the computers of NASA and the US military. It also brought him into contact with the American intelligence community and led to a new emphasis on preventing computer espionage.

Stoll tells his story...more
« previous 1 3 4 5 6 7 8 9 99 100 next »
topics  posts  views  last activity   
Funny. I just heard about this book the first time yesterday 3 54 Nov 15, 2011 01:09AM  
Computer 1 13 Aug 30, 2011 10:05PM  
  • Secrets and Lies: Digital Security in a Networked World
  • Where Wizards Stay Up Late: The Origins of the Internet
  • Masters of Deception: The Gang That Ruled Cyberspace
  • Hackers: Heroes of the Computer Revolution
  • The Hacker Crackdown: Law and Disorder on the Electronic Frontier
  • Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • On the Edge: The Spectacular Rise and Fall of Commodore
  • The Soul of a New Machine
  • Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age
  • The Fugitive Game: Online with Kevin Mitnick
  • Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
  • Accidental Empires
  • Cyberwar: The Next Threat to National Security & What to Do About It
  • What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry
  • The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization
  • Practical Cryptography
  • Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture
Silicon Snake Oil: Second Thoughts on the Information Highway High-Tech Heretic: Reflections of a Computer Contrarian Confessioni di un eretico high-tech

Share This Book

“VI was predecessor to hundreds of word processing systems. By now, Unix folks see it as a bit stodgy—it hasn’t the versatility of Gnu-Emacs, nor the friendliness of more modern editors. Despite that, VI shows up on every Unix system.” 0 likes
“Over the past decade Stallman created a powerful editing program called Gnu-Emacs. But Gnu’s much more than just a text editor. It’s easy to customize to your personal preferences. It’s a foundation upon which other programs can be built. It even has its own mail facility built in. Naturally, our physicists demanded Gnu; with an eye to selling more computing cycles, we installed it happily.” 0 likes
More quotes…