Cybersecurity Book Review: The Cuckoo’s Egg

Tracking a Spy Through the Maze of Computer Espionage

Teri Radichel
Cloud Security

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

🔒 Related Stories: Data Breaches | Security Books.

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A while ago I listened to The Cuckoo’s Egg by Cliff Stoll as an audiobook. I just had one question after hearing this story: How is this not yet a movie? I did some searching around and found a documentary on the topic but no box office thriller. Perhaps it takes a certain type of geekiness to appreciate this book but I can’t see how anyone could not be fascinated reading this game of cat and mouse.

We need more people in cybersecurity you say? Why not share this story with kids in school who might be interested in how an astronomer got involved tracking a hacker trying to break into government and military systems across the United States? I am onto another book now that tells the stories of other cybersecurity professionals. One went into the profession because he read Stoll’s book.

The Cuckoo’s Egg was written at a time when people didn’t understand the implications of cybersecurity attacks or take them seriously. Perhaps many still don’t, but I think if Cliff Stoll called up today to tell someone in the government a hacker was accessing military systems to view or remove data the reaction might be a bit different. The challenge in this book was, in part, to get anyone to listen to him.

As always in cybersecurity, people in Stoll’s organization at a university didn’t see the point and wanted to shut the whole operation down after it went on for what seemed like too long to them. They didn’t care that other military and government systems were affected. It wasn’t their job or responsibility and it impacted their budget.

What intrigued me also as Stoll took steps to capture the hacker was his knowledge of things beyond what I know about logical cybersecurity — the software and bits and bytes we examine and control to try to secure our systems. Cliff Stoll was using physical devices and knowledge in other domains to try to hone in on his adversary. Not only that, his girlfriend helped him create some contrived information to try to trick the hacker into hanging around long enough to capture him.

What this book really demonstrates is that as a cybersecurity professional, it helps to be creative and think like an attacker — a phrase that gets thrown around in security sometimes. But as I heard Adam Shostack, one of the top experts on the topic of threat modeling say in a presentation at BSides Vancouver, people outside of cybersecurity might understand what that means. By reading this book they will. Cliff Stoll recounts the back and forth with his adversary and how a cybersecurity professional tries to determine what might be effective in uncovering and identifying a cyber thief.

Technology has changed quite a bit since the publication date of this book. It is still relevant though because as I write about in the last chapter of my own book on cybersecurity, the more things change the more they stay the same. Cybersecurity fundamentals and concepts in this book are the same as those that cause the SolarWinds Hack I’ve been writing about recently: connected networks and stolen credentials.

I highly recommend this book to anyone interested in cybersecurity. You’ll also like it if you are the kind of person who likes spy movies or crime shows where law enforcement is trying to capture a criminal.

Follow for updates.

Teri Radichel | © 2nd Sight Lab 2021

About Teri Radichel:
~~~~~~~~~~~~~~~~~~~~
⭐️ Author
: Cybersecurity Books
⭐️ Presentations
: Presentations by Teri Radichel
⭐️ Recognition: SANS Award, AWS Security Hero, IANS Faculty
⭐️ Certifications: SANS ~ GSE 240
⭐️ Education: BA Business, Master of Software Engineering, Master of Infosec
⭐️ Company: Penetration Tests, Assessments, Phone Consulting ~ 2nd Sight Lab
Need Help With Cybersecurity, Cloud, or Application Security?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
🔒 Request a
penetration test or security assessment
🔒 Schedule a
consulting call
🔒
Cybersecurity Speaker for Presentation
Follow for more stories like this:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

❤️ Sign Up my Medium Email List
❤️ Twitter:
@teriradichel
❤️ LinkedIn:
https://www.linkedin.com/in/teriradichel
❤️ Mastodon:
@teriradichel@infosec.exchange
❤️ Facebook:
2nd Sight Lab
❤️ YouTube:
@2ndsightlab

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award