The Cuckoo's Egg (book)
   HOME

TheInfoList



OR:

''The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage'' is a 1989 book written by
Clifford Stoll Clifford Paul "Cliff" Stoll (born June 4, 1950) is an American astronomer, author and teacher. He is best known for his investigation in 1986, while working as a systems administrator at the Lawrence Berkeley National Laboratory, that led to th ...
. It is his first-person account of the hunt for a computer hacker who broke into a computer at the
Lawrence Berkeley National Laboratory Lawrence Berkeley National Laboratory (LBNL), commonly referred to as the Berkeley Lab, is a United States Department of Energy National Labs, United States national laboratory that is owned by, and conducts scientific research on behalf of, t ...
(LBNL). Stoll's use of the term extended the metaphor ''Cuckoo's egg'' from brood parasitism in birds to
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
.


Summary

Author Clifford Stoll, an
astronomer An astronomer is a scientist in the field of astronomy who focuses their studies on a specific question or field outside the scope of Earth. They observe astronomical objects such as stars, planets, natural satellite, moons, comets and galaxy, g ...
by training, managed computers at
Lawrence Berkeley National Laboratory Lawrence Berkeley National Laboratory (LBNL), commonly referred to as the Berkeley Lab, is a United States Department of Energy National Labs, United States national laboratory that is owned by, and conducts scientific research on behalf of, t ...
(LBNL) in California. One day in 1986 his supervisor asked him to resolve an accounting error of 75 cents in the computer usage accounts. Stoll traced the error to an unauthorized user who had apparently used nine seconds of computer time and not paid for it. Stoll eventually realized that the unauthorized user was a hacker who had acquired
superuser In computing, the superuser is a special user account used for system administration. Depending on the operating system (OS), the actual name of this account might be root, administrator, admin or supervisor. In some cases, the actual name of t ...
access to the LBNL system by exploiting a vulnerability in the
movemail movemail is a computer program by the GNU Project that moves mail from a user's Unix mailspool to another file. It is part of GNU Mailutils. A compromising of movemail was the backbone of the hack described in ''The Cuckoo's Egg'' by which Markus ...
function of the original
GNU Emacs GNU Emacs is a free software text editor. It was created by GNU Project founder Richard Stallman, based on the Emacs editor developed for Unix operating systems. GNU Emacs has been a central component of the GNU project and a flagship project of ...
. Early on, and over the course of a long weekend, Stoll rounded up fifty terminals, as well as teleprinters, mostly by “borrowing” them from the desks of co-workers away for the weekend. These he physically attached to the fifty incoming phone lines at LBNL. When the hacker dialed in that weekend, Stoll located the phone line used, which was coming from the Tymnet routing service. With the help of Tymnet, he eventually tracked the intrusion to a call center at
MITRE The mitre (Commonwealth English) (; Greek: μίτρα, "headband" or "turban") or miter (American English; see spelling differences), is a type of headgear now known as the traditional, ceremonial headdress of bishops and certain abbots in ...
, a defense contractor in
McLean, Virginia McLean ( ) is an unincorporated community and census-designated place (CDP) in Fairfax County in Northern Virginia. McLean is home to many diplomats, military, members of Congress, and high-ranking government officials partially due to its proxim ...
. Over the next ten months, Stoll spent enormous amounts of time and effort tracing the hacker's origin. He saw that the hacker was using a 1200
baud In telecommunication and electronics, baud (; symbol: Bd) is a common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel. It is the unit for symbol rate or modulatio ...
connection and realized that the intrusion was coming through a telephone
modem A modulator-demodulator or modem is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio. A modem transmits data by Modulation#Digital modulati ...
connection. Stoll's colleagues, Paul Murray and Lloyd Bellknap, assisted with the phone lines. After returning his “borrowed” terminals, Stoll left a teleprinter attached to the intrusion line in order to see and record everything the hacker did. He watched as the hacker sought – and sometimes gained – unauthorized access to military bases around the United States, looking for files that contained words such as “nuclear” or “ SDI” (Strategic Defense Initiative). The hacker also copied password files (in order to make dictionary attacks) and set up Trojan horses to find passwords. Stoll was amazed that on many of these high-security sites the hacker could easily guess passwords, since many system administrators had never bothered to change the passwords from their factory defaults. Even on military bases, the hacker was sometimes able to log in as “guest” with no password. This was one of the first ⁠— ⁠if not ''the'' first ⁠— documented cases of a computer break-in, and Stoll seems to have been the first to keep a daily logbook of the hacker's activities. Over the course of his investigation, Stoll contacted various agents at the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI), the
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA), the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA) and the
United States Air Force Office of Special Investigations The Department of the Air Force Office of Special Investigations (OSI) is a U.S. federal law enforcement agency that reports directly to the Secretary of the Air Force. OSI is also a U.S. Air Force field operating agency under the administrative ...
(OSI). At the very beginning there was confusion as to jurisdiction and a general reluctance to share information; the FBI in particular was uninterested as no large sum of money was involved and no
classified information Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know, ...
host was accessed. Studying his log book, Stoll saw that the hacker was familiar with VAX/VMS, as well as
AT&T Unix The history of Unix dates back to the mid-1960s, when the Massachusetts Institute of Technology, AT&T Bell Labs, and General Electric were jointly developing an experimental time-sharing operating system called Multics for the GE-645 mainframe. M ...
. He also noted that the hacker tended to be active around the middle of the day,
Pacific time The Pacific Time Zone (PT) is a time zone encompassing parts of western Canada, the western United States, and western Mexico. Places in this zone observe standard time by subtracting eight hours from Coordinated Universal Time ( UTC−08:00). ...
. Eventually Stoll hypothesized that, since modem bills are cheaper at night and most people have school or a day job and would only have a lot of free time for hacking at night, the hacker was in a time zone some distance to the east, likely beyond the US East Coast. With the help of Tymnet and agents from various agencies, Stoll found that the intrusion was coming from
West Germany West Germany is the colloquial term used to indicate the Federal Republic of Germany (FRG; german: Bundesrepublik Deutschland , BRD) between its formation on 23 May 1949 and the German reunification through the accession of East Germany on 3 O ...
via satellite. The West German post office, the '' Deutsche Bundespost'', had authority over the phone system there, and traced the calls to a university in
Bremen Bremen (Low German also: ''Breem'' or ''Bräm''), officially the City Municipality of Bremen (german: Stadtgemeinde Bremen, ), is the capital of the German state Free Hanseatic City of Bremen (''Freie Hansestadt Bremen''), a two-city-state consis ...
. In order to entice the hacker to reveal himself, Stoll set up an elaborate hoax – known today as a honeypot – by inventing a fictitious department at LBNL that had supposedly been newly formed by an “SDI“ contract, also fictitious. When he realized the hacker was particularly interested in the faux SDI entity, he filled the “SDInet” account (operated by an imaginary secretary named ‘Barbara Sherwin’) with large files full of impressive-sounding
bureaucratese Officialese, bureaucratese, or governmentese is language that sounds official. It is the "language of officialdom". Officialese is characterized by a preference for wordy, long sentences; a preference for complex words, code words or buzzwords ove ...
. The ploy worked, and the ''Deutsche Bundespost'' finally located the hacker at his home in
Hanover Hanover (; german: Hannover ; nds, Hannober) is the capital and largest city of the German state of Lower Saxony. Its 535,932 (2021) inhabitants make it the 13th-largest city in Germany as well as the fourth-largest city in Northern Germany ...
. The hacker's name was
Markus Hess Markus Hess, a German citizen, is best known for his endeavours as a hacker in the late 1980s. Alongside fellow hackers Dirk Brzezinski and Peter Carl, Hess hacked into networks of military and industrial computers based in the United States, Euro ...
, and he had been engaged for some years in selling the results of his hacking to the
Soviet Union The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, it was nominally a federal union of fifteen national ...
’s intelligence agency, the
KGB The KGB (russian: links=no, lit=Committee for State Security, Комитет государственной безопасности (КГБ), a=ru-KGB.ogg, p=kəmʲɪˈtʲet ɡəsʊˈdarstvʲɪn(ː)əj bʲɪzɐˈpasnəsʲtʲɪ, Komitet gosud ...
. There was ancillary proof of this when a Hungarian
agent Agent may refer to: Espionage, investigation, and law *, spies or intelligence officers * Law of agency, laws involving a person authorized to act on behalf of another ** Agent of record, a person with a contractual agreement with an insuranc ...
contacted the fictitious SDInet at LBL by mail, based on information he could only have obtained through Hess. Apparently this was the KGB's method of double-checking to see if Hess was just making up the information he was selling. Stoll later flew to West Germany to testify at the trial of Hess.


References in popular culture

* The book was chronicled in an episode of
WGBH WGBH may refer to: * WGBH Educational Foundation, based in Boston, Massachusetts, United States ** WGBH (FM), a public radio station at Boston, Massachusetts on 89.7 MHz owned by the WGBH Educational Foundation ** WGBH-TV WGBH-TV (channel 2), ...
’s ''
NOVA A nova (plural novae or novas) is a transient astronomical event that causes the sudden appearance of a bright, apparently "new" star (hence the name "nova", which is Latin for "new") that slowly fades over weeks or months. Causes of the dramati ...
'' entitled “The KGB, the Computer, and Me”, which aired on
PBS The Public Broadcasting Service (PBS) is an American public broadcasting, public broadcaster and Non-commercial activity, non-commercial, Terrestrial television, free-to-air television network based in Arlington, Virginia. PBS is a publicly fu ...
stations on October 3, 1990. Stoll and several of his co-workers participated in re-enactments of the events described.Richard Stoll's Personal Webpage on TV adaptations
* Another documentary, ''Spycatcher'', was made by Yorkshire Television. * The number sequence mentioned in Chapter 48 has become a popular math puzzle, known as the Cuckoo's Egg, the Morris Number Sequence, or the
look-and-say sequence In mathematics, the look-and-say sequence is the integer sequence, sequence of integers beginning as follows: : 1, 11, 21, 1211, 111221, 312211, 13112221, 1113213211, 31131211131221, ... . To generate a member of the sequence from the previous m ...
. * In the summer of 2000 the name “Cuckoo’s Egg” was used to describe a file sharing hack attempt that substituted white noise or sound effects files for legitimate song files on Napster and other networks. * These events are referenced in Cory Doctorow’s
speculative fiction Speculative fiction is a term that has been used with a variety of (sometimes contradictory) meanings. The broadest interpretation is as a category of fiction encompassing genres with elements that do not exist in reality, recorded history, na ...
short story “The Things that Make Me Weak and Strange Get Engineered Away”, as “(a) sysadmin who’d tracked a $0.75 billing anomaly back to a foreign spy-ring that was using his systems to hack his military”.Tor.com
Edited 2015-06-24.


See also

*
Digital footprint Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or digital devices. Digital footprints can be classified as either passive or ...
*
Karl Koch (hacker) Karl Werner Lothar Koch (July 22, 1965 – c. May 23, 1989) was a German hacker in the 1980s, who called himself "hagbard", after Hagbard Celine. He was involved in a Cold War computer espionage incident. Biography Koch was born in Hanover. ...
* 23 – a film made from the hackers viewpoint.


References


External links


Image of 1st Edition Cover—DoubledayStalking the Wily Hacker
The author's original article about the trap
''Booknotes'' interview with Stoll on ''Cuckoo’s Egg'', December 3, 1989Reference to the book on Internet Storm CenterWest German hackers use Columbia's Kermit software to break into dozens of US military computers and capture information for the KGB
Columbia University Computing History, 1986-1987 section. {{DEFAULTSORT:Cuckoo's Egg, The 1989 non-fiction books Works about cybercrime Computer security books Hacking (computer security) Trojan horses Doubleday (publisher) books Books about computer hacking