HOME

TheInfoList



OR:

''The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage'' is a 1989 book written by
Clifford Stoll Clifford Paul "Cliff" Stoll (born June 4, 1950) is an American astronomer, author and teacher. He is best known for his investigation in 1986, while working as a systems administrator at the Lawrence Berkeley National Laboratory, that led to t ...
. It is his first-person account of the hunt for a
computer hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
who broke into a computer at the Lawrence Berkeley National Laboratory (LBNL). Stoll's use of the term extended the metaphor ''Cuckoo's egg'' from
brood parasitism Brood parasites are animals that rely on others to raise their young. The strategy appears among birds, insects and fish. The brood parasite manipulates a host, either of the same or of another species, to raise its young as if it were its ow ...
in birds to malware.


Summary

Author Clifford Stoll, an
astronomer An astronomer is a scientist in the field of astronomy who focuses their studies on a specific question or field outside the scope of Earth. They observe astronomical objects such as stars, planets, moons, comets and galaxies – in either ...
by training, managed computers at Lawrence Berkeley National Laboratory (LBNL) in California. One day in 1986 his supervisor asked him to resolve an accounting error of 75 cents in the computer usage accounts. Stoll traced the error to an unauthorized user who had apparently used nine seconds of computer time and not paid for it. Stoll eventually realized that the unauthorized user was a hacker who had acquired superuser access to the LBNL system by exploiting a vulnerability in the movemail function of the original
GNU Emacs GNU Emacs is a free software text editor. It was created by GNU Project founder Richard Stallman, based on the Emacs editor developed for Unix operating systems. GNU Emacs has been a central component of the GNU project and a flagship project of ...
. Early on, and over the course of a
long weekend A long weekend is a weekend that is at least three days long (i.e. a three-day weekend), due to a public or unofficial holiday occurring on either the following Monday or preceding Friday. Many countries also have four-day weekends, in which ...
, Stoll rounded up fifty terminals, as well as teleprinters, mostly by “borrowing” them from the desks of co-workers away for the weekend. These he physically attached to the fifty incoming phone lines at LBNL. When the hacker dialed in that weekend, Stoll located the phone line used, which was coming from the
Tymnet Tymnet was an international data communications network headquartered in Cupertino, California that used virtual call packet-switched technology and X.25, SNA/ SDLC, BSC and Async interfaces to connect host computers (servers) at thousands of la ...
routing service. With the help of Tymnet, he eventually tracked the intrusion to a call center at
MITRE The mitre (Commonwealth English) (; Greek: μίτρα, "headband" or "turban") or miter (American English; see spelling differences), is a type of headgear now known as the traditional, ceremonial headdress of bishops and certain abbots in ...
, a defense contractor in
McLean, Virginia McLean ( ) is an unincorporated community and census-designated place (CDP) in Fairfax County in Northern Virginia. McLean is home to many diplomats, military, members of Congress, and high-ranking government officials partially due to its proxi ...
. Over the next ten months, Stoll spent enormous amounts of time and effort tracing the hacker's origin. He saw that the hacker was using a 1200 baud connection and realized that the intrusion was coming through a telephone
modem A modulator-demodulator or modem is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio. A modem transmits data by Modulation#Digital modulati ...
connection. Stoll's colleagues, Paul Murray and Lloyd Bellknap, assisted with the phone lines. After returning his “borrowed” terminals, Stoll left a teleprinter attached to the intrusion line in order to see and record everything the hacker did. He watched as the hacker sought – and sometimes gained – unauthorized access to military bases around the United States, looking for files that contained words such as “nuclear” or “ SDI” (Strategic Defense Initiative). The hacker also copied password files (in order to make
dictionary attack In cryptanalysis and computer security, a dictionary attack is an attack using a restricted subset of a keyspace to defeat a cipher or authentication mechanism by trying to determine its decryption key or passphrase, sometimes trying thousands o ...
s) and set up
Trojan horses The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
to find passwords. Stoll was amazed that on many of these high-security sites the hacker could easily guess passwords, since many
system administrator A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to en ...
s had never bothered to change the passwords from their factory defaults. Even on military bases, the hacker was sometimes able to log in as “guest” with no password. This was one of the first ⁠— ⁠if not ''the'' first ⁠— documented cases of a computer break-in, and Stoll seems to have been the first to keep a daily logbook of the hacker's activities. Over the course of his investigation, Stoll contacted various agents at the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
(FBI), the
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
(CIA), the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collect ...
(NSA) and the
United States Air Force Office of Special Investigations The Department of the Air Force Office of Special Investigations (OSI) is a U.S. federal law enforcement agency that reports directly to the Secretary of the Air Force. OSI is also a U.S. Air Force field operating agency under the administrative ...
(OSI). At the very beginning there was confusion as to jurisdiction and a general reluctance to share information; the FBI in particular was uninterested as no large sum of money was involved and no
classified information Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to kn ...
host was accessed. Studying his log book, Stoll saw that the hacker was familiar with
VAX/VMS OpenVMS, often referred to as just VMS, is a multi-user, multiprocessing and virtual memory-based operating system. It is designed to support time-sharing, batch processing, transaction processing and workstation applications. Customers using Ope ...
, as well as
AT&T Unix The history of Unix dates back to the mid-1960s, when the Massachusetts Institute of Technology, AT&T Bell Labs, and General Electric were jointly developing an experimental time-sharing operating system called Multics for the GE-645 mainframe. M ...
. He also noted that the hacker tended to be active around the middle of the day,
Pacific time The Pacific Time Zone (PT) is a time zone encompassing parts of western Canada, the western United States, and western Mexico. Places in this zone observe standard time by subtracting eight hours from Coordinated Universal Time ( UTC−08:00). ...
. Eventually Stoll hypothesized that, since modem bills are cheaper at night and most people have school or a day job and would only have a lot of free time for hacking at night, the hacker was in a time zone some distance to the east, likely beyond the US East Coast. With the help of Tymnet and agents from various agencies, Stoll found that the intrusion was coming from
West Germany West Germany is the colloquial term used to indicate the Federal Republic of Germany (FRG; german: Bundesrepublik Deutschland , BRD) between its formation on 23 May 1949 and the German reunification through the accession of East Germany on 3 O ...
via satellite. The West German post office, the ''
Deutsche Bundespost The Deutsche Bundespost (German federal post office) was a German state-run postal service and telecommunications business founded in 1947. It was initially the second largest federal employer during its time. After staff reductions in the 19 ...
'', had authority over the phone system there, and traced the calls to a university in Bremen. In order to entice the hacker to reveal himself, Stoll set up an elaborate hoax – known today as a honeypot – by inventing a fictitious department at LBNL that had supposedly been newly formed by an “SDI“ contract, also fictitious. When he realized the hacker was particularly interested in the faux SDI entity, he filled the “SDInet” account (operated by an imaginary secretary named ‘Barbara Sherwin’) with large files full of impressive-sounding bureaucratese. The ploy worked, and the ''Deutsche Bundespost'' finally located the hacker at his home in
Hanover Hanover (; german: Hannover ; nds, Hannober) is the capital and largest city of the German state of Lower Saxony. Its 535,932 (2021) inhabitants make it the 13th-largest city in Germany as well as the fourth-largest city in Northern Germany ...
. The hacker's name was
Markus Hess Markus Hess, a Germany, German citizen, is best known for his endeavours as a hacker (computer security), hacker in the late 1980s. Alongside fellow hackers Dirk Brzezinski and Peter Carl, Hess hacked into networks of military and industrial compu ...
, and he had been engaged for some years in selling the results of his hacking to the
Soviet Union The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, ...
’s intelligence agency, the
KGB The KGB (russian: links=no, lit=Committee for State Security, Комитет государственной безопасности (КГБ), a=ru-KGB.ogg, p=kəmʲɪˈtʲet ɡəsʊˈdarstvʲɪn(ː)əj bʲɪzɐˈpasnəsʲtʲɪ, Komitet gosud ...
. There was ancillary proof of this when a Hungarian agent contacted the fictitious SDInet at LBL by mail, based on information he could only have obtained through Hess. Apparently this was the KGB's method of double-checking to see if Hess was just making up the information he was selling. Stoll later flew to West Germany to testify at the trial of Hess.


References in popular culture

* The book was chronicled in an episode of WGBH’s '' NOVA'' entitled “The KGB, the Computer, and Me”, which aired on
PBS The Public Broadcasting Service (PBS) is an American public broadcaster and non-commercial, free-to-air television network based in Arlington, Virginia. PBS is a publicly funded nonprofit organization and the most prominent provider of educat ...
stations on October 3, 1990. Stoll and several of his co-workers participated in re-enactments of the events described.Richard Stoll's Personal Webpage on TV adaptations
* Another documentary, ''Spycatcher'', was made by
Yorkshire Television ITV Yorkshire, previously known as Yorkshire Television and commonly referred to as just YTV, is the British television service provided by ITV Broadcasting Limited for the Yorkshire franchise area on the ITV (TV network), ITV network. Until 19 ...
. * The number sequence mentioned in Chapter 48 has become a popular math puzzle, known as the Cuckoo's Egg, the Morris Number Sequence, or the
look-and-say sequence In mathematics, the look-and-say sequence is the sequence of integers beginning as follows: : 1, 11, 21, 1211, 111221, 312211, 13112221, 1113213211, 31131211131221, ... . To generate a member of the sequence from the previous member, read off t ...
. * In the summer of 2000 the name “Cuckoo’s Egg” was used to describe a file sharing hack attempt that substituted white noise or sound effects files for legitimate song files on Napster and other networks. * These events are referenced in
Cory Doctorow Cory Efram Doctorow (; born July 17, 1971) is a Canadian-British blogger, journalist, and science fiction author who served as co-editor of the blog '' Boing Boing''. He is an activist in favour of liberalising copyright laws and a proponent of ...
’s speculative fiction short story “The Things that Make Me Weak and Strange Get Engineered Away”, as “(a)
sysadmin A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to ensu ...
who’d tracked a $0.75 billing anomaly back to a foreign spy-ring that was using his systems to hack his military”.Tor.com
Edited 2015-06-24.


See also

*
Digital footprint Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or digital devices. Digital footprints can be classified as either passive or a ...
* Karl Koch (hacker) * 23 – a film made from the hackers viewpoint.


References


External links


Image of 1st Edition Cover—DoubledayStalking the Wily Hacker
The author's original article about the trap
''Booknotes'' interview with Stoll on ''Cuckoo’s Egg'', December 3, 1989Reference to the book on Internet Storm CenterWest German hackers use Columbia's Kermit software to break into dozens of US military computers and capture information for the KGB
Columbia University Computing History, 1986-1987 section. {{DEFAULTSORT:Cuckoo's Egg, The 1989 non-fiction books Works about cybercrime Computer security books Hacking (computer security) Trojan horses Doubleday (publisher) books Books about computer hacking