The Cuckoo's Egg
Tracking a Spy Through the Maze of Computer Espionage
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
0,99 $/mois pendant vos 3 premiers mois
Acheter pour 27,83 $
Aucun mode de paiement valide enregistré.
Nous sommes désolés. Nous ne pouvons vendre ce titre avec ce mode de paiement
-
Narrateur(s):
-
Will Damron
-
Auteur(s):
-
Cliff Stoll
À propos de cet audio
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75 cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" - a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases - a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
©1989 Clifford Stoll (P)2020 TantorVous pourriez aussi aimer...
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- Écrit par jesse b le 2022-05-20
Auteur(s): Kevin Mitnick, Autres
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- Auteur(s): Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrateur(s): Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Durée: 12 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Excellent and eye opening
- Écrit par Angie le 2024-04-12
Auteur(s): Laurent Richard, Autres
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Auteur(s): Geoff White
- Narrateur(s): Geoff White
- Durée: 8 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
If you love the podcast, buy this.
- Écrit par Amazon Customer le 2023-04-26
Auteur(s): Geoff White
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Auteur(s): Joseph Cox
- Narrateur(s): Peter Ganim
- Durée: 11 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
-
-
When the hunters spy on the hunted
- Écrit par Gerry Corcoran le 2024-07-16
Auteur(s): Joseph Cox
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- Auteur(s): Andy Greenberg
- Narrateur(s): Mark Bramhall
- Durée: 12 h et 2 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Surprisingly more boring than I thought.
- Écrit par Jake L.S. le 2020-01-18
Auteur(s): Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- Auteur(s): Kevin Mitnick, William L. Simon
- Narrateur(s): Ray Porter
- Durée: 13 h et 59 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
wow
- Écrit par jesse b le 2022-05-20
Auteur(s): Kevin Mitnick, Autres
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- Auteur(s): Kim Zetter
- Narrateur(s): Joe Ochman
- Durée: 13 h
- Version intégrale
-
Au global
-
Performance
-
Histoire
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Very interesting, technical but easy enough to understand.
- Écrit par Jon le 2023-12-07
Auteur(s): Kim Zetter
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- Auteur(s): Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrateur(s): Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Durée: 12 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Excellent and eye opening
- Écrit par Angie le 2024-04-12
Auteur(s): Laurent Richard, Autres
-
The Lazarus Heist
- From Hollywood to High Finance: Inside North Korea's Global Cyber War
- Auteur(s): Geoff White
- Narrateur(s): Geoff White
- Durée: 8 h et 28 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.
-
-
If you love the podcast, buy this.
- Écrit par Amazon Customer le 2023-04-26
Auteur(s): Geoff White
-
Dark Wire
- The Incredible True Story of the Largest Sting Operation Ever
- Auteur(s): Joseph Cox
- Narrateur(s): Peter Ganim
- Durée: 11 h et 40 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes--the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld.
-
-
When the hunters spy on the hunted
- Écrit par Gerry Corcoran le 2024-07-16
Auteur(s): Joseph Cox
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- Auteur(s): Joseph Menn
- Narrateur(s): Jonathan Davis
- Durée: 8 h et 11 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Hard to get into
- Écrit par Blair C. le 2019-11-06
Auteur(s): Joseph Menn
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- Auteur(s): Andy Greenberg
- Narrateur(s): Ari Fliakos
- Durée: 10 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
A very engaging read
- Écrit par Shep le 2024-10-18
Auteur(s): Andy Greenberg
-
Permanent Record
- Auteur(s): Edward Snowden
- Narrateur(s): Holter Graham
- Durée: 11 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Just Magnificent
- Écrit par Nate le 2019-09-27
Auteur(s): Edward Snowden
-
Kingpin
- How One Hacker Took Over the Billion-Dollar Cybercrime Underground
- Auteur(s): Kevin Poulsen
- Narrateur(s): Eric Michael Summerer
- Durée: 8 h et 8 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The word spread through the hacking underground like some unstoppable new virus: Someone - some brilliant, audacious crook - had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the U.S. economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin. Other agencies around the world deployed dozens of moles and double agents.
Auteur(s): Kevin Poulsen
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- Auteur(s): Nicole Perlroth
- Narrateur(s): Allyson Ryan
- Durée: 18 h et 32 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Illuminating at all levels
- Écrit par Utilisateur anonyme le 2021-10-15
Auteur(s): Nicole Perlroth
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Auteur(s): Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrateur(s): Ray Porter
- Durée: 9 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Good book but
- Écrit par Mr. C le 2018-02-27
Auteur(s): Kevin Mitnick, Autres
Ce que les auditeurs disent de The Cuckoo's Egg
Moyenne des évaluations de clientsÉvaluations – Cliquez sur les onglets pour changer la source des évaluations.
-
Au global
- Utilisateur anonyme
- 2021-05-18
Excellent
Really enjoyable experience for both the tech experienced and novices alike. Great narrator. Great story.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- Chris Burchett
- 2023-01-20
Engaging, thrilling
This was an amazing story, highly recommended for a good listen.
Well presented, narrator was easily listened to
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- Jay in BC
- 2022-12-27
One of my fav reads
perfect audio book, well done and easy to follow, even the on screen commands being narrated
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- Roberta W
- 2021-07-15
One of the best books!
This was, quite honestly, one of the best books I’ve ever listened to. What an absolutely fascinating tale. How a curious student stumbles on a hacker, tries to alert authorities, but no one will listen… not the FBI, CIA, or a half dozen agencies responsible for technology and security. Yet, he persists. With just enough of his personal story to illustrate how the ‘incident’ impacted (aka took over) his personal life, and his musings on his predicament, Stoll kept me hanging on, wanting to know the outcome. Greatly appreciate the time he took to share his story.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- Mildred Weiss
- 2021-08-06
Great story great performance
The story is really fascinating. The performance is excellent. Well done
A really good book for IT people and for security officers in our digital world
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.
-
Au global
-
Performance
-
Histoire
- The Diggerswife
- 2024-07-18
Excellent writing
I loved every minute of this book, following the twists and turns of a hacker through countries, servers and the early Internet.
Un problème est survenu. Veuillez réessayer dans quelques minutes.
Vous avez donné votre avis sur cette évaluation.
Vous avez donné votre avis sur cette évaluation.