Cracking the Cuckoo's Egg
()
About this ebook
In the mid-'80s, a series of computer hacks spanning the globe were performed by members and associates of the Chaos Computer Club (CCC) in Germany. This was the first major international hacking event involving espionage, resulting in arrests, convictions, and the death of Karl Koch (a.k.a. Hagbard, as referred to in this story), a young first-generation hacker. The hacking events associated with the Chaos Computer Club persisted for over two years, involving hundreds of systems across the USA, Japan, and Europe. This resulted in a daily barrage of emails, meetings, and phone calls that consumed the majority of my time and that of my staff at the Fermi National Laboratory (Fermilab) in Batavia, Illinois.
"The Cuckoo's Egg" is a book written by Cliff Stoll that details his role in tracking and catching hacker Markus Hess and associates while Cliff was employed at the Lawrence Berkeley National Laboratory (LBL) in Berkeley, California. Cliff Stoll's book became a bestseller, and various media and publications documented his story, but his book did not include my efforts that have never been published and are significantly different from Cliff's. It primarily involves Karl Koch (a.k.a. "Hagbard"), Digital Equipment Corporation (DEC) computers (rather than Unix systems), and the creation of a network "trap" that directly resulted in identifying Karl Koch as my principal hacker, where he lived, and ultimately helped identify his associates with the German police. I wrote this story as a sort of addendum to Cliff Stoll's book to fill in the missing chapter and dubbed it "Cracking the Cuckoo's Egg" (i.e., "crack it" to discover what else was inside).
Greg Chartrand
Greg Chartrand retired in 2017 after a 50-year career with the Department of Energy (DOE) working at four National Science Laboratories, DOE Headquarters, and the FBI. He began as a self-taught electronic technician as a teenager and steadily progressed to roles such as supervisor, group manager, department head, project manager, program manager, and finally principal senior advisor. In these positions, he repaired radio systems, built, repaired, and designed digital electronic circuits, managed data acquisition computers, designed and constructed the first generation of computer networks (both LAN and WAN) that predated Ethernet and the Internet, pioneered Internet development for physics research laboratories and universities, and served as a Counterintelligence Officer/Intelligence Analyst for his last 17 years. His efforts resulted in receiving 11 laboratory Outstanding Performance Awards, three Exceptional Performance Awards from the DOE Director of Intelligence and Counterintelligence, a Special Recognition Award for career-long computer security contributions from the DOE CIO, a special commendation letter for his contributions to creating DOE's network from the DOE Director - Office of Energy Research, and two awards from the FBI, including one from the FBI Director for his performance in joint FBI/DOE investigation. Mr. Chartrand attended Tri-State College in Angola, Indiana, and has been an Amateur Radio Operator for over 60 years (W7MY). Most of his writings and publications exist as classified documents created as a member of the Intelligence Community.
Related to Cracking the Cuckoo's Egg
Related ebooks
Inventing the Internet Rating: 0 out of 5 stars0 ratingsDealers of Lightning: Xerox PARC and the Dawn of the Computer Age Rating: 4 out of 5 stars4/5Words and Power: Computers, Language, and U.S. Cold War Values Rating: 0 out of 5 stars0 ratingsCold Trap Rating: 3 out of 5 stars3/5Breaking Backbones: Information Is Power: Book I of the Hacker Trilogy Rating: 5 out of 5 stars5/5The Office of the Future: Communication and Computers Rating: 0 out of 5 stars0 ratingsHow Does Streaming Work? Rating: 0 out of 5 stars0 ratingsHacking: A Comprehensive Guide to Computer Hacking and Cybersecurity Rating: 0 out of 5 stars0 ratingsTubes: A Journey to the Center of the Internet Rating: 3 out of 5 stars3/5Summary of Andrew J. Stewart's A Vulnerable System Rating: 0 out of 5 stars0 ratingsZero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5The Rise and Fall of Email Rating: 0 out of 5 stars0 ratingsThe Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5Recurrent Neural Networks: Fundamentals and Applications from Simple to Gated Architectures Rating: 0 out of 5 stars0 ratingsTrojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5The Threatened Net: How the Web Became a Perilous Place Rating: 0 out of 5 stars0 ratingsThe SQL Server DBA’s Guide to Docker Containers: Agile Deployment without Infrastructure Lock-in Rating: 0 out of 5 stars0 ratingsSummary of The Innovators: by Walter Isaacson | Includes Analysis Rating: 0 out of 5 stars0 ratingsCell Phones and Smartphones: A Graphic History Rating: 3 out of 5 stars3/5Big Dummy's Guide to the Internet Rating: 0 out of 5 stars0 ratingsUnder an Ionized Sky: From Chemtrails to Space Fence Lockdown Rating: 3 out of 5 stars3/5Summary of Clifford Stoll's CUCKOO'S EGG Rating: 0 out of 5 stars0 ratingsCyberclipper 2: Cyber Weapon Ends Nuclear War & China’s Takeover of America Rating: 0 out of 5 stars0 ratingsSummary of Steven Levy's Insanely Great Rating: 0 out of 5 stars0 ratingsSummary of Tracy Kidder's The Soul of A New Machine Rating: 0 out of 5 stars0 ratingsSingularity: Star Carrier: Book Three Rating: 4 out of 5 stars4/5Pegasus the Early Seminal Computer Rating: 0 out of 5 stars0 ratingsWho Will Rule The Coming 'Gods'?: The Looming Spiritual Crisis Of Artificial Intelligence Rating: 5 out of 5 stars5/5HACKING THROUGH TIME: From Tinkerers to Enemies of the State (and sometimes, State-Sponsored) Rating: 0 out of 5 stars0 ratingsThe Anonym Rating: 0 out of 5 stars0 ratings
Security For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5MC Microsoft Certified Azure Data Fundamentals Study Guide: Exam DP-900 Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5
Reviews for Cracking the Cuckoo's Egg
0 ratings0 reviews
Book preview
Cracking the Cuckoo's Egg - Greg Chartrand
1.0 Forward
In the mid-80’s, there were a series of computer hacks spanning the globe performed by members and associates of the Chaos Computer Club (CCC) [1] in Germany. This was the first major international hacking event involving espionage, resulting in arrests, convictions, and the death of Karl Koch (a.k.a. Hagbard as referred to in this story), a young first-generation hacker. The hacking events associated with the Chaos Computer Club persisted for over two years, involving hundreds of systems across the USA, Japan, and Europe, which resulted in a daily barrage of emails, meetings, and phone calls that consumed the majority of my time and that of my staff at the Fermi National Laboratory (Fermilab) [2] in Batavia, Illinois (Figure 1.0).
The Cuckoo's Egg
[3] is a book written by Cliff Stoll[4] that details his role in tracking and catching hacker Markus Hess and associates while Cliff was employed at the Lawrence Berkeley National Laboratory (LBL)[5] in Berkeley, California. Cliff Stoll's book became a best seller, and various media and publications documented his story. His book is still considered a must-read for those aspiring to work in computer security, and I certainly recommend it. I collaborated with Cliff on the hack for over two years, and in 1989, Cliff called me on the phone just as I started a new job as the Network Manager of the Superconducting Supercollider near Dallas, Texas. He told me he bought a book about writing books and started writing about the tracking of his hackers. He was really excited and informed me that he was nearly finished, and he wanted to dedicate an entire chapter to my experiences during my tenure at Fermilab.
I thought about it for a few days, called him back, and asked him to write me out of the book. Why?
he inquired. As a network manager, I stated that I didn't want hackers chasing me around all my life; they would make my life and work miserable wherever I went! He said he understood and would keep me and my efforts out of his book. He kept to his word.
(Figure 1 Fermilab 1990)
As a result, my story has never been told and it is significantly different from Cliff’s. It primarily involves Karl Koch (a.k.a. Hagbard
), Digital Equipment Corporation (DEC)[6] computers (rather than Unix systems), and the creation of a network trap
that directly resulted in identifying Karl Koch as my principal hacker, where he lived, and ultimately helped identify his associates with the German police. I wrote this story to fill-in the missing chapter, and dubbed it Cracking the Cuckoo's Egg
(i.e., crack it open
to discover what else was inside). Why write it now? Firstly, the hundreds of emails and my notes from that era were preserved on Macintosh disks, allowing me to recreate the nearly 40-year-old events that I have selectively chosen to tell this story that led to the conclusion of my quest. Finally, this story is a tribute to those who helped me in my chase, particularly those who are no longer with us.
2.0 Fermilab Background
In its prime, Fermilab was the premier high-energy physics (HEP) [7] facility in the world,