{"id":17242,"date":"2019-12-18T10:45:17","date_gmt":"2019-12-18T18:45:17","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/12\/18\/news-10978\/"},"modified":"2019-12-18T10:45:17","modified_gmt":"2019-12-18T18:45:17","slug":"news-10978","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/18\/news-10978\/","title":{"rendered":"Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5df9bbf9891bc70008d39ece\/master\/pass\/Backchannel-Cliff-Stoll-8495.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Wed, 18 Dec 2019 12:00:00 +0000<\/strong><\/p>\n<p class=\"byline bylines__byline byline--author\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name byline--with-bg\"><a class=\"byline__name-link\" href=\"\/contributor\/andy-greenberg\">Andy Greenber<span class=\"link__last-letter-spacing\">g<\/span><\/a><\/span> <\/span><\/p>\n<p class=\"content-header__row content-header__dek\">Thirty years ago, Cliff Stoll published <em>The Cuckoo&#39;s Egg<\/em>, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place&#8212;and Stoll has become a cybersecurity icon.<\/p>\n<p><strong>In 1986, Cliff Stoll\u2019s boss<\/strong> at Lawrence Berkeley National Labs tasked him with getting to the bottom of a 75-cent accounting discrepancy in the lab\u2019s computer network, which was rented out to remote users by the minute. Stoll, 36, investigated the source of that minuscule anomaly, pulling on it like a loose thread until it led to a shocking culprit: a hacker in the system.<\/p>\n<p>Stoll then spent the next year of his life following that hacker\u2019s footprints across the lab\u2019s network and the nascent internet. In doing so, he revealed a vast web of similar intrusions into military and government agencies carried out by a group of young German hackers, eventually revealed to have been working in the service of the Soviet KGB. The story that Stoll unraveled from that tiny initial clue, which he published in late 1989 as a kind of digital detective memoir, <em>The Cuckoo\u2019s Egg<\/em>, turned out to be the very first known case of state-sponsored hacking\u2014a tale far bigger than he could have ever imagined when he began hunting those three quarters missing from his lab\u2019s ledger.<\/p>\n<p>Today, that story has taken on a larger life still. As <em>The Cuckoo\u2019s Egg<\/em> hits its 30th anniversary, the book has sold more than 1 million copies. And for a smaller core of cybersecurity practitioners within that massive readership, it\u2019s become a kind of legend: the ur-narrative of a lone hacker hunter, a text that has inspired an entire generation of network defenders chasing their own anomalies through a vastly larger, infinitely more malicious internet.<\/p>\n<p>Stoll asks people who have interviewed him to sign his personal copy of <em>The Cuckoo&#8217;s Egg<\/em>.<\/p>\n<p>As for 69-year-old Stoll himself, he talks about the entire series of events as if he still can\u2019t believe all the fuss he\u2019s caused. \u201cI thought it was a weird, bizarre hiccup I\u2019d stumbled into,\u201d Stoll told me when we first spoke last year, after I called the home number he lists on the <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.kleinbottle.com\/&quot;}\" href=\"https:\/\/www.kleinbottle.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">very eclectic website for his business selling klein bottles<\/a>\u2014blown-glass oddities that, topologically speaking, have only one side, with no inside or outside. \u201cI had no idea this would become a multibillion-dollar industry. Or essential to running a large business. Or that the CEO of a credit reporting company could lose his job because of computer security. Or that thousands of people would have careers in the field. Or that national institutions in many countries around the world would devote themselves to exploiting security holes in computer networks.\u201d<\/p>\n<p>In fact, Stoll is an unlikely legend for his cybersecurity industry admirers. On the day I visited Stoll in his Oakland home last month, just a few days after the 30th anniversary of <em>The Cuckoo&#x27;s Egg<\/em>\u2019s publication, he had spent the morning watching Mercury transit the Sun with his telescope. Stoll has a PhD in planetary astronomy and had intended to make stargazing his career before Lawrence Berkeley transferred him\u2014not entirely voluntarily\u2014into the IT department.<\/p>\n<p>When I arrive, he takes me to his workshop in the back of the house, a room with one wall covered in printed pictures of inventors, mathematicians, and scientists who inspire him: Felix Klein, Alan Turing, Emmy Noether. Then he flips up his desk on a hinge to reveal a door in the wall beneath it.<\/p>\n<p>Inside is a small, homemade forklift robot, which lives in the crawlspace beneath his house. Using a remote control and watching several screens that show a feed from the robot&#x27;s cameras, he wheels his little bot across the cramped storage space under his home, its walls lined with cardboard boxes, to delicately retrieve a crate full of beautifully crafted klein bottles wrapped in paper.<\/p>\n<p>Stoll is still curious about hacking too. A couple of months earlier, he mentions, he decided on a lark to reverse-engineer some hackers\u2019 malware-laced Excel file to see where it hid its malicious code. \u201cI said to myself \u2018Oh, here\u2019s how they\u2019re hiding it.\u2019 It was very sweet and a useful lesson,\u201d Stoll says, sitting on the floor of his workshop next to his forklift bot. \u201cHaving said that, I\u2019m not very interested in cybersecurity today. I wish I was more interested. I wish I could help people defend their systems. Instead, I went back to figuring out how to make a klein bottle that can sit without wobbling.\u201d<\/p>\n<p>Royalties from <em>The Cuckoo&#x27;s Egg<\/em> paid off Stoll\u2019s mortgage years ago. Today, klein bottles sales provide him another\u2014very modest\u2014income stream. As for cybersecurity, beyond a few conference talks, he hasn\u2019t worked in the industry for decades. The same omnivorous curiosity that drove him to chase his hacker for a year eventually led him to devote the next 30 to his other interests like mathematics, electronic music, and physics\u2014none of which he claims to be an expert in. \u201cTo a mathematician, I\u2019m a pretty good physicist,\u201d Stoll deadpans. \u201cTo a physicist, I\u2019m a fairly good computer maven. To real computer jocks, they know me as somebody who\u2019s a good writer. To people who know how to write \u2026 I\u2019m a really good mathematician!\u201d<\/p>\n<p>\u201cTo a mathematician, I\u2019m a pretty good physicist,\u201d Stoll says.<\/p>\n<p>&quot;To people who know how to write,&quot; he says, &quot;I\u2019m a really good mathematician!\u201d<\/p>\n<p><strong>But if Stoll is a cybersecurity amateur<\/strong>, few experts have had as much influence on the field. Stoll\u2019s fans in the industry point out how, in hunting his hacker 30 years ago, he pioneered techniques out of necessity that would later become standard practice. Stoll slept under his desk at the lab and programmed his pager to alert him when the hacker logged into the network in the middle of the night. He also set up dozens of printers to transcribe every keystroke the hacker typed in real time. All of that added up to something like the first intrusion detection system.<\/p>\n<p>When Stoll traced the hacker\u2019s intrusions to the Department of Defense\u2019s MILNET systems, an Alabama army base, the White Sands Missile Range, Navy shipyards, Air Force bases, NASA\u2019s Jet Propulsion Laboratory, defense contractors, and the CIA, Stoll was mapping out an intrusion campaign just as threat intelligence analysts do today.<\/p>\n<p>When he planted hundreds of fake secret military documents on his network that tricked his hacker into staying logged into the Lawrence Berkeley system long enough for a German telecom employee to trace the intrusion to the hacker\u2019s location in Hanover, he was building a \u201choneypot\u201d\u2014the same sort of decoy regularly used to track and analyze modern hackers and botnets.<\/p>\n<p>\u201c<em>The Cuckoo&#x27;s Egg<\/em> documented so many of the methods we now use to deal with high-end intruders,\u201d says Richard Bejtlich, a well-known security guru and author of <em>The Tao of Network Security Monitoring: Beyond Intrusion Detection<\/em>, who has worked on incident response and network monitoring at companies like Corelight and FireEye. \u201cYou can see in the book almost everything you need to do in an incident. The mindset, the thoroughness, the commitment to it. It\u2019s all there.\u201d<\/p>\n<p>Even before his book was published, Stoll\u2019s hacker-tracking work at Lawrence Berkeley National Labs inspired its sister institution, Lawrence Livermore National Labs, to try to develop more systematic, automated defenses against hackers. An engineer there, Todd Heberlein, was given a grant to build the world\u2019s first network security monitoring software. \u201cYou could literally say that Cliff Stoll kick-started the entire intrusion detection field. We essentially automated in software much of what Stoll was doing,\u201d Heberlein says. \u201cOnce I had our tools turned on, we saw people every day trying to hack our network and sometimes succeeding. An entire crime wave was happening and no one was aware of it.\u201d<\/p>\n<p>Eventually a version of Heberlein\u2019s network monitoring software was deployed to more than 100 Air Force networks, including the ones Richard Bejtlich found himself working on during his time in the military in the late 1990s. As a high school student, Bejtlich had been captivated by a paperback copy of <em>The Cuckoo&#x27;s Egg<\/em>, and he reread it during that time in the Air Force. \u201cEvery element of what Stoll did, we were doing,\u201d he recalls.<\/p>\n<p>Around 2010, when he was working as director of incident response for General Electric, Bejtlich says he read it again, and found dozens more lessons for his team. He\u2019d later pull them together for a talk about those lessons, &quot;<a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/taosecurity.blogspot.com\/2011\/04\/cooking-cuckoos-egg.html&quot;}\" href=\"https:\/\/taosecurity.blogspot.com\/2011\/04\/cooking-cuckoos-egg.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Cooking the Cuckoo&#x27;s Egg<\/a>,\u201d that he gave at a Department of Justice cybersecurity conference.<\/p>\n<p>Just as much as its technical lessons, <em>The Cuckoo\u2019s Egg<\/em> captures a deeply personal side of the job of hacker tracking too. The long hours, friction with bosses, federal agents who demand to be briefed on discoveries without sharing their own information, and tensions with loved ones\u2014Stoll\u2019s then-girlfriend (now ex-wife) didn\u2019t always appreciate his nights sleeping under his desk to hunt an invisible white whale. \u201cThere are still incident responders who sleep under desks and are awoken at weird times. You\u2019re at the mercy of the intruder,\u201d Bejtlich says. \u201cAnyone who has done this can relate to being away from the family and working crazy hours. it\u2019s completely familiar even 30 years later.\u201d<\/p>\n<p>But there\u2019s a thrilling side to Stoll&#x27;s story as well: an ideal for aspiring network defenders, many of whom hope to someday find themselves the protagonist in a detective story like the one Stoll wrote about. \u201cPeople who get into cybersecurity dream they\u2019ll work on something like this,\u201d says Chris Sanders, a security consultant who created a course based on <em>The Cuckoo&#x27;s Egg<\/em> called &quot;<a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/chrissanders.org\/training\/cuckoosegg\/&quot;}\" href=\"https:\/\/chrissanders.org\/training\/cuckoosegg\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">The Cuckoo&#x27;s Egg Decompiled<\/a>.&quot; \u201cThey imagine finding the thing that becomes the bigger thing. We all want to live that. Some live it and some don\u2019t. But we all get to live it vicariously through Cliff.\u201d<\/p>\n<p>Stoll makes and sells blown glass klein bottles that, topologically speaking, have only one side, with no inside or outside.<\/p>\n<p><strong>That fantasy version of Cliff Stoll<\/strong> is hard to make out in the mad scientist, klein bottle-selling Cliff Stoll of today. But, it turns out, underneath 30 years of layered polymath whimsy, the obsessed hacker hunter is still there.<\/p>\n<p>After he finishes giving me a tour of his workshop, Stoll sits me down in his cluttered dining room lined with books, including a full 20-volume set of the Oxford English Dictionary, one of the first things he says he bought with his <em>Cuckoo&#x27;s Egg<\/em> advance. He starts reminiscing, telling a story about his hacker hunting that isn\u2019t in the book.<\/p>\n<p>After Stoll helped German police trace the Lawrence Berkeley National Lab\u2019s hacker to an address in Hanover, they arrested the intruder\u2014a young man named Markus Hess. The police found that Hess, along with four other hackers, had together decided to sell their stolen secrets to the Soviets.<\/p>\n<p>What he didn\u2019t mention in the book is that he later met Hess in person. When Stoll was called to the German town of Celle near Hanover to serve as an expert witness in the case, as he tells it, he ran into Hess in the courthouse bathroom, coming face to face with the hacker he\u2019d chased online for a year. Hess recognized Stoll, and began asking him in English why he had so doggedly pursued him. \u201cDo you know what you\u2019re doing to me?\u201d Hess asked, according to Stoll\u2019s 30-year-old memories. \u201cYou\u2019re going to get me sent to prison!\u201d<\/p>\n<p>Stoll says he simply told Hess, \u201cYou don&#x27;t understand,\u201d walked out of the bathroom, and testified against him. (That telling of events couldn\u2019t be confirmed with Hess, who has no contact information available online and hasn&#x27;t commented publicly on <em>The Cuckoo&#x27;s Egg<\/em> in decades. Even Hans H\u00fcbner, one of Hess\u2019 co-conspirators at the time, told me he had no idea about how to reach him. H\u00fcbner also noted that his own primary motivation in hacking had always been exploration and technical discovery, not Russian money. He believes Hess, who was given a 20-month suspended sentence for his intrusions, likely felt the same.)<\/p>\n<p>At this point in the story, Stoll becomes silent and his face twists into a pained expression. Slowly, I realize that he\u2019s angry. Then Stoll tells me what he really wanted to tell Hess: \u201cIf you\u2019re so smart, if you\u2019re so brilliant, make something that will make the internet a better place! Find out what\u2019s wrong and make it better! Don\u2019t go screwing with information that belongs to innocent people!\u201d Stoll says.<\/p>\n<p>He startles me by pounding his fist on his dining room table. \u201cDon\u2019t think you\u2019re licensed to break into computers because you\u2019re clever. No! You have a responsibility to those who have built those systems, those who maintain those networks, who built the delicate software. You have a responsibility to your colleagues like me to behave ethically.\u201d<\/p>\n<p>This is the other ingredient to Stoll\u2019s hacker-hunting obsession, and the same drive in so many others in the cybersecurity world who followed him\u2014not just curiosity, but a kind of low-burning moral outrage. For Stoll, it seems to stem from a time few other internet users remember, a time before the World Wide Web even existed and when most denizens of the internet were idealistic academics and scientists like him. Before the hackers\u2014or, at least, the criminal and state-sponsored ones\u2014arrived.<\/p>\n<p>\u201cI remember when the internet was innocent, when it crossed political boundaries without a care, when it was a sandbox for intellectually happy people,\u201d Stoll had told me in our first phone call. \u201cBoy, did that bubble burst.\u201d<\/p>\n<p>He never imagined, 30 years ago, that the internet would become a medium for dark forces: disinformation, espionage, and war. \u201cI look for the best in people. I want to live in a world where computing and technology are used for the good of humanity,\u201d Stoll says. \u201cAnd it breaks my heart.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/meet-the-mad-scientist-who-wrote-the-book-on-how-to-hunt-hackers\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5df9bbf9891bc70008d39ece\/master\/pass\/Backchannel-Cliff-Stoll-8495.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Wed, 18 Dec 2019 12:00:00 +0000<\/strong><\/p>\n<p>Thirty years ago, Cliff Stoll published The Cuckoo&#8217;s Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place\u2014and Stoll has become a cybersecurity icon.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[17573,714],"class_list":["post-17242","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-backchannel","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17242"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17242\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17242"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}