{"id":64971,"date":"2026-05-05T18:57:00","date_gmt":"2026-05-05T08:57:00","guid":{"rendered":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=64971"},"modified":"2026-05-05T18:57:00","modified_gmt":"2026-05-05T08:57:00","slug":"cliff-stoll","status":"publish","type":"post","link":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=64971","title":{"rendered":"Cliff Stoll"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-64972\" src=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2026\/05\/Cliff_Stoll.jpg\" alt=\"Cliff Stoll\" width=\"512\" height=\"640\" srcset=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2026\/05\/Cliff_Stoll.jpg 512w, https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2026\/05\/Cliff_Stoll-240x300.jpg 240w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<div dir=\"auto\">On his second day at a new position in 1986, an unemployed astronomer was asked to account for a 75-cent bookkeeping discrepancy. Ten months later, he had uncovered a Cold War KGB spy network.<\/div>\n<div dir=\"auto\">His name was Cliff Stoll. Trained as an astronomer with wild Einstein-style hair and a doctorate in planetary science, he had been working on telescope optics for the future Keck Observatory in Hawaii. When his grant ended, he ran out of astronomy funding. With no research money left, the Lawrence Berkeley National Laboratory in California \u2014 a major U.S. Department of Energy facility \u2014 reassigned him to the computer center to keep him employed. Stoll, who barely knew Unix at the time, became a sysadmin there.<\/div>\n<div dir=\"auto\">On his second day in the new role, his supervisor Dave Cleveland came into his office mentioning a small glitch in the lab&#8217;s billing system. The lab charged researchers for every second of computing time. The previous month&#8217;s accounts were 75 cents short on a total bill of $2,387. Cleveland casually asked Stoll to determine where the missing 75 cents went from the records of that month system ledger.<\/div>\n<div dir=\"auto\">Anyone else would have dismissed it as a simple rounding issue. Stoll calculated by hand and discovered the lab&#8217;s accounting system did not round numbers properly.<\/div>\n<div dir=\"auto\">So someone had used nine seconds of computing time without payment. This meant someone somewhere was accessing the lab&#8217;s system who was not supposed to be.<\/div>\n<div dir=\"auto\">The intruder used a username Stoll had never encountered before, only one word.<\/div>\n<div dir=\"auto\">Hunter.<\/div>\n<div dir=\"auto\">What followed became one of the strangest solo manhunts in computing history ever recorded.<\/div>\n<div dir=\"auto\">Stoll soon realized within days that Hunter was not a confused student or a curious acquaintance of an employee. Hunter had superuser privileges \u2014 full administrative access to the entire system \u2014 gained by exploiting a flaw in GNU Emacs that almost no one on Earth yet knew about. From inside Berkeley&#8217;s machine, Hunter used the system as a stepping stone to infiltrate other networks: Air Force bases, Army installations, defense contractors, NASA, MIT, and military command systems across the United States nation.<\/div>\n<div dir=\"auto\">Stoll, more curious than worried at first, began watching.<\/div>\n<div dir=\"auto\">He spent one well-known weekend gathering fifty borrowed teleprinters and terminals from co-workers&#8217; empty desks, dragging them into the lab on hand trucks, and physically connecting them to fifty modem lines feeding Berkeley&#8217;s computer center, so that when Hunter logged in, Stoll could record every keystroke on paper in real time. He kept the setup running. When printers clattered, he rushed in from across the lab every single time it happened.<\/div>\n<div dir=\"auto\">He bought a pager. He attached it to his belt. He shared the number with no one except the lab. Whenever the pager rang in the middle of the night, it signaled Hunter was online \u2014 and Stoll would jump onto his bicycle and ride at full speed across Berkeley to the lab to observe live as a stranger half a world away moved through American defense systems. He often slept under his desk for nights at a time. His girlfriend, Martha Matthews, brought him sandwiches and hand-knitted sweaters. The unofficial joke in the lab was that Cliff Stoll had become part of furniture.<\/div>\n<div dir=\"auto\">He went to the FBI. They essentially dismissed him \u2014 no significant money was missing, and the lab handled no classified material. He went to the CIA, who were polite but uninterested. He approached the NSA. He contacted the Air Force Office of Special Investigations. He spoke to anyone willing to listen. For months, almost no one in the U.S. intelligence community considered a 75-cent discrepancy important enough to act on in any serious investigation at the time then period.<\/div>\n<div dir=\"auto\">So Stoll continued investigating himself alone.<\/div>\n<div dir=\"auto\">He noticed the intruder logged in at the same time each day, in patterns suggesting he operated from somewhere in central Europe. He observed a 1200-baud modem connection, slow and unstable. With engineers from the long-distance carrier Tymnet, he traced the connection across the United States \u2014 to a defense contractor in Virginia, back across the Atlantic, then through a satellite to West Germany, and finally \u2014 astonishingly \u2014 to an apartment in Hanover on the edge of the network trace path.<\/div>\n<div dir=\"auto\">But West German authorities needed him to keep the intruder connected for at least 45 minutes to complete a trace. Hunter usually logged in for only ten or fifteen minutes at any given time period.<\/div>\n<div dir=\"auto\">So Stoll and his girlfriend Martha devised a solution. One morning in the shower, while discussing ideas, they created a plan they jokingly named &#8220;Operation Showerhead.&#8221; Stoll built a fake department on the Berkeley network \u2014 a fictional office working on Ronald Reagan&#8217;s Strategic Defense Initiative (&#8220;Star Wars&#8221;) \u2014 and filled its files with detailed but useless bureaucratic material. He invented an imaginary secretary called &#8220;Barbara Sherwin&#8221; and stocked her files with hundreds of pages of fabricated reports designed to impress a Cold War spy at the time period.<\/div>\n<div dir=\"auto\">By most accounts, what he built became the first honeypot in cybersecurity history ever created.<\/div>\n<div dir=\"auto\">The trap worked. Hunter, eager, stayed on Berkeley&#8217;s computer for hour after hour downloading fake SDI files. West German police completed the trace. They knocked on the door of an apartment in Hanover and arrested its occupant \u2014 a young West German hacker named Markus Hess, who, along with accomplices Dirk Brzezinski and Peter Carl, had been breaking into roughly 400 U.S. military computers over several years during the Cold War period era then, copying everything they found onto floppy disks, and selling it to a KGB officer code-named &#8220;Sergei&#8221; through a Soviet trade office in East Berlin.<\/div>\n<div dir=\"auto\">The total payment they received from the KGB across the entire operation? About $54,000 in cash \u2014 and, according to records, some cocaine was involved too.<\/div>\n<div dir=\"auto\">Hess and his group went to trial in 1990. The Berlin Wall had recently fallen. The Cold War was ending. The judge ruled that the damage to West Germany was minimal. They received suspended sentences of about two years. They smiled when the verdicts were announced. None of them served prison time at that point then.<\/div>\n<div dir=\"auto\">Cliff Stoll traveled to Germany to testify against them. He returned to Berkeley. He wrote it all up \u2014 first as an academic paper titled &#8220;Stalking the Wily Hacker&#8221; in Communications of the ACM, and later in 1989 as a New York Times bestselling book called The Cuckoo&#8217;s Egg, which remains, more than thirty-five years later, required reading in nearly every major cybersecurity course around the world in modern security education today still.<\/div>\n<div dir=\"auto\">Stoll never stopped being amazed by it all. He returned to making unusual things \u2014 most famously, he started a small basement business producing hand-blown Klein bottles, strange mathematically impossible glass shapes with only one surface. He gave lively, slightly chaotic TED talks. He wrote books. He kept his Einstein-style hair. By all accounts from people who met him, he was one of the kindest, gentlest, strangest, most intelligent figures in the early internet era according to those who knew him personally well documented.<\/div>\n<div dir=\"auto\">He passed away in May 2024, aged 73 years old.<\/div>\n<div dir=\"auto\">But the lesson he left behind has outlived him will likely always remain.<\/div>\n<div dir=\"auto\">History does not always pivot on dramatic events. Sometimes it turns on a 75-cent error in a billing report that any ordinary sysadmin, on any normal day, would have ignored instead entirely.<\/div>\n<div dir=\"auto\">The world&#8217;s first cyber-espionage ring was uncovered because one curious astronomer, on his second day at a new job, refused to ignore it.<\/div>\n<div dir=\"auto\">Pay attention to the small details.<\/div>\n<div dir=\"auto\">Sometimes they are the only signals anyone ever sends you.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>On his second day at a new position in 1986, an unemployed astronomer was asked to account for a 75-cent bookkeeping discrepancy. Ten months later, he had uncovered a Cold War KGB spy network. His name was Cliff Stoll. Trained as an astronomer with wild Einstein-style hair and a doctorate in planetary science, he had &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=64971\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Cliff Stoll&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,8],"tags":[],"class_list":["post-64971","post","type-post","status-publish","format-standard","hentry","category-general-interest","category-inspiration"],"_links":{"self":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/64971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=64971"}],"version-history":[{"count":1,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/64971\/revisions"}],"predecessor-version":[{"id":64973,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/64971\/revisions\/64973"}],"wp:attachment":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=64971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=64971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=64971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}