Misplaced Pages

Cuckoo's egg (metaphor)

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Metaphor for brood parasitism This article is about the metaphor. For other uses, see Cuckoo's egg.
A reed warbler raising a common cuckoo chick it hatched from an egg surreptitiously placed in its nest by the cuckoo's parent

A cuckoo's egg is a metaphor for brood parasitism, where a parasitic bird deposits its egg into a host's nest, which then incubates and feeds the chick that hatches, even at the expense of its own offspring. That original biological meaning has been extended to other uses, including one which references spyware and other pieces of malware.

History

The concept has been in use in the study of brood parasitism in birds since the 19th century. It first evolved a metaphoric meaning of "misplaced trust", wherein the chick hatched of a cuckoo's egg, having been surreptitiously laid among the eggs of another bird of a different, smaller, species , and thereupon incubated by the unwitting host parents, will consume any food brought by them to feed their own chicks, which then starve and eventually die.

The first well known application to tradecraft was in the 1989 book The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage by Clifford Stoll, in which Stoll deployed a honeypot to catch a cyber hacker that had accessed the secure computer system of the classified U.S. government Lawrence Berkeley National Laboratory.

Stoll chronicles the so-called 'Cuckoo's Egg Investigation', "a term coined by American press to describe (at the time) the farthest reaching computer-mediated espionage penetration by foreign agents”, which was also known as Operation Equalizer initiated and executed by the KGB through a small cadre of German hackers.

In his book Stoll describes the hacker employing a Trojan horse strategy to penetrate the secure Livermore Laboratory computer system:

I watched the cuckoo lay its egg: once again, he manipulated the files in my computer to make himself super-user. His same old trick: use the Gnu-Emacs move-mail to substitute his tainted program for the system's atrun file. Five minutes later, shazam! He was system manager.

See also

References

  1. "The Cuckoo's Egg: Misplaced trust is the beginning of every bad bedtime story about 'the cyber'."
  2. Andy Greenburg. "Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers". Wired.
  3. "What is a Honeypot", Caleb Townsend, uscybersecurity.net
  4. "The Impact of Project RAHAB and the Chaos Computing Congresses (CCC) on the Future of Computer-Network Mediated Espionage: Cuckoo’s Egg Prequel or Perfect Storm?", Armed Forces Communications & Electronics Association, afcea.org
  5. The Cuckoo's Egg, Stoll, Clifford, Doubleday, 1989, ISBN 0-385-24946-2, p. 123
Category: