Cybersecurity Hour: Exploring the Cybersecurity Canon

Cybersecurity Hour: Exploring the Cybersecurity Canon

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 3. The Cuckoo’s Egg - Chapter 5-8. Wiretapping at the Dawn of Cybersecurity
Copy link
Facebook
Email
Notes
More

Cybersec Canon Ep 3. The Cuckoo’s Egg - Chapter 5-8. Wiretapping at the Dawn of Cybersecurity

Exploring the privacy regulations in the US till the ECPA when wiretapping included digital communications.

Rob, a bibliophile's avatar
Rob, a bibliophile
Nov 02, 2024
∙ Paid

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 3. The Cuckoo’s Egg - Chapter 5-8. Wiretapping at the Dawn of Cybersecurity
Copy link
Facebook
Email
Notes
More
Share
low-angle photography of concrete stair
Photo by Wesley Pribadi on Unsplash

“But I’d heard that the phone company wouldn’t trace a line without a search warrant. And we needed the FBI to get that warrant.”

Stoll, Clifford. CUCKOO'S EGG (pp. 42-43). Knopf Doubleday Publishing Group. Kindle Edition.

Chapter 5 - It is Cliff’s second week at the job. He writes notes about the weekend activity of th…

Keep reading with a 7-day free trial

Subscribe to Cybersecurity Hour: Exploring the Cybersecurity Canon to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Noble Artistic Thoughtful Expressions
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More