Last updated on September 14th, 2024 at 03:00 pm
Computerbegabte Jugendliche in Tod getrieben Karl Koch + Messestand: CeBIT ct-computermagazin (Hannover) und Neue Presse (Hannover)
Msg #: 5 Date/Time: 12/23|11:09
From: Hagbard Celine
To: ALL Re:
MERRY CHRISMAS!!!
YES! FROM GERMANY TOO… AND BACK TO GERMANY!
TO TREPEX AND PENGO!!! ITS WONDERFUL !
HAGGI
.login 2204,1
JOB 20 XXX XXXXXX 1099/702 L100 TTY6
[LGNNOC No operator coverage]
Password: 15:15 5-Jan-86 Sun .who /dialup
1 J.KUGELFISCH 425,2
TTY5 XXX87S-1D PHI 13+8 TI 0:02:19
20 A.MOLES 2204,1
TTY6 XXX87S-2D WHO 14+63 R1* 0:00:24
21 HAGGI 1131,4
TTY7 XXX87S-3D TYPE 5+16 ^C 0:00:15
“I’m sorry but due to circumstances beyond my control this Account must be closed down.
This is basically due to pressure brought upon me from the managers of US computer installations who are worried about the integrity of their systems.
They require you to stop hacking into their systems and
I strongly suggest that you accede their requests.
BELIEVE ME THEY DO HAVE THE MEANS TO FIND OUT YOUR IDENTITY SO DO TAKE THIS SERIOUSLY”
Fermilab… $ set ho 153
NORAD Strategic Nuclear Command System
Username: FALKEN
Password:
User authorization failure
Username: WARGAMES
Password:
User authorization failure
Username: JOSHUA
Password:
User authorization failure
%REM-S-END, control returned to node _FNAL::
DDN = Defense Data Network
DCA = Defense Communication Agency
ARPANET = Advanced Research Projects Agency Network
MILNET = Military Network
MINET = Movements Information Network
TAC = Terminal Access Controler
C3 = Command, Control, Communications
C3I = Command, Control, Communcations and Intelligence
DDN INTERNET = ARPANET/MILNET/MINET
Thema: In den Tod getrieben
Kommentar: von M.Beier
My perspective on the attached essay by Dr. Sperber is that there is a reluctance to acknowledge that the witch hunt against tech-savvy youth should never have occurred. Additionally, I find the writing to be highly inappropriate towards someone who is already deceased. Imagine if a significant report suddenly appeared about you (or any other internet user), where an author addressed you line by line using a fictional username like “MisterX” or “Bonanza,” ultimately leading to a contemptuous piece about you.
Only one passage in Sperber’s essay points in the right direction, specifically the remark from a constitutional protector in Cologne who found Karl Koch’s death in 1989 “very, very strange.” Officials in the domestic security and intelligence services should be calm and rational individuals who never resort to targeting individuals. Unfortunately, this happens repeatedly in Germany. In small offices, sometimes even in mayoral offices or party headquarters, strings are pulled to “clean up” issues with citizens deemed undesirable. This “suppression mentality” often stems from CDU ideologies, but other parties are not immune either, as they too can quickly spiral out of control when “forged documents” are inserted into files.
In truth, Karl Koch was Germany’s first internet surfer, yet he was not celebrated in the same way as new customers today who hit milestones of millions of participants. The notion that Koch could have been a genuine spy or traitor to democracy is not supported by Dr. Sperber’s accounts. Real spies are neither hunted to death nor excessively insulted; instead, they would typically become part of a diplomatic exchange if captured (think: Glienicker Bridge).
It is also perplexing that Sperber criticizes the judges involved in the case for not imposing longer probation sentences on some computer enthusiasts. What does Sperber want? The tech-savvy Karl Koch paid with his life as a teenager for engaging in activities that everyone does today as a hobby.
If you read the distorted report carefully, you will notice that “guests” logging into university computers were lured with data traps. Anyone believing they had discovered secret plans was merely falling into a bait trap. This is akin to a store detective deliberately setting up a bait theft stand, which some cash-strapped housewives might find hard to resist. Such actions are illegal and would lead to immediate cessation of any prosecution. While the situation is not perfectly comparable, one must question how it is even possible that security-sensitive areas can be left accessible to online guests. A simple callback system could have restricted access to known users, preventing connections from unauthorized locations. It is, to put it mildly, sheer negligence that hobbyists can log in directly and face repercussions for their tinkering.
###################################################
What is concocted in crooked ways in small administrative offices often cannot be reversed. The now “hyperactive judge” Gottfried Weidelhofer not only knows the activities of his clique in great detail but also actively participates. My concern, in order to put an end to this mischief, is not only to finally take the reins out of the hands of this court director but also to see him leave the court in handcuffs. There are more than enough reasons for it!
############################################################
Please also read the article prepared by the CT editorial team, which takes a different perspective than the following essay by Dr. Sperber wants to make you believe! The important CT article is attached at the very end! Currently, there is a report of a new tragedy involving another computer-savvy teenager. Those close to the deceased do not believe it was suicide.
Comments are closed.