Last updated on August 29th, 2023 at 09:49 am
Computerbegabte Jugendliche in Tod getrieben Karl Koch + Messestand: CeBIT ct-computermagazin (Hannover) und Neue Presse (Hannover)
Msg #: 5 Date/Time: 12/23|11:09
From: Hagbard Celine
To: ALL Re:
MERRY CHRISMAS!!!
YES! FROM GERMANY TOO… AND BACK TO GERMANY!
TO TREPEX AND PENGO!!! ITS WONDERFUL !
HAGGI
.login 2204,1
JOB 20 XXX XXXXXX 1099/702 L100 TTY6
[LGNNOC No operator coverage]
Password: 15:15 5-Jan-86 Sun .who /dialup
1 J.KUGELFISCH 425,2
TTY5 XXX87S-1D PHI 13+8 TI 0:02:19
20 A.MOLES 2204,1
TTY6 XXX87S-2D WHO 14+63 R1* 0:00:24
21 HAGGI 1131,4
TTY7 XXX87S-3D TYPE 5+16 ^C 0:00:15
“I’m sorry but due to circumstances beyond my control this Account must be closed down.
This is basically due to pressure brought upon me from the managers of US computer installations who are worried about the integrity of their systems.
They require you to stop hacking into their systems and
I strongly suggest that you accede their requests.
BELIEVE ME THEY DO HAVE THE MEANS TO FIND OUT YOUR IDENTITY SO DO TAKE THIS SERIOUSLY”
Fermilab… $ set ho 153
NORAD Strategic Nuclear Command System
Username: FALKEN
Password:
User authorization failure
Username: WARGAMES
Password:
User authorization failure
Username: JOSHUA
Password:
User authorization failure
%REM-S-END, control returned to node _FNAL::
DDN = Defense Data Network
DCA = Defense Communication Agency
ARPANET = Advanced Research Projects Agency Network
MILNET = Military Network
MINET = Movements Information Network
TAC = Terminal Access Controler
C3 = Command, Control, Communications
C3I = Command, Control, Communcations and Intelligence
DDN INTERNET = ARPANET/MILNET/MINET
Thema: In den Tod getrieben
Kommentar: von M.Beier
Meine konkrete Sichtweise zum hier angefügten Aufsatz von Dr. Sperber ist, dass man nicht eingestehen will, dass eine Hetzjagd auf computerbegabte Jugendliche niemals hätte stattfinden dürfen. Mein Empfinden zudem ist, dass der Beitrag gegenüber einem bereits Toten sehr unangemessene Schreibweisen enthält. Stellen Sie sich einmal vor, es würde über Sie [oder einen anderen beliebigen Internet-Nutzer] plötzlich ein großer Bericht erscheinen, bei welchem ein Autor Sie Satz für Satz mit Ihrem Login-Wort anredet, welches ja ganz bewusst nur fiktiv ist wie “MisterX” oder “Bonanza” ist, und dass dann daraus resultierend ein verächtlicher Beitrag über Sie entstünde.
Nur eine einzige Passage des Sperber-Aufsatzes zeigt in eine richtige Richtung, nämlich damit meine ich den Hinweis, dass ein Verfassungsschützer aus Köln den Tod von Karl Koch im Jahre 1989 “sehr, sehr merkwürdig” fand. Beamte bei den Diensten Verfassungsschutz, Staatsschutz und Geheimdienst sollten in der Tat ruhig und besonnen denkende Leute sein, die sich niemals ereifern, den einzelnen Menschen zur Strecke zu bringen. Letzteres geschieht aber leider in Deutschland immer wieder. In kleinen Dienststellen, manchmal sogar Bürgermeisterämtern oder gar in Parteibüros werden dann die Fäden gezogen, um “aufzuräumen” mit Bürgern, die missliebig betrachtet werden. Häufig stammt die dann entstehende “Niederknüpplungs-Mentalität” aus CDU-Denkweisen. Nur sind auch alle anderen Parteien nicht davon frei, denn auch dort geraten die Dinge schnell aus den Fugen, wenn “gefälschte Texte” in Akten hineingekrickelt werden.
Genaugenommen war Karl Koch der erste Internet-Surfer Deutschlands. Nur wurde er nicht so feierlich hofiert, wie man es neuerdings immer dann tut, wenn ein neuer Kunde eine erneute Millionen-Teilnehmergrenze markiert! Dass Karl Koch dabei ein wirklicher Spion oder Demokratie-Verräter gewesen sein könnte, ist etwas, was selbst aus den Darstellungen des Dr. Sperber nicht herauszulesen ist. Echte Spione werden zudem weder zu Tode gejagt noch über alle Maßen beleidigt, sondern diese bildeten damals (sofern sie geschnappt wurden) ein diplomatisches Umtausch-Geschäft (Stichwort: Glienicker Brücke).
Unbegreiflich zudem ist, dass der Autor Sperber die mit dem Fall befassten Richter noch angreift, dahingehend dass dreijährige Bewährungsstrafen für einige Computer-Freaks nicht ausreichend gewesen wären. Was will Sperber denn? Der computerbegabte Karl Koch hat als Jugendlicher mit dem Leben bezahlen müssen, weil er als Hobby zehn Jahre früher das tat, was heute alle tun!
Wenn Sie den Zerrbericht aufmerksam lesen, dann werden Sie sicher auch an der Information hängen bleiben, dass für in Universäts-Computer sich einloggende “Gäste” Daten-Köder gelegt wurden. Wer somit glaubte, er habe irgendwelche Geheim-Pläne gefunden, der war lediglich in den Lock-Indikator hineingelaufen. Dies wäre somit adäquat damit, als würde ein Kaufhaus-Detektiv bewusst einen Lock-Diebstahlstand aufbauen, bei welchen manch eine (mit Geld kurz gehaltene) Hausfrau dann nicht widerstehen könnte. Das ist jedoch nicht erlaubt, und es hätte zur Folge, dass jede Strafverfolgung sofort eingestellt würde. Exakt vergleichbar ist die Situation natürlich nicht, jedoch fragen muss man sich, wie überhaupt es möglich sein kann, dass man sicherheitsrelevante Bereiche nicht vor Online-Gästen versperren kann. Da hätte es nur eines Callback bedurft, der dann nur an bekannte Nutzer verbindet, während er natürlich eine Dachkammer-Bude in Germany niemals connectiert hätte. Gelinde gesagt ist das einfach nur Schlamperei, wenn Hobbyisten sich direkt einloggen können, um dann gegen diese Tüftler
My specific viewpoint on the attached essay by Dr. Sperber is that one does not want to admit that a witch hunt against computer-savvy youth should never have taken place. Furthermore, I feel that the article contains very inappropriate writing towards a deceased individual. Imagine if a large report suddenly appeared about you [or any other internet user], with the author addressing you sentence by sentence using your login word, which is deliberately fictional like “MisterX” or “Bonanza,” and then a contemptuous article about you is created as a result.
Only one passage in Sperber’s essay points in the right direction, namely, the mention that a constitutional protector from Cologne found the death of Karl Koch in 1989 to be “very, very strange.” Officials in the constitutional protection, state protection, and intelligence services should indeed be calm and rational thinkers who never get carried away with targeting individuals. Unfortunately, this does happen in Germany time and again. In small offices, sometimes even mayor’s offices or party offices, strings are pulled to “clean up” citizens who are viewed as undesirable. Often, this “oppression mentality” stems from CDU thinking. However, other parties are not exempt from it either, as things quickly spiral out of control when “forged texts” are inserted into files.
It is also incomprehensible that the author Sperber attacks the judges involved in the case, suggesting that three-year probation sentences for some computer enthusiasts were not enough. What does Sperber want? The computer-savvy Karl Koch paid with his life as a teenager for doing what everyone does today, only ten years earlier!
If you read the distorted report attentively, you will surely notice the information that bait was set for “guests” logging into university computers. Anyone who believed they had found any secret plans had simply walked into the trap. This is analogous to a store detective deliberately setting up a fake theft stand, where certain (briefly bribed) housewives would find it irresistible. However, this is not allowed, and it would result in any criminal prosecution being immediately dropped. The situation is not exactly comparable, but one must wonder how it is even possible that security-sensitive areas cannot be locked to online guests. It would have only required a callback that connects only to known users, while never connecting to a small attic room in Germany. To put it mildly, it is simply negligence that hobbyists can log in directly, allowing such horror stories [like Sperber’s] to be imposed on these tinkers and computer enthusiasts, suggesting that it could trigger a nuclear war.
A few more notes [added 1.99]. Back then, the use of portable data communication devices, especially acoustical couplers, was not a sign of criminal activity but rather fast data modems [like the ones everyone uses today] were largely prohibited by the postal-telecom system. The reason behind this was the fear of competition for the hobbyist sector against the BTX post system. Sperber contemptuously writes that Karl Koch allowed a mainframe computer to rot in a garage. However, everyone knows today from the success story of Microsoft that it also began in a garage. One difference between the USA and Germany, though, is that here, people are largely under the control of authorities. If even the authorities in the major cities do not act vigorously enough, they receive a “push from the countryside,” as in this essay by Dr. Sperber. Thus, people worldwide were shocked back then, and even computer expert Clifford Stoll is said to have been shocked by the death of the computer-savvy teenager [“…I didn’t want to bring anyone down…”].
There are indeed numerous publications about Karl Koch. The computer scene sympathized with him as if he were a deceased brother! Although I only know a few reports about it, the most plausible conclusion is clear. The “invisible opponents” were not figments of imagination (like the science fiction Illuminatus book), but they were real. The list of people who instigated “secret actions” on their own initiative without coordination is something that should be pointed out to Sperber! Perhaps Sperber should also be added to the list! People who were removed from the LKA Hannover due to their activism are now being pursued by the detective industry (keyword BID detectives Willeboreib##EBG13 and ZAD Kocks remote learning institute). The blind frenzy of activism continues there, and, for example, fake criminal complaints/reports against me and against the “Detectives for Germany” initiative are being sent everywhere as forged faxes. In Minden, a reckless judge is now participating in the attacks and falsifying files. Since the conflict has started this way, it seems legitimate for people to invoke the “special department Land-CDU” everywhere. If credible texts cannot be inserted into the files, then the “forgers” immediately engage the “criminal elements.” In the bureaucratic country of Germany.
If you read the distortion report carefully, you will surely get stuck with the information that data bait was laid for “guests” logging into university computers. So anyone who believed they had found any secret plans had just run into the lock indicator. This would be adequate as if a department store detective were to consciously set up a lock-theft stand, which many a housewife (who was kept short with money) could then not resist. However, this is not allowed and it would mean that any prosecution would be stopped immediately. Of course, the situation is not exactly comparable, but one has to ask oneself how it is even possible that security-relevant areas cannot be blocked from online guests. It would only have required a callback, which then only connects to known users, while of course it would never have connected to an attic shack in Germany. It’s just sloppy to say the least when hobbyists can log in directly and then against these tinkerers
###################################################
What is concocted in crooked ways in small administrative offices often cannot be reversed. The now “hyperactive judge” Gottfried Weidelhofer not only knows the activities of his clique in great detail but also actively participates. My concern, in order to put an end to this mischief, is not only to finally take the reins out of the hands of this court director but also to see him leave the court in handcuffs. There are more than enough reasons for it!
############################################################
Please also read the article prepared by the CT editorial team, which takes a different perspective than the following essay by Dr. Sperber wants to make you believe! The important CT article is attached at the very end! Currently, there is a report of a new tragedy involving another computer-savvy teenager. Those close to the deceased do not believe it was suicide.