Introduction. This is part #10, Summary (9), of my theory that the radiocarbon dating laboratories were duped by a computer hacker. See the previous parts #10(1), #10(2), #10(3), #10(4), #10(5), #10(6), #10(7) and #10(8). Other previous posts in this series were parts #1, #2, #3, #4, #5, #6, #7, #8 and #9, which posts this part #10 will summarise. It is my emphasis below unless otherwise indicated.
9. EVIDENCE THAT KARL KOCH INSTALLED LINICK'S PROGRAM ON ZURICH AND OXFORD LABORATORIES' AMS COMPUTERS [#8][Above[2]: "The hacker Karl Koch was only 23 years old. On 1 June 1989 they found his burnt corpse in a forest near Gifhorn (Lower Saxony)."[3]. As summarised by Wikipedia:
"Karl Werner Lothar Koch (July 22, 1965 – ca. May 23, 1989) was a German hacker in the 1980s, who called himself "hagbard", after Hagbard Celine. He was involved in a Cold War computer espionage incident. ... Koch was born in Hanover. As his moniker would suggest, he was heavily influenced by The Illuminatus! Trilogy by Robert Anton Wilson and Robert Shea. ... Koch was loosely affiliated with the Chaos Computer Club. He worked with the hackers known as DOB (Dirk-Otto Brezinski), Pengo (Hans Heinrich Hübner), and Urmel (Markus Hess), and was involved in selling hacked information from United States military computers to the KGB. Clifford Stoll's book The Cuckoo's Egg gives a first-person account of the hunt and eventual identification of Hess. Pengo and Koch subsequently came forward and confessed to the authorities under the espionage amnesty, which protected them from being prosecuted. Koch was found burned to death with gasoline in a forest near Celle, Germany. The death was officially claimed to be a suicide. However, some believe there is little evidence supporting suicide and many believe that Koch was killed in order to keep him from confessing more to the authorities. Why Koch would be targeted, and not Pengo and Urmel, is unknown. Koch left his workplace in his car to go for lunch; he had not returned by late afternoon and so his employer reported him as a missing person. Meanwhile, German police were alerted of an abandoned car in a forest near Celle. When they went to investigate, they found an abandoned car, that looked like it had been there for years, as it was covered in dust. Near to the car they found a burned corpse (Koch). His shoes were missing and have never been found. There was a patch of burned ground around him, which although it had not rained in some time and the grass was perfectly dry, was controlled in a small circle around the corpse. It is thought to be highly unlikely that this type of controlled burning could have been achieved by Koch himself which leads many to believe that his death was not suicide."[4].]
• Koch is not essential to my theory. First, as I have previously stated, Karl Koch is not essential to my theory:
"... Koch's role is not essential to my theory. If it turned out that Koch could not possibly have personally travelled to Zurich and Oxford to access their radiocarbon laboratories computers, it would not falsify my theory. My theory includes Koch because of the striking coincidence that they were both allegedly hackers working for the KGB and both allegedly committed suicide within days of each other"[5]
I later discovered that Koch's charred body was identified by German police on 3 June 1989 (see below), one day earlier than Linick's `suicide' on 4 June 1989!
"...Karl Koch is not essential to my theory, as Linick could have hacked Zurich and Oxford's AMS computer some other way, e.g. by issuing them with a program `update', or one of the KGB's own operatives could have entered those two laboratories clandestinely and installed Linick's program on their AMS control console computers"[6]
If it turned out that Koch could not possibly have been involved, either directly or indirectly, in installing Linick's program on Zurich and Oxford laboratories' AMS control console computers, then my theory would not be falsified. In that case I would have to maintain that Linick's program was installed on those laboratories' computers by some other way. For example, Linick himself could have flown over to Zurich and Oxford, installed his program clandestinely on their computers, and returned to Arizona, in a few days. This is why my theory always has been "that the radiocarbon dating laboratories were duped by a computer hacker" (singular).
Also, as I have also previously stated, it is not essential to my theory that Linick knew Koch, or even about Koch (and vice-versa):
"... I don't claim that the laboratories, or even Linick, knew about Koch"[7]
I have included Karl Koch in my theory, despite there being as yet no confirmed link between Koch and Linick, because of: 1) the striking coincidence that both Koch and Linick died of suspected suicide within days of each other (and indeed Linick's `suicide' on 4 June 1989 was only one day after Koch charred body was identified and publicly announced as his by German police on 3 June 1989 (see below); 2) Koch's death was almost certainly the work of the KGB, or the East German Secret Police (Stasi)[8] at the behest of the KGB; 3) the KGB had no reason to kill Koch unless he had been involved in an entirely different type of hacking for them which they did not want to become public knowledge; 4) Koch's expertise would have been useful in hacking into Zurich and Oxford's AMS computers; and 5) Koch's living in Germany would have made it comparatively easy for him to travel to Zurich and Oxford to install Linick's program on their computers (although that too is not necessary to my theory as Koch may have only provided expert advice on how to hack into those computers and a KGB operative may have entered the laboratories clandestinely and installed Linick's program on their AMS computers, or Linick himself may have installed it).
So those who continue to dismiss my theory as merely a "conspiracy theory," in the full knowledge of my above disclaimers, do so dishonestly.
• Koch was a German computer hacker in the 1980s. Karl Koch was born in Hanover, West Germany, on 22 July 1965[9]. Both his parents were dead by the time he was 16 and Koch's inheritance supported his expensive drug habit[10]. Koch began computer hacking in Hannover, then West Germany, in the early 1980s[11]. Koch's adopted name was "Hagbard Celine" after the hero of the The Illuminatus! Trilogy[12] novels, who fights against The Illuminati, a fictitious, but to Koch real, all-powerful secret society[13]. Unlike other hackers, Koch was no programmer but was expert at guessing logins and passwords[14]. However what Koch lacked in programming skills he more than made up for by his deep intuition, fertile imagination[15], unusual insight, patience, single-mindedness[16] and persistence[17]. Other hackers were part-time but Koch, supported by his inheritance, devoted every waking moment to hacking[18].
• Koch became a paid hacker for the KGB. In 1985, at a hacker meeting in Hannover, Koch was recruited by a Peter Carl as a the first member of a ring of hackers to break into Western computer systems, particularly those on military or defence industry sites, and sell the information and programs to the KGB[19]. Others who joined Koch in the Hannover KGB hacker circle[20] included Hans Heinrich Hübner (Pengo)[21], Dirk-Otto Brzezinski (DOB)[22] and Markus Hess (Urmel)[23]. In September 1986 Peter Carl went to the Soviet trade mission in East Berlin with a proposition to sell them secret information from USA military computers[24]. A KGB agent, Sergei Markov, agreed to Carl's hacking proposition[25]. At subsequent meetings in East Berlin with Carl and Brzezinski, from 1986 through 1988, Sergei paid for information and software the German hacker ring provided[26].
• Koch allegedly installed Linick's program on Zurich and Oxford's AMS computers. By early 1987, Koch had spent his inheritance and his drug dependency had become acute[27]. It is in this 7 month period between October 1987, after the Archbishop of Turin announced that only three AMS laboratories, Arizona, Oxford and Zurich, would date the Shroud[28] and April 1988 when samples were cut from the Shroud and given to the three laboratories for dating[29], that according to my theory, the KGB's Sergei Markov secretly approached Koch, with an offer of drugs[30] and/or money in return for Koch installing Linick's program on Zurich and Oxford AMS computers. How exactly Koch installed Linick's program on Zurich and Oxford AMS computers is not part of my theory. Except that since Arizona's and Oxford's (and presumably Zurich's) AMS computers were never online[31], Linick's program would have had to be installed manually and locally, either by Koch alone, or by a KGB operative following Koch's instructions, or more likely by a KGB operative taking Koch to each of the two laboratories and helping him gain access to their AMS computers.
The hacking itself would have been easy for the very experienced Koch. In 1987 it was known by hackers (including Koch[32]) that VMS, the operating system for the "DEC computer system" that the AMS control console computer at Arizona[33] (and presumably also at Zurich and Oxford) was, had a major security flaw, in that if an unauthorised user entered any login and password and ignored the error messages, he could gain access to the system:
"Two ... Hamburg students. ... had exploited a devastatingly simple flaw in the VMS operating system used on VAX. The machines, like most computer systems, required users to log in their ID and then type their password to gain access. If the ID or the password was wrong, the VMS system had been designed to show an 'error' message and bar entry. But ... if they simply ignored all the 'error' messages, they could walk straight into the system - provided they continued with the log-on as though everything was in order. When confronted with the 'error' message after keying in a fake ID, they would press `enter', which would take them to the password prompt. They would then type in a phoney password, bringing up a second, equally ineffectual 'error' message. By ignoring it and pressing enter again, they were permitted access to the system. It was breathtakingly easy, and left the VAX open to any hacker, no matter how untalented. ... The VAX operating system, VMS, had been subjected to stringent tests ... It beggared belief that VMS could have gone through such testing without the back door being discovered. [Later, it would be established that although early versions of VMS had been fully tested, later ones hadn't. It was these newer versions that contained the back door. (Users update their computers with the latest versions of the operating systems almost as a matter of course, so nearly all VAXen became insecure for a time.)]"[34].
And even when "Digital issued a 'mandatory patch' ... in May 1987. ... many users didn't bother to install it"
"Responding to complaints from its users, Digital issued a 'mandatory patch', a small program designed specifically to close the back door, in May 1987. Despite the 'mandatory' tag, many users didn't bother to install it. So, at least for a time, VAX computers across the world provided hackers with an open house ..."[35].
And a good reason why many system managers did not install DEC's `mandatory patch" is that DEC were: "being real quiet about it. They don't want their customers to panic" (see below).
Indeed, in the "NASA hack," in which both Hess and Koch were involved[36], it was found that "DEC's [VMS] installation procedure works only" for a "SYSTEM account" but "most system managers do not change the preset default password MANAGER" and those who did change it used easy-to-guess passwords:
"In Hess' apartment, public prosecutors found (on March 3, 1989) password lists from other hacks. On Monday, March 6, 1989, the Panorama team (who had disclosed the NASA hack and basically the KGB connection) asked Klaus Brunnstein to examine some of the password lists; the material which he saw (for 30 minutes) consisted of about 100 photocopied protocols of a hack during the night of July 27 to 28, 1987; it was the famous `NASA hack.' From a VAX 750 (with VMS 4.3) ... to log-into other VAXes in remote institutes. They always used SYSTEM account and the `proper' password (invisible). ... DEC's installation procedure works only if a SYSTEM account is available; evidently, most system managers do not change the preset default password MANAGER; since Version 4.7, MANAGER is excluded, but on previous VMS versions, this hole probably exists in many systems! ... the hackers, in more than 40% of the cases, succeeded to login, their first activities were to ... to install ... the Trojan horse. With the Trojan horse ... they copied the password lists to their PCs. When looking through the password list, Klaus observed the well-known facts: More than 25% female or male first names, historical persons, countries, cities, or local dishes ... the password lists contained less than 5% passwords of such nature easy to guess!"[37].
And if the AMS laboratories' VMS was the very popular version 4.5, then "Anyone that logs into the system can become system manager by running a short program":
"Now if you want a tasty security hole, check out VMS. They've got a hole you could drive a truck through.' `Huh?' `Yeah. It's in every Vox computer from Digital Equipment Corporation that runs the VMS operating system Version 4.5.' `What's the problem?' Darren explained. 'Anyone that logs into the system can become system manager by running a short program. You can't stop 'em.' I hadn't heard of this problem. 'Isn't DEC doing something about it? After all, they sell those systems.' `Oh, sure, they're sending out patches. But they're being real quiet about it. They don't want their customers to panic.' `Sounds reasonable.' `Sure, but nobody's installing those patches. What would you do-some tape shows up in the mail saying, `Please install this program or your system may develop problems' ... you'll ignore it, because you've got better things to do.' `So all the systems are open to attack?' `You got it.' `Wait a second. That operating system was certified by NSA. They tested it and certified it secure.' `Sure they spent a year testing it. And a month after they verified the system, DEC modified it slightly. Just a little change in the password program.' ... `And now fifty thousand computers are insecure.'"[38].
So it would be likely the Zurich and Oxford's AMS computers, not being online, were among the many VAX computers which were not patched. And in the "more than 40% of the cases" where the System password was still set to its default "MANAGER." And among the 95% whose passwords were easy to guess!
Hacking into such insecure 1980s computers would be easy for a very experienced hacker as Koch was. It may be significant that in late 1987/early 1988 Sergei wanted Koch excluded from the KGB hacking ring because of his drug-taking and talking to journalists for money[39]. But there is no evidence that Koch's talking was the source of any of the news stories about the KGB's hacking, so perhaps Sergei's real concern was that Koch would talk about his hacking of Zurich and Oxford radiocarbon dating laboratories' computers?
• Koch confessed to hacking for the KGB. Following a period of treatment in psychiatric hospitals and drug rehabilitation centers[40], Koch was on the road to recovery[41]. In June 1987, due to Clifford Stoll's persistence, American and German authorities cooperated in tracing his Hess' modem call from Lawrence Berkeley Laboratories in California to his apartment in Hannover, Germany, but due to a police bungle, Hess was not caught in the act of hacking as planned[42], and although he was arrested and charged, Hess was later released on appeal[43]. A year later, in the summer of 1988, first Koch, then Hübner, independently, taking advantage of an amnesty provision for espionage in West German legislation, approached the authorities to confess their hacking for the KGB[44]. Both were interrogated by West German prosecutors[45], and on 2 March 1989 eight were arrested, including Hess, Hübner, Koch, Brescinsky and Carl, but all except Carl and Brescinsky were released after a few days[46]. Koch and Hübner, having confessed to espionage before they were caught, under the espionage amnesty legislation were in no danger of being jailed providing they co-operated[47].
• Koch was murdered between 23 and 30 May 1989. Before noon on 23 May 1989, Koch left his workplace at the Hannover office of Germany's Christian Democratic Union party, in his employer's vehicle, to deliver a package to a government office in Hannover, but he never arrived[48]. In the late afternoon, Koch's employer notified the police of his disappearance[49]. Koch's friends and the German domestic security agency (BFV) sent out search parties looking for Koch but after a week the searches were abandoned[50]. On 30 May a farmer who had been checking his irrigation daily noticed a car parked in the adjoining forest[51] near the village of Ohof, north of Hannover[52]. After a few days in a row, when he saw that the car was still there, he called the police[53], on 1 June. The police investigated the report that day and found that the car's roof, hood and windscreen were thick with dust[54], looking like it had been there for years[55]. In the undergrowth near the car, the police found a charred corpse lying next to an empty gasoline can[56]. He was lying face down with an arm over his head as though trying to shield himself from the flames[57]. The vegetation in the surrounding three or four metres had been burned black[58]. The police concluded that the driver of the car
[Above: Partially burnt forest trees from the gasoline fire that killed Karl Koch[59]. Note that a fire which can partly burn "dry as matchwood" trees would not go out until all the wood was burned, unless it was controlled by one or more persons using fire extinguishers or hoses. Buckets of water would not put out a gasoline fire. But Koch couldn't have extinguished the gasoline fire that killed him and there were no fire extinguishers or hoses left at the scene. Therefore Koch's death was murder, not suicide!.]
had committed suicide[60] by pouring the contents of the gasoline can over himself, soaking the surrounding earth as well, lit a match, and was burned to death[61]. The police noted that the corpse was barefoot but no shoes were found in the car or in the surrounding area[62]. They were puzzled, because there had been no rain for five weeks and the undergrowth was as dry as matchwood, yet the scorched patch around the body was contained, as if it had been carefully controlled[63]. The body was on 3 June 1989[64] publicly identified by the police as that of Karl Koch[65]. But if Koch had committed suicide
[Above (enlarge): Timeline between: a. Koch's disappearance on 23 May 1989[66]; b. a farmer first noticing on 30 May what turned out to be Koch's work vehicle parked in the adjoining forest[67]; c. police responding to the farmer's report found a burnt body near the vehicle[68]; d. police identification on 3 June of the body as that of Koch[69]; and e. Linick's `suicide' a day later on 4 June[70].]
by pouring gasoline over himself and then setting it alight, he could not then have been able to control the fire that killed him to prevent it spreading outside the confined perimeter[71]. Koch would have been wearing shoes when he left his office in the car, but they weren't in the car or the surrounding area[72]. And no suicide note was found.[73].
Moreover, suicide made no sense, since Koch had confessed to the German authorities his selling of hacked Western computer secrets to the KGB[74]. He was therefore in no danger of being prosecuted, being protected from punishment by the terms of the espionage amnesty legislation[75]. The authorities had actually provided Koch with accommodation and found him a job with the Christian Democratic Party[76]. He was also receiving help with his drug dependency and seemed on his way to rehabilitation[77] Koch was even planning to move into an apartment of his own and had embraced conventional religion[78]. So even on those grounds (apart from the impossibility of Koch extinguishing, with no fire extinguisher or hose, the gasoline fire which killed him) murder was much more likely than suicide[79].
When the Nature paper announced on 16 February 1989 that the Shroud had in 1988 been dated by radiocarbon "laboratories at Arizona, Oxford and Zurich" as "mediaeval ... AD 1260-1390"[80], it was world news. Koch who was employed by the Christian Democratic Party, and had "embraced conventional religion," i.e. Christianity, would have heard about it, either from the news media, or from his Christian friends. If Koch knew that he had in 1988 hacked two computers in laboratories at Zurich and Oxford universities, even if he did not know what their function was, he would have `put two and two together' and realised that the "mediaeval" carbon date of the Shroud was partly the result of his hacking. In which case if Koch then told his Christian friends about it, the KGB would have learnt of it, which would explain why the KGB would have permanently silenced Koch, and then Linick the day after Koch's burnt body was publicly identified on 3 June 1989!
Continued in part #10, Summary (10).
Notes
1. This post is copyright. No one may copy from this post or any of my posts on this my The Shroud of Turin blog without them first asking and receiving my written permission. Except that I grant permission, without having to ask me, for anyone to copy the title and one paragraph only (including one associated graphic) of any of my posts, provided that if they repost it on the Internet a link to my post from which it came is included. See my post of May 8, 2014. [return]
2. Photo, "In memory of Karl Koch. Hagbard Celine. 22.7.1965. 23.05.1989." Translated by Google. http://www.hagbard-celine.de/. [return]
3. Clauss, U., 2012, "Ancestor of the Pirate Party was charred in the forest," Die Welt, 25 May 2012. Translated by Google. [return]
4. "Karl Koch (hacker)," Wikipedia, 28 January 2015. Footnotes omitted. Two links added. [return]
5. Jones, S.E., 2014, "My theory that the radiocarbon dating laboratories were duped by a computer hacker #1," The Shroud of Turin blog, May 24. [return]
6. Jones, S.E., 2014, "My theory that the radiocarbon dating laboratories were duped by a computer hacker #5," The Shroud of Turin blog, June 13. [return]
7. Jones, S.E., 2014, "My theory that the radiocarbon dating laboratories were duped by a computer hacker #7," The Shroud of Turin blog, July 5. [return]
8. Clough. B. & Mungo, P., 1992, "Approaching Zero: Data Crime and the Computer," Faber & Faber: London & Boston, p.185. [return]
9. Wikipedia, 2015. [return]
10. Hafner, K. & Markoff, J., 1991, "Cyberpunk: Outlaws and Hackers on the Computer Frontier," Corgi: London, reprinted, 1993, p.207. [return]
11. Clough & Mungo, 1992, pp.164-165. [return]
12. Shea, R. & Wilson, R.A., 1975, "The Illuminatus! Trilogy," Dell: New York NY. [return]
13. Hafner & Markoff, 1991, p.206. [return]
14. Ibid. [return]
15. Hafner & Markoff, 1991, pp.206-207. [return]
16. Hafner & Markoff, 1991, p.216. [return]
17. Hafner & Markoff, 1991, p.214. [return]
18. Hafner & Markoff, 1991, p.215. [return]
19. Clough & Mungo, 1992, p.164. [return]
20. Hafner & Markoff, 1991, p.208. [return]
21. Hafner & Markoff, 1991, pp.209, 185. [return]
22. Hafner & Markoff, 1991, p.209. [return]
23. Hafner & Markoff, 1991, p.211. [return]
24. Hafner & Markoff, 1991, p.224. [return]
25. Hafner & Markoff, 1991, pp.225, 293. [return]
26. Hafner & Markoff, 1991, pp.230-231, 239-240, 245, 249, 250, 254, 260. [return]
27. Hafner & Markoff, 1991, p.266. [return]
28. Gove, H.E., 1996, "Relic, Icon or Hoax?: Carbon Dating the Turin Shroud," Institute of Physics Publishing: Bristol UK, pp.213-214. [return]
29. Gove, 1996, pp.260-261. [return]
30. King, T., ed., 1989a, "Computer Espionage: Three `Wily Hackers' Arrested," Phrack Magazine, Issue #25, March 3. [return]
31. Jones, S.E., 2014, "Were the radiocarbon dating laboratories duped by a computer hacker?: My replies to Dr. Timothy Jull and Prof. Christopher Ramsey," The Shroud of Turin blog, March 13. [return]
32. Clough & Mungo, 1992, p.173. [return]
33. Linick, T.W., et al., 1986, "Operation of the NSF-Arizona accelerator facility for radioisotope analysis and results from selected collaborative research projects," Radiocarbon, Vol. 28, No. 2a, pp.522-533, 524. [return]
34. Clough & Mungo, 1992, pp.170-172, 228n5. [return]
35. Clough & Mungo, 1992, p.172. [return]
36. Stoll, C., 1989, "The Cuckoo's Egg Tracking a Spy through the Maze of Computer Espionage," Pan: London, reprinted, 1991, p.362. [return]
37. King, T., ed., 1989b, "News From The KGB/Wily Hackers," Phrack Magazine, Issue #25, March 7. [return]
38. Stoll, 1989, pp.341-342. [return]
39. Hafner & Markoff, 1991, pp.254, 266. [return]
40. Hafner & Markoff, 1991, p.283. [return]
41. Clough & Mungo, 1992, p.185. [return]
42. Stoll, 1989, p.363. [return]
43. Ibid. [return]
44. Clough & Mungo, 1992, p.184. [return]
45. Clough & Mungo, 1992, p.172. [return]
46. Clough & Mungo, 1992, p.184. [return]
47. Clough & Mungo, 1992, pp.183-184. [return]
48. Clough, & Mungo, 1992, p.163. [return]
49. Ibid. [return]
50. Hafner & Markoff, 1991, pp.302-303. [return]
51. Hafner & Markoff, 1991, p.303. [return]
52. Clough, & Mungo, 1992, p.163. [return]
53. Hafner & Markoff, 1991, p.303. [return]
54. Clough, & Mungo, 1992, p.163. [return]
55. Karl Koch (hacker)," Wikipedia, 30 May 2014. [return]
56. Clough, & Mungo, 1992, p.163. [return]
57. Hafner & Markoff, 1991, p.303. [return]
58. Ibid. [return]
59. "Cliff Stoll visiting Karl Koch's death forest," FirstPost, 2014. [return]
60. Clough, & Mungo, 1992, p.163. [return]
61. Hafner & Markoff, 1991, p.303. [return]
62. Ibid. [return]
63. Clough, & Mungo, 1992, p.163. [return]
64. King, T., ed., 1989c, "One of Cliff Stoll's `Wily Hackers' Is Dead (Suicide?)," Phrack Magazine, June 5. This 5th June Phrack Magazine report states that Koch died on 3 June, evidently wrongly assuming at the time that Koch had died the same day that the police publicly identified his body. [return]
65. Ibid. [return]
66. Clough & Mungo, 1992, p.163; Hafner & Markoff, 1991, pp.302-303. [return]
67. Hafner & Markoff, 1991, p. 303. [return]
68. Clough & Mungo, 1992, p.163; Hafner & Markoff, 1991, p.303. [return]
69. Clough, & Mungo, 1992, p.163. [return]
70. Galeazzi, G., 2013. "Never solved: The enigma that still divides the Church: The Shroud," Vatican Insider, 1 April. Translated from Italian by Google. See English translation, "Unsolved Enigma that Still Divides the Church: The Shroud." [return]
71. Clough, & Mungo, 1992, p.163. [return]
72. Ibid. [return]
73. Stoll, 1989, p.362. [return]
74. Clough & Mungo, 1992, p.185. [return]
75. Clough & Mungo, 1992, p.186. [return]
76. Clough & Mungo, 1992, p.185. [return]
77. Ibid. [return]
78. Hafner & Markoff, 1991, p.302. [return]
79. Clough & Mungo, 1992, p.185. [return]
80. Damon, P.E., et al., 1989, "Radiocarbon Dating of the Shroud of Turin," Nature, Vol. 337, 16th February, pp.611-615. [return]
Posted: 17 May 2015. Updated: 4 February 2021.
No comments:
Post a Comment