Introduction. This is part #8 of my concluding summary of the evidence that the 1988 radiocarbon dating of the Shroud of Turin as "mediaeval ... AD 1260-1390" was the result of a computer hacking, allegedly by Arizona radiocarbon dating laboratory physicist Timothy W. Linick (1946-89), aided by German hacker Karl Koch (1965–89), on behalf of the former Soviet Union, through its agency the KGB. Previous posts in this series were parts: #1, #2, #3, #4, #5, #6 and #7. I will link the main headings in these posts back to my previous, "My theory ..." posts on those topics. The next post in this series is part #9.
"Karl Werner Lothar Koch (July 22, 1965 – ca. May 23, 1989) was a German hacker in the 1980s, who called himself `Hagbard', after Hagbard Celine. He was involved in a Cold War computer espionage incident. ... Koch was born in Hanover. As his moniker would suggest, he was heavily influenced by The Illuminatus! Trilogy by Robert Anton Wilson and Robert Shea. ... Koch was loosely affiliated with the Chaos Computer Club. He worked with the hackers known as DOB (Dirk-Otto Brezinski), Pengo (Hans Heinrich Hübner), and Urmel (Markus Hess), and was involved in selling hacked information from United States military computers to the KGB. Clifford Stoll's book The Cuckoo's Egg gives a first-person account of the hunt and eventual identification of Hess. Pengo and Koch subsequently came forward and confessed to the authorities under the espionage amnesty, which protected them from being prosecuted. Koch was found burned to death with gasoline in a forest near Celle, Germany. The death was officially claimed to be a suicide. However, some believe there is little evidence supporting suicide and many believe that Koch was killed in order to keep him from confessing more to the authorities. Why Koch would be targeted, and not Pengo and Urmel, is unknown. Koch left his workplace in his car to go for lunch; he had not returned by late afternoon and so his employer reported him as a missing person. Meanwhile, West German police were alerted of an abandoned car in a forest near Celle. When they went to investigate, they found an abandoned car, that looked like it had been there for years, as it was covered in dust. Near to the car they found a burned corpse (Koch). His shoes were missing and have never been found. There was a patch of burned ground around him, which although it had not rained in some time and the grass was perfectly dry, was controlled in a small circle around the corpse. It is thought to be highly unlikely that this type of controlled burning could have been achieved by Koch himself which leads many to believe that his death was not suicide." (my emphasis).• Koch was a German computer hacker in the 1980s. Karl Koch was born in Hanover, then West Germany, on 22 July 1965. Both his parents were dead by the time he was 16 and Koch's inheritance supported his expensive drug habit. Koch began computer hacking in Hanover in the early 1980s. Koch's online name was "Hagbard Celine" after the hero of the The Illuminatus! Trilogy novels, who fights against The Illuminati, a fictitious, but to Koch real, all-powerful secret society. Unlike other hackers, Koch was no programmer but was expert at guessing logins and passwords. What Koch lacked in programming skills he more than made up for by his deep intuition, fertile imagination, unusual insight, patience, single-mindedness and persistence. Also, other hackers were part-time but Koch, supported by his inheritance, devoted every waking moment to hacking.
• Koch became a paid hacker for the KGB. In 1985, at a hacker meeting in Hanover, Koch was recruited by a Peter Carl as a the first member of a ring of hackers to break into Western computer systems, particularly those on military or defence industry sites, and sell the information and programs to the KGB. Others who joined Koch in the Hanover KGB hacker circle included Hans Heinrich Hübner (Pengo), Dirk-Otto Brzezinski (DOB) and Markus Hess (Urmel). In September 1986 Peter Carl went to the Soviet trade mission in East Berlin with a proposition to sell them secret information from USA military computers. A KGB agent, Sergei Markov, agreed to Carl's hacking proposition. At subsequent meetings in East Berlin with Carl and Brzezinski, from 1986 through 1988, Markov paid for information and software the German hacker ring, including Koch, provided.
• Koch allegedly installed Linick's program on Zurich and Oxford's AMS computers. By early 1987, Koch had spent his inheritance and his drug dependency had become acute. It was in this ~7 month period between October 1987, after the Archbishop of Turin announced that only three AMS laboratories, Arizona, Oxford and Zurich, would date the Shroud and April 1988 when samples were cut from the Shroud and given to the three laboratories for dating, that according to my theory, the KGB's Sergei Markov secretly approached Koch, with an offer of drugs and/or money in return for Koch installing Linick's program on Zurich and Oxford AMS computers. How exactly Koch installed Linick's program on Zurich and Oxford AMS computers is not part of my theory. Except that, since Arizona's and Oxford's (and presumably Zurich's) AMS computers were never online, Linick's program would have had to be installed manually and locally, either by Koch alone, or by a KGB operative following Koch's instructions, or more likely by a KGB operative taking Koch to each of the two laboratories and helping him gain access to their AMS computers.
• The laboratories' AMS computers had a major security flaw. In 1987 it was known by hackers (including Koch) that VMS, the operating system for the "DEC computer system" that the AMS computer at Arizona (and presumably also at Zurich and Oxford) was, had a major security flaw, in that if an unauthorised user entered any login and password and ignored the error messages, he could gain access to the system:
"Two ... Hamburg students ... code-named Bach and Handel ... had exploited a devastatingly simple flaw in the VMS operating system used on VAX. The machines, like most computer systems, required users to log in their ID and then type their password to gain access. If the ID or the password was wrong, the VMS system had been designed to show an 'error' message and bar entry. But ... if they simply ignored all the 'error' messages, they could walk straight into the system - provided they continued with the log-on as though everything was in order. When confronted with the 'error' message after keying in a fake ID, they would press `enter', which would take them to the password prompt. They would then type in a phoney password, bringing up a second, equally ineffectual 'error' message. By ignoring it and pressing enter again, they were permitted access to the system. It was breathtakingly easy, and left the VAX open to any hacker, no matter how untalented. ... The VAX operating system, VMS, had been subjected to stringent tests ... It beggared belief that VMS could have gone through such testing without the back door being discovered. [Later, it would be established that although early versions of VMS had been fully tested, later ones hadn't. It was these newer versions that contained the back door. (Users update their computers with the latest versions of the operating systems almost as a matter of course, so nearly all VAXen became insecure for a time.)]" (my emphasis).
"Responding to complaints from its users, Digital issued a 'mandatory patch', a small program designed specifically to close the back door, in May 1987. Despite the 'mandatory' tag, many users didn't bother to install it. So, at least for a time, VAX computers across the world provided hackers with an open house ..." (my emphasis).And a reason why many system managers did not install DEC's `mandatory patch" is that DEC were "being real quiet about it. They don't want their customers to panic" (see below).
Indeed, after the "NASA hack," in which both Hess and Koch were involved, it was found that "DEC's [VMS] installation procedure works only" for a "SYSTEM account" but "most system managers do not change the preset default password MANAGER" and those who did change it used easy-to-guess passwords:
"In Hess' apartment, public prosecutors found (on March 3, 1989) password lists from other hacks. On Monday, March 6, 1989, the Panorama team (who had disclosed the NASA hack and basically the KGB connection) asked Klaus Brunnstein to examine some of the password lists; the material which he saw (for 30 minutes) consisted of about 100 photocopied protocols of a hack during the night of July 27 to 28, 1987; it was the famous `NASA hack.' From a VAX 750 (with VMS 4.3) ... to log-into other VAXes in remote institutes. They always used SYSTEM account and the `proper' password (invisible). ... DEC's installation procedure works only if a SYSTEM account is available; evidently, most system managers do not change the preset default password MANAGER; since Version 4.7, MANAGER is excluded, but on previous VMS versions, this hole probably exists in many systems! ... the hackers, in more than 40% of the cases, succeeded to login, their first activities were to ... to install ... the Trojan horse. With the Trojan horse ... they copied the password lists to their PCs. When looking through the password list, Klaus observed the well-known facts: More than 25% female or male first names, historical persons, countries, cities, or local dishes ... the password lists contained less than 5% passwords of such nature easy to guess! (my emphasis)".
"Now if you want a tasty security hole, check out VMS. They've got a hole you could drive a truck through.' `Huh?' `Yeah. It's in every VAX computer from Digital Equipment Corporation that runs the VMS operating system Version 4.5.' `What's the problem?' Darren explained. 'Anyone that logs into the system can become system manager by running a short program. You can't stop 'em.' I hadn't heard of this problem. 'Isn't DEC doing something about it? After all, they sell those systems.' `Oh, sure, they're sending out patches. But they're being real quiet about it. They don't want their customers to panic.' `Sounds reasonable.' `Sure, but nobody's installing those patches. What would you do-some tape shows up in the mail saying, `Please install this program or your system may develop problems' ... you'll ignore it, because you've got better things to do.' `So all the systems are open to attack?' `You got it.' `Wait a second. That operating system was certified by NSA. They tested it and certified it secure.' `Sure they spent a year testing it. And a month after they verified the system, DEC modified it slightly. Just a little change in the password program.' ... `And now fifty thousand computers are insecure.' (my emphasis)".
So it would be likely that Zurich and Oxford's AMS computers, not being online, were among the "many," indeed "nearly all," VAX computers which were not patched. And were in the "more than 40% of the cases" where the System password was still set to its default "MANAGER." And were among the 95% whose passwords were easy to guess!
• Koch was one of the first to exploit the VMS login security flaw. In 1985 Koch had obtained instructions and a program to exploit the VMS login security flaw, and sold it to the KGB for money and drugs:
"However, the Soviets lacked the skill and expertise for computer-mediated acquisitions and sought to recruit others. Having recruited Hanover hacker Karl Koch earlier, Koch became the vehicle through which the KGB acquired other IBM and DEC vigilante or mercenary talent and capability. In 1985, under greater pressure from Berlin KGB handlers. Karl Koch traveled to Karlsruhe seeking a DEC VAX VMS hacker named Steffen Weihruch. Weihruch provided Koch with a crafted software tool designed to automatically and deeply exploit a dangerous back-doors access point in the VAX system The hidden administrative backdoor was previously discovered by two Heidelberg hackers code-named Bach and Handel. The Weihruch tool was a password stealer that was covert, selective, and self-concealing. Once installed the tool cloaked its' presence, only recorded the access credentials of privileged system users in a record that could be picked up later, and erased its' activity as recorded in the computing system logs. Koch acquired the tool and sold it to the KGB in exchange for money and drugs. Bach and Handel also came into possession of the tool; the two were proteges of Weihruch.".Hacking into such insecure 1980s computers would be easy for a very experienced hacker as Koch was. It may be significant that in late 1987/early 1988 Markov wanted Koch excluded from the KGB hacking ring because of his drug-taking and talking to journalists for money.
• Koch confessed to hacking for the KGB. Following a period of treatment in psychiatric hospitals and drug rehabilitation centers, Koch was on the road to recovery. In June 1987, due to Clifford Stoll's persistence, American and West German authorities cooperated in tracing Markus Hess' modem call from Lawrence Berkeley Laboratories in California to his apartment in Hanover, Germany, but due to a police bungle, Hess was not caught in the act of hacking as planned, and although he was arrested and charged, Hess was later released on appeal. A year later, in the summer of 1988, first Koch, then Hübner, independently, taking advantage of an amnesty provision for espionage in West German legislation, approached the authorities to confess their hacking for the KGB. Both were interrogated by West German prosecutors, and on 2 March 1989 eight were arrested, including Hess, Hübner, Koch, Brezinski and Carl, but all except Carl and Brezinski were released after a few days. Koch and Hübner, having confessed to espionage before they were caught, under the espionage amnesty legislation were in no danger of being jailed providing they co-operated, which they did.
• In April 1989 a distraught German-sounding male phoned a well-known Shroud author and begged forgiveness for "falsifying the results of the 1988 dating" through "espionage". As posted in my May 2016 Shroud of Turin News Editorial, leading Shroud pro-authenticist Joe Marino emailed me in May the following (author's name substituted with "AN"):
"I've been in contact with AN about the C-14 issue and he has given me his okay to mention something we discussed to you, which is interesting in light of your 10 part series about a possible hacking. He's only told a few people and never wrote about it in any of his books because he can't prove anything. He said that not long after the C-14 dating--he thinks it was probably around April 1989, he received a call about 1:30 in the morning. The (male) person, who did not apologize for calling so late, sounded distraught. The person told AN he had been involved in falsifying the results of the 1988 dating. AN thought the accent might have been German and thought the person was in his 40s but wasn't sure because of the accent and emotional nature of the call. The person would not reveal his name (the person claimed it wasn't important) or where he was calling from. He kept asking AN if he would forgive him for having done a disservice to humanity. The person even mentioned the word `espionage' in relation to the event. The only detail he gave about the procedure was saying that the real Shroud sample was thrown in the trash. That last detail, of course, doesn't fit with a computer hacking, but other details do fit with your description of Koch. AN said the person said he also planned to call other Shroud researchers, but as far as we know, no one ever did receive a call. AN has wondered over the years whether the call itself could have been a fraud, but he is firm that the person sounded distraught to the point that AN said he wouldn't have been surprised if the guy would have said `I've got a gun and I'm going to shoot myself.' Even now, AN just isn't sure what to think. But I know you'll find this interesting one way or the other.".I replied to Marino that, because of the German accent, and especially "because of the unusual word `espionage,' I believe it was Koch":
"The caller being German does fit Karl Koch but him throwing the Shroud sample in the trash does not. There is no doubt that the Shroud sample was dated, because the dating was not blind and the Shroud has a distinctive weave. However, it could have been a metaphor for him having `trashed' the Shroud. The word `espionage' is very significant because that was what the hackers were charged with and were granted amnesty for under then West German law. That word has, as far as I know, never been used of the Shroud dating. I only found it in books [and Wikipedia] about the West German hacker ring who were prosecuted in 1988 for selling computer secrets to the USSR. Koch became a Christian in late 1988/early 1989, and could have obtained AN's name from his ... book `....' It would have been more certainly Koch if he had mentioned hacking. But because of the unusual word `espionage,' I believe it was Koch."The Wikipedia entry on Koch above twice mentions "espionage" in the context of Koch's hacking:
"... Koch ... was a German hacker in the 1980s ... He was involved in a Cold War computer espionage incident ... Pengo (Hans Heinrich Hübner) ... and Koch subsequently came forward and confessed to the authorities under the espionage amnesty, which protected them from being prosecuted.".The alternative is that this was just a crank call, and while a crank might say "he had been involved in falsifying the results of the 1988 dating" by him throwing "the real Shroud sample" into "the trash," it is difficult to imagine a crank using the word "espionage" in that context. A search of my system found that, the word "espionage" had never been used in relation to the 1988 radiocarbon dating of the Shroud, until I started using it. It is also hard to imagine a crank being (or pretending to be) "distraught" about discrediting the Shroud, rather than crowing about it. Let alone being so distraught that it left an impression on AN such that he not only "told a few people," considered writing about it in one of "his books" and kept wondering about it "over the years." The time, "April 1989" also fits Koch better than a crank because the latter would more likely have phoned AN shortly after it was announced on 13 October 1988 that radiocarbon dating had shown the Shroud to be a medieval fake. And as we saw above and shall see next, it was on 23 May 1989 that Koch was reported missing, presumably abducted by the KGB, and was later found dead on 1 June 1989.If the KGB discovered that Koch had since April 1989 been telling others that "he had been involved in falsifying the results of the 1988 dating," that would explain why it decided to silence Koch permanently. I regard this information volunteered by AN as highly significant, because not only is it the first piece of evidence that directly links Koch with hacking the 1988 radiocarbon dating of the Shroud, but also it shows that leading Shroud pro-authenticists like Joe Marino and AN are starting to take my hacking theory seriously!
• Koch was murdered between 23 and 30 May 1989. Before noon on 23 May 1989, Koch left his workplace at the Hanover office of West Germany's Christian Democratic Union party, in his employer's vehicle, to deliver a package to a government office in Hanover, but he never arrived. In the late afternoon, Koch's employer notified the police of his disappearance. Koch's friends and the West German domestic security agency (BFV) sent out search parties looking for Koch but after a week the searches were abandoned. On 30 May a farmer who had been checking his irrigation daily noticed a car parked in the adjoining forest near the village of Ohof, north of Hanover. After a few days in a row, when he saw that the car was still there, he called the police, on 1 June. The police investigated the report that day and found that the car's roof, hood and windscreen were thick with dust, looking like it had been there for years. In the undergrowth near the car, the police found a charred corpse lying next to an empty gasoline can. He was lying face down with an arm over his head as though trying to shield himself from the flames. The vegetation in the surrounding three or four metres had been burned black. The police concluded that the driver of the car
[Above (enlarge): Partially burnt forest trees from the gasoline fire that killed Karl Koch. Note that a fire which can partly burn "dry as matchwood" trees would not go out until all the wood was burned, unless it was controlled by one or more persons using fire extinguishers or hoses. Buckets of water would not put out a gasoline fire. But Koch couldn't have extinguished the gasoline fire that killed him and there were no fire extinguishers, hoses or buckets left at the scene. Therefore Koch's death was murder, not suicide!]
had committed suicide by pouring the contents of the gasoline can over himself, soaking the surrounding earth as well, lit a match, and was burned to death. The police noted that the corpse was barefoot but no shoes were found in the car or in the surrounding area. They were puzzled, because there had been no rain for five weeks and the undergrowth was as dry as matchwood, yet the scorched patch around the body was contained, as if it had been carefully controlled. On 3 June 1989 the body was publicly identified by the police as that of Karl Koch. But if Koch had committed suicide
[Above (enlarge): Timeline between: a. Koch's disappearance on 23 May 1989; b. a farmer first noticing on 30 May what turned out to be Koch's work vehicle parked in the adjoining forest; c. police responding to the farmer's report found a burnt body near the vehicle; d. police identification on 3 June of the body as that of Koch; and e. Linick's `suicide' (see 22Feb16 & 07Mar16) a day later on 4 June.]
by pouring gasoline over himself and then setting it alight, he could not then have been able to control the fire that killed him to prevent it spreading outside the confined perimeter. Koch would have been wearing shoes when he left his office in the car, but they weren't in the car or the surrounding area. And no suicide note was found..
Moreover, suicide made no sense, since Koch had confessed to the West German authorities his selling of hacked Western computer secrets to the KGB. He was therefore in no danger of being prosecuted, being protected from punishment by the terms of the West German espionage amnesty legislation. The authorities had actually provided Koch with accommodation and found him a job with the Christian Democratic Party. He was also receiving help with his drug dependency and seemed on his way to rehabilitation Koch was even planning to move into an apartment of his own and had embraced conventional religion. So even on those grounds (apart from the impossibility of Koch extinguishing in dry forest undergrowth, with no fire extinguisher, hose or bucket, the gasoline fire which killed him), murder was much more likely than suicide to put it mildly.
When the Nature paper announced on 16 February 1989 that the Shroud had in 1988 been radiocarbon dated by "laboratories at Arizona, Oxford and Zurich" as "mediaeval ... AD 1260-1390", it was worldwide news. Koch who was employed by the Christian Democratic Party, and had "embraced conventional religion" (see above) i.e. Christianity, would have heard about it, from the news media and/or from his Christian friends. If Koch knew that he had in 1987/88 hacked two computers in laboratories at Zurich and Oxford universities, even if he did not know what their function was, he would have `put two and two together' and realised that the "mediaeval" carbon date of the Shroud was partly the result of his hacking. In which case if Koch then told his Christian friends about it, and even phoned at least one leading pro-Shroud author (as we saw above), the KGB would likely have learned of it, and would explain why the KGB would have permanently silenced Koch, and then Linick on 4 June 1989, the day after Koch's burnt body was publicly identified on 3 June 1989!
• Koch is not essential to my theory. As I have previously stated, Karl Koch is not essential to my theory:
"... Koch's role is not essential to my theory. If it turned out that Koch could not possibly have personally travelled to Zurich and Oxford to access their radiocarbon laboratories computers, it would not falsify my theory. My theory includes Koch because of the striking coincidence that they were both allegedly hackers working for the KGB and both allegedly committed suicide within days of each other"
"...Karl Koch is not essential to my theory, as Linick could have hacked Zurich and Oxford's AMS computer some other way, e.g. by issuing them with a program `update', or one of the KGB's own operatives could have entered those two laboratories clandestinely and installed Linick's program on their AMS control console computers"
If it turned out that Koch could not possibly have been involved, either directly or indirectly, in installing Linick's program on Zurich and Oxford laboratories' AMS computers, then my theory would not be falsified. I would then maintain that Linick's program was installed on those laboratories' computers by some other way. For example, Linick himself could have flown over to Zurich and Oxford, installed his program clandestinely on their computers, and returned to Arizona, in a few days. This is why my theory always has been "that the radiocarbon dating laboratories were duped by a computer hacker" (singular).
"... I don't claim that the laboratories, or even Linick, knew about Koch"
I had included Karl Koch in my theory despite there being no evidence of a link between Koch and Linick (there does not need to be), and before there was evidence of a link between Koch and the 1988 radiocarbon dating (as there now is - see above) because of: 1) the striking coincidence that both Koch and Linick died of suspected suicide within days of each other (and indeed Linick's `suicide' on 4 June 1989 was only one day after Koch charred body was identified and publicly announced as his by West German police on 3 June 1989 -see above); 2) Koch's death was almost certainly the work of the KGB, or the East German Secret Police (Stasi) at the behest of the KGB; 3) yet the KGB had no reason to kill Koch unless he had been involved in an entirely different type of hacking for them which they did not want to become public knowledge; 4) Koch's expertise would have been useful in hacking into Zurich and Oxford's AMS computers (but Linick may have known how to do it); and 5) Koch's living in West Germany would have made it comparatively easy for him to travel to Zurich and Oxford to install Linick's program on their computers (although that too is not necessary to my theory as Koch may have only provided expert advice on how to hack into those computers and a KGB operative may have entered the laboratories clandestinely and installed Linick's program on their AMS computers, or Linick himself may have installed it).
So those who continue to dismiss my theory as merely a "conspiracy theory," ignoring all my evidence, and in the full knowledge of my above disclaimers that Koch is not essential to my theory and Linick could have acted alone, do so dishonestly and/or self-deludedly!
Continued in part #9 of this series.
1. This post is copyright. Permission is granted to quote from any part of this post (but not the whole post), provided it includes a reference citing my name, its subject heading, its date, and a hyperlink back to this post. [return]
2. Damon, P.E., et al., 1989, "Radiocarbon Dating of the Shroud of Turin," Nature, Vol. 337, 16th February, pp.611-615, p.611. [return]
3. Jull, A.J.T. & Suess, H.E., 1989, "Timothy W. Linick," Radiocarbon, Vol 31, No 2. [return]
4. "Karl Koch (hacker)," Wikipedia, 1 April 2016. [return]
5. Photo, "In memory of Karl Koch. Hagbard Celine. 22.7.1965. 23.05.1989." Translated by Google. http://www.hagbard-celine.de/. [return]
6. Clauss, U., 2012, "Ancestor of the Pirate Party was charred in the forest," Die Welt, 25 May 2012. Translated by Google. [return]
7. "Karl Koch (hacker)," Wikipedia, 1 April 2016. Footnotes omitted and links added. [return]
8. "Karl Koch (hacker)," Wikipedia, 1 April 2016. [return]
9. Hafner, K. & Markoff, J., 1991, "Cyberpunk: Outlaws and Hackers on the Computer Frontier," Corgi: London, reprinted, 1993, p.207. [return]
10. Clough. B. & Mungo, P., 1992, "Approaching Zero: Data Crime and the Computer," Faber & Faber: London & Boston, pp.164-165. [return]
11. Shea, R. & Wilson, R.A., 1975, "The Illuminatus! Trilogy," Dell: New York NY. [return]
12. Hafner & Markoff, 1991, p.206. [return]
13. Ibid. [return]
14. Hafner & Markoff, 1991, pp.206-207. [return]
15. Hafner & Markoff, 1991, p.216. [return]
16. Hafner & Markoff, 1991, p.214. [return]
17. Hafner & Markoff, 1991, p.215. [return]
18. Clough & Mungo, 1992, p.164. [return]
19. Hafner & Markoff, 1991, p.208. [return]
20. Hafner & Markoff, 1991, pp.209, 185. [return]
21. Hafner & Markoff, 1991, p.209. [return]
22. Hafner & Markoff, 1991, p.211. [return]
23. Hafner & Markoff, 1991, p.224. [return]
24. Hafner & Markoff, 1991, pp.225, 293. [return]
25. Hafner & Markoff, 1991, pp.230-231, 239-240, 245, 249, 250, 254, 260. [return]
26. Hafner & Markoff, 1991, p.266. [return]
27. Gove, H.E., 1996, "Relic, Icon or Hoax?: Carbon Dating the Turin Shroud," Institute of Physics Publishing: Bristol UK, pp.213-214. [return]
28. Gove, 1996, pp.260-261. [return]
29. King, T., ed., 1989a, "Computer Espionage: Three `Wily Hackers' Arrested," Phrack Magazine, Issue #25, March 3. [return]
30. Jones, S.E., 2014, "Were the radiocarbon dating laboratories duped by a computer hacker?: My replies to Dr. Timothy Jull and Prof. Christopher Ramsey," The Shroud of Turin blog, March 13. [return]
31. Clough & Mungo, 1992, p.173. [return]
32. Linick, T.W., et al., 1986, "Operation of the NSF-Arizona accelerator facility for radioisotope analysis and results from selected collaborative research projects," Radiocarbon, Vol. 28, No. 2a, pp.522-533, 524. [return]
33. Clough & Mungo, 1992, pp.170-172, 228n5. [return]
34. Clough & Mungo, 1992, p.172. [return]
35. Stoll, C., 1989, "The Cuckoo's Egg Tracking a Spy through the Maze of Computer Espionage," Pan: London, reprinted, 1991, p.362. [return]
36. King, T., ed., 1989b, "News From The KGB/Wily Hackers," Phrack Magazine, Issue #25, March 7. [return]
37. Stoll, 1989, pp.341-342. [return]
38. Yanalitis, M., 2014, "The Impact of Project RAHAB and the Chaos Computing Congresses (CCC) on the Future of Computer-Network Mediated Espionage: Cuckoo's Egg Prequel or Perfect Storm?," Carnegie Mellon University, January 9, pp.1-37, 15. [return]
39. Hafner & Markoff, 1991, pp.254, 266. [return]
40. Hafner & Markoff, 1991, p.283. [return]
41. Clough & Mungo, 1992, p.185. [return]
42. Stoll, 1989, p.363. [return]
43. Ibid. [return]
44. Clough & Mungo, 1992, p.184. [return]
45. Clough & Mungo, 1992, p.172. [return]
46. Clough & Mungo, 1992, p.184. [return]
47. Clough & Mungo, 1992, pp.183-184. [return]
48. Marino, J.G., 2016, Email "Re: info about a strange call Shroud researcher received circa 1989," 4 May 2016, 10:26 AM. [return]
49. Jones, S.E., 2016, Email "Re: info about a strange call Shroud researcher received circa 1989," 14 May 2016, 3:19 PM. [return]
50. "Karl Koch (hacker)," Wikipedia, 1 April 2016. [return]
51. Wilson, I., 1991, "Holy Faces, Secret Places: The Quest for Jesus' True Likeness," Doubleday: London, pp.8-9; Ruffin, C.B., 1999, "The Shroud of Turin: The Most Up-To-Date Analysis of All the Facts Regarding the Church's Controversial Relic," Our Sunday Visitor: Huntington IN, p.118; Wilson, I., 1998, "The Blood and the Shroud: New Evidence that the World's Most Sacred Relic is Real," Simon & Schuster: New York NY, pp.6-7; Zugibe, F.T., 2005, "The Crucifixion of Jesus: A Forensic Inquiry," M. Evans & Co.: New York NY, p.3; Tribbe, F.C., 2006, "Portrait of Jesus: The Illustrated Story of the Shroud of Turin," Paragon House Publishers: St. Paul MN, Second edition, pp.168-169; de Wesselow, T., 2012, "The Sign: The Shroud of Turin and the Secret of the Resurrection," Viking: London, p.166; Wilson, I., 2010, "The Shroud: The 2000-Year-Old Mystery Solved," Bantam Press: London, pp.84-85. [return]
52. Clough, & Mungo, 1992, p.163. [return]
53. Ibid. [return]
54. Hafner & Markoff, 1991, pp.302-303. [return]
55. Hafner & Markoff, 1991, p.303. [return]
56. Clough, & Mungo, 1992, p.163. [return]
57. Hafner & Markoff, 1991, p.303. [return]
58. Clough, & Mungo, 1992, p.163. [return]
59. Karl Koch (hacker)," Wikipedia, 1 April 2016. [return]
60. Clough, & Mungo, 1992, p.163. [return]
61. Hafner & Markoff, 1991, p.303. [return]
62. Ibid. [return]
63. "Cliff Stoll visiting Karl Koch's death forest," YouTube, January 13, 2008. [return]
64. Clough, & Mungo, 1992, p.163. [return]
65. Hafner & Markoff, 1991, p.303. [return]
66. Ibid. [return]
67. Clough, & Mungo, 1992, p.163. [return]
68. King, T., ed., 1989c, "One of Cliff Stoll's `Wily Hackers' Is Dead (Suicide?)," Phrack Magazine, June 5. This 5th June Phrack Magazine report states that Koch died on 3 June, evidently wrongly assuming at the time that Koch had died the same day that the police publicly identified his body. [return]
69. Ibid. [return]
70. Clough & Mungo, 1992, p.163; Hafner & Markoff, 1991, pp.302-303. [return]
71. Hafner & Markoff, 1991, p. 303. [return]
72. Clough & Mungo, 1992, p.163; Hafner & Markoff, 1991, p.303. [return]
73. Clough, & Mungo, 1992, p.163. [return]
74. Galeazzi, G., 2013. "Never solved: The enigma that still divides the Church: The Shroud," Vatican Insider, 1 April. Translated from Italian by Google (no longer online). English translation, "Unsolved Enigma that Still Divides the Church: The Shroud" (no longer online). [return]
75. Clough, & Mungo, 1992, p.163. [return]
76. Ibid. [return]
77. Stoll, 1989, p.362. [return]
78. Clough & Mungo, 1992, p.185. [return]
79. Clough & Mungo, 1992, p.186. [return]
80. Clough & Mungo, 1992, p.185. [return]
81. Ibid. [return]
82. Hafner & Markoff, 1991, p.302. [return]
83. Clough & Mungo, 1992, p.185. [return]
84. Damon, 1989, pp. 611-615. [return]
85. Wilson, 1991, p.9; Wilson, 1998, pp.7-8; Garza-Valdes, L.A., 1998, "The DNA of God?," Hodder & Stoughton: London, p.5; Ruffin, 1999, p.118; Tribbe, 2006, p.169; Whiting, B., 2006, "The Shroud Story," Harbour Publishing: Strathfield NSW, Australia, p.141. [return]
86. Jones, S.E., 2014, "My theory that the radiocarbon dating laboratories were duped by a computer hacker #1," The Shroud of Turin blog, 24 May. [return]
87. Jones, S.E., 2014, "My theory that the radiocarbon dating laboratories were duped by a computer hacker #5," The Shroud of Turin blog, June 13. [return]
88. Jones, S.E., 2014, "My theory that the radiocarbon dating laboratories were duped by a computer hacker #7," The Shroud of Turin blog, July 5. [return]
89. Clough & Mungo, 1992, p.185. [return]
Posted: 2 June 2016. Updated: 2 October 2016.