Le seguenti 1080 parole non sono state trovate nel dizionario di 1275 termini (includendo 1275 LocalSpellingWords) e sono evidenziate qui sotto:
4b   70s   90s   about   Accelerator   According   according   accused   action   activities   addict   addiction   Adepts   advancement   advisors   Again   age   Agency   agent   ago   Alamos   alcohol   alias   alien   almost   already   alternative   Although   always   America   among   amount   Anarchy   Another   another   answered   Anton   appeared   appears   applies   arcane   armament   arms   army   Arrested   arrested   arrests   article   articles   Artists   aside   assembled   assigned   assisted   associate   association   at   At   atavistic   Atlantean   atomic   attention   attract   authorities   Authority   available   avoid   awaited   away   back   background   balanced   balding   bank   banks   based   bastard   Bavarian   be   bearded   became   because   become   been   begins   being   beings   believed   belong   Bene   Berlin   Bf   big   billable   birth   black   blew   Bohemian   Bonn   book   bootleggers   Boris   both   bottle   bought   brand   Brandt   Break   breaking   breaks   Brezinski   brilliant   bringing   broad   brought   Brunnstein   Btx   Bureau   burnt   business   But   but   By   by   cable   call   called   calls   camp   can   Captain   cards   Carl   case   cases   Celine   Celle   Center   centers   Cers   Chancellor   Chaos   character   charge   charm   cheap   Chief   circumstances   clear   Cliff   Clifford   close   club   Club   clubs   clumsiness   cocaine   colleague   Cologne   coma   comical   committed   Communication   communications   Communications   community   companies   computer   Computer   computers   computing   comrades   conference   Conferences   confessed   confirm   confirmed   Congress   congresses   considerable   considered   considering   conspiracy   contacts   contemporary   continue   contractors   conventions   corporate   counter   courageous   covered   cracker   crap   created   creates   crime   croupier   Crowley   cryptome   Cs   Cthulhu   culture   customer   cute   cyber   daily   databases   Datenschleuder   David   Dawn   day   days   Dead   dead   deal   dealing   deals   death   Dec   decade   deeply   defense   denied   description   designed   desire   Despite   detained   deutschmarks   diagrams   did   didnt   died   different   difficult   Digest   diploma   directly   Dirk   disclosure   discoveries   discussed   discussions   disease   distributing   does   dominated   dorm   down   downloaded   drug   drugs   dungarees   during   dust   dwarves   early   earned   East   Eastern   eating   Ebay   eco   edited   edition   editorial   eerily   effective   effectively   effects   eight   Electron   electronics   element   embarrassed   employees   ended   enlightened   enough   enterprise   enthusiast   Espionage   espionage   Europe   European   evaluation   even   every   everybody   evidently   ex   example   excerpt   existing   experience   expertise   experts   explains   explosion   F14   fact   facts   fail   fairly   family   famous   fascinates   federal   feet   fell   fellow   Fermilab   few   fifty   fight   figured   files   film   financial   firmly   firms   five   focus   followed   following   For   for   foremost   forest   forever   forget   former   found   founded   freaks   freely   French   Friday   friends   fringe   from   From   front   fronts   gained   gamers   games   Games   gang   gangs   gasoline   gave   generation   Geneva   genie   genius   Germany   Germanys   get   gifted   go   goal   going   Golden   good   got   government   governments   great   greatest   Groendahl   ground   group   groups   guess   Gun   guys   hack   hacked   Hacker   hacker   Hackers   hackers   hacking   hacks   had   Hagbard   Hagen   Hamburg   hanged   Hannover   Hans   happened   hardcore   Harold   having   head   headquarters   Heidelberg   Heinrich   held   Hell   helm   heroes   Herwart   Hess   hilarious   him   himself   hire   His   his   history   hits   hobbyists   holds   hole   Holland   Hollands   Homebrew   honorary   hours   house   household   how   How   however   Hudson   Huebner   human   id   illegally   Illimunates   Illuminates   Illuminatus   imagine   important   impression   Inch   incident   including   incomparable   increasingly   incredibly   Indeed   indirectly   industry   indybay   infiltrating   Informatics   information   Information   insider   installations   Institute   institution   institutions   insufficient   insurance   intelligence   Intelligence   interested   interests   Interior   internalized   interview   Into   into   introduce   intrude   intruded   intrusion   intrusions   investigate   investigations   investment   invited   involved   Involving   issue   issues   Italian   Its   its   jammed   Japanese   jj   John   joined   journalist   journalists   jpg   July   June   just   Karl   Karlsruhe   kernel   key   kid   kidding   kill   kind   kits   Klaus   knowledge   known   Koch   kochkarl2   laboratory   Las   last   late   later   launch   law   lb   leadership   leading   leakers   Leaks   least   left   legitimization   lest   let   levels   Levys   libertarian   life   lifestyle   like   Like   likely   listening   lists   literate   little   Lloigor   location   logged   long   looks   Los   lot   Lothar   Lovecraft   luxurious   made   magazine   main   mainframe   major   majority   make   manager   manufacturer   many   March   market   Markus   masquerading   mathematics   Mathias   Max   maybe   me   mechanisms   medal   media   medium   member   members   mentioned   merely   might   military   mind   Ministry   ministry   modems   moments   Monday   money   month   months   moralistic   more   moreover   Moritz   morning   most   mothballs   movie   much   multiple   Munich   music   my   mysterious   myth   Mythos   Nails   name   named   names   Nasa   national   nature   naïve   near   nearly   needed   nerd   nerds   Nerds   network   networked   networking   networks   never   nevertheless   new   news   News   newsmedia   newspaper   newspapers   next   Next   night   Nine   Note   noting   Now   now   nuclear   Nuclear   number   objectives   observed   obsessed   obtained   occurred   oddities   off   office   Office   officer   officers   offices   officials   Often   often   Oh   on   One   one   ones   online   only   operated   operating   opinion   or   organized   oriented   originally   others   Our   our   ourselves   out   outlaw   outlaws   outnumbered   over   overload   overwhelming   own   packs   page   paid   Panorama   Paolo   paper   parliament   part   Part   particular   parties   party   passed   passwords   pattern   penetrated   Pengo   Pentagon   performed   perhaps   permanent   permanently   person   personal   Personal   personality   Peter   phone   phrack   physical   Physics   piercings   place   Planck   playing   plea   plus   point   points   Police   police   political   politics   porn   portion   possibilities   Post   postal   posters   postmodern   potential   precise   Prepares   presentation   president   Probably   probably   problems   process   profit   program   programmer   programs   prolongation   prominence   promote   proof   properly   prosecute   Prosecutor   prosecutors   protection   Provided   pseudonym   psychedelicdungeon   psychic   Public   public   publications   publicly   published   puerile   quality   question   questions   quick   quite   radical   rather   re   react   Read   reading   reasons   received   recent   recently   recover   referred   regarded   regions   regular   relationship   relatively   remains   remember   remembered   remembers   reminiscent   remnants   remotely   report   reported   reports   research   Research   resource   Reticuli   revealed   revolution   right   Ring   rise   Robert   role   roughly   ruling   Russia   said   same   save   savings   savvy   says   scandal   scandals   scene   scenes   schematics   scientific   searches   secret   Secrets   secure   security   see   Seeger   seekers   seeking   seem   sees   self   sell   sensational   sense   serious   setting   several   sex   shall   shaped   share   shared   sharing   Shea   sheer   shirts   should   shown   side   Siemens   significant   similar   since   sitting   situation   Skittles   skulls   sling   slowly   small   smaller   smartcards   So   so   society   Sold   sold   solve   some   someone   something   sometimes   soon   sought   soundtrack   Soviet   Space   speak   speakers   spectacular   speculations   Speer   spoil   spokesman   spoof   Spy   spy   Staff   stand   starved   States   status   stay   Steffen   stepchild   Steven   stewardship   still   Stoll   stopped   story   strict   stroke   strong   studies   subsequent   such   suffered   suggested   suggests   suicide   Suicide   sums   Sunday   supervision   supplied   support   supposed   supposedly   surprised   suspected   suspects   system   systems   tab   table   tageszeitung   take   taken   talk   tap   target   taught   team   teams   Technical   technical   technology   telecom   telecoms   telephone   telephony   Television   television   than   that   That   their   themselves   theories   there   these   they   They   think   This   this   Thomson   Those   those   though   Though   thought   Three   three   through   Time   time   times   to   To   today   together   top   Top   town   tracking   training   transactions   translated   tried   tries   trilogy   Tron   troubleshooter   true   truly   Trust   turf   Twenty   two   undebatable   Under   underline   understanding   understood   unfinished   unique   United   universal   University   unknown   Unlike   unmasking   unsolved   unsuccessfully   unused   up   used   uses   value   ve   Vegas   vehemently   visible   visionary   waiting   walls   War   war   warn   warned   warning   warrior   wasnt   Wau   Waus   way   ways   we   weak   wearing   website   well   were   Werner   Wernery   Wernry   West   Western   what   What   when   Whenever   where   which   While   while   who   whole   whose   will   Willy   Wilson   Wily   wing   wired   wiring   with   within   without   wordpress   worked   working   works   world   worse   worth   would   wouldnt   writes   writing   year   years   yet   young   Young   Zeta  

Nascondi questo messaggio
Italiano English
Modifica History Actions

Karl Werner Lothar Koch

Karl Werner Lothar Koch published on ninux.org by: Paolo Del Bene

http://www.wired.com/news/news/culture/story/17019.html

Berlin Prepares for Chaos by David Hudson 3:00 a.m. 24.Dec.98.PST

The mysterious and as yet unsolved case is eerily reminiscent of the death of another CCC associate, Karl Werner Lothar Koch, nearly 10 years ago.

Indeed, Berlin police were quick to call Tron’s death a suicide, as Koch’s had been. But the CCC, as well as Tron’s family and friends, have vehemently denied that suicide was even remotely in his nature. Unlike Karl Werner Lothar Koch, Tron was not only a well-balanced personality but also a brilliant hacker.

He was the first European to hack phone cards so that they could be used freely and forever, and had figured out a way to make ISDN phone calls tap-proof.

Often, he was the focus of attention,” remembers Heinrich Seeger, a Hamburg journalist who has covered many CCC congresses.

“I guess one of the reasons for that, aside from his undebatable genius and expertise, were his good looks and his charm, which made him stand out.

Despite ruling the death a suicide, Berlin police have assigned eight officers to investigate, noting more than a few oddities about the case.

Although Tron appeared to have hanged himself, for example, his feet were firmly on the ground.

German newspaper and television reports have suggested that considering the potential value of Tron’s knowledge of smartcards and telephony, organized crime may have been involved.

Our next dead Chaos Computer Club hacker is Karl Werner Lothar Koch, who became obsessed with Robert Anton Wilson’s Illuminatus trilogy.

A German film based on his life was even called “23″ due to the number’s prominence in Wilson’s book.

He was involved with the KGB scandal that involved hackers being bought by drugs in exchange for breaking into key NATO and corporate installations. .

Here are several articles dealing with this case.

They were originally in German and translated, so that explains the clumsiness (sometimes hilarious on multiple levels) of some of the writing.

http://psychedelicdungeon.files.wordpress.com/2010/09/kochkarl2.jpg http://www.phrack.org/issues.html?issue=27&id=12#article

One of Cliff Stoll’s “Wily Hackers” Is Dead (Suicide?) June 5, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

According to West German publications, the “Wily HackerKarl Werner Lothar Koch, of Hannover, West Germany, died Friday, June 3, probably by suicide.

His body was found burnt (with gasoline) to death, in a forest near Celle (a West German town near Hannover where he committed his hacks, as had been observed by German Post).

Karl Werner Lothar Koch was one of the 2 hackers who confessed their role in the KGB hack to the public prosecutors, there with bringing the case to public attention.

As German newspapers report, he probably suffered from a psychic disease: He thought he was permanently observed by alien beings named Illimunateswhich tried to kill him.

Probably, he had internalized the role of “Captain Hagbard” (his pseudonym in the hacking scene), taken from a U.S. book, who (like him) suffered from supervision by the Illuminates.

Police officials evidently think that Karl Werner Lothar Koch committed suicide (though it is believed, that there are “some circumstanceswhich may also support other theories; no precise information about such moments are reported).

According to German police experts, Karl Werner Lothar Koch’s role in the KGB case as in daily life can properly be understood when reading this unknown book.

Information Provided by Klaus Brunnstein (University of Hamburg)

- – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - -

Illuminatus! June 14, 1989

~~~~~~~~~~~~

The book in question is believed to beIlluminatus!” by Harold Shea and Robert Anton Wilson.

The book is a spoof on conspiracy theories, and suggests that many and probably all human institutions are just fronts for a small group of “enlightened ones,” who are themselves a front for the Time dwarves from Reticuli Zeta, or perhaps Atlantean Adepts, remnants of Crowley’s Golden Dawn, or even more likely the Lloigor of H.P. Lovecraft’s Cthulhu Mythos.

A leading character in this book is named Hagbard Celine. http://www.phrack.org/issues.html?issue=25&id=10#article

German Hackers Break Into Los Alamos and NASA March 2, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Three hours ago, a famous German TV-magazine revealed maybe one of the greatest scandals of espionage in computer networks:

They talk about some (three to five) West German hackers breaking into several secret data networks (Los Alamos, Nasa, some military databases, (Japanese) war industry, and many others) in the interests of the KGB, USSR.

They received sums of $50,000 to $100,000 and even drugs, all from the KGB, the head of the political television-magazine said.

The following news articles (and there are a lot) all deal with (directly and indirectly) the recent Spy scandal situation that occurred in West Germany. The majority of the articles shown here are taken from RISKS Digest, but they have been edited for this presentation.

Computer Espionage: ThreeWily HackersArrested March 2, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Three hackers have been arrested in Berlin, Hamburg and Hannover, and they are accused of computer espionage for the Soviet KGB.

According to the television magazinePanorama” (whose journalists have first published the NASA and SPAN hacks), they intruded scientific, military and industry computers and gave passwords, access mechanisms, programs and data to 2 KGB officers; among others, intrusion is reported of the NASA headquarters, the Los Alamos and Fermilab computers, the United States Chief of Staff’s data bank OPTIMIS, and several more army computers.

In Europe, computers of the French-Italian arms manufacturer Thomson, the European Space Agency ESA, the Max Planck Institute for Nuclear Physics in Heidelberg, CERN/GENEVA and the German Electron Accelerator DESY/Hamburg are mentioned.

The report says that they earned several 100,000 DM plus drugs (one hacker evidently was drug addict) over about 3 years.

For the German Intelligence authorities, this is “a new quality of espionage.”

The top manager said that they had awaited something similar but are nevertheless surprised that it happened so soon and with such broad effects.

- – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - -

Computer Spy Ring Sold Top Secrets To Russia March 3, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

excerpt:

In Karlsruhe, the West German Chief Public Prosecutor’s Office, which is in charge of spy cases, would only confirm last night that three arrests have been made March 2nd during house searches in Hannover and West Berlin.

Those detained were suspected of “having obtained illegally, through hacking and in exchange for money, information which was passed on to an Eastern secret service.

But the spokesman did not share West German television’s evaluation, which said the case was the most serious since the unmasking in 1974 of an East German agent in the office of ex-Chancellor Willy Brandt.

The Interior Ministry in Bonn last night also confirmed several arrests and said the suspects had supplied information to the KGB.

The arrests followed months of investigations into the activities of young computer freaks based in Hamburg, Hannover and West Berlin, the ministry said. According to the television report, the hackers gained access to the data banks of the Pentagon, NASA Space Center, and the nuclear laboratory in Los Alamos.

They also penetrated leading West European computer centers and armament companies, including the French Thomson group, the European Nuclear Research Center, CERN, in Geneva; the European Space Authority, ESA, and German companies involved in nuclear research.

- – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - – - -

News From The KGB/Wily Hackers March 7, 1989

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Now, five days after the “sensationaldisclosure of the German (NDR) Panorama Television team, the dust of speculations begins to rise and the facts become slowly visible; moreover, some questions which could not be answered in Clifford Stoll’s Communications of the ACM paper may now be answered.

Though not all facts are known publicly, the following facts seem rather clear.

In 1986, some hackers from West Berlin and Hannover discussed, in “hacker partieswith alcohol and drugs, how to solve some personal financial problems; at that time, first intrusions of scientific computers (probably CERN/Geneva as hacker training camp) and Chaos Computer Club’s spectacular BTX-intrusion gave many hackers (assisted by newsmedia) the *puerile impression* that they could intrude *into every computer system*;

I remember contemporary discussions on 1986/87 Chaos Computer Conferences about possibilities, when one leading CCC member warned that such hacks might also attract espionage (Steffen Wernery recently mentioned that German counter-espionage had tried several times to hire him and other CCC members as advisorsunsuccessfully). -

A “kernel group” of 5 hackers who worked together, in some way, in the “KGB case” are (according to Der SPIEGEL, who published the following names in its Monday, March 6, 1989 edition):

-> Markus Hess, 27, from Hannover, Clifford Stoll’s “Wily Hackerwho was often referred to as the Hannover Hacker and uses the alias of Mathias Speer; after having ended (unfinished) his studies in mathematics, he works as programmer, and tries to get an Informatics diploma at the University of Hagen (FRG); he is said to have good knowledge of VMS and UNIX.

-> Karl Werner Lothar Koch, 23, from Hannover, who works as programmer; due to his luxurious lifestyle and his drug addiction, his permanent financial problems have probably added to his desire to sellhacker knowledgeto interested institutions.

-> Hans Huebner, aliasPengo,” from Berlin, who after having received his Informatics diploma from Technical University of West Berlin, founded a small computer house; the SPIEGEL writes that he needed money for investment in his small enterprise; though he does not belong to the Chaos Computer Club, he holds close contacts to the national hacker scenes (Hamburg: Chaos Computer Club; Munich: Bavarian Hacker Post; Cologne: Computer Artists Cologne, and other smaller groups), and he was the person to speak about UUCP as a future communications medium at the Chaos Communication Congress.

-> Dirk Brezinski, from West Berlin, programmer and sometimestroubleshooterfor Siemens BS-2000 systems (the operating system of Siemens mainframe computers), who earned, when working for Siemens or a customer (BfA, a national insurance for employees) 20,000 DM (about $10,800) a month; he is regarded (by an intelligence officer) as “some kind of a genius.”

-> Peter Carl, from West Berlin, a former croupier, whoalways had enough cocaine.” No information about his computer knowledge or experience is available.

Next, we get to the man Wau Holland himself! Note: Like the other famous CCC members, Holland died young, of a stroke at the age of 49.http://lists.jammed.com/ISN/2001/07/0082.html

By Boris Groendahl Berlin Bureau Chief July 30, 2001

The year is 1981. IBM still has to introduce its first Personal Computer.

The movieWarGames” and Steven Levys bookHackers,” which will make the self-description of alternative computer nerds a household name in the U.S, are two years away.

In Western Berlin, in the offices of the left-wing daily “die tageszeitung,” fringe computer hobbyists are sitting at a conference table, sharing their knowledge of early computers and computer networks.

They followed the call of Wau Holland, a bearded, balding man in dungarees who looks more like an eco-warrior than an electronics enthusiast.

The assembled group is about to found the jj Computer Club (CCC) and go down in computing history.

Twenty years later, the CCC now has to continue without its honorary president Wau Holland, also known as Herwart Holland-Moritz. Holland suffered a stroke in late May and fell into a coma; he died Sunday morning, age 49.

Read today, Hollands editorial that appeared in the first issue of CCCs magazineDatenschleuder” (roughly: “data sling”) back in 1984 appears almost visionary. For him and for the CCC, the computer was already not merely a technology but “the most important new medium.”

He held that “all existing media will be increasingly networked through computers, a networking which creates a new quality of media.” The first and foremost goal of the hackers association was to promote this new medium, bydistributing wiring diagrams and kits for cheap and universal modems.”

What should have earned the CCC a medal for the advancement of the information society, however, got him in conflict with the arcane German telecom law. At the time, as Holland remembered later, “the prolongation of a telephone cable was considered worse than setting off an atomic explosion.”

Involving everybody, not just big government and big business, into the information revolution, ways always Hollands and the CCCs main goal.

Its first famous hack was performed 1984 on Germanys first online service Btx, an atavistic network operated by the German postal service.

The CCC found a security hole in the network, but the postal service didnt react to the warning. So Holland and his colleague Steffen Wernry logged in, masquerading as a German savings bank, and downloaded their own billable Btx page all night long.

When the tab got to 134,000 deutschmarks, they stopped the program and called German TV Btx had its first scandal only months after its launch, and it wouldnt recover for more than a decade.

The Btx hack, as it became known later, would become a pattern for every CCC action. Holland, in particular, was at least as media-savvy as he as he was computer literate.

Whenever the CCC hacked into regions he wasnt supposed to see, he sought protection by seeking public attention, and used them to warn of weak security and insufficient data protection.

Though only a few of Waus CCC comrades shared his political background most joined the club as regular electronics nerds he shaped the German hackers association into a unique institution, incomparable with the U.S. hacker scene.

The CCC is different from both the technology-oriented Homebrew Computer Club that gave birth to the PC in the ’70s, and the cracker gangs that dominated media attention in the early90s.

Holland taught his fellow CCCers to never hack for profit, to always be open about what they were up to, and to fight for an open information society.

He was deeply embarrassed when some CCCers sold their discoveries from within the U.S. military computer network to the KGB.

This incident and the subsequent discussions in the club brought the next generation to the CCCs helm.

While the new leadership has a less strict moralistic, more postmodern sense of hacking, it remains true to the CCCs political objectives.

Holland became the clubs honorary president. Under his stewardship, the CCC gained considerable status in German politics, with its speakers invited by the parliament, telecoms firms, banks and even the secret service. That part fascinates me. The German secret service, the BND? That is quite a process of legitimization for a supposedlyoutlawhacker club.

As we shall see in Part 4b, the Chaos Computer Club has a physical site in Berlin, which just blew my mind as I found out fairly late in my research. Are you kidding me?

A hacker gang that breaks into major corporate and defense systems has a PHYSICAL location?

How naïve are these guys? To underline the point that the story of WikiLeakssecurity” is much more myth than fact, here is an interview by former insider John Young of the cryptome.org website, also designed for leakers.

As someone who has a fairly strong understanding of computer networks,

I’ve always found it comical how secure some of these radical groups (indybay for example) think their online communications truly are. John Young hits on many of the key points.

In my opinion, the world’s governments fail to police the Internet effectively not because of overwhelming technical issues, but because of political, financial, and human resource overload. The most difficult part is the sheer amount of data to go through and prosecute.

Hell, can you imagine what it would take just to police a day’s worth of Ebay transactions?

Also, the business culture of America sees the free Internet as part of our national brand that we market to the world.

But when the will is there to target something, in my opinion, the government cyber-security teams of the West can be QUITE effective. They have incredibly gifted hackers on their side, many who have been brought in through plea deals to avoid 10 years of federal time.

In fact, many of those hackers are sitting right next to the outlaws at their cute littlehacker conventions”, like DefCon in Las Vegas, wearing the same piercings and black shirts with skulls on them.

The wholelibertarian hacker myth” of courageous, sex-starved 400 lb Bohemian heroes who stay up all night hacking to save the world for Anarchy ,while eating fifty packs of Skittles and listening to Nine Inch Nails, applies to a relatively small portion of the hardcore nerd community.

They are outnumbered by sex-starved 400 lb military contractors who stay up all night tracking and infiltrating other hackers while eating fifty packs of Skittles, listening to crap like the Top Gun soundtrack. Oh, and playing role-playing games on the Internet with the guys they are going after.

Trust me, I’ve known guys like this. Theyre the guys who had posters of F14 schematics on their dorm walls. And lest we forget, who created and paid for the Internet in the first place? DARPA, part of the Pentagon! Another greatlibertarian hacker myth” is that the Internet was just sitting there unused by the military, and waiting in mothballs to be taken over by the world’s role-playing gamers, porn seekers, and music bootleggers. Again, are you serious? Nerds, you’re playing ontheirturf! While there is a significant element of “genie out of bottle” in the military’s relationship with it’s bastard stepchild, the Internet, let’s not kid ourselves… Here’s John Young to spoil the party.