By Ben Fentonand Kate Connolly
The German publisher of a book which claims that British intelligence officers murdered Heinrich Himmler is a Right-wing extremist who has been jailed for publishing revisionist history.
David Irving comments:
ROLL that phrase around your tongue, Americans, and savour it,: Jailed in modern Germany “for publishing revisionist history.” Words committed to paper without any comment, in all seriousness, by this broadsheet journalist and traditional enemy of free speech Ben Fenton.
Note that he has failed to respond to requests for access to the rest of the forensic tests on the Himmler documents which he and his newspaper commissioned — he has published only extracts so far.
We do not doubt that his quotations are accurate — as accurate as his reference to Traudl Junge as Hitler’s “surviving” secretary (she died last year). Nor can even the Germans jail somebody for “extremism”; Sudholt was prosecuted under Germany’s laws for the suppression of free speech. Galileo was extreme in his day, as was Copernicus.
BUT what about this odd paragraph:
“A year later when the controversial British historian David Irving lost a libel action against an American professor who had called him a Holocaust denier, Mr Sudholt, 62, was described as one of the author’s leading contacts in the world of German Right-wing extremism.”
What was the purpose of this paragraph, for Heavens’ sake, unless it originally contained another sentence that the newspaper’s lawyers no doubt wisely struck out.
In fact Gerd Sudholt is about as extreme as Woody Allen. The hate- filled German authorities eventually grabbed him, outraged at his publication of books that the mainline publishers had been warned to suppress. He is a mild-mannered, educated, and hard-working family man, but unfortunately easily tricked and misled.
I refused to allow publishers to sell my books to him (which did not prevent Herbert Fleissner of Langenmüller Verlag from “selling him rights” to my flagship work “Hitler’s War” for 5000 euros some years back, and telling him to keep it quiet from me!
Such is the state of German law that when I got wind of the planned Sudholt edition, my Munich lawyer Heinz Lebrecht Herrmann failed to act to obtain an injunction preventing it (“too late to stop it”) and I was never paid a penny by either publisher.
Visiting London, Sudholt later apologised to me that his publishing firm Druffel had asked Dr Fleissner for a proper contract, but Fleissner would only give him a receipt for the cash payment (because in fact Fleissner had long lost the rights he was purporting to own and sell, and they had reverted to us).
What a gang of crooks! For a long time Sudholt would not speak with me, because I warned him that the Heinrich Müller “interrogations” he was publishing were forged by Gregory Douglas, aka the American counterfeiter and forger Peter Stahl, aka etc., etc., etc. Sudholt thought I was spoiling his scoop; I was trying to save his skin.
Seems there are more sharks in the publishing world than in the waters just south of here (Panama City, Florida).
The claims, in Himmler’s Secret War, by Martin Allen, have been debunked by an independent forensic analyst working on behalf of The Daily Telegraph. The analysis showed that at least four of the documents used to substantiate them were forgeries smuggled into the National Archives in Kew, west London. Almost all historians accept that Himmler, the head of the SS, committed suicide soon after being captured by British soldiers in May 1945.
Yesterday Gert Sudholt, the head of the Druffel Verlag printing house in Munich, suggested that the forgeries may have been perpetrated by British agents. “We know that the Russians had a massive system of forgeries – why not the British?,” he said.
His publishing firm is renowned for its support of former Nazis and “revisionist” historians.
Mr Sudholt, whose stepfather, Helmut Sündermann, was deputy to Otto Dietrich, the Nazi press chief, has been prosecuted at least three times for printing far-Right material. He was jailed for six months in 1993 and received a suspended sentence in 1999 for similar offences.
A year later when the controversial British historian David Irving lost a libel action against an American professor who had called him a Holocaust denier, Mr Sudholt, 62, was described as one of the author’s leading contacts in the world of German Right-wing extremism.
In addition to his publishing business, Mr Sudholt also runs the Society for Free Communication [Gesellschaft für freie Publizistik] which offers former Nazi Party members and their families a platform for their opinions.
In the acknowledgments to Himmler’s Secret War, Mr Allen’s third book, the author thanks Mr Sudholt for his “great assistance in my search for testimony from eyewitnesses of Germany’s past”.
These are thought to include Gudrun Burwitz, Himmler’s daughter, and Traudl Junge, the last surviving personal secretary to Adolf Hitler. Mrs Burwitz is regarded by most historians as an unrepentant Nazi. Mr Sudholt said that despite the furore over the documents he would still publish Mr Allen’s book, even if the “three relevant pages” were cut.
He published Mr Allen’s first book, Hidden Agenda, under the title Dear Herr Hitler, and his second, The Hitler/Hess Deception, under the title Churchill’s Peace Trap.
He said he had not spoken to Mr Allen about the documents and was not prepared to say if they were forgeries. “The most pressing questions for us now are, if the documents were forged, where did they come from, and who put them there and why were they in the National Archive? Can we trust anything in the National Archive at all for the last 500 years? Can we indeed trust anything in any national archive? This could lead to the review of contemporary history and turn it on its head.
“I am sure though that Mr Allen will not have forged these – that’s significant to us. We just want to know how they ended up in the archives. Who put them there?
“If Mr Allen looked at them, someone must have put them there. It’s very exciting. You never know, they might have been swapped for the real ones by the British secret service – if that’s the case the story is even more spectacular.”
Mr Allen said last week that he had not realised the Mr Sudholt had such extreme connections when agreeing to let him publish his books in Germany.
He also claimed that Mr Sudholt guided him towards Himmler as a subject.
But Mr Sudholt said yesterday: “I gave him contacts to people who knew Himmler and that was helpful to him. But we didn’t tell him to go to the documents in the National Archive. I don’t know of them at all.”
Himmlers Secret
Sir – I AM amazed that the manner of Himmler’s death is still being debated. My father (the late Dr C J L Wells) was a Medical Officer at the British Army HQ in north Germany when Himmler was arrested and brought in.
He was asked to examine him, and when he was about to look into his mouth, Himmler bit on the concealed cyanide capsule and died immediately. My father was annoyed that the authorities, who were aware that this was a risk with high-profile Nazis, did not warn him of the problem.
These facts, I am sure, were well-known at the time.
Dr A. L. Wells,
Beccles, Suffolk
In the rapidly evolving landscape of high-end technology, smart home devices have become a staple for enhancing convenience and efficiency. Among these devices, WiFi-enabled LED bulbs stand out for their ability to be controlled remotely, customized for different lighting needs, and integrated into smart home ecosystems. However, as with many advancements in technology, these seemingly benign devices pose significant security risks that often go unnoticed.
The Hidden Agenda of Smart Technology
Imagine this: a seemingly innocent LED bulb, connected to your home WiFi, quietly and methodically infiltrating your digital fortress. While it illuminates your living room, it also serves as an entry point for cyber criminals. These hackers exploit the vulnerabilities of your smart bulbs, transforming them from simple lighting devices into sophisticated tools of espionage and control.
How It Happens
Backdoor Entry: WiFi LED bulbs often come with weak security protocols. Hackers can exploit these weaknesses, using the bulbs as a backdoor to infiltrate your home network. Once they gain access, they can easily move laterally to other devices connected to the same network.
Data Interception: These smart bulbs communicate with your smartphone or smart home hub, often transmitting data in an unencrypted format. Cybercriminals can intercept this data, capturing sensitive information, including passwords, credit card details, and other personal data.
Network Takeover: Once inside your network, hackers can install malicious software that grants them control over other smart devices in your home. Imagine waking up to find that your security cameras, smart locks, and even your thermostat are under the control of an unknown entity.
Real-Life Horror Stories
These aren’t just wild conspiracy theories. There have been real-world instances where smart devices have been hijacked to carry out sinister activities. From launching massive denial-of-service attacks to spying on unsuspecting homeowners, the potential for abuse is alarming. One chilling example saw a family’s smart home system turned against them, with lights flickering uncontrollably, doors locking and unlocking at random, and cameras being manipulated—all orchestrated by a hacker who gained access through a smart bulb.
The Warning Signs
Be wary if your smart bulbs:
Act erratically, flickering or changing colors without input.
Cause unexpected changes in your network’s performance.
Are unresponsive or show signs of being controlled by an unknown source.
Protect Yourself
Secure Your Network: Use strong, unique passwords for your WiFi and smart devices. Enable encryption and regularly update your router’s firmware.
Regular Updates: Ensure that your smart bulbs receive regular firmware updates from the manufacturer to patch known vulnerabilities.
Network Segmentation: Create a separate network for your smart devices, isolating them from your primary devices such as computers and smartphones.
Stay Informed: Keep abreast of the latest security news related to smart home devices and be proactive in addressing potential threats.
The Lure of Convenience
WiFi LED bulbs have gained popularity due to their ease of use and the convenience they offer. Users can adjust lighting conditions from their smartphones, set schedules, and even synchronize the bulbs with other smart devices to create an interconnected home environment. This integration, while beneficial, also opens up a new frontier for potential cyber threats.
The Security Risks
Weak Authentication Protocols: Many WiFi LED bulbs come with insufficient authentication mechanisms. Weak or default passwords can be easily exploited by hackers, allowing unauthorized access to the home network. Once inside, attackers can potentially access other devices connected to the same network, leading to more severe breaches.
Inadequate Encryption: Encryption is a fundamental security measure that ensures data transmitted between devices and the control application is secure. However, several smart bulb manufacturers fail to implement robust encryption protocols, making the communication channel vulnerable to interception and exploitation.
Firmware Vulnerabilities: Firmware updates are critical for maintaining the security and functionality of smart devices. However, many WiFi LED bulbs do not receive regular updates, leaving them exposed to known vulnerabilities. Attackers can exploit these vulnerabilities to gain control over the bulbs and, by extension, the home network.
Integration with Other Smart Devices: The interconnectivity of smart home devices can be a double-edged sword. While it enhances user experience, it also means that a single compromised device can serve as a gateway for attackers to access other devices in the network. For instance, a hacked smart bulb can be used to infiltrate security cameras, smart locks, or even personal computers.
Real-World Implications
The security risks associated with WiFi LED bulbs are not just theoretical. There have been documented cases where vulnerabilities in smart bulbs have been exploited to carry out more extensive attacks. In one notable incident, researchers demonstrated how a single compromised bulb could be used to launch a denial-of-service attack on an entire smart home system, rendering all connected devices unusable.
Furthermore, the growing trend of integrating these bulbs into high-end, professionally designed smart homes increases the stakes. The more sophisticated the home network, the more attractive it becomes to cybercriminals looking for high-value targets.
Mitigation Strategies
To mitigate these risks, both consumers and manufacturers need to take proactive steps:
Strong Password Policies: Users should change default passwords immediately and use strong, unique passwords for their devices.
Regular Firmware Updates: Manufacturers must commit to providing regular firmware updates and patches to address known vulnerabilities.
Enhanced Encryption: Implementing end-to-end encryption for all data transmitted between the bulbs and the control application is essential.
Network Segmentation: Users can protect their primary network by creating a separate network for smart devices. This limits the potential damage if a device is compromised.
User Awareness: Educating users about the potential risks and encouraging them to follow best practices in cybersecurity can significantly reduce the likelihood of successful attacks.
Conclusion
While WiFi LED bulbs offer impressive convenience and functionality, they also present a unique set of security challenges that cannot be ignored. As high-end technology continues to integrate more deeply into our daily lives, it is crucial to balance innovation with robust security measures. Only through a collaborative effort between manufacturers, consumers, and cybersecurity professionals can we ensure that our smart homes remain safe and secure.
In the rapidly evolving landscape of high-end technology, smart home devices have become a staple for enhancing convenience and efficiency. Among these devices, WiFi-enabled LED bulbs stand out for their ability to be controlled remotely, customized for different lighting needs, and integrated into smart home ecosystems. However, as with many advancements in technology, these seemingly benign devices pose significant security risks that often go unnoticed.
The Hidden Agenda of Smart Technology
Imagine this: a seemingly innocent LED bulb, connected to your home WiFi, quietly and methodically infiltrating your digital fortress. While it illuminates your living room, it also serves as an entry point for cyber criminals. These hackers exploit the vulnerabilities of your smart bulbs, transforming them from simple lighting devices into sophisticated tools of espionage and control.
How It Happens
Backdoor Entry: WiFi LED bulbs often come with weak security protocols. Hackers can exploit these weaknesses, using the bulbs as a backdoor to infiltrate your home network. Once they gain access, they can easily move laterally to other devices connected to the same network.
Data Interception: These smart bulbs communicate with your smartphone or smart home hub, often transmitting data in an unencrypted format. Cybercriminals can intercept this data, capturing sensitive information, including passwords, credit card details, and other personal data.
Network Takeover: Once inside your network, hackers can install malicious software that grants them control over other smart devices in your home. Imagine waking up to find that your security cameras, smart locks, and even your thermostat are under the control of an unknown entity.
Real-Life Horror Stories
These aren’t just wild conspiracy theories. There have been real-world instances where smart devices have been hijacked to carry out sinister activities. From launching massive denial-of-service attacks to spying on unsuspecting homeowners, the potential for abuse is alarming. One chilling example saw a family’s smart home system turned against them, with lights flickering uncontrollably, doors locking and unlocking at random, and cameras being manipulated—all orchestrated by a hacker who gained access through a smart bulb.
The Warning Signs
Be wary if your smart bulbs:
Act erratically, flickering or changing colors without input.
Cause unexpected changes in your network’s performance.
Are unresponsive or show signs of being controlled by an unknown source.
Protect Yourself
Secure Your Network: Use strong, unique passwords for your WiFi and smart devices. Enable encryption and regularly update your router’s firmware.
Regular Updates: Ensure that your smart bulbs receive regular firmware updates from the manufacturer to patch known vulnerabilities.
Network Segmentation: Create a separate network for your smart devices, isolating them from your primary devices such as computers and smartphones.
Stay Informed: Keep abreast of the latest security news related to smart home devices and be proactive in addressing potential threats.
The Lure of Convenience
WiFi LED bulbs have gained popularity due to their ease of use and the convenience they offer. Users can adjust lighting conditions from their smartphones, set schedules, and even synchronize the bulbs with other smart devices to create an interconnected home environment. This integration, while beneficial, also opens up a new frontier for potential cyber threats.
The Security Risks
Weak Authentication Protocols: Many WiFi LED bulbs come with insufficient authentication mechanisms. Weak or default passwords can be easily exploited by hackers, allowing unauthorized access to the home network. Once inside, attackers can potentially access other devices connected to the same network, leading to more severe breaches.
Inadequate Encryption: Encryption is a fundamental security measure that ensures data transmitted between devices and the control application is secure. However, several smart bulb manufacturers fail to implement robust encryption protocols, making the communication channel vulnerable to interception and exploitation.
Firmware Vulnerabilities: Firmware updates are critical for maintaining the security and functionality of smart devices. However, many WiFi LED bulbs do not receive regular updates, leaving them exposed to known vulnerabilities. Attackers can exploit these vulnerabilities to gain control over the bulbs and, by extension, the home network.
Integration with Other Smart Devices: The interconnectivity of smart home devices can be a double-edged sword. While it enhances user experience, it also means that a single compromised device can serve as a gateway for attackers to access other devices in the network. For instance, a hacked smart bulb can be used to infiltrate security cameras, smart locks, or even personal computers.
Real-World Implications
The security risks associated with WiFi LED bulbs are not just theoretical. There have been documented cases where vulnerabilities in smart bulbs have been exploited to carry out more extensive attacks. In one notable incident, researchers demonstrated how a single compromised bulb could be used to launch a denial-of-service attack on an entire smart home system, rendering all connected devices unusable.
Furthermore, the growing trend of integrating these bulbs into high-end, professionally designed smart homes increases the stakes. The more sophisticated the home network, the more attractive it becomes to cybercriminals looking for high-value targets.
Mitigation Strategies
To mitigate these risks, both consumers and manufacturers need to take proactive steps:
Strong Password Policies: Users should change default passwords immediately and use strong, unique passwords for their devices.
Regular Firmware Updates: Manufacturers must commit to providing regular firmware updates and patches to address known vulnerabilities.
Enhanced Encryption: Implementing end-to-end encryption for all data transmitted between the bulbs and the control application is essential.
Network Segmentation: Users can protect their primary network by creating a separate network for smart devices. This limits the potential damage if a device is compromised.
User Awareness: Educating users about the potential risks and encouraging them to follow best practices in cybersecurity can significantly reduce the likelihood of successful attacks.
Conclusion
While WiFi LED bulbs offer impressive convenience and functionality, they also present a unique set of security challenges that cannot be ignored. As high-end technology continues to integrate more deeply into our daily lives, it is crucial to balance innovation with robust security measures. Only through a collaborative effort between manufacturers, consumers, and cybersecurity professionals can we ensure that our smart homes remain safe and secure.
Alabama, Thursday, July 7, 2005Interview David Irvings mit einer deutschnationalen Zeitschrift über die Himmler-Affäre
Herr Irving, Dokumente des Britischen Nationalarchivs...