Le Secret Aura Mis 40 Ans Avant D’Éclater Au Visage De La Suisse

Total Page:16

File Type:pdf, Size:1020Kb

Le Secret Aura Mis 40 Ans Avant D’Éclater Au Visage De La Suisse « Le secret aura mis 40 ans avant d’éclater au visage de la Suisse. » «Es dauerte 40 Jahre, bis das Geheimnis der Schweiz um die Ohren fliegt.» «Ci sono voluti 40 anni affinché la Svizzera si trovasse di fronte all’esplosione di questo segreto.» Mehdi Atmani, novembre 2019 Fr. 25.– / € 24.– ISBN 978-3-03878-044-1 NEW: Swiss Press Live Journalism Michael von Graffenried On 16 April 2019, for the first time in the history of the Swiss Press Awards, three journalists nominated at Swiss Press Award 19 and one Swiss Press Photo category winner told their stories in front of a live audience at the Museum of Communication in Bern. From left to right and top to bottom: Rahel Walser (Audio), Aline Wanner (Text), Florian Imbach (Video) and Nicolas Brodard (Photo, Swiss Stories) / photographer Nicolas Brodard (Photo) / journalist Aline Wanner (Text) / Nicolas Brodard, Aline Wanner, Rahel Walser, Florian Imbach and jury member Patrick Feuz in front of the audience. www.swisspressaward.ch 2 Gewinner Gagnants Vincitori Winners 3 Inhalt Swiss Press Award Swiss Press Text 4–5 Swiss Press Journalist of the Year Sommaire 1. Arnaud Robert La révolution des toilettes Swiss Press Text heidi.news Indice 6 Jury Text Contents 7–11 Gewinner / Gagnant / Vincitore / Winner 2. Martin Beglinger / Zoé Baches / Ermes Gallarotti Die Affäre Khan e nd 12–15 2. Preis / 2 prix / 2°premio / 2 prize Neue Zürcher Zeitung 16–17 3. Preis / 3e prix / 3° premio / 3rd prize 3. Jacopo Scarinci / Andrea Manna Le frontaliere di Ghiggia Swiss Press Online La Regione 18 Jury Online 19–29 Gewinner / Gagnant / Vincitore / Winner Swiss Press Online 30–31 2. Preis / 2e prix / 2° premio / 2nd prize e rd 32–33 3. Preis / 3 prix / 3° premio / 3 prize 1. Christian Zeier / Valentin Felber / Florian Spring / «Credit Crisis» – Der Finanzskandal Stirling Tschan reflekt.ch und DAS MAGAZIN von Moçambique Swiss Press Audio 34 Jury Audio 2. Duc-Quang Nguyen / Mathieu Rudaz La Suisse et son territoire 35–37 Gewinner / Gagnant / Vincitore / Winner 24heures.ch 38–39 2. Preis / 2e prix / 2° premio / 2nd prize e rd 40–41 3. Preis / 3 prix / 3° premio / 3 prize 3. Sibilla Bondolfi / Carlo Pisani / Daniel Rihs Telearbeit in den Bergen swissinfo.ch Swiss Press Video 42 Jury Video Swiss Press Audio 43–45 Gewinner / Gagnant / Vincitore / Winner e nd 46–47 2. Preis / 2 prix / 2°premio / 2 prize 1. Franziska Engelhardt / Stefanie Müller-Frank «Zündstoff» – Die Geschichte e rd 48–49 3. Preis / 3 prix / 3° premio / 3 prize republik.ch eines Messies Swiss Press Local 2. Cédric Guigon / Joëlle Cachin Ebola, une épidémie 50 Jury Local RTS Radio, La Première de méfiances 51–53 Gewinner / Gagnant / Vincitore / Winner e nd 54–55 2. Preis / 2 prix / 2°premio / 2 prize 3. Alice Pedrazzini / Giuseppe Bucci Io mi chiamo Nina e rd 56–57 3. Preis / 3 prix / 3° premio / 3 prize RSI, Rete Uno e fra 20 anni … Swiss Press Photo Swiss Press Video 58 Jury Photo 59 Gewinner / Gagnant / Vincitore / Winner 1. Mehdi Atmani / Alexandre Bugnon La Suisse sous couverture 60 Swiss Press Photo of the Year rts.ch 62–63 Gewinner-Kategorien / Gagnant Categories / Vincitori per categorie / Winner Categories 2. Isabelle Ducret Made in Etiopia RTS, Temps Présent 3. Cécile Durring / Jérôme Galichet Moudon : Objectif 50 % Abbildung vorne / Page de couverture / Übersetzung / Traduction / Traduzioni / Translation: RTS, Mise au Point Impressum Copertina / Front cover: Pascale Bournier 24heures Cindy-Jane Armbruster, Clara Benn, Claudio Meier, Porträtbilder und Filme / Portraits et films / Yves Petignat, Thomas und Katia Röthlin Swiss Press Local Ritratti e film / Portraits and films: Roland Lanz Umschlagbild hinten / Quatrième de couverture / Lektorat / Correction / Correzione bozze / Proofreading: Quarta di copertina / Back cover: Michael von Graffenried Angela Benza, Prangins; Ast & Fischer AG, Wabern 1. François Ruchti Safaris de chasse en Valais Herausgeberin / Éditeur / Editore / Publisher: Druck / Impression / Stampa / Printed by: RTS, Mise au Point Fondation Reinhardt von Graffenried, Bern Ast & Fischer AG, Wabern 2. Urs Bühler «Wir Stadttiere» © 2020 Swiss Press Award, Till Schaap Edition, Bern ISBN 978-3-03878-044-1 nzz.ch Konzept und Realisation / Concept et direction artistique / Swiss Press Award Sekretariat: Concetto e direzione artistica / Concept and artistic direction: Regula Bachofner 3. Alessandro Bertellotti Natale col pane bianco Michael von Graffenried, Paris Zeughausgasse 18, Postfach CH-3001 Bern RSI, Rete due Grafische Gestaltung / Conception graphique / mailto: [email protected] Grafica / Graphic design: Gerhard Blättler, Bern www.swisspressaward.ch Swiss Press Swiss Press Redaktion / Rédaction / Redazione / Edited by: Printed in Switzerland Thomas und Katia Röthlin, Baden Journalist Photographer of the Year of the Year Mehdi Atmani Yves Leresche rts.ch L’Illustré La Suisse sous couverture Grève des femmes, Lausanne 4 5 JOURNALIST OF THE YEAR Swiss Press Journalist of the Year 2020: Mehdi Atmani «Cryptoleaks» war der erste Scoop «Cryptoleaks» a été le premier scoop «Cryptoleaks è stato il primo scoop “Cryptoleaks” was the first media des Medienjahres 2020. Am 11. Februar de l’année 2020. Le 11 février, l’émis- mediatico del 2020. L’11 febbraio, scoop of the year 2020. On 11 Feb- enthüllte die Rundschau des Schweizer sion Rundschau de la Télévision suisse la trasmissione della Televisione sviz- ruary, the Rundschau programme Fernsehens SRF, wie amerikanische SRF a révélé comment le CIA et le zero-tedesca SRF, Rundschau, ha of Swiss TV broadcaster SRF revealed Geheimdienste und der deutsche Bun- Service fédéral de renseignement alle- svelato come i servizi segreti america- how the American secret services desnachrichtendienst mit manipulierten mand avaient espionné durant des ni e il Servizio federale di spionaggio and German Federal Intelligence Ser- Chiffriergeräten der Schweizer Firma décennies plus de cent pays grâce à tedesco avevano spiato per decenni vice had spied on over a hundred Crypto AG jahrzehntelang über hun- des dispositifs de cryptage trafiqués più di cento Paesi grazie a delle appa- countries for decades, using manipu- dert Staaten ausspioniert hatten. Der de la société suisse Crypto AG. Ce recchiature di cifratura manomesse lated encryption devices from the Skandal, an dessen Aufdeckung die scandale, au dévoilement duquel le dalla società svizzera Crypto AG. Que- Swiss company Crypto AG. The scan- Washington Post und das ZDF mitge- Washington Post et ZDF ont collaboré, sto scandalo, che il Washington Post dal that the Washington Post and arbeitet hatten, ging um die Welt. a fait le tour du monde. e la ZDF avevano svelato in collabora- ZDF had worked to uncover, went Nur: «Cryptoleaks» war zu diesem Toutefois, «Cryptoleaks» n’était zione, ha fatto il giro del mondo. around the world. Zeitpunkt eigentlich gar keine Breaking déjà plus un scoop à ce moment-là. «Cryptoleaks», però, a quel mo- However, “Cryptoleaks” was not News mehr. Le 18 novembre 2019, une série mento non era già più uno scoop. exactly breaking news by this point. Am 18. November 2019 geht auf de vidéos en cinq parties avait déjà Il 18 novembre 2019, una serie di On 18 November 2019, a five-part der Website des Westschweizer été mise en ligne sur le site de la télé- video in cinque puntate veniva messa video series went online on the web- Fernsehens RTS eine fünfteilige Video- vision suisse romande RTS. « La Suisse online sul sito della televisione romanda site of French-speaking Swiss televi- serie online. «La Suisse sous couver- sous couverture » décrivant une Suisse RTS. «La Suisse sous couverture» (La sion station RTS. “La Suisse sous cou- ture» dokumentiert eine Schweiz als « centre d’espionnage », qui n’a jamais Svizzera sotto copertura) descrive una verture” (Switzerland Undercover) «Mittelpunkt der Spionage», die nie hésité «à sacrifier sa neutralité au Svizzera «centro dello spionaggio», che documents Switzerland’s role as the gezögert habe, «ihre Neutralität den profit des intérêts politiques, écono- non ha mai esitato «nel sacrificare la “centre of espionage” that has never politischen, ökonomischen und mili- miques et militaires ». Partie 1 de série propria neutralità agli interessi politici, hesitated to “sacrifice its neutrality tärischen Interessen zu opfern». Teil 1 web : « Agents infiltrés ». Sujet : « l’affaire economici e militari allo scopo di pre- to political, economic and military der Webserie: «Agents infiltrés». Crypto AG ». Répercussions : aucune. servare la sua bella faccia». Parte 1 della interests». Part 1 of the web series: Thema: «l’affaire Crypto AG». Resonanz: Pendant dix ans, le journaliste serie web: «Agents infiltrés» (Agenti in- “Agents infiltrés” (Undercover Agents). keine. indépendant Mehdi Atmani (36 ans) filtrati). Tema: «L’affaire Crypto AG» (Il Topic: “l’affaire Crypto AG” (The Cryp- Zehn Jahre recherchierte der freie a effectué en mission secrète des caso Crypto AG). Risonanza: nessuna. to AG Affair). Fallout: none. Journalist Mehdi Atmani (36) über die recherches sur la Suisse aux États- Per dieci anni il giornalista indipen- The freelance journalist Mehdi Schweiz in geheimer Mission, in den Unis, en Grande-Bretagne, en Alle- dente Mehdi Atmani (36 anni) ha svolto Atmani (36) spent ten years research- USA, Grossbritannien, Deutschland, magne, en France et en Belgique. Il ricerche sulla Svizzera in missione se- ing Switzerland on a secret mission, Frankreich, Belgien. Die Crypto-Affäre résume l’affaire Crypto dans un film greta, negli Stati Uniti, Gran Bretagna, in the USA, Great Britain, Germany, fasste er in einem 14-minütigen Film de 14 minutes. Germania, Francia e Belgio. Riassume France, and Belgium. He summarises zusammen. Atmani avait depuis le début il caso Crypto in un film di 14 minuti. the Crypto affair in a 14-minute film. Atmani hatte von Anfang an die l’ambition de diffuser cette histoire à Atmani fin dall’inizio aveva l’ambi- From the very beginning Atmani Ambition, die Geschichte national zu l’échelle nationale. La version en langue zione di diffondere questa storia su had aspired to make the story known Roland Lanz verbreiten.
Recommended publications
  • (Transparency of Political Party Funding), Adopted by GRECO At
    DIRECTORATE GENERAL I - HUMAN RIGHTS AND RULE OF LAW INFORMATION SOCIETY AND ACTION AGAINST CRIME DIRECTORATE Strasbourg, 21 October 2011 Greco Eval III Rep (2011) 4E Theme II Third Evaluation Round Evaluation Report on Switzerland Transparency of Political Party Funding (Theme II) Adopted by GRECO at its 52nd Plenary Meeting (Strasbourg, 17-21 October 2011) Secrétariat du GRECO GRECO Secretariat www.coe.int/greco Conseil de l’Europe Council of Europe F-67075 Strasbourg Cedex ( +33 3 88 41 20 00 Fax +33 3 88 41 39 55 I. INTRODUCTION 1. Switzerland joined GRECO on 1 July 2006. GRECO adopted the report on the joint first and second evaluation rounds (Greco Eval I-II Rep (2007) 1E) at its 37th meeting (31 March- 4 April 2008). The aforementioned evaluation report, and the corresponding compliance report, are available on the GRECO web site (http://www.coe.int/greco). 2. The current Third Evaluation Round, which started on 1 January 2007, covers the following themes: - Theme I – Incriminations: articles 1a and 1b, 2-12, 15-17 and 19 paragraph 1 of the Criminal Law Convention on Corruption (ETS 173), articles 1-6 of its Additional Protocol (ETS 191) and Guiding Principle 2 (GPC 2) (incrimination of corruption). - Theme II - Transparency of Political Party Funding: articles 8, 11, 12, 13b, 14 and 16 of Recommendation Rec(2003)4 on common rules against corruption in the funding of political parties and election campaigns and – more generally – Guiding Principle 15 on financing of political parties and election campaigns. 3. The GRECO Evaluation Team (hereafter referred to as the “GET”), which carried out an on-site visit to Switzerland from 11 to 13 May 2011, comprised Mr Edmond DUNGA, Head of the Anti- Corruption Secretariat, Regional Anti-Corruption Initiative (Albania) and Professor Richard GHEVONTIAN, Vice-President of the Paul Cézanne University of Aix-Marseille III responsible for legal and statutory affairs, Director of research at the Louis Favoreu Institute, Study and Research group on constitutional justice (France).
    [Show full text]
  • An Empirical Survey on How Much Security and Privacy Customers Want in Instant Messengers
    SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers Thomas Paul Hans-Joachim Hof MuSe – Munich IT Security Research Group Munich University of Applied Sciences Munich University of Applied Sciences Lothstrasse 64, Munich, Germany Lothstraße 64, Munich, Germany e-mail: [email protected] e-mail: [email protected] Abstract— Instant messengers are popular communication developers of future instant messengers to decide on tools used by many people for everyday communication, as security features to implement. well as for work related communication. Following the This paper is structured as follows: Section II discusses disclosure of a massive surveillance system by Edward related work. Section III presents the design of the user Snowden, many users became aware of the risks of unsecure survey. Section IV discusses in detail the findings of the communication. Users increasingly ask for secure communication. However, unsecure instant messengers are still user survey. Section V presents the features of an ideal popular nowadays. This could be due to the fact, that, besides instant messenger fulfilling all the user preferences the large number of available instant messengers, no instant identified by the survey. A market simulation is used to messenger fully satisfies the users preferences. To research the show the potential of this ideal instant messenger. Section acceptance of security mechanisms in instant messengers, this VI summarizes the findings of the paper. paper presents an evaluation of user preferences for secure instant messengers. A user survey was conducted to rate the II.
    [Show full text]
  • Investigating Mobile Messaging Security
    Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Elias Hazboun Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Untersuchung von Mobile Messaging Sicherheit Author Elias Hazboun Supervisor Prof. Dr.-Ing. Georg Carle Advisor Dr. Matthias Wachs, Quirin Scheitle Date April 27, 2016 Informatik VIII Chair for Network Architectures and Services Abstract In this report we document our work in analyzing the security of a selection of mobile messaging apps. Focusing on network based security, we studied traffic generated by the apps to gain an understanding of the current state of applying encryption and authentication protocols. Our findings show a positive trend in security with developers steadily improving security with newer app updates partly due to the increased scrutiny from the community and academia. Although not all apps analyzed had perfect state of the art security properties, none have shown any major vulnerabilities exploited by normal adversaries. It was also evident that only one app - namely TextSecure - is using the industry standard TLS for server-client authentication and security while others have opted for custom made protocols and algorithms. I Contents 1 Introduction 1 1.1 Research Question . .2 1.2 Outline . .2 2 Background and Related Work 3 2.1 Methodology . .3 2.1.1 App Selection . .3 2.1.2 Approach . .3 2.2 Definition of Security Concepts . .4 2.2.1 Layers of Encryption . .4 2.2.2 Transport Layer Security Protocol (TLS) . .5 2.2.3 Perfect Forward Secrecy (PFS) . .5 2.2.4 Asynchronous Messaging Security .
    [Show full text]
  • Enterprise Edition
    Secure Communication. Simplified. SAFECHATS Problem Most companies use popular insecure email and ⛔ messaging services to communicate confidential information P The information flow within the Company is ⛔ disorganized Metadata is exposed and available to third-party ⛔ services SAFECHATS Introducing SAFECHATS Ultra-secure communication solution P Designed with security in mind SAFECHATS Why SAFECHATS? ✔ Information is always end-to-end encrypted by default P ✔ All-in-one communication suite: • Text messaging (one-on-one and group chats) • Voice calls • File transfers (no size and file type limits) SAFECHATS How does SAFECHATS solve the problem? ✔ Customizable white label solution ✔ Integrates with existing softwareP infrastructure ✔ Enterprise-wide account and contact list management, supervised audited chats for compliance SAFECHATS What makes SAFECHATS different? ✔ Your own isolated cloud environment or on-premise deployment P ✔ Customizable solution allows to be compliant with internal corporate security policies ✔ No access to your phone number and contact list SAFECHATS Screenshot Protection ✔ Notifications on iOS P ✔ DRM protection on Android SAFECHATS Identity Verification ✔ Protection from man-in-the-middle attacksP ✔ SMP Protocol SAFECHATS Privacy Features ✔ Show / hide messages and files P ✔ Recall messages and files ✔ Self-destructing messages and files SAFECHATS Additional Protection ✔ History retention control P ✔ Application lock: • PIN-code • Pattern-lock on Android devices • Touch ID on iOS devices SAFECHATS How does SAFECHATS
    [Show full text]
  • ESS9 Appendix A3 Political Parties Ed
    APPENDIX A3 POLITICAL PARTIES, ESS9 - 2018 ed. 3.0 Austria 2 Belgium 4 Bulgaria 7 Croatia 8 Cyprus 10 Czechia 12 Denmark 14 Estonia 15 Finland 17 France 19 Germany 20 Hungary 21 Iceland 23 Ireland 25 Italy 26 Latvia 28 Lithuania 31 Montenegro 34 Netherlands 36 Norway 38 Poland 40 Portugal 44 Serbia 47 Slovakia 52 Slovenia 53 Spain 54 Sweden 57 Switzerland 58 United Kingdom 61 Version Notes, ESS9 Appendix A3 POLITICAL PARTIES ESS9 edition 3.0 (published 10.12.20): Changes from previous edition: Additional countries: Denmark, Iceland. ESS9 edition 2.0 (published 15.06.20): Changes from previous edition: Additional countries: Croatia, Latvia, Lithuania, Montenegro, Portugal, Slovakia, Spain, Sweden. Austria 1. Political parties Language used in data file: German Year of last election: 2017 Official party names, English 1. Sozialdemokratische Partei Österreichs (SPÖ) - Social Democratic Party of Austria - 26.9 % names/translation, and size in last 2. Österreichische Volkspartei (ÖVP) - Austrian People's Party - 31.5 % election: 3. Freiheitliche Partei Österreichs (FPÖ) - Freedom Party of Austria - 26.0 % 4. Liste Peter Pilz (PILZ) - PILZ - 4.4 % 5. Die Grünen – Die Grüne Alternative (Grüne) - The Greens – The Green Alternative - 3.8 % 6. Kommunistische Partei Österreichs (KPÖ) - Communist Party of Austria - 0.8 % 7. NEOS – Das Neue Österreich und Liberales Forum (NEOS) - NEOS – The New Austria and Liberal Forum - 5.3 % 8. G!LT - Verein zur Förderung der Offenen Demokratie (GILT) - My Vote Counts! - 1.0 % Description of political parties listed 1. The Social Democratic Party (Sozialdemokratische Partei Österreichs, or SPÖ) is a social above democratic/center-left political party that was founded in 1888 as the Social Democratic Worker's Party (Sozialdemokratische Arbeiterpartei, or SDAP), when Victor Adler managed to unite the various opposing factions.
    [Show full text]
  • Cryptography Whitepaper
    Cryptography Whitepaper Threema uses modern cryptography based on open source components that strike an optimal balance between security, performance and message size. In this whitepaper, the algorithms and design decisions behind the cryptography in Threema are explained. VERSION: JUNE 21, 2021 Contents Overview 4 Open Source 5 End-to-End Encryption 5 Key Generation and Registration 5 Key Distribution and Trust 6 Message Encryption 7 Group Messaging 8 Key Backup 8 Client-Server Protocol Description 10 Chat Protocol (Message Transport Layer) 10 Directory Access Protocol 11 Media Access Protocol 11 Cryptography Details 12 Key Lengths 12 Random Number Generation 13 Forward Secrecy 14 Padding 14 Repudiability 15 Replay Prevention 15 Local Data Encryption 15 iOS 15 Android 16 Key Storage 16 iOS 16 Android 16 Push Notifications 17 iOS 17 Android 17 Threema • Cryptography Whitepaper Address Book Synchronization 17 Linking 18 ID Revocation 19 An Example 19 Profile Pictures 19 Web Client 20 Architecture 20 Connection Buildup 21 WebRTC Signaling 22 WebRTC Connection Buildup 22 Trusted Keys / Stored Sessions 23 Push Service 23 Self Hosting 24 Links 24 Threema Calls 24 Signaling 24 Call Encryption 24 Audio Encoding 25 Video Encoding 25 Privacy / IP Exposure 25 Threema Safe 26 Overview 26 Backup Format 27 Encryption 27 Upload/Storage 27 Backup Intervals 28 Restore/Decryption 28 Running a Custom Threema Safe Server 28 Threema • Cryptography Whitepaper Overview Threema uses two different encryption layers to protect messages between the sender and the recipient. • End-to-end encryption layer: this layer is between the sender and the recipient. • Transport layer: each end-to-end encrypted message is encrypted again for transport between the client and the server, in order to protect the header information.
    [Show full text]
  • How Secure Is Textsecure?
    How Secure is TextSecure? Tilman Frosch∗y, Christian Mainkay, Christoph Badery, Florian Bergsmay,Jorg¨ Schwenky, Thorsten Holzy ∗G DATA Advanced Analytics GmbH firstname.lastname @gdata.de f g yHorst Gortz¨ Institute for IT-Security Ruhr University Bochum firstname.lastname @rub.de f g Abstract—Instant Messaging has gained popularity by users without providing any kind of authentication. Today, many for both private and business communication as low-cost clients implement only client-to-server encryption via TLS, short message replacement on mobile devices. However, until although security mechanisms like Off the Record (OTR) recently, most mobile messaging apps did not protect confi- communication [3] or SCIMP [4] providing end-to-end con- dentiality or integrity of the messages. fidentiality and integrity are available. Press releases about mass surveillance performed by intelli- With the advent of smartphones, low-cost short-message gence services such as NSA and GCHQ motivated many people alternatives that use the data channel to communicate, to use alternative messaging solutions to preserve the security gained popularity. However, in the context of mobile ap- and privacy of their communication on the Internet. Initially plications, the assumption of classical instant messaging, fueled by Facebook’s acquisition of the hugely popular mobile for instance, that both parties are online at the time the messaging app WHATSAPP, alternatives claiming to provide conversation takes place, is no longer necessarily valid. secure communication experienced a significant increase of new Instead, the mobile context requires solutions that allow for users. asynchronous communication, where a party may be offline A messaging app that claims to provide secure instant for a prolonged time.
    [Show full text]
  • Zwischen Propaganda Und Unterhaltung : Das Kino in Der Schweiz Zur Zeit Des Ersten Weltkriegs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2017 Zwischen Propaganda und Unterhaltung : das Kino in der Schweiz zur Zeit des Ersten Weltkriegs Gerber, Adrian Abstract: In den 1910er Jahren entstand das moderne Kino als populäre Unterhaltungsform. Während des Ersten Weltkriegs begannen die Krieg führenden Staaten, das neuartige Medium systematisch für Propagandazwecke zu nutzen. Als Bestandteil eines massenmedialen Ensembles sollten Filme auf die öffentliche Meinung einwirken. Geografisch inmitten des Kriegsgeschehens gelegen, spielte die Informa- tionsdrehscheibe Schweiz im weltweiten Propagandakrieg eine prominente Rolle. So betrieb etwa das deutsche Auswärtige Amt über Tarnfirmen mehrere Kinos in der Schweiz. Die Filme, mit denen sowohl die Mittelmächte als auch die Alliierten den schweizerischen Filmmarkt überschwemmten, hatten gegen- sätzliche Auswirkungen: Einerseits verschärften die sie begleitenden öffentlichen Debatten die Spannun- gen im Land; andererseits führte der Abwehrreflex gegen ausländische Beeinflussung zum Wunsch nach einem eigenen nationalen Filmschaffen. Die Studie beschreibt die Anfänge der modernen Filmkultur in der Schweiz und gibt einen Überblick über die Etablierung von Filmmarkt und Kinoöffentlichkeit; insbesondere rekonstruiert sie die Rezeption der international zirkulierenden Propagandafilme zwischen 1914 und 1918. Damit beleuchtet der Autor die bisher nur in Grundzügen bekannte frühe Schweizer Film- und Kinogeschichte im Spannungsfeld von Unterhaltung und gezielter politischer Einflussnahme. Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-131686 Monograph Published Version Originally published at: Gerber, Adrian (2017). Zwischen Propaganda und Unterhaltung : das Kino in der Schweiz zur Zeit des Ersten Weltkriegs. Marburg: Schüren. Adrian Gerber Adrian Gerber In den 1910er–Jahren entstand das moderne Kino als Zwischen popu läre Unterhaltungsform.
    [Show full text]
  • Information Guide Euroscepticism
    Information Guide Euroscepticism A guide to information sources on Euroscepticism, with hyperlinks to further sources of information within European Sources Online and on external websites Contents Introduction .................................................................................................. 2 Brief Historical Overview................................................................................. 2 Euro Crisis 2008 ............................................................................................ 3 European Elections 2014 ................................................................................ 5 Euroscepticism in Europe ................................................................................ 8 Eurosceptic organisations ......................................................................... 10 Eurosceptic thinktanks ............................................................................. 10 Transnational Eurosceptic parties and political groups .................................. 11 Eurocritical media ................................................................................... 12 EU Reaction ................................................................................................. 13 Information sources in the ESO database ........................................................ 14 Further information sources on the internet ..................................................... 14 Copyright © 2016 Cardiff EDC. All rights reserved. 1 Cardiff EDC is part of the University Library
    [Show full text]
  • Challenger Party List
    Appendix List of Challenger Parties Operationalization of Challenger Parties A party is considered a challenger party if in any given year it has not been a member of a central government after 1930. A party is considered a dominant party if in any given year it has been part of a central government after 1930. Only parties with ministers in cabinet are considered to be members of a central government. A party ceases to be a challenger party once it enters central government (in the election immediately preceding entry into office, it is classified as a challenger party). Participation in a national war/crisis cabinets and national unity governments (e.g., Communists in France’s provisional government) does not in itself qualify a party as a dominant party. A dominant party will continue to be considered a dominant party after merging with a challenger party, but a party will be considered a challenger party if it splits from a dominant party. Using this definition, the following parties were challenger parties in Western Europe in the period under investigation (1950–2017). The parties that became dominant parties during the period are indicated with an asterisk. Last election in dataset Country Party Party name (as abbreviation challenger party) Austria ALÖ Alternative List Austria 1983 DU The Independents—Lugner’s List 1999 FPÖ Freedom Party of Austria 1983 * Fritz The Citizens’ Forum Austria 2008 Grüne The Greens—The Green Alternative 2017 LiF Liberal Forum 2008 Martin Hans-Peter Martin’s List 2006 Nein No—Citizens’ Initiative against
    [Show full text]
  • Listener Feedback #170
    Security Now! Transcript of Episode #409 Page 1 of 40 Transcript of Episode #409 Listener Feedback #170 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-409.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-409-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. What a great show ahead. Questions, answers. We'll talk more about PRISM, more insight there. You've got to stay tuned. This is the show to keep your privacy and security up. Security Now! is next. Leo Laporte: This is Security Now! with Steve Gibson, Episode 409, recorded June 19th, 2013: Your questions, Steve's answers, #170. It's time for Security Now!, the post-NSA edition. Steve Gibson is here, our Explainer in Chief, the guy who does all the security and privacy and is really our guru in that realm. Hello, Steve. Good to see you. Steve Gibson: Hey, Leo. Great to be with you again. And we have largely, as expected, a follow-up to last week's blockbuster theory of how PRISM works, as I expected. Actually I probably had double the number of email that I normally pull from the mailbag, which would have only been in half of the period of time.
    [Show full text]
  • Vergleich Standard-Messenger Whatsapp Benötigt Zwingend Den Zugriff Auf Alle Kontakte Der Anwender
    Staatskanzlei Aufsichtsstelle Datenschutz Staatskanzlei, Aufsichtsstelle Datenschutz, 8510 Frauenfeld An diverse Adressaten 058 345 53 41, [email protected] Frauenfeld, den 5. August 2020 Vergleich Standard-Messenger WhatsApp benötigt zwingend den Zugriff auf alle Kontakte der Anwender. Bereits aus diesem Grund kann WhatsApp für die Kommunikation im Schulbereich nicht empfohlen werden. Damit die Schulen einen Überblick über die Funktionsweise von weiteren Messen- gerdiensten erhalten, wurden die verbreiteten Applikationen Signal, Threema, Telegram und Wire (etc.) näher geprüft. Es bestehen noch sehr viele weitere Applikationen und verschiedene Versionen, auf welche hier nicht eingegangen wird. Identifikation Kontakte-hashed Backup Open-Source Berechtigungen Signal Rufnummer ja 6 Fünferblöcke ja (Github) 55 Zugriffsarten Threema Keine (Rufnummer ja lokales Backup von nein (nur der nicht eruierbar, da oder Mail sind frei- Zugangsdaten oder Verschlüsselungs- kein offener Code willig) von allen Daten prozess ist veröf- möglich fentlicht) Telegram Rufnummer ja in Cloud ja (Github) 52 Zugriffsgangsar- ten Wire Mail oder Rufnum- ja in lokale Datei ja (Github) 19 Zugriffsarten mer WhatsApp Rufnummer alle Kontakte müs- unverschlüsselt auf nein nicht eruierbar, da sen freigeschaltet Google Drive kein offener Code werden! Klapp Mail nicht eruierbar, da extern; nicht genau nein nicht eruierbar, da kein offener Code eruierbar, da kein kein offener Code offener Code Mattermost frei wählbar kein Zugriff nötig auf Schulserver ja keine Die als datenschutzrechtlich gut befundenen Eigenschaften sind grün markiert. Die Applikation Signal gilt heute grundsätzlich als sehr datenschutzfreundlich. Der einzi- ge Nachteil von Signal ist, dass die Rufnummer zur Identifikation zwingend angegeben werden muss. Aus dem Quellcode ergibt sich, dass Signale vom Benutzer sehr viele Regierungsgebäude, 8510 Frauenfeld Tel.
    [Show full text]