Proceedings 25C3 Datenpannen Solar-Powering Your Geek Gear First

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings 25C3 Datenpannen Solar-Powering Your Geek Gear First Proceedings 25C3 Datenpannen Solar-powering your Geek Gear first open source PLC tool Hackerparagraph 202c StGB Security Failures in Smart Card Payment Systems Building hackerspaces.org About Cyborgs and Gargoyles ... Terrorist All-Stars Der Staat als Virenprogrammierer? Just Estonia and Georgia? Das Grundrecht auf digitale Intimsphäre Chip Reverse Engineering Erich Mühsams Tagebücher in der Festungshaft Hacking the iPhone foo Beyond Asimov Cracking the MSP430 BSL Advanced memory forensics: Cold Boot Attacks Locating Mobile Phones using SS7 Collapsing the European security to the DNS vulnervulner-- ability? coreboot Messing with Garage Doors Kurt Gödel Jahresrückblick Post-Privacy Climate Change Full-Disk-Encryption Attacking Rich Internet Applications Hacking the Atmosphere and Symbian Vulnerability in closed source PHP applications Music in a Box Handschellen hacken Anatomy of smartsmart- phone hardware Security of MICA*-based wireless sensor TCP Denial of Service Vulnerabilities Short Attention Span Security The Trust Situation Scalable Swarm Robotics Prototype Your Life foo All your base(s) are to us Banking Malware 101 The Infinite Library Console Hacking 2008: Wii Fail Tricks: makes you smile Fnord News Show Blinkenlights Stereoscope Life is a Holodeck! Soviet Unterzoegersdorf your own GSM network Spuren eVoting the TI EZ430U Big Brother Awards Neusprech im Überwachungsstaat Privacy in the social semantic web new stream cipher designs Commodore 64 Talk Hacking into Botnets Security and anonymity vulnerabilities in Tor Squeezing Attack NFC mobile phones OnionCat A TOR-based Anonymous VPN SWF and the Malware Targeted Attacks with Office Documents Der Personalausweis Cisco IOS attack Revolution Wikileaks Hacker Jeopardy We got owned get a lessons learned Why technology sucks The Privacy Workshop Project La Quadrature du Net Predictable RNG in the vulnerable Debian OpenSSL package Crafting and Hacking the theoretical possible Mining social contacts with active RFID Pflanzenhacken Security Nightmares 2009 Peter Fnord Für Wolfgang. ......................................... Proceedings . ......................................... Proceedings of the 25th Chaos Communication Congress December, 27th - 30th 2008, Berlin Congress Center, Alexanderplatz. 25C3: An event of the Chaos Computer Club. https://events.ccc.de/congress/2008/ Cover: Evelyn Schubert Data-Gardening: Sven Klemm Editor: Matthias 'wetterfrosch' Mehldau Publisher: Art d’Ameublement Marktstraße 18 in 33602 Bielefeld Vertrieb: FoeBuD e.V. Unterstützungsbedarf Marktstraße 18 in 33602 Bielefeld, https://shop.foebud.org/ Font-Family: Myriad Pro ISBN: 978-3-934636-06-4 ISSN: 1867-8556 Program planning under the patronage of the Wau Holland Foundation. 1st edition, 400 copies Last update: December, 15th 2008 Printer: Druckerei Wollenhaupt Unter dem Felsenkeller 30 in 37247 Großalmerode Paper: Printed on FSC-certi ed paper by a FSC-certi ed printer. Environment: Climate-neutral print. The for the production this book emitted carbon-dioxide was compensated in cooperation with the natureOffi ce.de-program which supports IMO-COC-028075 facilities for renewable energy in developing countries. Strömchen! License: c Creative Commons Attribution-Noncommercial-No Derivative Works 2.0 Germany As long as not otherwise noticed, you are free to copy, distribute and transmit the work under the following conditions: b Attribution. You must attribute the work in the manner specifi ed by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). n Noncommercial. You may not use this work for commercial purposes. d No Derivative Works. You may not alter, transform, or build upon this work. c Full license-text: http://creativecommons.org/licenses/by-nc-nd/2.0/de/deed.en C ......................................... Index . ......................................... Day 2008-12-27 11:30 CET Datenpannen ... p. 19 Forderungen nach dem Jahr der Datenverbrechen Saal 1: Society with 46halbe, Patrick Breyer Solar-powering your Geek Gear ... p. 20 Alternative and mobile power for all your little toys ... see paper on p. 225 Saal 2: Making with script 12:45 CET U23 ... p. 21 The Hackerspace's Junior Academy Saal 2: Community with fd0, Lars Weiler, red_hood FAIFA: A first open source PLC tool ... p. 22 PowerLineCommunications has now their open source tool Saal 3: Hacking with Nicolas Thill, Florian, Xavier Carcelle 14:00 CET Der Hackerparagraph 202c StGB ... p. 23 Bestandsaufnahme und Auswirkungen Saal 1: Hacking with Felix von Leitner, lexi, Jan Münther, Jürgen Schmidt Security Failures in Smart Card Payment Systems ... p. 24 Tampering the Tamper-Proof Saal 3: Hacking with Steven J. Murdoch 16:00 CET Building an international movement: hackerspaces.org ... p. 25 What we did so far. What will happen in the future. Saal 1: Community with Nick Farr, Enki, Jens Ohlig, Bre, Jake About Cyborgs and Gargoyles ... ... p. 26 State of the Art in Wearable Computing ... see paper on p. 235 Saal 2: Science with kai_ser 17:15 CET Terrorist All-Stars ... p. 28 Some cases of terrorism around the world that are not terrorist at all Saal 1: Society with Anne Roth Der Staat als Virenprogrammierer? ... p. 29 Die Steueridentifikationsnummer als Gefahr der informationellen Selbstbestimmung Saal 2: Society with Sven Lüders Just Estonia and Georgia? ... p. 30 Global-scale Incident Response and Responders Saal 3: Culture with gadi 18:30 CET Das Grundrecht auf digitale Intimsphäre ... p. 31 Festplattenbeschlagnahme in neuem Licht Saal 1: Society with Ulf Buermeyer, 46halbe Chip Reverse Engineering ... p. 32 Saal 2: Hacking with Karsten Nohl, starbug ... see paper on p. 155 Erich Mühsams Tagebücher in der Festungshaft ... p. 33 Ein Idylle aus der Analogsteinzeit der Überwachung Saal 3: Society with Johannes Ullmaier 20:30 CET Hacking the iPhone ... p. 34 Pwning Apple's Mobile Internet Device Saal 1: Hacking with pytey, MuscleNerd, planetbeing Beyond Asimov - Laws for Robots ... p. 35 Developing rules for autonomous systems Saal 2: Society with Frank Rieger Cracking the MSP430 BSL ... p. 36 Part Two ... see paper on p. 165 Saal 3: Hacking with Travis Goodspeed 21:45 CET Advanced memory forensics: The Cold Boot Attacks ... p. 37 Recovering keys and other secrets after power off ... see paper on p. 133 Saal 1: Hacking with Jake Locating Mobile Phones using SS7 ... p. 38 Saal 2: Hacking with Tobias Engel Collapsing the European security architecture ... p. 39 More security-critical behaviour in Europe! ... see paper on p. 263 Saal 3: Society with Gipfelsoli 23:00 CET Why were we so vulnerable to the DNS vulnerability? ... p. 46 Saal 1: Hacking with Effugas coreboot: Beyond The Final Frontier ... p. 47 Open source BIOS replacement with a radical approach to boot. Saal 2: Hacking with Peter Stuge Messing Around with Garage Doors ... p. 48 Breaking Remote Keyless Entry Systems with Power Analysis Saal 3: Hacking with Timo Kasper, Thomas Eisenbarth 24:00 CET Kurt Gödel – I do not fit into this century ... p. 49 Ein audiovisuelles Live-Feature Saal 1: Culture with 46halbe, Marcus Richter, Ina Kwasniewski, Kai Kittler Day 2008-12-28 11:30 CET Jahresrückblick ... p. 52 Die Themen des CCC im Jahr 2008 Saal 1: Community with 46halbe, andy, Frank Rieger, frankro, Erdgeist Lightning Talks 1 ... p. 54 5 mins of fame Saal 2: Community with SvenG Embracing Post-Privacy ... p. 55 Optimism towards a future where there is 'Nothing to hide' Saal 3: Society with Christian Heller / plomlompom 12:45 CET Climate Change - State of the Science ... p. 56 Saal 2: Science with Rahmstorf ... see paper on p. 243 Full-Disk-Encryption Crash-Course ... p. 57 Everything to hide ... see paper on p. 171 Saal 3: Hacking with Juergen Pabel 14:00 CET Attacking Rich Internet Applications ... p. 58 Not your mother's XSS bugs Saal 1: Hacking with kuza55, Stefano Di Paola Hacking the Atmosphere ... p. 59 How to exploit the weather and fly for free Saal 2: Science with Martin Ling Exploiting Symbian ... p. 60 Symbian Exploit and Shellcode Development Saal 3: Hacking with Collin Mulliner 16:00 CET Vulnerability discovery in encrypted closed source PHP applications ... p. 61 Saal 1: Hacking with ionic Algorithmic Music in a Box ... p. 62 Doing music with microcontrollers ... see paper on p. 219 Saal 2: Making with wesen Handschellen hacken ... p. 63 Essentielles Grundwissen für alle, die nichts zu verbergen hatten Saal 3: Hacking with Ray 17:15 CET Anatomy of smartphone hardware ... p. 64 Dissecting contemporary cellphone hardware Saal 1: Hacking with Harald Welte Security of MICA*-based wireless sensor networks ... p. 65 Saal 2: Hacking with Dan Cvrcek ... see paper on p. 183 TCP Denial of Service Vulnerabilities ... p. 66 Accepting the Partial Disclosure Challenge Saal 3: Hacking with Fabian Yamaguchi 18:30 CET Short Attention Span Security ... p. 67 A little of everything Saal 1: Hacking with Ben Kurtz The Trust Situation ... p. 69 Why the idea of data protection slowly turns out to be defective ... see paper on p. 309 Saal 2: Society with Sandro Gaycken Scalable Swarm Robotics ... p. 70 Formica: a cheap, open research platform Saal 3: Making with Jeff Gough 20:30 CET Rapid Prototype Your Life ... p. 72 The time is now to make anything you can imagine Saal 1: Making with Bre All your base(s) are belong to us ... p. 73 Dawn of the high-throughput DNA sequencing era Saal 2: Science with Magnus Manske Banking Malware 101 ... p. 74 Overview of Current Keylogger Threats Saal 3: Hacking with tho 21:45 CET The Infinite Library ... p. 75 Storage and Access of Pornographic Information Saal 1: Society with Rose White Console Hacking 2008: Wii Fail ... p. 77 Is implementation the enemy of design? Saal 2: Hacking with bushing, marcan Tricks: makes you smile ... p. 78 A clever or ingenious device or expedient; adroit technique: the tricks of the trade. Saal 3: Hacking with Francesco `ascii` Ongaro 23:00 CET Fnord News Show ... p. 79 Wir helfen Euch, die Fnords zu sehen Saal 1: Society with Felix von Leitner, Frank Rieger Blinkenlights Stereoscope ... p. 80 Behind the scenes of the new light installation Saal 2: Hacking with Tim Pritlove Life is a Holodeck! ..
Recommended publications
  • Shorten Device Boot Time for Automotive IVI and Navigation Systems
    Shorten Device Boot Time for Automotive IVI and Navigation Systems Jim Huang ( 黃敬群 ) <[email protected]> Dr. Shi-wu Lo <[email protected]> May 28, 2013 / Automotive Linux Summit (Spring) Rights to copy © Copyright 2013 0xlab http://0xlab.org/ [email protected] Attribution – ShareAlike 3.0 Corrections, suggestions, contributions and translations You are free are welcome! to copy, distribute, display, and perform the work to make derivative works Latest update: May 28, 2013 to make commercial use of the work Under the following conditions Attribution. You must give the original author credit. Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. License text: http://creativecommons.org/licenses/by-sa/3.0/legalcode Goal of This Presentation • Propose a practical approach of the mixture of ARM hibernation (suspend to disk) and Linux user-space checkpointing – to shorten device boot time • An intrusive technique for Android/Linux – minimal init script and root file system changes are required • Boot time is one of the key factors for Automotive IVI – mentioned by “Linux Powered Clusters” and “Silver Bullet of Virtualization (Pitfalls, Challenges and Concerns) Continued” at ALS 2013 – highlighted by “Boot Time Optimizations” at ALS 2012 About this presentation • joint development efforts of the following entities – 0xlab team - http://0xlab.org/ – OSLab, National Chung Cheng University of Taiwan, led by Dr.
    [Show full text]
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • Why We Should Consider the Plurality of Hacker and Maker Cultures 2017
    Repositorium für die Medienwissenschaft Sebastian Kubitschko; Annika Richterich; Karin Wenz „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures 2017 https://doi.org/10.25969/mediarep/1115 Veröffentlichungsversion / published version Zeitschriftenartikel / journal article Empfohlene Zitierung / Suggested Citation: Kubitschko, Sebastian; Richterich, Annika; Wenz, Karin: „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures. In: Digital Culture & Society, Jg. 3 (2017), Nr. 1, S. 185– 195. DOI: https://doi.org/10.25969/mediarep/1115. Erstmalig hier erschienen / Initial publication here: https://doi.org/10.14361/dcs-2017-0112 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 Attribution - Non Commercial - No Derivatives 4.0 License. For Lizenz zur Verfügung gestellt. Nähere Auskünfte zu dieser Lizenz more information see: finden Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0 https://creativecommons.org/licenses/by-nc-nd/4.0 “There Simply Is No Unified Hacker Movement.” Why We Should Consider the Plurality of Hacker and Maker Cultures Sebastian Kubitschko in Conversation with Annika Richterich and Karin Wenz Sebastian Kubitschko is a postdoctoral researcher at the Centre for Media, Communication and Information Research (ZeMKI) at the University of Bremen in Germany. His main research fields are political communication, social movements and civil society organisations. In order to address the relevance of new forms of techno-political civic engagement, he has conducted qualitative, empirical research on one of the world’s oldest and largest hacker organisations, the Chaos Computer Club (CCC).
    [Show full text]
  • The Best of Both Worlds with On-Demand Virtualization
    The Best of Both Worlds with On-Demand Virtualization Thawan Kooburat, Michael Swift University of Wisconsin-Madison [email protected], [email protected] Abstract Virtualization offers many benefits such as live migration, resource consolidation, and checkpointing. However, there are many cases where the overhead of virtualization is too high to justify for its merits. Most desktop and laptop PCs and many large web properties run natively because the benefits of virtualization are too small compared to the overhead. We propose a new middle ground: on-demand virtualization, in which systems run natively when they need native performance or features but can be converted on-the-fly to run virtually when necessary. This enables the user or system administrator to leverage the most useful features of virtualization, such as or checkpointing or consolidating workloads, during off-peak hours without paying the overhead during peak usage. We have developed a prototype of on-demand virtualization in Linux using the hibernate feature to transfer state between native execution and virtual execution, and find even networking applications can survive being virtualized. OS can return to native execution on its original hardware. 1. Introduction We call this approach on-demand virtualization, and it System virtualization offers many benefits in both data- gives operating systems an ability to be virtualized center and desktop environments, such as live migration, without service disruption. multi-tenancy, checkpointing, and the ability to run dif- Reaping the benefits of virtualization without its costs ferent operating systems at once. These features enable has been proposed previously in other forms. Microvisors hardware maintenance with little downtime, load ba- [14] provided the first step in the direction toward lancing for better throughput or power efficiency, and on-demand virtualization.
    [Show full text]
  • Espionage Against Poland in the Documents and Analyses of the Polish Special Services (1944–1989) – As Illustrated by the Intelligence Activities of the USA
    DOI 10.14746/ssp.2016.1.8 Remigiusz ROSICKI Adam Mickiewicz University in Poznań Espionage against Poland in the Documents and Analyses of the Polish Special Services (1944–1989) – as Illustrated by the Intelligence Activities of the USA Abstract: The text is treats of the espionage against Poland in the period 1944–1989. The above analysis has been supplemented with the quantitative data from the period 1944–1984 as regards those convicted for participating in, acting for, and passing on information to the foreign intelligence agencies. The espionage issues were presented on the example of the American intelligence activity, which was illustrated by the cases of persons who were convicted for espionage. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of In- ternal Affairs, which were in its major part addressed to the Security Service and the Citizens’ Militia officers. The author made an attempt at the verification of the fol- lowing research hypotheses: (1) To what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination (1944–1989)?; (2) What was the level of foreign intel- ligence services’ interest in Poland before the year 1990?; (3) Is it possible to indicate the specificity of the U.S. intelligence activity against Poland? Key words: espionage, U.S. espionage, intelligence activities, counterespionage, Polish counterintelligence, special services, state security Introduction he aim of this text is to present the level of knowledge among the au- Tthorities responsible for the state security and public order about the intelligence activities conducted against Poland in the period 1944–1989.
    [Show full text]
  • Cybersecurity Forum Für Datensicherheit, Datenschutz Und Datenethik 23
    3. JAHRESTAGUNG CYBERSECURITY FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK 23. APRIL 2020, FRANKFURT AM MAIN #cyberffm Premium-Partner: Veranstaltungspartner: 3. JAHRESTAGUNG CYBERSECURITY DEUTSCHLAND — DIGITAL — SICHER — BSI Die Schadsoftware »Emotet« hat uns in den letzten Wochen und Monaten erneut schmerzhaft vor Augen geführt, welche Auswirkungen es haben kann, wenn man die Vorteile der Digitalisierung genießt, ohne die dafür unabdingbar notwendige Infor- mationssicherheit zu gewährleisten. Stadtverwaltungen, Behörden, Krankenhäuser und Universitäten wurden lahmgelegt, Unternehmen mussten zeitweise den Betrieb einstellen. Die Folgen sind für jeden von uns spürbar: Arbeitsplätze sind in Gefahr, Waren und Dienstleistungen können nicht mehr angeboten und verkauft werden, Krankenhäuser müssen die Patientenannahme ablehnen. Stadtverwaltungen sind nicht mehr arbeitsfähig und schließen ihre Bürgerbüros. Bürgerinnen und Bürger konnten keine Ausweise und Führerscheine beantragen, keine Autos anmelden und keine Sperrmüllabfuhr bestellen. Sogar Hochzeiten mussten verschoben werden. Und wie würde die Lage wohl erst aussehen, wenn wir tatsächlich in einer voll digitalisierten Welt lebten? Das BSI beschäftigt sich damit, in welchen Anwendungsfeldern der Digitalisierung Risiken entstehen könnten und wie wir diese Risiken kalkulierbar und beherrschbar machen können. Unsere Stärke ist es, Themen der Informationssicherheit gebündelt fachlich zu analysieren und aus der gemeinsamen Analyse heraus konkrete Angebote für unterschiedliche Zielgruppen
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Transformation of the Special Services in Poland in the Context of Political Changes
    Scientific Journal of the Military University of Land Forces ISSN:2544-7122(print),2545-0719(online) 2020,Volume52,Number3(197),Pages557-573 DOI:10.5604/01.3001.0014.3926 Original article Transformation of the special services in Poland in the context of political changes Marian Kopczewski1* , Zbigniew Ciekanowski2 , Anna Piotrowska3 1 FacultyofSecuritySciences, GeneralTadeuszKościuszkoMilitaryUniversityofLandForces,Wrocław,Poland, e-mail:[email protected] 2 FacultyofEconomicandTechnicalSciences, PopeJohnPaulIIStateSchoolofHigherEducationinBiałaPodlaska,Poland, e-mail:[email protected] 3 FacultyofNationalSecurity,WarStudiesUniversity,Warsaw,Poland, e-mail:[email protected] INFORMATION ABSTRACT Article history: ThearticlepresentsthetransformationofspecialservicesinPolandagainst Submited:16August2019 thebackgroundofpoliticalchanges.Itpresentstheactivitiesofsecuritybod- Accepted:19May2020 ies–civilandmilitaryintelligenceandcounterintelligenceduringthecommu- Published:15September2020 nistera.Theirtaskwastostrengthencommunistpower,eliminateopponents ofthesystem,strengthentheallianceofsocialistcountriesledbytheUSSR, andfightagainstdemocraticopposition.Thecreationofnewspecialservices wasalsoshown:theUOPandtheWSI.Thefocuswasonthenewtasksthat weresetfortheminconnectionwiththedemocraticchangesandnewalli- ances.TherewerepresentedspectacularUOPactions,whichcontributedto raisingtheprestigeofPolandontheinternationalarena. KEYWORDS *Correspondingauthor specialservices,politicalchanges,democracy,security ©2020byAuthor(s).ThisisanopenaccessarticleundertheCreativeCommonsAttribution
    [Show full text]
  • Trigger Happy: Videogames and the Entertainment Revolution
    Free your purchased eBook form adhesion DRM*! * DRM = Digtal Rights Management Trigger Happy VIDEOGAMES AND THE ENTERTAINMENT REVOLUTION by Steven Poole Contents ACKNOWLEDGMENTS............................................ 8 1 RESISTANCE IS FUTILE ......................................10 Our virtual history....................................................10 Pixel generation .......................................................13 Meme machines .......................................................18 The shock of the new ...............................................28 2 THE ORIGIN OF SPECIES ....................................35 Beginnings ...............................................................35 Art types...................................................................45 Happiness is a warm gun .........................................46 In my mind and in my car ........................................51 Might as well jump ..................................................56 Sometimes you kick.................................................61 Heaven in here .........................................................66 Two tribes ................................................................69 Running up that hill .................................................72 It’s a kind of magic ..................................................75 We can work it out...................................................79 Family fortunes ........................................................82 3 UNREAL CITIES ....................................................85
    [Show full text]
  • Journée Particulière Dans L'écrin Loclois De La Marque Zenith
    SOLAR IMPULSE L’avion exposé à Washington PAGE 16 GYMNASTIQUE Claudio Capelli et Giulia Steingruber rois de la Fête PAGE 20 KEYSTONE LUNDI 17 JUIN 2013 | www.arcinfo.ch | N0 41437 | CHF 2.50 | J.A. - 2300 LA CHAUX-DE-FONDS Après le non au RER-Transrun, un nouveau projet de mobilité? CANTON Le Conseil d’Etat demande au Grand TRAVAUX Selon le gouvernement, il existe une SOCIÉTÉ La commission mobilité du Grand Conseil de lui accorder un crédit d’un million quasi-unanimité pour ne pas se contenter d’un Conseil est d’accord avec le gouvernement. de francs pour les premières démarches simple assainissement de la ligne ferroviaire Mais faut-il maintenir Transrun SA? Question en vue d’un nouveau projet de mobilité. entre La Chaux-de-Fonds et Neuchâtel. posée alors qu’un document a fuité... PAGE 3 Journée particulière dans l’écrin loclois de la marque Zenith BIST-STÉPHANE GERBER TRAMELAN Les yodleurs s’en sont donné jusqu’à plus de voix PAGE 8 FESTIVAL DES GOUTTES Record le soir de Kim Wilde et petite soirée le samedi PAGE 6 ÉCOUTES Les appétits de surveillance de la NSA inquiètent PAGE 15 LA MÉTÉO DU JOUR pied du Jura à 1000m 17° 32° 13° 29° CHRISTIAN GALLEY HORLOGERIE Personne ne se souvient quand Zenith a ouvert ses portes au public pour la dernière fois. SOMMAIRE La marque l’a fait samedi et hier, lors des deuxièmes «Journées particulières» du groupe de luxe LVMH. Les Feuilleton PAGE 12 Télévision PAGE 25 inscriptions avaient été liquidées en un temps record.
    [Show full text]
  • Parteienmonitor
    Hauptabteilung Politik und Beratung Berlin, im Februar 2010 PARTEIENMONITOR Partei der „digital natives“? Eine Analyse der Genese und Etablierungschancen der Piratenpartei Fabian Blumberg ANSPRECHPARTNER: Dr. Michael Borchard Hauptabteilungsleiter Hauptabteilung Politik und Beratung Konrad-Adenauer-Stiftung e.V. Klingelhöferstr. 23 10785 Berlin 03026996 3503 [email protected] PARTEIENMONITOR 2 INHALTSVERZEICHNIS 1. EINLEITUNG UND ZUSAMMENFASSUNG ..................................... 3 2. HINTERGRUND: FILESHARING, „THE PIRATE BAY“ UND DIE SCHWEDISCHE „PIRATPARTIET“........................................................ 6 3. DAS „ERWECKUNGSERLEBNIS“ ZUGANGSERSCHWERUNGSGESETZ 9 4. MITGLIEDERENTWICKLUNG.....................................................13 5. ANHÄNGERSTRUKTUR, WAHLERGEBNISSE 2009 ........................13 5.1 EUROPAWAHL 2009 .............................................................14 5.2 BUNDESTAGSWAHL 2009 .....................................................15 5.3 WEITERE WAHLEN...............................................................17 6. INHALTLICHE SCHWERPUNKTE UND PROGRAMMATISCHE(S) PROFIL(LOSIGKEIT)........................................................................18 6.1 INFORMATIONELLE SELBSTBESTIMMUNG UND DATENSCHUTZ ..19 6.2 URHEBERRECHT..................................................................19 6.3 OPEN ACCESS.....................................................................22 6.4 PATENTRECHT ....................................................................22 6.6 BILDUNG............................................................................23
    [Show full text]
  • Antragsbuch Bundesparteitag 2011.2
    Antragsbuch Bundesparteitag 2011.2 Klarmachen zum Ändern 3.-4. Dezember 2011 Dies ist eine inoffizielle Zusammenstellung der Anträge zum BPT 2011.2 der Piratenpartei in Offenbach. Die offiziellen Anträge werden auf der Webseite der Antragskommission gesammelt: http://wiki.piratenpartei.de/Bundesparteitag_2011.2/Antragsportal 1 Inhaltsverzeichnis 1 Gruppenübersicht 13 2 Programmanträge 29 PA001 - Staat, Religion und Weltanschauung............................. 29 PA002 - Anspruch flexibler Kinderbetreuung............................. 30 PA003 - Reformierung der Öffentlich-Rechtlichen Medien...................... 31 PA004 - Verhältnis von Staat und Religion............................... 33 PA005 - Strafverfolgungsentschädigungsgesetz............................ 34 PA011 - Ablehnung von Anwendung der CCS-Technologie...................... 35 PA012 - Gleichstellung von Kirchen mit gemeinnützigen Vereinen.................. 36 PA013 - Klarstellungsanstrag: Eröffnung des Bundestagswahlprogramm 2013............ 37 PA014 - Wahlrechtsvorschlag von Mehr Demokratie e.V. ins Wahlprogramm............. 38 PA015 - Abschaffung von Pflichtmitgliedschaften in Kammern.................... 40 PA016 - Abschaffung von Pflichtmitgliedschaften in Kammern.................... 41 PA017 - Strategische Förderung Freier Software mittels eines FLOSS-Fonds............. 42 PA018 - Steuervereinfachung und Steuergerechtigkeit......................... 44 PA020 - Betroffene von Überwachungsmaßnahmen müssen informiert werden............ 45 PA022 - Ausführung Programm Energiepolitik............................
    [Show full text]