{"acronym":"sigint09","aspect_ratio":"4:3","updated_at":"2026-04-10T00:45:04.284+02:00","title":"SIGINT09","schedule_url":"","slug":"conferences/sigint/2009","event_last_released_at":"2009-09-11T02:00:00.000+02:00","link":null,"description":null,"webgen_location":"conferences/sigint/2009","logo_url":"https://static.media.ccc.de/media/conferences/sigint09/folder-sigint-2009.png","images_url":"https://static.media.ccc.de/media/conferences/sigint09","recordings_url":"https://cdn.media.ccc.de/events/sigint09","url":"https://api.media.ccc.de/public/conferences/sigint09","events":[{"guid":"import-ef6c8e0fb82a1c1e38","title":"Diffie-Hellman, RSA, etc.","subtitle":"Mathematische Grundlagen asymmetrischer Verschlüsselungsverfahren","slug":"SIGINT09_3210_de_diffie_hellman_rsa_etc","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3210.en.html","description":"Inzwischen sind kryptographische Techniken und Verfahren auch auf dem letzten Home-PC angekommen. Leider gilt das Thema in den meisten Köpfen als mystische \"Black Art\".\n","original_language":"eng","persons":["pesco"],"tags":["sigint09"],"view_count":288,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-01-13T14:45:25.741+01:00","length":3452,"duration":3452,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3210_de_diffie_hellman_rsa_etc.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3210_de_diffie_hellman_rsa_etc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-ef6c8e0fb82a1c1e38-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-ef6c8e0fb82a1c1e38-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3210_de_diffie_hellman_rsa_etc","url":"https://api.media.ccc.de/public/events/import-ef6c8e0fb82a1c1e38","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":401,"event_guid":"import-1b04c3cadf7986cda5","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":495,"event_guid":"import-58eefb24d1e79d9d41","weight":1},{"event_id":511,"event_guid":"import-cfc5912dc710f2c509","weight":1},{"event_id":646,"event_guid":"import-7af3c11a86c7ca7fca","weight":1},{"event_id":1748,"event_guid":"ufJTu-pu8QBUtd-bji9tmw","weight":2},{"event_id":2188,"event_guid":"oBQMMNfX5t-5TBIk3z6pOg","weight":1},{"event_id":2375,"event_guid":"128d4236-6001-4483-9152-c5941314d2cb","weight":2},{"event_id":2376,"event_guid":"0bc12fad-8cb0-4c89-b1b5-f9087325d0f9","weight":1},{"event_id":2741,"event_guid":"308b58d7-9b90-4afa-a044-b7fb025a2cd9","weight":1},{"event_id":2811,"event_guid":"fa0727ab-81a7-4197-bc7d-0ce5e9dc4526","weight":1},{"event_id":2877,"event_guid":"b5d1079a-7d72-45b1-8328-e5c3e60944c1","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":3040,"event_guid":"adba2706-279c-41a4-aa9d-78b20755f866","weight":1},{"event_id":3096,"event_guid":"2304d7e1-aad1-450b-92f9-910d63327e9e","weight":1},{"event_id":3597,"event_guid":"87092ad2-d3fd-4a37-bb58-1fe71217a06b","weight":1},{"event_id":3626,"event_guid":"c3844820-b5ed-4b12-9094-cfc67aff60be","weight":1},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":1},{"event_id":3648,"event_guid":"8aaa55ad-b426-4d7a-8d46-f4b34a906eda","weight":1},{"event_id":3663,"event_guid":"56b62043-b92d-4b32-b5d0-b78d8fbcbb24","weight":1},{"event_id":3717,"event_guid":"07a731a0-2c3a-40f1-928e-3f709eb1eccf","weight":1},{"event_id":3741,"event_guid":"725b4ff6-8d4c-4d8f-9e38-6b1e49e1602c","weight":6},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":1},{"event_id":3764,"event_guid":"b1a28d62-75e9-48de-bec9-44df4e611685","weight":1},{"event_id":3969,"event_guid":"3da0c4af-8e71-491f-a9cc-206d5fd98325","weight":1},{"event_id":3986,"event_guid":"ff2bf44f-3417-5914-a017-9777087662f7","weight":1},{"event_id":4354,"event_guid":"4f8bb09c-348f-43a7-a29c-891af8b59c0d","weight":1},{"event_id":4360,"event_guid":"159484b6-5989-4e61-b0bb-20f12a8b65d1","weight":1},{"event_id":4369,"event_guid":"5f25fc58-113d-4605-9fc0-9e98407cd9a3","weight":1},{"event_id":4618,"event_guid":"544e7dec-a9a6-11e7-9649-6f2a45a76afd","weight":1},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":1},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":3},{"event_id":4855,"event_guid":"51b586be-500c-436e-b70c-fc433e65c4be","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4935,"event_guid":"947f946e-3dd9-4911-b4de-f9bbd87058ee","weight":2},{"event_id":5228,"event_guid":"44434a47-4b41-2020-2020-202020202020","weight":1},{"event_id":5240,"event_guid":"39474e46-4733-2020-2020-202020202020","weight":1}]},{"guid":"import-58eefb24d1e79d9d41","title":"Keynote Tag 2: Pranks, Bugs, and Insecurities","subtitle":null,"slug":"SIGINT09_3248_de_keynote_tag2_pranks_bugs_and_insecurities","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3248.en.html","description":"\n","original_language":"eng","persons":["FX of Phenoelit"],"tags":["sigint09"],"view_count":186,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-04-07T14:00:07.003+02:00","length":2880,"duration":2880,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3248_de_keynote_tag2_pranks_bugs_and_insecurities.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3248_de_keynote_tag2_pranks_bugs_and_insecurities_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-58eefb24d1e79d9d41-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-58eefb24d1e79d9d41-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3248_de_keynote_tag2_pranks_bugs_and_insecurities","url":"https://api.media.ccc.de/public/events/import-58eefb24d1e79d9d41","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":481,"event_guid":"import-ef6c8e0fb82a1c1e38","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":5},{"event_id":496,"event_guid":"import-51b51649a35b05d109","weight":1},{"event_id":505,"event_guid":"import-81ffbf01f29be799e4","weight":1},{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1},{"event_id":766,"event_guid":"import-e6bf982e4949766ac4","weight":2},{"event_id":1011,"event_guid":"import-eceb398fdedfd15263","weight":2},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":2},{"event_id":1219,"event_guid":"import-c1b343dc3dc4828a06","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1233,"event_guid":"import-96406013bfdba8987b","weight":2},{"event_id":1372,"event_guid":"import-79c42ca7a3a36179d3","weight":1},{"event_id":1470,"event_guid":"import-384abf403ee27a0804","weight":1},{"event_id":1579,"event_guid":"import-def6598c84e42db15e","weight":2},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":1},{"event_id":2170,"event_guid":"DvpNPWPGVgSqGcOI1WK45g","weight":1},{"event_id":2406,"event_guid":"680d0aea18aa6ba03f104efcd2bac2f3","weight":1},{"event_id":2448,"event_guid":"49d47154-9156-46e4-8869-89c1a9be94c6","weight":1},{"event_id":4168,"event_guid":"6325079a-6c06-5156-80a7-e8f373a22f16","weight":1},{"event_id":4217,"event_guid":"8da84e68-73c0-11e7-ac71-d3b143ff9640","weight":1},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1},{"event_id":4909,"event_guid":"03ba9edb-1d3a-4774-9384-7548c0696df7","weight":1},{"event_id":5217,"event_guid":"42433839-4355-2020-2020-202020202020","weight":1},{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":1},{"event_id":5239,"event_guid":"524a3859-5641-2020-2020-202020202020","weight":1},{"event_id":5244,"event_guid":"4a473753-5039-2020-2020-202020202020","weight":1}]},{"guid":"import-3bd72ee6c231e50bf3","title":"Turn off the Stockholm Programme!","subtitle":"Campaign against the next five-years plan for EU homeland affairs","slug":"SIGINT09_3164_de_turn_off_the_stockholm_program","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3164.en.html","description":"Following Tampere 1999 and Hague 2004, the EU plans to decide the next five-year plan on \"Justice and Home Affairs\" (JHA) this year. \n\nAfter the implementation of data retention and new databases, the creation of \"Frontex\" and the \"European Security Research Programme\", the \"harmonization\" of terrorism laws and more surveillance of the internet, next severe changes are foreseen to bet set in the new guideline. \n\nUnder swedish EU presidency in the second half of 2009, probably in November or December, the ministers of interior and justice will meet to agree the new \"Stockholm Programme\". \n\nA self-announced \"Future Group\" of some of the ministers, initiated under german EU presidency 2007, already published the wishlist \"European Home Affairs in an open world\": \n\nAn EU population register, ‘remote’ forensic searches of computer hard drives, internet surveillance systems, more implementation of satellites and ‘drone’ planes for surveillance, automated exit-entry systems operated by machines, autonomous targeting systems, risk assessment and profiling systems, e-borders, passenger profiling systems, an EU ‘entry-exit’ system, joint EU expulsion flights, dedicated EU expulsion planes, EU-funded detention centres and refugee camps in third countries (even \"overseas\"), expansion of the para-military European Gendarmerie Force, deployment of EU Battle Groups, crisis management operations in Africa, permanent EU military patrols in the Mediterranean and Atlantic, more power for EU agencies, interlinking of national police systems, an EU criminal record, a permanent EU Standing Committee on internal security (COSI) dealing with operational matters, more partnerships with the security industry. \n\nBy 2014, the ministers wish to establish a \"transatlantic security partnership\" between the EU and USA, that can be seen as a kind of a \"domestically NATO\". NATO strategists on the other hand approach to internal politics by claiming in the paper \"Towards a grand strategy in an uncertain world\" that military could only supply \"strong defence\" if there is a \"strong homeland security\". \n\nSimulating a \"participation of the citizens\", the EU organized a \"survey\" asking online opinions towards the changes foreseen in the \"Stockholm Programme\". Participants could only choose between provided answers, that didn't allow any serious critique towards the plans. Only 700 user were counted.\n\nFor more information see the studies of \nStatewatch: http://www.statewatch.org/analyses/the-shape-of-things-to-come.pdf \nGipfelsoli: http://www.gipfelsoli.org/Gipfelsoli/Gipfelsoli_english/5575.html \n","original_language":"eng","persons":["Gipfelsoli"],"tags":["sigint09"],"view_count":13,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2023-11-19T16:45:02.810+01:00","length":2927,"duration":2927,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3164_de_turn_off_the_stockholm_program.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3164_de_turn_off_the_stockholm_program_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3bd72ee6c231e50bf3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3bd72ee6c231e50bf3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3164_de_turn_off_the_stockholm_program","url":"https://api.media.ccc.de/public/events/import-3bd72ee6c231e50bf3","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":634,"event_guid":"import-5a4e69978d19371bc5","weight":1},{"event_id":2156,"event_guid":"-n9QScyDLXMEwkqrCHASYw","weight":1},{"event_id":2254,"event_guid":"L9rFWciMu_GVpHLIhPT9Qg","weight":1},{"event_id":3004,"event_guid":"d6854caf-514f-4c2a-af64-81924ecf15e1","weight":1},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":1},{"event_id":3766,"event_guid":"2b9b6095-9dcd-49f3-9792-cf74aab88b16","weight":1},{"event_id":4765,"event_guid":"9326038b-f781-4707-b35a-9ef52f98d35a","weight":1},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":1},{"event_id":4832,"event_guid":"275f85de-d612-4440-8755-85dee5912f12","weight":1},{"event_id":4871,"event_guid":"4b1c06a3-d870-4740-9f77-832768d41fae","weight":1},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":1},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":1},{"event_id":5047,"event_guid":"51eb0169-e1fc-4b40-816c-be3a11618c45","weight":1},{"event_id":6389,"event_guid":"c8b34953-b60f-4ed0-8784-dc20153e0725","weight":1},{"event_id":6449,"event_guid":"76417167-e13b-43cd-a089-841ff78266e8","weight":1}]},{"guid":"import-22af5ccb71466c2ed2","title":"Chancen und Risiken von Ubiquitous Computing und Ambient Intelligence","subtitle":null,"slug":"SIGINT09_3135_de_ubiquitous_computing","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3135.en.html","description":"Es existiert ein hohes wirtschaftliches Potenzial für mobile und eingebettete Technologien, das für die Entwicklung innovativer Produkte und Dienstleistungen genutzt werden kann, wodurch sich Geschäftsmodelle sowie zentrale Geschäftsprozesse deutlich verändern werden. Die Vertraulichkeit personenbezogener Daten, die Authentizität und Integrität aller beteiligten Instanzen sowie die Zuverlässigkeit essentieller Infrastrukturkomponenten stellen hierbei jedoch kritische Erfolgsfaktoren dar. Um den Anforderungen gerecht zu werden, muss eine Vielzahl unterschiedlichster Herausforderungen bewältigt werden, die anhand von konkreten Beispielen aus dem Finanzdienstleistungssektor beleuchtet werden sollen.\n","original_language":"eng","persons":["Sebastian Schroeder"],"tags":["sigint09"],"view_count":85,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-12-23T16:45:05.991+01:00","length":3740,"duration":3740,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3135_de_ubiquitous_computing.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3135_de_ubiquitous_computing_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-22af5ccb71466c2ed2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-22af5ccb71466c2ed2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3135_de_ubiquitous_computing","url":"https://api.media.ccc.de/public/events/import-22af5ccb71466c2ed2","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":150,"event_guid":"import-c6f888938ae607a87c","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":3559,"event_guid":"f3975e63-9760-479a-8765-a678f188581d","weight":1},{"event_id":3666,"event_guid":"2f586f3b-5399-496c-ab03-c25ad8ea8cf6","weight":1},{"event_id":6397,"event_guid":"51ede2da-0f9b-4984-bd58-659c556d20c9","weight":1},{"event_id":6429,"event_guid":"d995955c-319f-4228-b3f4-080868bbfdf8","weight":1},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":1},{"event_id":6551,"event_guid":"3a571c21-31ed-453b-886d-7dea7b5751cd","weight":1},{"event_id":6591,"event_guid":"ba68f092-89bd-4348-9f81-7a05317a0497","weight":2},{"event_id":7846,"event_guid":"dc8b3e8c-0831-5725-a64a-2c8cd7737580","weight":1}]},{"guid":"import-a85c1a72ff670914de","title":"Bloggen gegen Überwachung","subtitle":"Wie manchmal ein Blog helfen kann, die Privatsphäre zu retten","slug":"SIGINT09_3215_de_bloggen_gegen_ueberwachung","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3215.en.html","description":"Mein Freund Andrej Holm wurde im Sommer 2007 in unserer Wohnung von einem Sondereinsatzkommando der Polizei festgenommen. An diesem Tag erfuhren wir, dass ein Verfahren nach § 129a gegen ihn geführt und er also verdächtigt wurde, ein Terrorist zu sein. Er, ich, unsere Verwandten und Freunde und Freundinnen wurden schon seit einem Jahr überwacht. Zwei Monate nach der Festnahme habe ich angefangen, über das Innenleben einer Anti-Terror-Fahnung zu bloggen.\n","original_language":"eng","persons":["Anne Roth"],"tags":["sigint09"],"view_count":112,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-04-10T00:45:04.281+02:00","length":3698,"duration":3698,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3215_de_bloggen_gegen_ueberwachung.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3215_de_bloggen_gegen_ueberwachung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a85c1a72ff670914de-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a85c1a72ff670914de-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3215_de_bloggen_gegen_ueberwachung","url":"https://api.media.ccc.de/public/events/import-a85c1a72ff670914de","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":1301,"event_guid":"import-eac758740ecd962c0b","weight":4},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":2},{"event_id":3767,"event_guid":"0c197c9a-35eb-4780-a38d-9c53b7ff9bea","weight":2},{"event_id":3769,"event_guid":"5e96082f-cea6-41b5-9545-b2bc0b16c377","weight":4}]},{"guid":"import-6946a029b1e5a3aecf","title":"Datenschutz - und was tun die Gewerkschaften?","subtitle":"Fokus Datenschutz für Arbeitnehmer","slug":"SIGINT09_3169_de_datenschutz_und_was_tun_die_gewerkschaften","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3169.en.html","description":"Wenn von \"den Gewerkschaften\" gesprochen wird, handelt es sich im Rahmen dieses Vortrags um den DGB und seine Mitgliedsgewerkschaften, also IG Metall, verdi, IG BAU, IG BCE, GEW, NGG, Gewerkschaft der Polizei und Transnet. Im Vortrag sollen gewerkschaftliche Positionen zum Arbeitnehmerdatenschutz referiert werden, aber auch Ergebnisse einer Studie gezeigt werden, die schon 2007 von verdi beauftragt wurde. Sie belegt, was der Big Brother Award jedes Jahr aufs neue klarmacht: Arbeitnehmerbespitzelung ist betrieblicher Alltag. Der Vortrag basiert auf Material, das vom DGB zur Verfügung gestellt wurde.\n","original_language":"eng","persons":["Guido Brombach"],"tags":["sigint09"],"view_count":32,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-12-10T23:45:07.565+01:00","length":3296,"duration":3296,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3169_de_datenschutz_und_was_tun_die_gewerkschaften.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3169_de_datenschutz_und_was_tun_die_gewerkschaften_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-6946a029b1e5a3aecf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-6946a029b1e5a3aecf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3169_de_datenschutz_und_was_tun_die_gewerkschaften","url":"https://api.media.ccc.de/public/events/import-6946a029b1e5a3aecf","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[]},{"guid":"import-ab8dbcc7631a1e4932","title":"The Aesthetics of our Artificial Habitat","subtitle":"How to come to terms with how beautiful we want the future to be","slug":"SIGINT09_3245_en_the_aesthetics_of_our_artificial_habitat","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3245.en.html","description":"Form does not simply follow function. Form is a function of any artifact, because most of us might be cyborgs, yet we are still living, breathing, sensing beings. If our notion of functionality comprises human pleasure in addition to any specific tasks, a lot of today's technology, from housing and transport to industry and the latest gadgets seems quite dysfunctional. This talk will look at the causes of the obvious ugliness of a lot of current technology, as well as explain why it is far from necessary, and attempt to show some ways how technology could help to optimize this world (and be optimized itself) for human pleasure beyond most people's imagination.\n","original_language":"eng","persons":["Oona Leganovic"],"tags":["sigint09"],"view_count":50,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-11-22T18:30:03.793+01:00","length":3029,"duration":3029,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3245_en_the_aesthetics_of_our_artificial_habitat.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3245_en_the_aesthetics_of_our_artificial_habitat_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-ab8dbcc7631a1e4932-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-ab8dbcc7631a1e4932-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3245_en_the_aesthetics_of_our_artificial_habitat","url":"https://api.media.ccc.de/public/events/import-ab8dbcc7631a1e4932","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":1093,"event_guid":"import-f6a6c03237ef52248e","weight":5},{"event_id":1173,"event_guid":"import-38d07191f3dc94d4de","weight":3},{"event_id":1436,"event_guid":"import-b6cba2c62c6ac212a4","weight":1},{"event_id":1833,"event_guid":"bJDjDUHLd0Y6wLncMd5Unw","weight":1},{"event_id":3380,"event_guid":"f67e27f3-eef4-4233-8e21-a8296b486056","weight":1},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":1},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":1}]},{"guid":"import-545af2bae2a86c1935","title":"Internetzensur in Deutschland","subtitle":"und wie wir damit an der Nase rumgeführt werden","slug":"SIGINT09_3133_de_internetzensur_in_deutschland","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3133.en.html","description":"\"Doppelter dokumentierter Kindesmißbrauch\" – Internetzensur in Deutschland die als \"Internet-Sperren gegen Kinderpornographie\" verkauft wird.\n","original_language":"eng","persons":["scusi"],"tags":["sigint09"],"view_count":58,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-12-28T18:00:11.479+01:00","length":3636,"duration":3636,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3133_de_internetzensur_in_deutschland.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3133_de_internetzensur_in_deutschland_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-545af2bae2a86c1935-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-545af2bae2a86c1935-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3133_de_internetzensur_in_deutschland","url":"https://api.media.ccc.de/public/events/import-545af2bae2a86c1935","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":2381,"event_guid":"04ec4cc0-499d-40c4-9222-134482af8e5f","weight":1},{"event_id":3653,"event_guid":"658b276a-e3a2-4698-b2a8-2edb724be17e","weight":1},{"event_id":3766,"event_guid":"2b9b6095-9dcd-49f3-9792-cf74aab88b16","weight":1}]},{"guid":"import-9e781ed4d04567cfc3","title":"Das neue Grundrecht","subtitle":"...auf Gewährleistung der Vertraulichkeit und Integrität informationstechnischer Systeme","slug":"SIGINT09_3107_de_das_neue_grundrecht","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3107.en.html","description":"Welche Folgen hat das Urteil zur Online-Durchsuchung für die Beschlagnahme und Durchsuchung von informationstechnischen Systemen jenseits des umstrittenen \"Bundestrojaners\"? Wie muß die Praxis von Hausdurchsuchungen und Beschlagnahmungen angepaßt werden angesichts der Tatsache, daß die Mehrzahl der Deutschen privateste Daten auf Handies, Laptops oder PDAs speichert? \n","original_language":"eng","persons":["Constanze Kurz"],"tags":["sigint09"],"view_count":58,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-27T05:30:04.233+01:00","length":3534,"duration":3534,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3107_de_das_neue_grundrecht.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3107_de_das_neue_grundrecht_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-9e781ed4d04567cfc3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-9e781ed4d04567cfc3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3107_de_das_neue_grundrecht","url":"https://api.media.ccc.de/public/events/import-9e781ed4d04567cfc3","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":483,"event_guid":"import-d30458e3d16d8486cd","weight":1},{"event_id":569,"event_guid":"import-742ccaffbef719715b","weight":1},{"event_id":585,"event_guid":"import-d94f5d200796e19ab4","weight":1},{"event_id":1349,"event_guid":"import-c9fb5ca0b9154e1ba1","weight":1},{"event_id":2892,"event_guid":"668ba44b-6800-4a8f-9544-b8e5cd7bd86c","weight":1},{"event_id":3568,"event_guid":"63660fa9-8613-5150-9b8b-1b5cd9cd42ef","weight":1},{"event_id":3855,"event_guid":"868c1ce8-2592-4d61-8de9-e19e36e48fee","weight":1},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":1},{"event_id":4430,"event_guid":"bcae2b4e-90de-44fc-8dbb-8d4de94d6d7c","weight":1},{"event_id":4504,"event_guid":"4f5c59c8-4f8f-59c4-9036-8f4c371a373a","weight":1},{"event_id":5023,"event_guid":"4ad778ab-3c0b-4e74-9f9e-1ff7614e41a1","weight":1},{"event_id":5229,"event_guid":"53464646-4151-2020-2020-202020202020","weight":1}]},{"guid":"import-175ba8821bf875026a","title":"Soziale Medien für politische Kampagnen nutzen","subtitle":"Erfahrungen mit netzpolitik.org","slug":"SIGINT09_3130_de_soziale_medien_fuer_politische_kampagnen_nutzen","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3130.en.html","description":"Soziale Medien wie Blogs und Twitter eignen sich hervorragend zur Kommunikation – und können auch für politische Zwecke eingesetzt werden. Ohne viel Kosten kann man damit neue Kommunikationskanäle aufbauen, über politische Prozesse berichten, diese dokumentieren und kommentieren sowie Kampagnen begleiten und starten. Blogs und soziale Medien sind aber mehr als nur ein Kanal. Durch die Vernetzung vieler Blogs können dezentrale Strukturen entstehen, um schnell Nachrichten und Kampagnen-Informationen zu verteilen und Menschen zu mobilisieren, sich selbst mit Hilfe des Internets politisch zu engagieren und sich an unserer Demokratie zu beteiligen.\n","original_language":"eng","persons":["Markus Beckedahl"],"tags":["sigint09"],"view_count":31,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-12-28T16:45:15.590+01:00","length":3317,"duration":3317,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3130_de_soziale_medien_fuer_politische_kampagnen_nutzen.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3130_de_soziale_medien_fuer_politische_kampagnen_nutzen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-175ba8821bf875026a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-175ba8821bf875026a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3130_de_soziale_medien_fuer_politische_kampagnen_nutzen","url":"https://api.media.ccc.de/public/events/import-175ba8821bf875026a","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":3720,"event_guid":"198bdfe5-24cf-4b2f-9cd5-7522a99b3b4e","weight":1}]},{"guid":"import-710bee847dc2e043f4","title":"Licht in den Vorratsdatendschungel!","subtitle":"Rechte, Pflichten und Rechtsschutz für ISPs","slug":"SIGINT09_3171_de_licht_in_den_vorratsdatendschungel_1","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3171.en.html","description":"Der Rechtsanwalt, der für den Provider QSC eine Einstweilige Verfügung zur Aussetzung des Aufzeichnungsgebots aus der Vorratsdatenspeicherung erwirkt hat, spricht über die juristische Strategie. Es werden die Argumentationen dargestellt, die zu der Entscheidung führten.\n\n \n","original_language":"eng","persons":["Marc Schütze"],"tags":["sigint09"],"view_count":18,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-02-14T18:30:06.333+01:00","length":3347,"duration":3347,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3171_de_licht_in_den_vorratsdatendschungel_1.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3171_de_licht_in_den_vorratsdatendschungel_1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-710bee847dc2e043f4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-710bee847dc2e043f4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3171_de_licht_in_den_vorratsdatendschungel_1","url":"https://api.media.ccc.de/public/events/import-710bee847dc2e043f4","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[]},{"guid":"import-a893e7c0eab6d00e24","title":"Software-Patente. Nicht schon wieder!","subtitle":"Es geht wieder los. Diesmal ist es aber vielleicht das letzte Mal.","slug":"SIGINT09_3257_de_software_patente_nicht_schon_wieder","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3257.en.html","description":"Software ist nicht patentierbar. Das Gesetz besagt eindeutig:\n\"Als [patentierbare] Erfindungen [...] werden insbesondere\nnicht angesehen: [...] Programme für Datenverarbeitungsanlagen.\"\n(Art. 52 Abs. 2c EPÜ)\n","original_language":"eng","persons":["Peter Gerwinski"],"tags":["sigint09"],"view_count":33,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-03-11T16:15:05.798+01:00","length":5023,"duration":5023,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3257_de_software_patente_nicht_schon_wieder.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3257_de_software_patente_nicht_schon_wieder_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a893e7c0eab6d00e24-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a893e7c0eab6d00e24-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3257_de_software_patente_nicht_schon_wieder","url":"https://api.media.ccc.de/public/events/import-a893e7c0eab6d00e24","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":6457,"event_guid":"74b9c748-970f-4693-ac7e-46fcc733d2b4","weight":1}]},{"guid":"import-e591bba87ce939ab3c","title":"Cisco IOS Attack \u0026 Defense","subtitle":"The State of the Art","slug":"SIGINT09_3235_de_cisco_ios_attack_and_defense","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3235.en.html","description":"The talk will cover the past, present and future of Cisco IOS hacking, defense and forensics.\n","original_language":"eng","persons":["FX of Phenoelit"],"tags":["sigint09"],"view_count":148,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-10T20:45:11.190+01:00","length":4018,"duration":4018,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3235_de_cisco_ios_attack_and_defense.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3235_de_cisco_ios_attack_and_defense_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-e591bba87ce939ab3c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-e591bba87ce939ab3c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3235_de_cisco_ios_attack_and_defense","url":"https://api.media.ccc.de/public/events/import-e591bba87ce939ab3c","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":1},{"event_id":481,"event_guid":"import-ef6c8e0fb82a1c1e38","weight":1},{"event_id":495,"event_guid":"import-58eefb24d1e79d9d41","weight":5},{"event_id":516,"event_guid":"import-22af5ccb71466c2ed2","weight":1},{"event_id":646,"event_guid":"import-7af3c11a86c7ca7fca","weight":1},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1035,"event_guid":"import-522b456890530bf341","weight":2},{"event_id":1299,"event_guid":"import-5fa5d5ff35316aaa6c","weight":2},{"event_id":1746,"event_guid":"il4lmTSfWPAY3ks_KW7SHg","weight":4},{"event_id":2326,"event_guid":"870e6541-0633-4a92-a1a6-7f9b5480c838","weight":1},{"event_id":2384,"event_guid":"15a42829-1e83-4ff4-aa1a-c39f6cdf2a15","weight":1},{"event_id":2705,"event_guid":"55fccc39-c1bb-4d05-aa95-7188ad229f56","weight":1},{"event_id":2784,"event_guid":"d23288d1-84a4-11e5-9649-fd71808389dd","weight":1},{"event_id":2987,"event_guid":"9a2446e0-f287-4e92-9030-0df63edef025","weight":1},{"event_id":3340,"event_guid":"d4776b28-450d-5c72-bbcd-16b813808106","weight":1},{"event_id":3662,"event_guid":"8c32309e-7136-4899-8ee4-1558e63ad137","weight":1}]},{"guid":"import-6bc4e7dd356dca7797","title":"Diesel and Dust","subtitle":"Globale Energiepolitik","slug":"SIGINT09_3202_de_diesel_und_dust","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3202.en.html","description":"„I've got the power!“, kreischt ein amerikanischer Pop-Star in die Welt und möchte uns für eine neue Seidenstraße begeistern. „Spiel nicht mit den Schmuddelkindern!“, rät er unserem alten Auto-Kanzler.\n","original_language":"eng","persons":["Georg Fröhlich"],"tags":["sigint09"],"view_count":38,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-11T02:00:00.000+02:00","updated_at":"2025-03-19T14:00:06.011+01:00","length":3389,"duration":3389,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3202_de_diesel_und_dust.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3202_de_diesel_und_dust_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-6bc4e7dd356dca7797-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-6bc4e7dd356dca7797-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3202_de_diesel_und_dust","url":"https://api.media.ccc.de/public/events/import-6bc4e7dd356dca7797","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":1779,"event_guid":"0OMMJkoMY79GCUUx9LULgA","weight":1},{"event_id":2651,"event_guid":"e518b13a-7599-44e7-b8df-7047921a9cdc","weight":2},{"event_id":3548,"event_guid":"2cf17a2b-cfc5-4782-a1eb-91656d073b04","weight":1},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":1},{"event_id":5769,"event_guid":"76ad2dd9-6054-44b4-a969-eb8f1bf87d62","weight":1}]},{"guid":"import-415aa60fed48f010a8","title":"Addressing the Future of Internet","subtitle":null,"slug":"SIGINT09_3194_en_addressing_the_future_of_internet","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3194.en.html","description":"IPv4 addresses are running out. Fast. IPv6 addresses are easily available, but are *you* ready for the dual-stacked Internet? \n","original_language":"eng","persons":["Vesna Manojlovic"],"tags":["sigint09"],"view_count":26,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2019-12-11T01:00:04.110+01:00","length":3008,"duration":3008,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3194_en_addressing_the_future_of_internet.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3194_en_addressing_the_future_of_internet_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-415aa60fed48f010a8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-415aa60fed48f010a8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3194_en_addressing_the_future_of_internet","url":"https://api.media.ccc.de/public/events/import-415aa60fed48f010a8","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":205,"event_guid":"import-17e2f2334e694b4d28","weight":1},{"event_id":3005,"event_guid":"f390d1c8-9712-40bd-a09d-9d7b7508b348","weight":1},{"event_id":3982,"event_guid":"fcc2ffca-3079-5b55-ba27-a676c7b5e8c7","weight":1},{"event_id":5738,"event_guid":"fafacf91-9842-4a5f-bb02-146250450001","weight":1},{"event_id":7268,"event_guid":"7007a0ab-a90c-4c5a-8ff2-e9faa6eba646","weight":1}]},{"guid":"import-ddac0747003f24802c","title":"Keynote Tag 3: The Future of Everything ","subtitle":null,"slug":"SIGINT09_3249_en_keynote_tag3_the_future_of_everything","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3249.en.html","description":"\n","original_language":"eng","persons":["Nick Farr"],"tags":["sigint09"],"view_count":16,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2024-12-10T23:00:03.637+01:00","length":3439,"duration":3439,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3249_en_keynote_tag3_the_future_of_everything.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3249_en_keynote_tag3_the_future_of_everything_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-ddac0747003f24802c-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-ddac0747003f24802c-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3249_en_keynote_tag3_the_future_of_everything","url":"https://api.media.ccc.de/public/events/import-ddac0747003f24802c","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":410,"event_guid":"import-ec05f2b312ee438d99","weight":1},{"event_id":433,"event_guid":"import-8b428ff51202ec0f50","weight":1},{"event_id":474,"event_guid":"import-3fc16fe1d6b73db9ed","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":495,"event_guid":"import-58eefb24d1e79d9d41","weight":1},{"event_id":496,"event_guid":"import-51b51649a35b05d109","weight":1},{"event_id":498,"event_guid":"import-3aa2088aa2c74f093b","weight":1},{"event_id":503,"event_guid":"import-0717a4aa6f9596895b","weight":1},{"event_id":505,"event_guid":"import-81ffbf01f29be799e4","weight":1},{"event_id":515,"event_guid":"import-744e40f528889f912a","weight":1},{"event_id":521,"event_guid":"import-729e44803359d6029d","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":2353,"event_guid":"75324e0b-a58b-4b5a-8b34-3550e2c777d1","weight":1},{"event_id":2354,"event_guid":"85e042c6-c99a-4806-b458-3d2c9bcca279","weight":1},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":1},{"event_id":3892,"event_guid":"0a3ac728-e175-4746-98e2-5f0c0e028f29","weight":1},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":1},{"event_id":5217,"event_guid":"42433839-4355-2020-2020-202020202020","weight":1},{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":1},{"event_id":5239,"event_guid":"524a3859-5641-2020-2020-202020202020","weight":1},{"event_id":5244,"event_guid":"4a473753-5039-2020-2020-202020202020","weight":1}]},{"guid":"import-0ec2ccdadf78748aa9","title":"Richtlinien für staatliche IT","subtitle":"Berliner Manifest: Öffentliche Dienste 2.0","slug":"SIGINT09_3115_de_richtlinien_fuer_staatliche_it","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3115.en.html","description":"Auf der ver.di-Konferenz „Staatliche Verantwortung und Öffentliche Daseinsvorsorge in der Informationsgesellschaft“ im Herbst 2008 verabschiedete unter dem Motto \"Die Daseinsvorsorge in der Informationsgesellschaft stärken!\" eine breites Bündnis (von CCC-Vertretern über den Städte- und Gemeindebund bis hin zum Bundesinnenministerium) das \"Berliner Manifest\". Es setzt Leitideen und Rahmenbedigungen öffentlicher Dienstleistungen des Staates in der Informationsgesellschaft. Auf der SIGINT wird das Manifest durch die Koordinatorin des Prozesses, Annette Mühlberg, vor- und zur offenen Diskussion gestellt.\n","original_language":"eng","persons":["Annette Mühlberg"],"tags":["sigint09"],"view_count":12,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-11T02:00:00.000+02:00","updated_at":"2026-02-13T15:00:10.681+01:00","length":3366,"duration":3366,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3115_de_richtlinien_fuer_staatliche_it.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3115_de_richtlinien_fuer_staatliche_it_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-0ec2ccdadf78748aa9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-0ec2ccdadf78748aa9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3115_de_richtlinien_fuer_staatliche_it","url":"https://api.media.ccc.de/public/events/import-0ec2ccdadf78748aa9","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[]},{"guid":"import-7dd468401a516b773e","title":"Unter Beobachtung","subtitle":"Internet und Strafverfolgung","slug":"SIGINT09_3228_de_unter_beobachtung","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3228.en.html","description":"Das Internet steht unter Beobachtung. Der Vortrag erklärt, was die Ermittlungsbehörden interessiert, wie sie vorgehen und welche Rechte Betroffene haben. \n","original_language":"eng","persons":["Udo Vetter"],"tags":["sigint09"],"view_count":319,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-04-03T05:45:03.823+02:00","length":4117,"duration":4117,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3228_de_unter_beobachtung.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3228_de_unter_beobachtung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-7dd468401a516b773e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-7dd468401a516b773e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3228_de_unter_beobachtung","url":"https://api.media.ccc.de/public/events/import-7dd468401a516b773e","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":569,"event_guid":"import-742ccaffbef719715b","weight":7},{"event_id":609,"event_guid":"import-3cf81cc3f1f6d963b9","weight":11},{"event_id":1163,"event_guid":"import-73f7a87aafc447fa0b","weight":12}]},{"guid":"import-fba1d591e34ecf9093","title":"The Art Of Sound Hacking.","subtitle":"Eine musikalische Reise zu den kreativen Banalitäten des Alltags.","slug":"SIGINT09_3195_de_the_art_of_sound_hacking","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3195.en.html","description":"\"Home Made Sound Electronics\" und der Eingriff mittels Lötkolben im Hardware Hacking sind eine Methode im künstlerischen Gestaltungsprozess und auch als Antwort auf die etablierte, nach Imitation und klangliche Perfektion strebende Musikindustrie zu verstehen. Darüber hinaus versprechen ungewöhnliche Quellen für Sampling-Techniken oder selbstgebaute Instrumente eine Normverletzung gängiger Hörgewohnheiten.\nDiese Strategie der Zweckentfremdung bringt damit jeden erdenklichen Alltagsgegenstand zum Tönen und biegt ihn als vorübergehendes Instrument zurecht. So werden selbst ausgediente Veteranen des technologischen Zeitalters wie Nadeldrucker für eigens kreierte Symphonien angesteuert, Popsongs oder Geräusche aus Schönheits-OPs klanglich verwurstet . \nAber worin liegt der Mehrwert bei technischen Modifikationen angesichts der Subversion und Aneignung in den Klangkarambolagen des Bootlegging und warum ist nicht jeder \"Für Elise\" spielende Scanner ein orginärer Komponist?\n\nMit ausgewählten Musikbeispielen u.a. von Voice Crack, Das Erste Wiener Gemüseorchester, Matmos, The User, Quarta 330, Modified Toy Orchestra, Electric Family, George Coleman.\n\n","original_language":"eng","persons":["Waltraud Blischke"],"tags":["sigint09"],"view_count":137,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-11T02:00:00.000+02:00","updated_at":"2025-12-06T19:30:06.896+01:00","length":3383,"duration":3383,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3195_de_the_art_of_sound_hacking.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3195_de_the_art_of_sound_hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-fba1d591e34ecf9093-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-fba1d591e34ecf9093-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3195_de_the_art_of_sound_hacking","url":"https://api.media.ccc.de/public/events/import-fba1d591e34ecf9093","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":471,"event_guid":"import-c5640107b55f3e08c9","weight":1},{"event_id":514,"event_guid":"import-27d6ce9d4ab21b3e92","weight":1},{"event_id":1122,"event_guid":"import-a24ed08b895b751d60","weight":1},{"event_id":1233,"event_guid":"import-96406013bfdba8987b","weight":1},{"event_id":1362,"event_guid":"import-5f693514aee8848fb2","weight":1},{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":2082,"event_guid":"exuQFfNR0oVP49Bt6g8kPQ","weight":1},{"event_id":2226,"event_guid":"hl9yD87mkTYvOY5J2BIQwQ","weight":1},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":1},{"event_id":2301,"event_guid":"419d4f7e-7506-4d46-8700-e47e164a8e32","weight":1},{"event_id":2438,"event_guid":"ba45991d-6548-4a8f-90d8-da72fd417f89","weight":2},{"event_id":2466,"event_guid":"882370ef-642d-43ba-b91d-22e9e87e9a1f","weight":1},{"event_id":2468,"event_guid":"97cbc2a0-7d63-4d54-9ff6-fb1b8ed30380","weight":1},{"event_id":2470,"event_guid":"c131b08d-e1be-4658-b98a-a223bc746784","weight":1},{"event_id":2530,"event_guid":"a4478dbf-90c0-4633-aa8e-4fe993840089","weight":1},{"event_id":2540,"event_guid":"cd66723d-23cc-40e7-9b76-f9b38dc576ab","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":2901,"event_guid":"b4339927-6780-4881-a342-e7a262078dce","weight":1},{"event_id":2995,"event_guid":"23135566-f6b9-4e08-b7a0-c7454a8e0b23","weight":1},{"event_id":3016,"event_guid":"1d8d0f5b-68e1-47a2-9ffe-5ad5667514a9","weight":1},{"event_id":3079,"event_guid":"a9e0502d-7c27-4303-a965-c5f942adbb2a","weight":1},{"event_id":3470,"event_guid":"9b863067-c910-4528-92ab-f5b021add0ee","weight":1},{"event_id":3616,"event_guid":"e4fbbb8d-0b74-4129-83b7-bda2247175bc","weight":1},{"event_id":3815,"event_guid":"81eaad6b-0c0d-4c69-8388-7509f86e0adc","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":3857,"event_guid":"880588ea-3e65-4eee-a4b9-e240c4c187e8","weight":1},{"event_id":3949,"event_guid":"a57914e1-cd19-4fc6-9d8d-8fdc67c9a651","weight":1},{"event_id":4215,"event_guid":"5e70bcbe-5498-40f6-96ac-51c211b5ec2b","weight":1},{"event_id":4216,"event_guid":"f90b88a0-e43e-46f4-b9ad-373995a520ee","weight":1},{"event_id":4243,"event_guid":"c678a194-0d4a-42a2-b4ef-b19a83459f4c","weight":1},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":1},{"event_id":4367,"event_guid":"f284b8f1-f27b-466e-9084-c3de794f8fd3","weight":1},{"event_id":4865,"event_guid":"0b0a3457-91be-43ea-af21-8e251d8d9322","weight":1},{"event_id":4936,"event_guid":"fa2a2506-f54d-4e3f-9fc2-e808d0a580b6","weight":1},{"event_id":5167,"event_guid":"23c64282-a962-40e5-942e-6739c7cff86c","weight":1},{"event_id":5227,"event_guid":"544e5950-4642-2020-2020-202020202020","weight":1},{"event_id":5819,"event_guid":"4fd19ecd-d015-4329-b825-cd7bc6541674","weight":1},{"event_id":5900,"event_guid":"8943c64d-1b79-5b75-a095-bbe976377d29","weight":1},{"event_id":5923,"event_guid":"5adafa17-0546-5d92-8702-162a4558284b","weight":1},{"event_id":6907,"event_guid":"84147516-2c41-5106-9fc2-d8036f9da837","weight":1}]},{"guid":"import-24cd85e1a04de69b6d","title":"Is (teaching) Hacking Ethical?","subtitle":null,"slug":"SIGINT09_3205_de_is_teaching_hacking_ethical","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3205.en.html","description":"Hacking is usually considered as a criminal act, harming people, data and infrastructure. Hence, courses on hacking are perceived with mixed feelings by the general public.\nThe opposite view on hacking is by those who create, build and administrate IT systems. In their world, hacking is the art of creating beautiful solutions and finding uncommon and effective ways to solve inherent problems.\n","original_language":"eng","persons":["lexi"],"tags":["sigint09"],"view_count":14,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-08-24T04:30:03.235+02:00","length":3150,"duration":3150,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3205_de_is_teaching_hacking_ethical.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3205_de_is_teaching_hacking_ethical_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-24cd85e1a04de69b6d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-24cd85e1a04de69b6d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3205_de_is_teaching_hacking_ethical","url":"https://api.media.ccc.de/public/events/import-24cd85e1a04de69b6d","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4926,"event_guid":"1e5e3f78-dfbe-4aeb-9565-73c395c9f8fc","weight":1},{"event_id":5031,"event_guid":"63141299-3a04-4ce9-b90f-8da3f4f6649a","weight":1}]},{"guid":"import-3062ea750df96590b9","title":"Alternative Vergütungsmodelle","subtitle":"Kulturflatrate, Streetperformer, Spendenbutton?","slug":"SIGINT09_3081_alternative_verguetungsmodelle","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3081.en.html","description":"Creative Commons schön und gut – aber wie lässt sich g'scheit im \"nicht-kommerziellen\" Bereich auch online wieder Geld einspielen? Impulsreferate zu alternativen Vergütungskonzepten und einem neuem Labelbegriff stehen der Diskussion auf dem Podium sowie mit dem Publikum vorweg und werden eine Einführung in das Thema bieten. Wir möchten herausfinden, welche Rolle Künstler, Label und Verwertungsgesellschaften heute sinnvoll einnehmen können.\n","original_language":"eng","persons":["Frank Dommert","Frank Kühl","Robert Drakogiannaki","Stefan Krempl","Volker Grassmuck"],"tags":["sigint09"],"view_count":31,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2019-09-29T01:38:28.683+02:00","length":6246,"duration":6246,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3081_alternative_verguetungsmodelle.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3081_alternative_verguetungsmodelle_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3062ea750df96590b9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3062ea750df96590b9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3081_alternative_verguetungsmodelle","url":"https://api.media.ccc.de/public/events/import-3062ea750df96590b9","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":578,"event_guid":"import-98949d05d9b4d93a54","weight":1},{"event_id":623,"event_guid":"import-d116852c9d91cf26b2","weight":1},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":1},{"event_id":2395,"event_guid":"62b038eb-2975-4065-95ee-09a068dbfb81","weight":1},{"event_id":2959,"event_guid":"83ab70a1-de38-42d3-993e-08024cac1ddg","weight":1},{"event_id":3041,"event_guid":"29aaed8b-5b17-4feb-a9fc-7cc584682746","weight":1},{"event_id":3042,"event_guid":"6f99831e-89d9-4a9f-ab7e-9712d596227d","weight":1},{"event_id":3110,"event_guid":"b7935ff9-54e1-4b97-9ce4-1febd50e6f82","weight":1},{"event_id":3111,"event_guid":"f5dd54b0-b67b-4024-a25e-eb941aeb89aa","weight":1},{"event_id":3112,"event_guid":"c01432ad-d78f-4e16-9e19-22469af9050a","weight":1},{"event_id":3631,"event_guid":"c5d3d09f-f024-45e3-8ed3-07d44d327e0e","weight":1},{"event_id":3635,"event_guid":"86119a7f-cd68-4355-9617-d1b96638fe82","weight":1},{"event_id":4570,"event_guid":"b3cfeacd-ce23-584f-87dd-61202b5251cc","weight":1},{"event_id":4573,"event_guid":"0a06447c-95e2-5d84-b1fc-2601e846ffbe","weight":1},{"event_id":5997,"event_guid":"922dce7b-565d-5a4b-ad22-88d2d4607d98","weight":1}]},{"guid":"import-27d6ce9d4ab21b3e92","title":"Analyse von Daten aus Überwachungsvorgängen; Werkzeuge der Geheimdienste","subtitle":"Die Überwachungsindustrie, Ihre Technologien und Ihre Auswirkungen","slug":"SIGINT09_3226_de_analyse_von_daten_aus_ueberwachungsvorgaengen","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3226.en.html","description":"Die zunehemende Überwachung von Telekommunikationsdaten steht auch im Kontext mit einer neuen Industrie, die Werkzeugs zum analysieren von Datenströmen, Verkehrsdaten und anderen verfügbaren Datenquellen erstellt und verkauft. Diese Software, vermarket als \"Intelligence Support Systems\", bietet den Geheimdienst- \u0026 Kontrollfetischisten die Werkzeugs Ihrer feuchten Träume an.\n","original_language":"eng","persons":["Andy Müller-Maguhn"],"tags":["sigint09"],"view_count":145,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-01-10T03:45:07.225+01:00","length":3268,"duration":3268,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3226_de_analyse_von_daten_aus_ueberwachungsvorgaengen.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3226_de_analyse_von_daten_aus_ueberwachungsvorgaengen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-27d6ce9d4ab21b3e92-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-27d6ce9d4ab21b3e92-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3226_de_analyse_von_daten_aus_ueberwachungsvorgaengen","url":"https://api.media.ccc.de/public/events/import-27d6ce9d4ab21b3e92","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":476,"event_guid":"import-76f8d3a6991dcf7f03","weight":1},{"event_id":480,"event_guid":"import-8a89cf5b26fff8766e","weight":2},{"event_id":490,"event_guid":"import-01080654e07d3f6ea8","weight":1},{"event_id":494,"event_guid":"import-fba1d591e34ecf9093","weight":1},{"event_id":510,"event_guid":"import-7dd468401a516b773e","weight":1},{"event_id":541,"event_guid":"import-89e08070d706035e7a","weight":1},{"event_id":650,"event_guid":"import-673de562b1aeb8a31b","weight":1},{"event_id":683,"event_guid":"import-fb5fe4937619117a96","weight":2},{"event_id":727,"event_guid":"import-36ab6d2a93d3fc6e96","weight":1},{"event_id":1364,"event_guid":"import-0c9237b79e075b6815","weight":1},{"event_id":1746,"event_guid":"il4lmTSfWPAY3ks_KW7SHg","weight":1},{"event_id":2107,"event_guid":"tzOmjwXgN1q75klvZ9nPrA","weight":2},{"event_id":2355,"event_guid":"313301b4-c823-492c-99b7-bd5e4e60943a","weight":1},{"event_id":2507,"event_guid":"2e6e3f84-3f82-4e72-981e-fd90e23d8112","weight":1},{"event_id":2515,"event_guid":"b8a7511e-143d-45c5-b974-2e91dab18814","weight":1},{"event_id":2528,"event_guid":"6393a33b-889d-4850-b0e3-cbc7caeab1cb","weight":1},{"event_id":3395,"event_guid":"fb6854da-6ee9-4dd4-b8db-ef69ea33cc36","weight":1},{"event_id":4418,"event_guid":"00ac6281-8db2-47af-9b12-22f9404368ac","weight":2},{"event_id":4687,"event_guid":"5c8efab1-6819-49b0-bccd-0393dd7f3ade","weight":1},{"event_id":4693,"event_guid":"7180f36d-9892-4596-8173-a1b5899569c3","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":5738,"event_guid":"fafacf91-9842-4a5f-bb02-146250450001","weight":1},{"event_id":5830,"event_guid":"1f3a0237-0515-4cdb-90ac-d57f7bc85586","weight":1}]},{"guid":"import-cfc5912dc710f2c509","title":"Der Abmahnwahn in Deutschland","subtitle":"Filesharing und die rechtlichen Konsequenzen","slug":"SIGINT09_3179_der_abmahnwahn_in_deutschland","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3179.en.html","description":"Die Musikindustrie drohte kürzlich mit bis zu 1000 Abmahnungen monatlich. Die aktuelle Anzahl an Abmahnungen gegen die Teilnehmer der Peer-To-Peer-Börsen dürfte nicht weit darunter liegen, die genauen Zahlen sind unbekannt.\n","original_language":"eng","persons":["Lars Sobiraj"],"tags":["sigint09"],"view_count":52,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-02-12T20:00:07.328+01:00","length":3156,"duration":3156,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3179_der_abmahnwahn_in_deutschland.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3179_der_abmahnwahn_in_deutschland_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-cfc5912dc710f2c509-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-cfc5912dc710f2c509-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3179_der_abmahnwahn_in_deutschland","url":"https://api.media.ccc.de/public/events/import-cfc5912dc710f2c509","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":481,"event_guid":"import-ef6c8e0fb82a1c1e38","weight":1}]},{"guid":"import-01080654e07d3f6ea8","title":"Die Zukunft des Krieges","subtitle":"Cyberwarfare und seine Einbindung in die Kriegsführung","slug":"SIGINT09_3157_die_zukunft_des_krieges","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3157.en.html","description":"Die wirtschaftlichen, politischen und militärischen Prozesse des\nSteuerns und Entscheidens, des Kommandierens und des Wahrnehmens sind\nmittlerweile eng informationstechnisch strukturiert. Ein Ausfall oder\ndie Übernahme der Technik in diesen Bereichen käme oft dem Ausfall oder\nder Kontrolle gesellschaftlicher Grundlagen gleich. Damit ergibt sich\nmilitärische Relevanz. Informationstechnologien sind zu attraktiven\nZielen gewachsen, und ein neuer Zweig der Kriegsführung entsteht:\nCyberwarfare.\n","original_language":"eng","persons":["Sandro Gaycken"],"tags":["sigint09"],"view_count":105,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-04-10T01:45:03.622+02:00","length":3515,"duration":3515,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3157_die_zukunft_des_krieges.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3157_die_zukunft_des_krieges_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-01080654e07d3f6ea8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-01080654e07d3f6ea8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3157_die_zukunft_des_krieges","url":"https://api.media.ccc.de/public/events/import-01080654e07d3f6ea8","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":476,"event_guid":"import-76f8d3a6991dcf7f03","weight":3},{"event_id":1657,"event_guid":"import-eca9dd6a5ceffbdef9","weight":4},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":2},{"event_id":3581,"event_guid":"9c6d3dca-ef43-548a-97e8-b574b8e08891","weight":3}]},{"guid":"import-8e09678728188bebdf","title":"Sollte Sicherheitstechnik demokratisiert werden?","subtitle":"Ein fordernder Blick auf das Verhältnis von Technik und Politik","slug":"SIGINT09_3158_de_sollte_sicherheitstechnik_demokratisiert_werden","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3158.en.html","description":"Insbesondere in der Sicherheitspolitik spielt Technik immer wieder eine zentrale Rolle. Sie ermöglicht und bedingt gleichermaßen Strategien, Doktrinen, Vorgehensweisen und Gesetze. Trotz dieser dominanten und gesellschaftsstrukturierenden Rolle ist allerdings grundlegend unklar, ob und wie Sicherheitstechnik besonders politisiert werden soll. Mein Vortrag will sich mit dieser Frage beschäftigen und anhand der feststellbaren wechselseitigen Einwirkungen von Technik und Politik aufeinander Eingriffspunkte für politisches Handeln feststellen. Normative Forderungen für eine \"Technopolitik\" sollen aufgestellt werden.\n","original_language":"eng","persons":["Sandro Gaycken"],"tags":["sigint09"],"view_count":15,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2024-04-24T20:15:03.723+02:00","length":3746,"duration":3746,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3158_de_sollte_sicherheitstechnik_demokratisiert_werden.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3158_de_sollte_sicherheitstechnik_demokratisiert_werden_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-8e09678728188bebdf-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-8e09678728188bebdf-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3158_de_sollte_sicherheitstechnik_demokratisiert_werden","url":"https://api.media.ccc.de/public/events/import-8e09678728188bebdf","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":80,"event_guid":"import-1cedebc2373b808760","weight":1},{"event_id":490,"event_guid":"import-01080654e07d3f6ea8","weight":1},{"event_id":910,"event_guid":"import-94276250016fb6922a","weight":2},{"event_id":1429,"event_guid":"import-491788383a692aaae6","weight":2},{"event_id":4646,"event_guid":"3e4263fb-2d17-486b-8f41-24b19ef64ffb","weight":1},{"event_id":4649,"event_guid":"0386da26-f42d-4808-a965-a5f9a0469d79","weight":1},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":1},{"event_id":5971,"event_guid":"1b238da1-4d57-5951-8dea-abf09df92f3e","weight":1},{"event_id":6462,"event_guid":"23e85d7a-9645-4ae2-9954-63b71abc08d4","weight":1}]},{"guid":"import-3fc16fe1d6b73db9ed","title":"Harsh Conditions","subtitle":"Eine Rollenspiel-Extravaganza","slug":"SIGINT09_3239_en_harsh_conditions","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3239.en.html","description":"monochrom will bring good old role-playing to the big stage.\n\n","original_language":"eng","persons":["Johannes Grenzfurthner"],"tags":["sigint09"],"view_count":7,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2021-12-26T18:00:13.869+01:00","length":6901,"duration":6901,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3239_en_harsh_conditions.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3239_en_harsh_conditions_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3fc16fe1d6b73db9ed-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3fc16fe1d6b73db9ed-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3239_en_harsh_conditions","url":"https://api.media.ccc.de/public/events/import-3fc16fe1d6b73db9ed","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":515,"event_guid":"import-744e40f528889f912a","weight":1},{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1},{"event_id":521,"event_guid":"import-729e44803359d6029d","weight":1}]},{"guid":"import-284134e58b95a61653","title":"Kommunikationsguerilla revisited: Multitude und Subversion","subtitle":"Zur politischen Ökonomie der Symbole, Zeichen und Codes im Kognitiven Kapitalismus","slug":"SIGINT09_3234_de_kommunikationsguerilla_revisited","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3234.en.html","description":"Ausgehend von Formen politischer Praxis, wie sie in den 1990er Jahren im „ Handbuch der Kommunikationsguerilla“ beschreiben wurden, untersuchen die Autorinnen, in welcher Weise die gesellschaftlichen Veränderungen der letzten Dekade die Bedingungen für politischen Dissens, Protest und Subversion neu definieren. \n","original_language":"eng","persons":["autonome a.f.r.i.k.a. gruppe","Sonja Brünzels"],"tags":["sigint09"],"view_count":122,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-11-03T14:45:07.530+01:00","length":3743,"duration":3743,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3234_de_kommunikationsguerilla_revisited.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3234_de_kommunikationsguerilla_revisited_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-284134e58b95a61653-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-284134e58b95a61653-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3234_de_kommunikationsguerilla_revisited","url":"https://api.media.ccc.de/public/events/import-284134e58b95a61653","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":1604,"event_guid":"import-006ecab1019284581b","weight":1},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":1}]},{"guid":"import-7e5f87b74359ab5ee0","title":"Es gibt keinen Löffel? Dann druck doch einen neuen aus!","subtitle":"How the internet, open source and fabbing are making everyone a maker.","slug":"SIGINT09_3197_de_es_gibt_keinen_loeffel_dann_druck_doch_einen_neuen_aus","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3197.en.html","description":"Das Internet hat die Verbreitung von Wissen und Kreativität demokratisiert. Wie schaffen wir es, diese Möglichkeiten der digitalen Welt auch auf die Produktion von echten Gegenständen auszuweiten (und warum können unsere Großeltern uns dabei helfen)?\n","original_language":"eng","persons":["Philip Steffan"],"tags":["sigint09"],"view_count":10,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2023-06-26T07:00:02.058+02:00","length":3499,"duration":3499,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3197_de_es_gibt_keinen_loeffel_dann_druck_doch_einen_neuen_aus.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3197_de_es_gibt_keinen_loeffel_dann_druck_doch_einen_neuen_aus_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-7e5f87b74359ab5ee0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-7e5f87b74359ab5ee0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3197_de_es_gibt_keinen_loeffel_dann_druck_doch_einen_neuen_aus","url":"https://api.media.ccc.de/public/events/import-7e5f87b74359ab5ee0","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":17,"event_guid":"import-c264bc85b41adf308a","weight":1},{"event_id":490,"event_guid":"import-01080654e07d3f6ea8","weight":1},{"event_id":2846,"event_guid":"527d5a8e-841d-48ad-89d9-b62fbee741b8","weight":1},{"event_id":2920,"event_guid":"d516ffe3-d32d-4bed-8289-09d245ac2b2f","weight":1},{"event_id":2925,"event_guid":"e1efc11e-170c-4234-9ac0-4451a6631b01","weight":1},{"event_id":3560,"event_guid":"21141199-d313-4a9f-83b0-e81089a07fee","weight":1}]},{"guid":"import-b3b15026deb16aa1a6","title":"Technology transfer, surveillance technology and traffic from the east to the west ","subtitle":"Recognizing the value of industrial espionage and friendship between the East and West after the Cold War ","slug":"SIGINT09_3123_en_technology_transfer_from_the_east_to_the_west","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3123.en.html","description":"Me, as an information dealer from the East, I am trying to facilitate the selling of the best ideas and technology from the East to the West. Sebastian Big, a citizen from the Maramures region in Romania (now living in Amsterdam) wants to sell this user-friendly surveillance technology to the powers of the West. Because it is cheap, do-it-yourself, recyclable, efficient and has a long pedigree.\n","original_language":"eng","persons":["megatron"],"tags":["sigint09"],"view_count":26,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2024-01-04T19:00:04.132+01:00","length":2561,"duration":2561,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3123_en_technology_transfer_from_the_east_to_the_west.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3123_en_technology_transfer_from_the_east_to_the_west_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-b3b15026deb16aa1a6-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-b3b15026deb16aa1a6-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3123_en_technology_transfer_from_the_east_to_the_west","url":"https://api.media.ccc.de/public/events/import-b3b15026deb16aa1a6","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":2147,"event_guid":"OQzXwQcnHSLD9Qd7Iu7Rqw","weight":1},{"event_id":5243,"event_guid":"41524d50-3344-2020-2020-202020202020","weight":1},{"event_id":6408,"event_guid":"ffdc92f3-1a39-4931-9409-f8bfabe9f628","weight":1},{"event_id":6474,"event_guid":"f58a2b6d-bde0-483b-a8db-043ea9371cb6","weight":1}]},{"guid":"import-d30458e3d16d8486cd","title":"ePass und ePA","subtitle":"Fingerzeig auf Unsicherheiten in Prozeß und Hardware","slug":"SIGINT09_3139_de_epass_und_epa","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3139.en.html","description":"Status Quo und Neuigkeiten um den eingeführten ePass, den kommenden elektronischen Personalausweis und die biometrische Vollerfassung.\n","original_language":"eng","persons":["Constanze Kurz","starbug"],"tags":["sigint09"],"view_count":655,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-02-11T12:00:10.794+01:00","length":4126,"duration":4126,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3139_de_epass_und_epa.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3139_de_epass_und_epa_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-d30458e3d16d8486cd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-d30458e3d16d8486cd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3139_de_epass_und_epa","url":"https://api.media.ccc.de/public/events/import-d30458e3d16d8486cd","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":1314,"event_guid":"import-48cba9fbb65a92437f","weight":7},{"event_id":1469,"event_guid":"import-7cc5774ada31a7936e","weight":11},{"event_id":2980,"event_guid":"c2724e07-7ce6-41ba-b88b-00bbe950e98b","weight":2},{"event_id":3851,"event_guid":"a2b0d408-3f34-11e7-a2ff-b7e0ed5cc95f","weight":3}]},{"guid":"import-8a89cf5b26fff8766e","title":"Die Politik von Deep Packet Inspection","subtitle":"Wozu es genutzt werden kann, wofür es wirklich genutzt wird, und warum.","slug":"SIGINT09_3148_de_die_politik_von_deep_packet_inspection","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3148.en.html","description":"Ein Überblick über die verschiedenen Use-Cases für DPI, die vielfältigen\nArten, es zu regulieren, und einige der damit verbundenen politischen\nKämpfe um die Zukunft des Internet.\n","original_language":"eng","persons":["Ralf Bendrath"],"tags":["sigint09"],"view_count":113,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-17T04:15:02.813+01:00","length":3538,"duration":3538,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3148_de_die_politik_von_deep_packet_inspection.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3148_de_die_politik_von_deep_packet_inspection_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-8a89cf5b26fff8766e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-8a89cf5b26fff8766e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3148_de_die_politik_von_deep_packet_inspection","url":"https://api.media.ccc.de/public/events/import-8a89cf5b26fff8766e","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":510,"event_guid":"import-7dd468401a516b773e","weight":1},{"event_id":514,"event_guid":"import-27d6ce9d4ab21b3e92","weight":2},{"event_id":519,"event_guid":"import-4a2eb06af5fc1e18d0","weight":1},{"event_id":600,"event_guid":"import-7a1e18a97f9b81e0d5","weight":2},{"event_id":1059,"event_guid":"import-38355af6e03d054ba5","weight":1},{"event_id":1522,"event_guid":"import-fc5a355c43b4c15caa","weight":1}]},{"guid":"import-c5640107b55f3e08c9","title":"Paranoid Machines","subtitle":"threads of symptom and haunting woven throughout the history of mnemotechnics","slug":"SIGINT09_3121_en_paranoid_machines","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3121.en.html","description":"From the supernatural mass murder which inspired the Arts of Memory to the atomic alien conspiracies which spawned the Web, information technology has always been paranoid. \n","original_language":"eng","persons":["Jason Brown"],"tags":["sigint09"],"view_count":68,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-01-11T04:45:08.142+01:00","length":3565,"duration":3565,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3121_en_paranoid_machines.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3121_en_paranoid_machines_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-c5640107b55f3e08c9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-c5640107b55f3e08c9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3121_en_paranoid_machines","url":"https://api.media.ccc.de/public/events/import-c5640107b55f3e08c9","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":494,"event_guid":"import-fba1d591e34ecf9093","weight":1},{"event_id":1922,"event_guid":"z4naKshLFP7r0hyPJ3cLBA","weight":1},{"event_id":2826,"event_guid":"9ab1407a-126f-48d9-898d-eae7974324e9","weight":1},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":1},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":1},{"event_id":4883,"event_guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","weight":1}]},{"guid":"import-3a4a349a0c53f623e1","title":"Yes we can! Yes we will!","subtitle":"Free Software for a new society","slug":"SIGINT09_3192_de_yes_we_can_yes_we_will","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3192.en.html","description":"Vor zehn Jahren hat das Projekt Oekonux begonnen, das Phänomen Freier Software mit einer politischen Perspektive zu analysieren. Die Projektteilnehmer und Projektteilnehmerinnen möchten wissen, wie das Phänomen Freie Software verstanden werden kann und welches Potential für eine fundamentale gesellschaftliche Änderung Freie Software besitzt. Mittlerweile gibt es Projekte wie Wikipedia und Peer Production we in Freier Software wird zunehmend sichtbar.\n","original_language":"eng","persons":["Stefan Merten"],"tags":["sigint09"],"view_count":13,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-05-28T01:30:03.406+02:00","length":3714,"duration":3714,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3192_de_yes_we_can_yes_we_will.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3192_de_yes_we_can_yes_we_will_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3a4a349a0c53f623e1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3a4a349a0c53f623e1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3192_de_yes_we_can_yes_we_will","url":"https://api.media.ccc.de/public/events/import-3a4a349a0c53f623e1","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":386,"event_guid":"import-0288d2a0c41dbb9abc","weight":1},{"event_id":403,"event_guid":"import-0e985d166abdaa09a4","weight":1},{"event_id":409,"event_guid":"import-92e1d710c3d864d874","weight":1},{"event_id":411,"event_guid":"import-669f7f97f2f1709469","weight":1},{"event_id":415,"event_guid":"import-8451e6396a295cee92","weight":1},{"event_id":426,"event_guid":"import-d5ed7e29ab1153d0cf","weight":1},{"event_id":489,"event_guid":"import-f0bc5ef5dcba88e3c1","weight":1},{"event_id":496,"event_guid":"import-51b51649a35b05d109","weight":1},{"event_id":501,"event_guid":"import-a85c1a72ff670914de","weight":1},{"event_id":569,"event_guid":"import-742ccaffbef719715b","weight":1},{"event_id":584,"event_guid":"import-09216dd510bd5fe02f","weight":1},{"event_id":1976,"event_guid":"b0167f2efcd6a228","weight":1},{"event_id":2733,"event_guid":"a990a339-b544-47e7-a5d6-1f2650d18e2a","weight":1},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":1}]},{"guid":"import-377d765ea160f5efc2","title":"DDoS gegen das GG?","subtitle":"Die Gesetzesvorhaben in Sachen Sicherheit...","slug":"SIGINT09_3177_de_ddos_gegen_das_gg","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3177.en.html","description":"Gesetze zur Verbesserung der Sicherheitslage werden wöchentlich vorgeschlagen oder diskutiert. Werden dabei die Grundrechte hinreichend beachtet?\n","original_language":"eng","persons":["RA Dominik Boecker"],"tags":["sigint09"],"view_count":37,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-11T02:00:00.000+02:00","updated_at":"2026-02-15T20:30:08.504+01:00","length":3366,"duration":3366,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3177_de_ddos_gegen_das_gg.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3177_de_ddos_gegen_das_gg_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-377d765ea160f5efc2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-377d765ea160f5efc2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3177_de_ddos_gegen_das_gg","url":"https://api.media.ccc.de/public/events/import-377d765ea160f5efc2","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":507,"event_guid":"import-f33f66116fd61622e2","weight":1},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":1},{"event_id":3853,"event_guid":"efeeaebc-3f29-11e7-9ba7-2f214305c877","weight":1},{"event_id":4644,"event_guid":"b607796c-ce58-43ee-afbd-f5fe2008ac66","weight":1}]},{"guid":"import-0717a4aa6f9596895b","title":"Das Snafu-Prinzip","subtitle":"Wie Hierarchien Kommunikation verhindern","slug":"SIGINT09_3203_de_das_snafu_prinzip","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3203.en.html","description":"“Mit dem Akronym der beliebten US-Army-Diagnose »Situation normal all fucked-up« hatte Robert Anton Wilson einst beschrieben, wie die Kommunikationsstrukturen in vertikalen Organisationen arbeiten. Aus Angst wird in der Rangordnung von unten nach oben positiv ausgefiltert, also gelogen. Je weiter oben sich jemand in der Prestigepyramide befindet, desto verzerrter wird sein Bild von der Welt; wird ihm das klar, kann er es trotzdem kaum abstellen und verfällt der Paranoia. Populäres Beispiel für Snafu ist der über 100jährige Großkapitalist Monty Burns bei den »Simpsons«, dem von seiner Umgebung nur untertänigst begegnet wird und der in einer immer schrulligeren Welt voller Oldtimer und verblichener Präsidenten lebt.”\n\nAus dem “Phrasenprüfer”\n","original_language":"eng","persons":["classless Kulla"],"tags":["sigint09"],"view_count":684,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-04-02T15:00:05.578+02:00","length":3169,"duration":3169,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3203_de_das_snafu_prinzip.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3203_de_das_snafu_prinzip_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-0717a4aa6f9596895b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-0717a4aa6f9596895b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3203_de_das_snafu_prinzip","url":"https://api.media.ccc.de/public/events/import-0717a4aa6f9596895b","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":124,"event_guid":"import-4ef0accbc71134a330","weight":1},{"event_id":481,"event_guid":"import-ef6c8e0fb82a1c1e38","weight":1},{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1},{"event_id":538,"event_guid":"import-7a8d7cd7685ff4574a","weight":5},{"event_id":933,"event_guid":"import-d928c1ca02266729e6","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":1225,"event_guid":"import-693a7916772f61c4c9","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1302,"event_guid":"import-ec1c4bafaa3e2f5449","weight":1},{"event_id":1661,"event_guid":"import-f96ec72f41d4dca7d6","weight":1},{"event_id":2172,"event_guid":"ELK9-ZQeFcqKxBYW8eay8g","weight":1},{"event_id":2472,"event_guid":"e8d65b1e-ce8a-4307-b056-e8b60461c825","weight":1},{"event_id":2534,"event_guid":"0e66ac36-d9c6-4900-b532-4f651dd39582","weight":1},{"event_id":2663,"event_guid":"43013560-543a-45d5-b96e-5e113c863b6f","weight":1},{"event_id":2986,"event_guid":"f361b88c-3b05-45c6-bbff-6aaa6fd41b50","weight":1},{"event_id":3156,"event_guid":"KROCEGraOskISuupZHUVIQ","weight":1},{"event_id":3676,"event_guid":"f6811c99-96af-44d5-b82d-5afe826b2caf","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":1},{"event_id":3892,"event_guid":"0a3ac728-e175-4746-98e2-5f0c0e028f29","weight":1},{"event_id":4351,"event_guid":"06f3958c-0e2c-4dfc-804c-9493fae7fe9b","weight":1},{"event_id":4431,"event_guid":"50b2cf5f-cc9b-49ef-bc7b-39bb383bf253","weight":1},{"event_id":4437,"event_guid":"f19a25cd-c6b5-44ab-a5b0-19c43a7e0abe","weight":1},{"event_id":4470,"event_guid":"d5ad9c64-0e65-4ee2-bc2b-feb9c7faa1c6","weight":1},{"event_id":4569,"event_guid":"2017bf48-f589-5de0-af34-e19076559508","weight":1},{"event_id":4632,"event_guid":"caeece7b-a23c-4863-ba1b-f3cdde62a1b3","weight":1},{"event_id":5090,"event_guid":"2180ad03-5c90-5099-a00b-a9be0f719900","weight":1},{"event_id":5727,"event_guid":"702996dd-0853-4d00-81e2-3e39cae19500","weight":1},{"event_id":5820,"event_guid":"d285cec6-c1b3-41bc-bb28-ed499609bd2e","weight":1},{"event_id":6507,"event_guid":"787007cf-828d-4409-94b0-90a0b8d727a0","weight":1},{"event_id":6735,"event_guid":"b7640bd5-2810-53ee-8b8e-b5f8472add1f","weight":1}]},{"guid":"import-3c1a01df08f075d5a8","title":"The Innermost Unifier: The Corporate Anthem","subtitle":"Work, Music and Control","slug":"SIGINT09_3238_en_the_innermost_unifier","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3238.en.html","description":"The Innermost Unifier: Today it's the Corporate Anthem\nA talk/audio performance by Johannes Grenzfurthner, monochrom (Vienna, Austria)\n\nUsing different historical and current examples (especially from the area of the hardware/software-industry), Johannes Grenzfurthner gives a theoretical and applied - and not unamusing - overview on the musical genre of corporate anthems.\nCome and sing along. Powernapping is welcome, too.\n","original_language":"eng","persons":["Johannes Grenzfurthner"],"tags":["sigint09"],"view_count":86,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2023-08-22T19:30:03.558+02:00","length":4758,"duration":4758,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3238_en_the_innermost_unifier.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3238_en_the_innermost_unifier_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3c1a01df08f075d5a8-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3c1a01df08f075d5a8-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3238_en_the_innermost_unifier","url":"https://api.media.ccc.de/public/events/import-3c1a01df08f075d5a8","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":99,"event_guid":"import-38b13899aa39910195","weight":1},{"event_id":579,"event_guid":"import-c0e772f8f666217a65","weight":1},{"event_id":1111,"event_guid":"import-f7a9d70ee5cd203be2","weight":2},{"event_id":1192,"event_guid":"import-76fbd1cf41edc25067","weight":1},{"event_id":5863,"event_guid":"42163914-9c80-5fdb-b322-eefd772041c6","weight":1},{"event_id":5884,"event_guid":"19410fc9-3856-5142-b8e0-97dff6c415ad","weight":1}]},{"guid":"import-9291551452e3da2a0d","title":"Open Government","subtitle":"Anforderungen an das maschinenlesbare Staatswesen","slug":"SIGINT09_3131_de_open_government","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3131.en.html","description":"Nach einem Blick auf das hiesige Angebot des Staats in der digitalen Welt wird Markus Beckedahl einen Blick über den Tellerrand werfen und auf wegweisende IT-Projekte in anderen Ländern aufmerksam machen. In der anschließenden Diskussion soll erörtert werden, welche Prinzipien sowohl für die technische Umsetzung als auch die organisatorische Einbettung der Prozesse wichtig sind. Fragen des Datenschutzes im technisierten Staatswesen sollen ebenso aufgeworfen und die alte CCC-Forderung nach einer Maschinenlesbaren Regierung weiter ausformuliert werden.\n","original_language":"eng","persons":["Andreas Bogk","Annette Mühlberg","Markus Beckedahl","Markus Heidmeier"],"tags":["sigint09"],"view_count":36,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-02-12T12:45:09.925+01:00","length":6332,"duration":6332,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3131_de_open_government.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3131_de_open_government_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-9291551452e3da2a0d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-9291551452e3da2a0d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3131_de_open_government","url":"https://api.media.ccc.de/public/events/import-9291551452e3da2a0d","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":106,"event_guid":"import-c6b33fcb2523d7b8e4","weight":1},{"event_id":223,"event_guid":"import-30b3f90fd9c7a149dd","weight":1},{"event_id":536,"event_guid":"import-6e86cf78ae6a909608","weight":2},{"event_id":613,"event_guid":"import-4669325c0b3c2bec9e","weight":1},{"event_id":790,"event_guid":"import-c429172db8cd508503","weight":1},{"event_id":971,"event_guid":"import-f8d674bfb833cf8fe0","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1508,"event_guid":"import-013a0ed46953531289","weight":1},{"event_id":1688,"event_guid":"import-4cdbb5158fcf67d436","weight":1},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":2},{"event_id":2311,"event_guid":"29dbd740-b1c8-476d-b8f1-ad98df418bb7","weight":1},{"event_id":2406,"event_guid":"680d0aea18aa6ba03f104efcd2bac2f3","weight":1},{"event_id":2757,"event_guid":"303801f5-9eaf-41a9-9022-92dc5cd702d2","weight":1},{"event_id":2760,"event_guid":"2cddcb2a-8f50-41bd-9a55-9691b6abc4bc","weight":1},{"event_id":3038,"event_guid":"cf873495-8beb-47f3-a303-4893400ecf30","weight":1},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":1},{"event_id":5268,"event_guid":"d154dae1-b03c-4533-8c15-b882ffa5ca3a","weight":1},{"event_id":5726,"event_guid":"699d4df8-182e-11e8-a51e-1766dd9762f3","weight":1},{"event_id":5992,"event_guid":"efb89c51-5b9e-597e-8110-18b21c9e3ca2","weight":1},{"event_id":7315,"event_guid":"3be7f020-f202-4ae8-bdec-853e86554252","weight":1},{"event_id":7501,"event_guid":"a4aa4222-f2ca-5e0c-94f6-4c7a3595d1a2","weight":1},{"event_id":7523,"event_guid":"a95cf31f-07d2-5255-bfa2-6fb38923a15f","weight":1},{"event_id":7587,"event_guid":"1dac21fe-e493-541b-8e5f-ba1c1f15db2c","weight":1},{"event_id":7594,"event_guid":"9f3b41cc-dc93-55d8-a318-7b7740109b71","weight":1},{"event_id":7673,"event_guid":"89f564bf-e743-5086-a372-478a49b0d7ce","weight":1}]},{"guid":"import-3aa2088aa2c74f093b","title":"Greenpeace Campaigning 2.0","subtitle":"Aktionen auf der Straße und im Web","slug":"SIGINT09_3084_de_greenpeace_campaigning_2punkt0","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3084.en.html","description":"Greenpeace ergänzt und modernisiert seine Kampagnenkommunikation im Netz. Unsere Strategie ist es die Aktivitäten auf der Straße mit den Aktivitäten im Netz zu verbinden, um so den Druck zur Veränderung in Politik und Industrie zu verstärken. Einen großen Schritt nach vorne auf diesem Weg bedeutet der Start der Kampagnen-Plattform \"GreenAction.de\". Mit GreenAction startet Greenpeace die erste Kampagnen-Plattform für Umweltthemen, die allen offen steht. Die Community organsiert und kommuniziert eine medienunabhängige Gegenöffentlichkeit. Wir führen die Menschen aus unterschiedlichen Zielgruppen an einem Ort und auf einer Plattform zu einer Community zusammen, geben ihnen eine Stimme und zeigen ihnen, dass sie etwas verändern können. Jeder Einzelne erfährt jetzt, was sein Engagement bewirkt und wie Gegner reagieren. \n","original_language":"eng","persons":["Volker Gaßner"],"tags":["sigint09"],"view_count":14,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-01-30T11:30:06.055+01:00","length":2704,"duration":2704,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3084_de_greenpeace_campaigning_2punkt0.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3084_de_greenpeace_campaigning_2punkt0_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3aa2088aa2c74f093b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-3aa2088aa2c74f093b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3084_de_greenpeace_campaigning_2punkt0","url":"https://api.media.ccc.de/public/events/import-3aa2088aa2c74f093b","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1},{"event_id":7454,"event_guid":"da999f3a-edf0-590a-85f8-37cb00cf21d9","weight":1}]},{"guid":"import-a3fcc2760e7f838c9b","title":"Dancing: Direct Action in Disguise","subtitle":"New Strategies for Street Protest","slug":"SIGINT09_3207_en_dancing_direct_action_in_disguise","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3207.en.html","description":"Why do we demonstrate? Why do we go out into the streets and march for what we believe in? Marching in solidarity for your beliefs is a powerful personal experience. However, as a method of communicating an outward message, it is frequently twisted and manipulated against the purposes direct action seeks to advocate. Peaceful demonstrations in the US occasionally fall prey to provocateurs, devolve into riots or become targets for illegal detention. What to do about it? Dance!  \n","original_language":"eng","persons":["Nick Farr"],"tags":["sigint09"],"view_count":10,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2023-09-04T01:00:02.408+02:00","length":2641,"duration":2641,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3207_en_dancing_direct_action_in_disguise.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3207_en_dancing_direct_action_in_disguise_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a3fcc2760e7f838c9b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a3fcc2760e7f838c9b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3207_en_dancing_direct_action_in_disguise","url":"https://api.media.ccc.de/public/events/import-a3fcc2760e7f838c9b","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":428,"event_guid":"import-aac153935209b2785c","weight":1}]},{"guid":"import-4a2eb06af5fc1e18d0","title":"Technologie, Überwachung und Privatheit im historischen Wandel","subtitle":"Warum das Panoptikon nicht das Modell für heute ist","slug":"SIGINT09_3149_de_technologie_ueberwachung_und_privatheit_im_historischen_wandel","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3149.en.html","description":"Überwachung als das systematische Beobachten zur Kontrolle von Menschen ist historisch nichts neues. Die zu Grunde liegenden Technologien haben sich allerdings in den letzten 150 Jahren gewandelt, und damit haben sich auch die Prinzipien und Praktiken der Überwachung verändert.\n","original_language":"eng","persons":["Ralf Bendrath"],"tags":["sigint09"],"view_count":100,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-02T03:15:04.194+01:00","length":3583,"duration":3583,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3149_de_technologie_ueberwachung_und_privatheit_im_historischen_wandel.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3149_de_technologie_ueberwachung_und_privatheit_im_historischen_wandel_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-4a2eb06af5fc1e18d0-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-4a2eb06af5fc1e18d0-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3149_de_technologie_ueberwachung_und_privatheit_im_historischen_wandel","url":"https://api.media.ccc.de/public/events/import-4a2eb06af5fc1e18d0","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":480,"event_guid":"import-8a89cf5b26fff8766e","weight":1}]},{"guid":"import-76f8d3a6991dcf7f03","title":"Horch mal, wer da funkt","subtitle":"Signal Intelligence selbstgemacht","slug":"SIGINT09_3072_de_horch_mal_wer_da_funkt","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3072.en.html","description":"Dank der ständig wachsenden Leistungsansprüche der Gaming-Community steht heutzutage in jedem Kinderzimmer mehr Signalverarbeitungskapazität als noch vor 10 Jahren in so mancher Dienststelle.  Der Vortrag möchte zeigen, wie man mit Hilfe von GNU Radio und USRP sowie Baudline Funksignalaufklärung für den Heimgebrauch betreiben kann.\n","original_language":"eng","persons":["Andreas Bogk"],"tags":["sigint09"],"view_count":150,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-11T02:00:00.000+02:00","updated_at":"2026-03-24T16:45:06.112+01:00","length":2807,"duration":2807,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3072_de_horch_mal_wer_da_funkt.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3072_de_horch_mal_wer_da_funkt_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-76f8d3a6991dcf7f03-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-76f8d3a6991dcf7f03-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3072_de_horch_mal_wer_da_funkt","url":"https://api.media.ccc.de/public/events/import-76f8d3a6991dcf7f03","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":100,"event_guid":"import-f73126cae24d750083","weight":3},{"event_id":137,"event_guid":"import-09be6c4dcd22a304d3","weight":3},{"event_id":347,"event_guid":"import-8fbea067584d0e592d","weight":1},{"event_id":490,"event_guid":"import-01080654e07d3f6ea8","weight":3},{"event_id":622,"event_guid":"import-a244dfe0921ddbc139","weight":1},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":1},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":1132,"event_guid":"import-7f22cde4ed072fc5b9","weight":2},{"event_id":2735,"event_guid":"5c0323b6-c538-4fb6-8d70-d08def6bf865","weight":1},{"event_id":2814,"event_guid":"3cb4101c-2042-4883-b6fb-6591994a70c0","weight":1},{"event_id":2960,"event_guid":"a871e2e5-3750-4bf7-b96f-8204bd9a951d","weight":1},{"event_id":3038,"event_guid":"cf873495-8beb-47f3-a303-4893400ecf30","weight":2},{"event_id":3249,"event_guid":"8ec92aac-5807-5ceb-934a-e971c7e63205","weight":1},{"event_id":3288,"event_guid":"0b36ec47-6b04-53be-8ca4-c0b93bacd99d","weight":1},{"event_id":3802,"event_guid":"a588243f-a16e-4298-9e66-d26fb949aaea","weight":1},{"event_id":3804,"event_guid":"23a68819-b112-435d-8d5d-c6a6ecf52875","weight":1},{"event_id":3811,"event_guid":"68a745a5-f6b7-4c12-adf7-4f7c815f30fe","weight":1},{"event_id":3815,"event_guid":"81eaad6b-0c0d-4c69-8388-7509f86e0adc","weight":1},{"event_id":3816,"event_guid":"e370add0-106d-48e6-9e97-cd560ba60b9c","weight":1},{"event_id":3818,"event_guid":"adb3ca92-d333-4a8d-b44a-09b3bbb75656","weight":1},{"event_id":3928,"event_guid":"05c1739a-5802-4e84-afce-a71acba67e67","weight":1},{"event_id":4259,"event_guid":"b5a645a9-bbdc-433e-a77c-b416074a92ea","weight":1},{"event_id":4589,"event_guid":"d13d0904-92a4-11e7-be40-5373c2f92fbe","weight":3},{"event_id":4777,"event_guid":"a66fa9d5-b12c-4d6b-84f9-f279faf38f86","weight":1},{"event_id":4843,"event_guid":"86c60da2-fefc-4750-ad22-fa821ce619b1","weight":1}]},{"guid":"import-729e44803359d6029d","title":"Am Ende der Leitung","subtitle":"Lesung und Diskussion zu einer Science Fiction-Anthologie über die Zukunft von Bürgerrechten, Datenschutz und Überwachung","slug":"SIGINT09_3198_de_am_ende_der_leitung","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3198.en.html","description":"Der Verein Quintessenz hat, aus Anlass des 10-jährigen Jubiläums der Big Brother Awards, unter dem Titel \"Am Ende der Leitung\" gegen Ende 2008 eine Science Fiction-Anthologie zur Zukunft von Bürgerrechten, Datenschutz und Überwachung herausgegeben.\n","original_language":"eng","persons":["Adrian Dabrowski","Florian Bayer","Uwe Protsch"],"tags":["sigint09"],"view_count":31,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-07-22T22:30:04.618+02:00","length":3805,"duration":3805,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3198_de_am_ende_der_leitung.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3198_de_am_ende_der_leitung_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-729e44803359d6029d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-729e44803359d6029d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3198_de_am_ende_der_leitung","url":"https://api.media.ccc.de/public/events/import-729e44803359d6029d","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":466,"event_guid":"import-a1c68c7964ecf87fab","weight":1},{"event_id":474,"event_guid":"import-3fc16fe1d6b73db9ed","weight":1},{"event_id":515,"event_guid":"import-744e40f528889f912a","weight":1},{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1}]},{"guid":"import-b6db4f8d20e762f5fe","title":"Let Them Fail","subtitle":"An Introduction to Massively Distributed Finance or \"Cloud Banking\"","slug":"SIGINT09_3209_en_let_them_fail","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3209.en.html","description":"In a truly free market, no institution or government can ever become too large to fail.  This talk looks at what might happen if there were no bailouts, rescue packages, guarantees or other political consideration paid to large entities.  What would the world look like if there were no for-profit banks?  The technology and legal structure exists to let us all be our own consumers, producers and investors, making our own informed financial decisions and consuming locally produced products and services.\n","original_language":"eng","persons":["Nick Farr"],"tags":["sigint09"],"view_count":19,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-10-09T22:00:07.196+02:00","length":3542,"duration":3542,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3209_en_let_them_fail.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3209_en_let_them_fail_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-b6db4f8d20e762f5fe-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-b6db4f8d20e762f5fe-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3209_en_let_them_fail","url":"https://api.media.ccc.de/public/events/import-b6db4f8d20e762f5fe","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":81,"event_guid":"import-475f5e64df5220613a","weight":1},{"event_id":2163,"event_guid":"P27IBlfmjGfZIib1deB_xg","weight":2},{"event_id":2396,"event_guid":"d39b1212f999334b96dd942e1e602822 ","weight":1},{"event_id":2871,"event_guid":"74515f8e-a752-4cbb-b407-3a70fca5b0b3","weight":1},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":4853,"event_guid":"7f293cf6-6d19-43ed-8aa7-7371e008bd45","weight":1},{"event_id":6512,"event_guid":"25c54ce3-598c-42ee-8832-52fe9deae7ad","weight":1},{"event_id":6523,"event_guid":"240fe8a1-ee33-4f07-88d0-34b8bb04db71","weight":1}]},{"guid":"import-9571a042af59106b1e","title":"Culture Hacking and Evolutionary Technologies","subtitle":"Considered, Synthesized, Digested, and Defecated.","slug":"SIGINT09_3246_en_culture_hacking_and_evolutionary_technologies","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3246.en.html","description":"VJ Scott Beibin of Lost Film Fest and Scientists Are The New Rockstars (USA) presents an hour long presentation incorporating storytelling and modern media archaeology by exploring the means in which media has been used by the forces of social change to achieve great feats of mass information dissemination and meme manifestation.\n","original_language":"eng","persons":["Scott Beibin"],"tags":["sigint09"],"view_count":23,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-03-24T02:30:03.433+01:00","length":3471,"duration":3471,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3246_en_culture_hacking_and_evolutionary_technologies.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3246_en_culture_hacking_and_evolutionary_technologies_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-9571a042af59106b1e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-9571a042af59106b1e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3246_en_culture_hacking_and_evolutionary_technologies","url":"https://api.media.ccc.de/public/events/import-9571a042af59106b1e","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":557,"event_guid":"import-d79f0966b22b231d16","weight":1},{"event_id":751,"event_guid":"import-8f844c9c19dc5a0dbf","weight":1}]},{"guid":"import-f33f66116fd61622e2","title":"Computerspiele in der Gesellschaft","subtitle":null,"slug":"SIGINT09_3250_de_computerspiele_und_gesellschaft","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3250.en.html","description":"Wo immer häufiger das Verbot einzelner Computerspiele oder ganzer Spielegenres gefordert wird, scheinen Computerspiele an sich kaum mehr Anerkennung als etabliertes Kulturgut zu bekommen. In diesem Spannungsbogen möchten wir mit Vertretern von Spieleherstellern und Spielern sowie Politik und Wissenschaft diskutieren.\n","original_language":"eng","persons":["Christoph Brüning","Frank Pinter","Holger Klein","Malte Spitz"],"tags":["sigint09"],"view_count":172,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-01-07T21:15:26.842+01:00","length":7193,"duration":7193,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3250_de_computerspiele_und_gesellschaft.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3250_de_computerspiele_und_gesellschaft_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-f33f66116fd61622e2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-f33f66116fd61622e2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3250_de_computerspiele_und_gesellschaft","url":"https://api.media.ccc.de/public/events/import-f33f66116fd61622e2","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":436,"event_guid":"import-21f792b821db8cc7d9","weight":3},{"event_id":523,"event_guid":"import-377d765ea160f5efc2","weight":1},{"event_id":2294,"event_guid":"9ba6d9cc-76ac-4e6d-9f2d-9e8c6e9a0c08","weight":1},{"event_id":2551,"event_guid":"f8909f2d-fac5-4d5f-b483-cff184591b0c","weight":3},{"event_id":2967,"event_guid":"cabf79b8-cadc-45ef-89c8-c3c877baf379","weight":1},{"event_id":3710,"event_guid":"a288d8dd-db0a-455d-881b-bc6d9c593fa3","weight":4},{"event_id":4504,"event_guid":"4f5c59c8-4f8f-59c4-9036-8f4c371a373a","weight":1},{"event_id":4644,"event_guid":"b607796c-ce58-43ee-afbd-f5fe2008ac66","weight":1},{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":2},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":2},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":1},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":2},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":1}]},{"guid":"import-e0a1d99e8cda2f4fc7","title":"Datenschutz für Administratoren","subtitle":"Was darf ich rechtlich machen?","slug":"SIGINT09_3134_de_datenschutz_fuer_administratoren","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3134.en.html","description":"Zu den Aufgaben von Administratoren gehört es, mit großen Datenmengen zu arbeiten. Oft genug sind dies auch personenbezogene Daten, die durch technisch-organisatorische Maßnahmen entsprechend geschützt werden sollten. \n","original_language":"eng","persons":["Hanno 'Rince' Wagner"],"tags":["sigint09"],"view_count":145,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-13T14:30:06.546+01:00","length":3663,"duration":3663,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3134_de_datenschutz_fuer_administratoren.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3134_de_datenschutz_fuer_administratoren_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-e0a1d99e8cda2f4fc7-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-e0a1d99e8cda2f4fc7-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3134_de_datenschutz_fuer_administratoren","url":"https://api.media.ccc.de/public/events/import-e0a1d99e8cda2f4fc7","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":289,"event_guid":"import-68b820504f3c67229a","weight":4},{"event_id":558,"event_guid":"import-b4c44c1a04d7d18687","weight":3},{"event_id":3051,"event_guid":"a52b22a5-9b68-4343-a37b-84ed1b0b6bce","weight":1}]},{"guid":"import-744e40f528889f912a","title":"SIGKILL imminent","subtitle":"Novel Robot Uprising Mitigation Strategies","slug":"SIGINT09_3166_en_sigkill_imminent","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3166.en.html","description":"As we all know, computers are advancing at an incredible rate. How long will it take them to switch from obeying what we teached them, to gain the ability to think and turn over our system? While we've seen this scenario imagined in many movies, it has been rarely ever talked about how to protect yourself in the event of a robot army deciding to mass execute SIGKILL death on all of mankind. This basic but most frightening humanitarian problem is even more escalated as more and more robots are able to reproduce, while more and more scientists are researching possible ways to create an AI and autonomus military killing machines, that may or may not need a person monitoring its behaviour.\n","original_language":"eng","persons":["Astera","George Shammas"],"tags":["sigint09"],"view_count":41,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-01-01T04:15:09.747+01:00","length":4190,"duration":4190,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3166_en_sigkill_imminent.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3166_en_sigkill_imminent_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-744e40f528889f912a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-744e40f528889f912a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3166_en_sigkill_imminent","url":"https://api.media.ccc.de/public/events/import-744e40f528889f912a","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":32,"event_guid":"import-714b015334b6bc6ff0","weight":1},{"event_id":474,"event_guid":"import-3fc16fe1d6b73db9ed","weight":1},{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1},{"event_id":521,"event_guid":"import-729e44803359d6029d","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":1},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":1}]},{"guid":"import-81ffbf01f29be799e4","title":"Videospiel-Comedy","subtitle":"und was sie uns über die Games-Kultur erzählt","slug":"SIGINT09_3240_de_videospiel_comedy","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3240.en.html","description":"Schon in den 1980er Jahren waren in Spielemagazinen kleine Nerd-Comicstrips zu finden, die amüsante Geschichten aus der damals noch verhältnismäßig unbekannten Welt von Computern, Spielkonsolen und Games erzählten. Mitte der 1990er kam der Schritt von den Zeichnungen hin zum Comedy-Video, das nochmals zehn Jahre später im Netz zu einer blühenden Subkultur gereift ist.\n","original_language":"eng","persons":["Robert Glashüttner"],"tags":["sigint09"],"view_count":21,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-11-14T23:45:05.818+01:00","length":3584,"duration":3584,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3240_de_videospiel_comedy.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3240_de_videospiel_comedy_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-81ffbf01f29be799e4-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-81ffbf01f29be799e4-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3240_de_videospiel_comedy","url":"https://api.media.ccc.de/public/events/import-81ffbf01f29be799e4","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":495,"event_guid":"import-58eefb24d1e79d9d41","weight":1},{"event_id":496,"event_guid":"import-51b51649a35b05d109","weight":1},{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":1},{"event_id":2907,"event_guid":"3b16ddc9-499b-44b1-9084-b3e328daea30","weight":1},{"event_id":4901,"event_guid":"bb975ea3-1b67-4a0d-a166-48f435dc9515","weight":1},{"event_id":5217,"event_guid":"42433839-4355-2020-2020-202020202020","weight":1},{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":1},{"event_id":5239,"event_guid":"524a3859-5641-2020-2020-202020202020","weight":1},{"event_id":5244,"event_guid":"4a473753-5039-2020-2020-202020202020","weight":1},{"event_id":5353,"event_guid":"8743b645-2a12-55d4-a09e-56585dfdcaa5","weight":1},{"event_id":5913,"event_guid":"996785ea-5073-5ce6-9ee5-702840d83eee","weight":1},{"event_id":6380,"event_guid":"e9095f5f-a38a-48da-b3d7-20da141b8b14","weight":1},{"event_id":6410,"event_guid":"a12d17e9-3758-4fa0-b612-0c6ba22ea773","weight":1},{"event_id":6519,"event_guid":"5a8097ad-15c2-492e-8bc4-6b634fd8e963","weight":1}]},{"guid":"import-90e83ca77eca257db3","title":"Eine radikal-liberale Perspektive zu den Chancen und Risiken in der technisierten Gesellschaft","subtitle":null,"slug":"SIGINT09_3212_de_eine_radikal_liberale_perspektive","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3212.en.html","description":"Die Technisierung der Gesellschaft schreitet immer weiter voran, wird sie von Grund auf verändern, zum besseren oder zum schlechteren. Dieser Prozess macht es nötig, über die Grundstrukturen gesellschaftlichen Zusammenlebens zu diskutieren und moralüberladene und überholte Vorstellungen zu verwerfen, um dynamische Gesellschaftsformen zu entwickeln. \nAktuell dominieren wohl zwei Strömungen in der Gesellschaftsregulation: die der globalen und die der lokalen Einflussnahme. \nGlobale Einflussnahme versucht eine a priori Einheit zu verstehen und zu steuern, also mit und durch Technik das Leben des Menschen zu bestimmen. Die Strömung der lokalen Einflussnahme, begreift diese Prozesse als Netzwerke von Einzelentscheidungen und daher als sich organisch selbst-steuernd. Organisch heißt hier: Das Individuum wird gerade dadurch zum Rechtssubjekt, dass es technisiert. Es ist also die begrenzte Anwendung instrumenteller Vernunft, die den Menschen als solchen auszeichnet. Wir wollen zeigen, wie globale Steuerung zu faschistoiden Systemen führt und als Gegenentwurf eine Weiterentwicklung der modernen Demokratie vorstellen.\n","original_language":"eng","persons":["Peter Röttges","Sebastian Rothlauf"],"tags":["sigint09"],"view_count":34,"promoted":false,"date":"2009-05-24T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2023-08-18T01:45:02.496+02:00","length":3431,"duration":3431,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3212_de_eine_radikal_liberale_perspektive.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3212_de_eine_radikal_liberale_perspektive_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-90e83ca77eca257db3-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-90e83ca77eca257db3-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3212_de_eine_radikal_liberale_perspektive","url":"https://api.media.ccc.de/public/events/import-90e83ca77eca257db3","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[]},{"guid":"import-2edbcb9de9c28ca25e","title":"Glühende Ohren durch Lauschen","subtitle":"Möglichkeiten der Überwachung im 10GbE-Datenverkehr","slug":"SIGINT09_3186_de_gluehende_ohren_durch_lauschen","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3186.en.html","description":"Ein Erfahrungsbericht über die technischen Möglichkeiten und die Umsetzung, um die schnellsten aktiven Datenleitungen im laufenden Betrieb zu überwachen.\n","original_language":"eng","persons":["Lars Weiler"],"tags":["sigint09"],"view_count":23,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2024-08-18T07:15:02.069+02:00","length":3028,"duration":3028,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3186_de_gluehende_ohren_durch_lauschen.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3186_de_gluehende_ohren_durch_lauschen_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-2edbcb9de9c28ca25e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-2edbcb9de9c28ca25e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3186_de_gluehende_ohren_durch_lauschen","url":"https://api.media.ccc.de/public/events/import-2edbcb9de9c28ca25e","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":197,"event_guid":"import-55bea4c97858ab99ef","weight":1},{"event_id":632,"event_guid":"import-02d8be88203f92f071","weight":1},{"event_id":774,"event_guid":"import-ef6d6d75b7095316d9","weight":1},{"event_id":1001,"event_guid":"import-e7c273000224131013","weight":1},{"event_id":1165,"event_guid":"import-6f018026ae6f6434fa","weight":1},{"event_id":1335,"event_guid":"import-d1037d2e423d87a070","weight":1},{"event_id":1386,"event_guid":"import-889bf7d4f546181efe","weight":1},{"event_id":1515,"event_guid":"import-43dd29b0920928530a","weight":1},{"event_id":1573,"event_guid":"import-a9c9273e3172d5e77c","weight":1},{"event_id":1625,"event_guid":"import-d5e915f712036ff928","weight":1},{"event_id":2422,"event_guid":"03553ade-bec3-4833-8210-6ac0983bb0c0","weight":1},{"event_id":2774,"event_guid":"3d7c45af-7e31-11e5-b91e-84b7d9780b35","weight":1},{"event_id":2776,"event_guid":"3d7c416e-7e31-11e5-b91e-f1d2b07f83cb","weight":1},{"event_id":4538,"event_guid":"41484e52-4847-2020-2020-202020202020","weight":1},{"event_id":4542,"event_guid":"56484c54-534e-2020-2020-202020202020","weight":1},{"event_id":4552,"event_guid":"4a584856-5341-2020-2020-202020202020","weight":1},{"event_id":4557,"event_guid":"374e5454-5055-2020-2020-202020202020","weight":1},{"event_id":4965,"event_guid":"cfcbe75b-dd21-47a3-949b-c3eedddb9be4","weight":1},{"event_id":5007,"event_guid":"dae3f880-f388-4c80-a9c7-78288ec51ba7","weight":1},{"event_id":5050,"event_guid":"15e6de74-a59d-42a7-b116-da561a7a2aad","weight":1},{"event_id":5350,"event_guid":"47b7888b-3379-53e2-b2c8-6b004ae00550","weight":1},{"event_id":5381,"event_guid":"2b148a03-ea3f-5aa8-8a6d-9cb7624f303e","weight":1},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":1},{"event_id":6188,"event_guid":"6a7f1749-036e-5368-a0f5-b26cd75aa9c1","weight":1},{"event_id":6189,"event_guid":"d6e07140-7e64-5404-9a88-007f54545a24","weight":1},{"event_id":6616,"event_guid":"e96ff77d-7247-48a8-839b-554ee37328d6","weight":1}]},{"guid":"import-a04089a78d64fd0b11","title":"Die Zukunft der Demokratie - Alles Bingo oder was?","subtitle":"\"Öffentlichkeit ist der Sauerstoff der Demokratie.\" - Günter Wallraff","slug":"SIGINT09_3154_de_die_zukunft_der_demokratie","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3154.en.html","description":"Von verschiedenen Seiten wird das eVoting als Rettung der Demokratie gesehen, dass es Probleme zu geben scheint, zeigt nicht zuletzt das Urteil vom Bundesverfassungsgericht im März. Der Wahlrechsaktivist Oliver Knapp gibt in seinem Talk einen Rückblick auf bisherige elektronische Wahlsysteme, spricht über das Urteil vom Bundesverfassungsgericht und wagt einen Blick in die Zukunft unserer Demokratie.\n","original_language":"eng","persons":["Oliver Knapp"],"tags":["sigint09"],"view_count":30,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2025-02-12T19:30:04.807+01:00","length":3297,"duration":3297,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3154_de_die_zukunft_der_demokratie.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3154_de_die_zukunft_der_demokratie_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a04089a78d64fd0b11-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a04089a78d64fd0b11-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3154_de_die_zukunft_der_demokratie","url":"https://api.media.ccc.de/public/events/import-a04089a78d64fd0b11","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":541,"event_guid":"import-89e08070d706035e7a","weight":2},{"event_id":1472,"event_guid":"import-f35cde7a61039c2eca","weight":2}]},{"guid":"import-f0bc5ef5dcba88e3c1","title":"Strafverfolgung 2.0 statt mittelalterlicher Pranger","subtitle":"Der Fall Tauss als Lehrstück sozialer Exekution mit (neuen) Medien","slug":"SIGINT09_3223_de_strafverfolgung_2punkt0_statt_mittelalterlicher_pranger","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3223.en.html","description":"Jan Mönikes ist der Berliner Partner von Schalast\u0026Partner Rechtsanwälte und auf Internet- und Medienrecht spezialisiert, zudem selbst seit vielen Jahren politisch in diesen Bereichen aktiv. Als Rechtsbeistand des Bundestagsabgeordneten und CCC-Mitgliedes Jörg Tauss hat er den \"Fall Tauss\" von Anfang an begleitet.\n","original_language":"eng","persons":["Andy Müller-Maguhn","Jan Moenikes"],"tags":["sigint09"],"view_count":63,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-04T04:45:02.166+01:00","length":3409,"duration":3409,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3223_de_strafverfolgung_2punkt0_statt_mittelalterlicher_pranger.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3223_de_strafverfolgung_2punkt0_statt_mittelalterlicher_pranger_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-f0bc5ef5dcba88e3c1-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-f0bc5ef5dcba88e3c1-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3223_de_strafverfolgung_2punkt0_statt_mittelalterlicher_pranger","url":"https://api.media.ccc.de/public/events/import-f0bc5ef5dcba88e3c1","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":493,"event_guid":"import-3a4a349a0c53f623e1","weight":1},{"event_id":501,"event_guid":"import-a85c1a72ff670914de","weight":1},{"event_id":569,"event_guid":"import-742ccaffbef719715b","weight":1},{"event_id":584,"event_guid":"import-09216dd510bd5fe02f","weight":1},{"event_id":1087,"event_guid":"import-2d3f3e91ab482231f6","weight":1},{"event_id":2486,"event_guid":"439d64b1-b08b-4313-87f9-c469211d4206","weight":1},{"event_id":2875,"event_guid":"0bdbef2d-1594-4582-b315-7ee5da5505bf","weight":1},{"event_id":3582,"event_guid":"9e10862d-aca8-5e32-ab05-7affc9afbc4c","weight":1},{"event_id":3583,"event_guid":"644ddfa9-2ae4-5d6f-aea8-ef23138d3f0f","weight":1},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":1},{"event_id":3782,"event_guid":"dec1ddb6-e4f3-11e6-ba49-a38509dc3679","weight":1}]},{"guid":"import-a63d71f889863720da","title":"Antizensur in Hochzeiten politischen Opportunismus und Kontrollwahns","subtitle":null,"slug":"SIGINT09_3243_de_antizensur_wikileaks","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3243.en.html","description":"Wie in keinem Jahr nach Ende des 3. Reichs sehen sich Informationsfreiheit, das Recht auf freie politische und gesellschaftliche Bildung der Buerger und die Freiheiten der Berichterstattung politischen Opportunisten und manipulativer Propaganda ausgesetzt. Das Internet als wichtigste Innovation der Informationsgesellschaft ist akut bedroht durch macht- und kontrollhungrige Politiker, profitgierige Unternehmer und eine breite Masse von Propagandaopfern.\n","original_language":"eng","persons":["wikileaks"],"tags":["sigint09"],"view_count":83,"promoted":false,"date":"2009-05-23T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-12T00:00:06.282+01:00","length":3854,"duration":3854,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3243_de_antizensur_wikileaks.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3243_de_antizensur_wikileaks_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a63d71f889863720da-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-a63d71f889863720da-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3243_de_antizensur_wikileaks","url":"https://api.media.ccc.de/public/events/import-a63d71f889863720da","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":433,"event_guid":"import-8b428ff51202ec0f50","weight":1},{"event_id":435,"event_guid":"import-c5444cff9f339666f1","weight":1},{"event_id":747,"event_guid":"import-ea3c62f4ae68df82e6","weight":1},{"event_id":1270,"event_guid":"import-b01de4e5ea4f6f641f","weight":1},{"event_id":1368,"event_guid":"import-2f5b6d9d75ad65da1d","weight":3},{"event_id":1458,"event_guid":"import-d91ee307eb6ced5743","weight":1},{"event_id":1846,"event_guid":"BAKqlbEKHMpBMr22KlDsEg","weight":1},{"event_id":3537,"event_guid":"3fbad2ec-8c25-5270-aaed-40248621bbfd","weight":1},{"event_id":4983,"event_guid":"476b4610-680e-4b3b-aec2-9f1fef91cd4e","weight":1},{"event_id":5018,"event_guid":"0ef0a575-4bc2-4832-ab9d-dc0c5cc292cb","weight":1}]},{"guid":"import-51b51649a35b05d109","title":"Keynote Tag 1: Control and Surveillance ","subtitle":null,"slug":"SIGINT09_3247_de_keynote_tag1_control_and_surveillance","link":"http://events.ccc.de/sigint/2009/Fahrplan/events/3247.en.html","description":"\n","original_language":"eng","persons":["Jens Ohlig"],"tags":["sigint09"],"view_count":10,"promoted":false,"date":"2009-05-22T02:00:00.000+02:00","release_date":"2009-09-10T02:00:00.000+02:00","updated_at":"2026-03-09T15:30:11.144+01:00","length":2517,"duration":2517,"thumb_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3247_de_keynote_tag1_control_and_surveillance.jpg","poster_url":"https://static.media.ccc.de/media/conferences/sigint09/SIGINT09_3247_de_keynote_tag1_control_and_surveillance_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/sigint09/import-51b51649a35b05d109-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/sigint09/import-51b51649a35b05d109-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SIGINT09_3247_de_keynote_tag1_control_and_surveillance","url":"https://api.media.ccc.de/public/events/import-51b51649a35b05d109","conference_title":"SIGINT09","conference_url":"https://api.media.ccc.de/public/conferences/sigint09","related":[{"event_id":386,"event_guid":"import-0288d2a0c41dbb9abc","weight":1},{"event_id":403,"event_guid":"import-0e985d166abdaa09a4","weight":1},{"event_id":409,"event_guid":"import-92e1d710c3d864d874","weight":1},{"event_id":411,"event_guid":"import-669f7f97f2f1709469","weight":1},{"event_id":415,"event_guid":"import-8451e6396a295cee92","weight":1},{"event_id":426,"event_guid":"import-d5ed7e29ab1153d0cf","weight":1},{"event_id":484,"event_guid":"import-e591bba87ce939ab3c","weight":1},{"event_id":493,"event_guid":"import-3a4a349a0c53f623e1","weight":1},{"event_id":495,"event_guid":"import-58eefb24d1e79d9d41","weight":1},{"event_id":505,"event_guid":"import-81ffbf01f29be799e4","weight":1},{"event_id":518,"event_guid":"import-ddac0747003f24802c","weight":1},{"event_id":526,"event_guid":"import-868bde731cc0be35f9","weight":1},{"event_id":533,"event_guid":"import-76dca07be1cc11bf12","weight":1},{"event_id":553,"event_guid":"import-1642ac54dd91815d89","weight":1},{"event_id":554,"event_guid":"import-2e34712c8431e5d9fd","weight":1},{"event_id":573,"event_guid":"import-6cb8a9e340fe2ed9c9","weight":1},{"event_id":595,"event_guid":"import-a9e01c02f0bd2d6c75","weight":1},{"event_id":606,"event_guid":"import-e85a3ece0b1462e5e5","weight":1},{"event_id":610,"event_guid":"import-96fb292ec2031505c2","weight":1},{"event_id":615,"event_guid":"import-88be6eaed423980de3","weight":1},{"event_id":620,"event_guid":"import-0683ba6033d2b4ff3c","weight":1},{"event_id":621,"event_guid":"import-2209e1762ac6cc117f","weight":1},{"event_id":632,"event_guid":"import-02d8be88203f92f071","weight":1},{"event_id":670,"event_guid":"import-618b74c8f21e779a8d","weight":1},{"event_id":674,"event_guid":"import-4668efe98f02e12b8d","weight":1},{"event_id":691,"event_guid":"import-e07970a31bd07defcf","weight":1},{"event_id":695,"event_guid":"import-5cf523cd2fd74f6829","weight":1},{"event_id":696,"event_guid":"import-a4baaf004d8c564571","weight":1},{"event_id":1976,"event_guid":"b0167f2efcd6a228","weight":1},{"event_id":2733,"event_guid":"a990a339-b544-47e7-a5d6-1f2650d18e2a","weight":1},{"event_id":3899,"event_guid":"3dd64605-0402-4a89-955c-3a48a4dc1ff8","weight":1},{"event_id":5217,"event_guid":"42433839-4355-2020-2020-202020202020","weight":1},{"event_id":5220,"event_guid":"57533942-4659-2020-2020-202020202020","weight":1},{"event_id":5239,"event_guid":"524a3859-5641-2020-2020-202020202020","weight":1},{"event_id":5244,"event_guid":"4a473753-5039-2020-2020-202020202020","weight":1}]}]}