miércoles, 30 de noviembre de 2011

Dia de la Seguridad de la Información Via @csi_mattica

Fuente: mattica.com

Hoy 30 de noviembre y desde 1988 se celebra el Día de la Seguridad de la Información. El objeto de este día es concientizar a los usuarios sobre la importancia de la seguridad de su información, de los sistemas y de los entornos que operan con ella.

Dejamos aquí una serie de sugerencias de uso seguro de la información, sin embargo de nada sirven si sólo se leen y no se aplican y comparten. Invitamos a que se comparta esta información y se republique (citándonos como fuente para aumentar la seguridad de nuestra información y de nuestro entorno.
  1. Usar contraseñas fuertes – de al menos 8 caracteres: numéricos, alfabéticos en minúsculas y mayúsculas, y especiales
  2. No uses un usuario administrador o root para tareas cotidianas, crea un usuario restringido para tal efecto
  3. No hagas caso a mensajes que te piden sincronizar o actualizar tu información bancaria o de servicios
  4. Si abres un archivo adjunto, asegúrate que sí tenga la extensión que debe tener. file.gif no es lo mismo que file.gif.exe
  5. Cambiar las contraseñas frecuentemente. Así cierras posibles vulnerabilidades que no hayas detectado
  6. Si vas a ingresar con usuario y contraseña en un sitio Web, asegúrate que el URL sí pertenezca al servicio
  7. Usa contraseñas diferentes por cada servicio. Así si te vulneran una no te vulneras en todos lados
  8. Es importante mantener tu software actualizado, con los últimos parches de seguridad siempre
  9. No instales aplicaciones y programas que no necesites – Emoticones, barras de ligas, etcétera – pueden vulnerarte
  10. Haz copias de seguridad de tu información, manten las copias en algún lugar seguro
  11. Nunca dejes tu computadora sin contraseña si te alejas de ella
  12. Mantén un firewall, un antivirus y un anti malware instalado en tus equipos. Instálalos antes de entrar a Internet
  13. Si estarás un tiempo prolongado lejos de tu computadora, intenta dejarla sin conexión a la LAN y a Internet. – O apágala
  14. No abras mensajes de correo si el destinatario no es conocido y si lo haces, no bajes o abras archivos adjuntos ni ligas
  15. Deshabilita la reproducción automática de scripts en tu mail (y hasta en tu browser)
  16. Si usas Windows, deshabilita la opción de ocultar las extensiones de los files
  17. Sigue en Twitter a  @csi_mattica  @cibercrimen y @crimendigital para mantenerte al dia – y sugiéreselos a tus amigos y TL. :) 
Fuente: mattica.com

...

Los Depredadores en la Internet Via @Alediaganet

Dr. ALEXANDER DÍAZ GARCÍA

Especialista en: Nuevas Tecnologías y Protección de Datos
Ciencias Constitucionales y Administrativas y
Ciencias Penales y Criminológicas.
Autor de la Ley de Delitos Informáticos en Colombia (1273 de 2009)

Con el video que ofrezco a continuación, producción del Canal Colombiano RCN, concluirmos que las mujeres que buscan pareja a través de la Internet, cada día se está convirtiendo en una actividad de alto riesgo, aquí y en cualquier parte del mundo. Las redes sociales son el mejor canal de búsqueda para los esfuerzos de las mujeres que quieren encontrar desaforadamente su alma gemela en el exterior y efectivamente los depredadores sexuales están listos para acaparar este mercado que se lo ponen a su disposición con bandeja y menú a la carta. Las ingenuas víctimas encuentran potenciales "cónyuges" a través de publicaciones en perfiles creados ex profeso para estos menesteres. Búsqueda que usualmente logran sin mucho esfuerzo pues son muchos los delincuentes, seguramente con perfiles falsos, publican sugestivas fotos para mostrar un "lindo extranjero" o una cara de un "príncipe azul" con las que convencerán a sus víctimas.


http://www.canalrcnmsn.com/content/drama_en_ibagu%C3%A9_por_colombiana_que_desapareci%C3%B3_hace_un_mes_en_alemania


Se sabe que a las damas elegidas se les proporciona los tiquetes (recuerden que es una inversión y hay que mostrar solvencia a la víctima) por sus futuras parejas o potencial (es) marido (s), individuos que no conocen personalmente, porque sólo les han hecho vivir "experiencias divinas" por medio de sus charlas virtuales, pues no han logrado saber si el sujeto ronca o mastican bien sus alimentos, si tiene enfermedades o realiza o tienen ciertas costumbres extrañas, que no son de su aceptación, algunas se atreven a decir que no les importa porque aprenderán a amarlos con el tiempo con estos detallitos; aspectos que son toda una sorpresa para la esperanzada víctima conyugal. Cuando se han dado cuenta de la situación real de riesgo, ya es demasiado tarde, son abandonadas incluso en el primer encuentro personal que es casi siempre sexual, y las dejan a su suerte en un país extranjero, llevan sumas insignificartivas de dinero que pronto se les agota, son sometidas a la esclavitud sexual, violaciones, humillacione, vejámenes y hasta la muerte como nos lo enseña esta nota de RCN.

Algunas incrédulas que no son tan osadas en aceptar estos viajes maravillosos, se han limitado a chatear con su galán virtual a través de las diferentes herramientas que existen en las redes para realizar estas tareas, no obstante lo inocente que se convierte aparentemente estos cuartos de charla, éstas realizan conversaciones acompañadas de escenas completas de alto contenido sexual, pensando que su interlocutor es un decente caballero, con el que creen merecer compartir este momento de intimidad con su proyectada pareja, y lo que está ocurriendo verdaderamente es, que les están grabando todo el show aparentemente privado para luego comercializarlo en los miles de sites que existen en las redes, ofreciendo material con contenido de esta naturaleza por un par de dólares o están transmitiendo en tiempo real su encuentro sexual, no es raro que a "María" o a "Julia" sean saludadas inexplicablemente en la red porque las conocen, precisamente porque su novio "tan lindo" vendió su entrega virtual de pasión a una comercializadora o él mismo realiza la comercialización.

El tercer caso de los depredadores sexuales, es una variable de la anterior, consistiendo en que no viajan pero las obliga a mantener un ritmo de escenas diarias para grabar un alto contenido explícito sexual, extorsionándolas con publicarlas sino acceden (por ejemplo mujeres casadas con amigos virtuales). Esta variable no sólo ocurre con mujeres adultas sino también con adolescentes de ambos sexos que están empezando su vida sexua (sujetos por el temor que los padres o resto de familia se enteren). Como ésto genera temor por los señalamientos sociales y que conozcan sus preferencia (datos sensibles) sexuales que tienen las personas en la intimidad, usualmente logran los criminales mantener la víctima por un buen tiempo atada a sus pretensiones ilícitas.

También incluimos con el mismo formato pero diferente escenario es el de las ofertas laborales, que enseñan oportunidades que a nivel local nunca se encontrarán aparentemente, cuando las víctimas llegan al país anfitrión se les muestra la realidad del trabajo por ocupar, se les retienen los documentos de identificaición, comercio sexual, pornografía no consentida, comercio de órganos, y otras labores denigrantes que muy seguramente no sólo violan la dignidad humana sino también otros derechos constitucionales.

Ahora bien en tratándose de depredadores patrimoniales los que se apoderan a través de una mise en scene (estafa) del patrimonio de su víctima sin importar el género, hombres y mujeres caen por igual. La conducta consiste en buscar potenciales víctimas que poseen alguna fortuna significativa o solvencia económica reconocida (se establece mediante ingeniería social) y aprovechándose del mismo ánimo anterior, de conseguir pareja, se entregan sin límites a ese "príncipe azul" o a esa "reina" y éstos mostrando cierta solvencia muy parecida a la de sus víctimas, les ofrece confianza y comienzan a intimar no sólo sexualmente sino confidencialmente, pues le entregan toda la información de su bienes, incluso se llega a tal punto que la víctima le autoriza sin ninguna restricción el manejo y adminsitrción de los bienes. Cuando despiertan de este lindo sueño, se dan cuenta que están en la calle sin un centavo en su bolsillo, tal vez en un país extranjero y en donde seguramente su pareja (él o ella) le ha hecho adquirir créditos inmensos en donde el esperanzado (a) consorte dócilmente rubrica su compromiso.

La rata de estos delitos es muy baja porque poco se denuncia, entonces no se tienen estadísticas fidedignas, precisamente por el escarnio que genera el conocimiento en la sociedad que tal persona fue víctima o no, de conductas penales de esta naturaleza. Para el ego de un hombre no menos para la mujer, cuando cae en manos de una (o) de éstas (os), puede producir efectos psicológicos severos, de ahí el por qué prefieren ocultarlo.

Ante tales hechos existen asociaciones, organizaciones y otros, de origen público o privado que ayudan a las víctimas de estos comportamientos, por ejemplo tenemos el web site:


Grupo Getthe en Facebook

administrado por Amit Mendelshon, en donde se publican todos los perfiles que han sido utilizados por los depredadors para hacer caer en sus redes víctimas inocentes. Importante es que se denuncie ante las autoridades de sus respectivos países.

Este trabajo ciertamente no va a detener el flagelo de los depredadores en la Internet, tal vez ni baje las estadísticas, pero nos va a permitir concienciar a la comunidad advirtiéndole que deben tener más de prudencia, cuidado y desacelerándo ese ánimo de buscar pareja sin establecer filtros, la razonabilidad que corresponde y el análisis de riesgo que implica esta clase de relaciones, porque este proceso no es como el de comprar tomates, rojos, frescos y limpios. La opción de morir en manos de su marido, como la mujer de la nota periodística, no es nada descartable.

Por fortuna podemos decir que hoy por hoy existen laboratorios forense con excelentes recursos en informática forense e informática jurídica y amén de profesionales certificados en el área, con equipos muy sofisticados como los de la empresa CHK SECURITY SYSTEMS, para ponernos a tono con los delincuentes. Podemos decir que hemos (la alianza entre el sistema judicial y los laboratorios de informática forense particulares y oficiales) logrado el éxito en casos en donde se ha penetrado a la máquina del depredador (claro con anuencia del Juez de Control de Garantías Constitucionales) sin que éste se entere, en el momento mismo que cree estar controlando a la víctima, apoderándonos de sus ficheros. Hemos ubicado direcciones físicas y por ende su IP y su ISP. nos le hemos apoderado de su web cam, de todos los dispositivos (perífericos) instalados a la red y al equipo, estableciendo la identidad plena del sujeto agresor, quien ha pensado que el encontrarse al otro lado del monitor le da anonimato. Consideramos que hemos contribuido a mermar esta clase de conductas.

Finalmente no podemos decir que esto ocurre para todos los contactos que se realizan en la Internet con fines matrimoniales u otros, porque existen excepciones con felices resultados: conocemos hoy que existen parejas felizmente casadas y de serias ofertas de trabajo; pero no descartamos que el índice de víctimas es muy alto, aprovechando precisamente la ingenuidad de algunas personas, su necesidad de trabajo, su necesidad (¿angustia?) de pareja y algunos otros aspectos tales como en pensar un mejor futuro económico, así no lleguen a amar su cónyuge virtual o conociendo que la oferta de trabajo no es la de un alto (a) ejecutivo (a), sin impórtarles el precio de esos aparentes beneficios, aceptan el reto como tal vez lo aceptó la dama asesinada por su esposo Alemán.


"nombres ficticios de mujeres"

Fin del texto original del Dr. ALEXANDER DIAZ GARCIA

Gracias Honorable por el privilegio de interactuar con Usted,
Gracias por la Ley de Delitos Informaticos de Colombia
Gracias por compartir esta experiencia para la toma de conciencia de las mujeres
Gracias por contribuir al combate del cibercrimen.

Noviembre ha sido el mes Internacional de la NO VIOLENCIA CONTRA LAS MUJERES.
No pudo ser en mejor momento, aunque encaminemos los esfuerzos,
en este caso en el ciberespacio para que sea de todos los
dias que nos quedan en este mundo la lucha por la no violencia contra las mujeres
y la caza bajo la ley de esta otra categoria de "Depredadores"

Angel Aldana.

Happy #EthicalHacking

...

sábado, 26 de noviembre de 2011

Desconferencia, Gobierno, Ciudania digital, #Solidaridad #Geek Colombia!




Un modelo maravilloso de uso de las TICs hecho en Colombia para exportar a otros Ministerios.
Mundo TIC.

Admirable @ClaudiaBerbeo



Nombre de la desconferencia: "Brigada Digital"
Desconferencista: Claudia Berbeo @ClaudiaBerbeo
Evento: Colombia Tres Punto Cero.
Lugar: Corferias Pabellón 1. 6 de Octubre de 2011.
Mayor Información: http://www.brigadadigital.co/
Transmisión y Edición: http://slivo.tv grabación a 3 cámaras. Con Captura de Pantalla
Producido con Wirecast 4.1 Pro
Category:Science & Technology


Perdí la reseña que de la desconferencista hallé en la web, pero si no
recuerdo mal ella es la autora y ejecutora de esta estrategia
con un maravilloso equipo.

Bueno, amo las TICs, me dio por preguntarle y acá esta claro su papel en esta maravillosa iniciativa:


Angel Aldana: bla bla bla (lo que yo tenga que decir sobra, todo est[a claro en el video)

Claudia Berbeo: "si, yo creé la estrategia para el Ministerio TIC, y actualmente soy la Coordinadora nacional."

Parece que la autora fué una niña genio desde la escuela > Claudia Berbeo

El camino bien llevado de una Lider ejemplar que gracias a su amor por la humanidad, por su trabajo y por las TICs gana la admiraci[on de profanos como yo y curioso adem[as por todas estas formas de servir a nuestros hermanos por medio de una herramienta que me apasiona desde que tengo memoria, las TIC.

Gracias por las respuestas Dra Claudia Berbeo y celebro con orgullo de Colombiano
ese amor a Colombia que se le escapa en cada paso.

Gracias.

Publicado inicialmente en:
my.opera.com/TIC-Security 

Hoy Dic. 20 de 2011 encuentro por casualidad un articulo muy especial de la misma protagonista de este video, lo comparto. Motivadora recapitulacion del trabajo de la #brigadadigital de la mano de su creadora:

Algunas veces las cosas no son como te las imaginaste, ... son aún mejor!!!!  

...

viernes, 25 de noviembre de 2011

ONU conmemora hoy Día Internacional de la Eliminación de la Violencia contra la Mujer #mujertienesderechos


Fuente Observatorioviolencia.org

Las Naciones Unidas conmemora hoy el Día Internacional de la Eliminación de la Violencia contra la Mujer para crear conciencia sobre ese problema que tiene connotaciones mundiales.
La directora general de la Organización de las Naciones Unidas para la Educación la Ciencia y la Cultura (Unesco), Irina Bokova, advirtió que la violencia contra la mujer “hace que se cimbren las bases de nuestras sociedades”.

“Es una violación brutal de la dignidad de las personas y una afrenta a sus derechos humanos. Este Día Internacional de la Eliminación de la Violencia contra la mujer nos brinda la oportunidad de unirnos para ponerles fin”.
Según la funcionaria, esta violencia es indiscriminada, puede ser física, sexual, psicológica o económica, puede darse durante un conflicto o en tiempos de paz, afecta a mujeres de todas las edades, procedencias y clases sociales, se produce en todas las culturas del mundo.

Sus consecuencias son devastadoras para las personas, las comunidades y las sociedades, esta violencia afecta la salud de las mujeres, repercute en su capacidad para participar plenamente en la vida social, económica y pública.

Refuerza otras formas de discriminación y marginación, impide a las sociedades alcanzar un desarrollo inclusivo y sostenible y socava los esfuerzos para lograr los Objetivos de Desarrollo del Milenio.

Los gobiernos están tomando medidas para eliminar la violencia contra la mujer. La comunidad internacional ha elaborado convenciones y políticas que procuran impedirla y eliminarla. Pese a ello, los niveles de violencia siguen siendo altos. Esto exige una mayor movilización y la adopción de medidas más contundentes.

Unesco contribuye a esta lucha investigando a fondo las causas sociales, culturales y económicas fundamentales de esta violencia.

“Basándonos en estos conocimientos trabajamos con los encargados de la formulación de políticas para definir nuevas estrategias para la prevención de la violencia y apoyamos a las mujeres afectadas por la violencia para permitirle encontrar estrategias de resistencia.

Asimismo, nuestras campañas de prevención se dirigen también a los niños y hombres a fin de modificar las conductas y hacerlos participar activamente en las actividades de prevención”.

“Nuestro objetivo es que este Día Internacional de la Eliminación de la Violencia contra la Mujer deje de tener razón. La violencia contra la mujer empobrece las sociedades en su conjunto. Debemos enaltecer la dignidad de todas las niñas y mujeres y proteger los derechos humanos de cada miembro de la sociedad. Es la condición indispensable para lograr un siglo XXI más inclusivo, sostenible y pacífico”.
Artículo tomado de:
http://www.observatorioviolencia.org/noticias.php?id=2543

#mujertienesderechos


viernes, 18 de noviembre de 2011

30 Years of Political Hacking - The Chaos Computer Club - German

The Chaos Computer Club, the celebrated and influential German hacker collective, turns 30 this autumn. OWNI meets Andy Müller-Maguhn, CCC board member and long-time spokesman, to discuss the challenges and successes of the last three decades. 
  
by Sabine Blanc and Ophelia Noor On November 8, 2011

Fuente:  OWNI.eu

Andy Müller-Maguhn at the Chaos Computer Club in Berlin, November 2011

Since September 1981, the Chaos Computer Club has been bringing together hackers, those passionate enthusiasts of hacking, re-purposing, and information technology. The small group started in Hamburg and moved to Berlin before branching out around Germany and abroad, becoming the first organization of its kind in Europe. Now they have managed to achieve real political influence in the area of digital freedoms and the protection of privacy.

Andy Müller-Maguhn is one of the old guard, having joined in 1985 at the age of 14. A board member and long time spokesman, today Andy juggles several activities: journalism (at Buggedplanet), consulting (IT and communications) and running his own telephone communications encryption company. Talkative, affable, funny and surprisingly sharp, in person he quickly makes you forget about his imposing nerd physique.

The interview took place at the CCC premises in Berlin over a bottle of Club-Mate, the highly caffeinated beverage of choice amongst hackers. It’s an eccentric space overrun by objects reclaimed from the street, the kind that usually abound in hackerspaces: old arcade consoles, a mysterious airport bulletin board, promotional stickers, antediluvian sofas and, of course, cables galore. It all forms a perfect contrast to the bourgeois district of Mitte within which it’s situated.

 

The CCC has just turned 30. When it began, could you have imagined it would become what it has today?

The CCC was established informally in 1981 by I.T. professionals who met to discuss the impact of I.T. tools and their use on society. They put together a list of some of the issues that were arising, such as privacy.

The CCC was more formally set up in 1984, with the release of their magazine Die Datenschleuder (literally The Data Extractor) and the first Chaos Communication Congress. I joined before the CCC became an official association in 1996. I’m one of the oldest! I wanted to share ideas about hacking and meet more people who played around with electronic communications. The CCC brought together people from very different social classes, it was a very heterogeneous group but with common interests. It was unusual and it’s still the case today.

The club was small but we were beginning to become known in Germany, thanks to the hack of Bildschirmtext in 1984. We returned the money of course, and explained to the public what we had been doing.

People were playing around with technology that would become mainstream a decade later, like the Internet. This power to use the network to make something happen on the other side of the world with our small home computers, that was still something really special for us data travelers. At the time in Germany there was a big movement against government interference into the private lives of citizens, especially regarding the public census they wanted to carry out.

When I first arrived, there were 300 people. Today there are more than 3,500 of us, but we can’t accommodate everyone on the premises for health & safety reasons. The congress has grown little by little, and the readership of the magazine has gone from 200 to a thousand people. The quarterly print edition was more important in the 90’s, but now the online news is what gets seen first.

The CCC is still relevant as a forum where all kinds of discussions can take place, where ideas are born, where very different people meet. At the same time, I have to say it’s sometimes chaotic. It’s a very dynamic place, sometimes too dynamic. We don’t pay people, no one gets paid by the CCC. That’s not to do with hacker ethics. We just want people to be here because of the cause and not because of the money, even if that system imposes its own limitations.

 

Right now there’s a buzz around hackers, hacking has become fashionable. Is it something you feel in the CCC?

The way we do things has changed so much. Today this is a global political and cultural movement, which was not always the case. In the 1980’s, very few people understood what we were doing. It was really a subculture. We had a lot of legal problems, so we needed a lot of legal experts to advise us what we could or could not hack, and to help us distinguish between legal activities and grey areas of legality.

France was a good example. If you showed up as a hacker in France, you had two options: go to jail or work for the government. The government was very closely monitoring people who had specific knowledge about systems security. That’s why the hacker scene there hasn’t developed as much.

We’re also seen as a lobby that advocates for the protection of privacy and therefore regulation of personal data, but also for transparency and open technologies, or even self-regulation. In the 2000’s there was the introduction of this term nerd, which to me seemed like some sort of culturally created vindication of people’s right to have no interest in reality or how we treat each other, because we are all really living completely in the “machine”. Which I disagreed with. This geek culture feels a little foreign to me, as an old backpacker. So do the hackerspaces.

 

What does the average member of the CCC look like? You were talking earlier about the great social diversity, is that still the case?

I don’t think there is a typical profile. We are now in the fourth or fifth generation and I stopped counting long ago. The CCC is highly decentralized, we have clubs throughout Germany and worldwide, so the profiles are varied.

At first it was inspired somewhat by the culture of the left. The hardcore hacking scene – the second generation, my generation – was even more varied. But there were still people who were just there looking to help their careers. They would just pass through the club but they also brought a lot of ideas and projects. That’s always the way things have worked.

Now the Internet has brought with it a lot of new employment opportunities. Many members of the CCC work in this sector; they have their own companies as Internet service providers (ISPs) or they manage infrastructural parts of the network. So they come here to share their knowledge, but they also take care of our infrastructural needs and are invested in the ideals upheld by the CCC. As for women, we’re just above 10% female membership.

 

Hackers appear to be being listened to more in German politics now, would you agree?

I think that’s true. If you look at the political environment in Germany, the CCC is an accepted and recognized entity because it has worked to educate the public about technology since the 1980s. We have always dealt with strange stories that were brought to us, about data that disappeared for example, and we could help to explain things like that.

The German media have always seen us as people who know our stuff about technology, its benefits and dangers, and not as guys who work for companies with economic interests.

So we had the power to define ourselves and we have always used that. In the 90’s we were invited to government hearings on questions surrounding the regulation of telecommunications and privacy. We tried to organize public participation on these issues. So we have a history of lobbying for more or less the last 20 years.

We don’t necessarily want to be formally integrated within policy making, but we play an advisory role from the outside. They can’t afford to ignore us completely anymore. The politicians need our expertise and we’re very familiar with the laws, so we can point out their errors. The advantage we have is that some of us at the CCC can look after the more political issues, and others can speak up on more technical issues. We have both sides.

 

Do you think the German hacker scene is influential because of the history of your country? It’s sometimes said that the Germans are more aware of the need for a strong opposition.

Issues such as privacy are very sensitive, especially given the history of East Germany. We know how structural abuse can become dangerous because we’ve done it all. Like putting yellow stars on people before sending them off to death.

So we have an awareness, but that also comes from the German education system. At school you learn the history of Nazism. Germans are anti-authoritarian and anti-didactic. You won’t find anyone here giving orders.

As a German, we have these two conflicting aspects within our cultural genetic code. We aspire to great efficiency and excellent organization in whatever we do. But we also have an intimate understanding of the evil that hierarchical structures can bring to communication, or treating people like objects.


The CCC, in the way it’s set up, is trying to have the best of both worlds. To be aware of the evil that can occur, and also to get things done efficiently.

 

Do you think Germans from the former GDR are culturally more inclined towards DIY because they had to do without and improvise in their daily lives for so long?

The CCC in Berlin was born from the merger of two computer clubs, one in Hamburg and one in East Berlin. I came from Hamburg in 1989 when the government of East Germany was falling apart. We came into contact with the young talent in East Berlin.

They had different ways of handling things, they improvised a lot. They also brought their humor and the experience of having already toppled a government. That’s very important, you should never underestimate how they perceived the West German government. For them it was just an intermediate step – at some point we would have to overthrow this government. It was just a matter of time. The structural differences between what existed in the East and the system in the West are not that great. In Berlin we have a saying that in a socialist or communist system you have humans abusing humans. With capitalism it’s the other way around.

They also had this anti-authoritarian side, and they had come into close contact with the secret services. In Berlin, their experience with the Stasi (the East German secret police) has greatly enriched the CCC. The Stasi are now one of the best documented secret intelligence services that has ever existed. We have all their training manuals and we know the techniques they used to destabilize groups and sow doubt. Their contribution was essential to understanding the modern world, and the mess in Berlin between East and West, with Russian and American influences.

 

What are your biggest successes and regrets?

The congresses have always been a barometer of what was happening. Over time they have become international events, attracting people from around the world. We realize that this is a global movement now. This is a great success.

The CCC is now made up of many clubs around Germany and worldwide, and we’re all connected with each other. Each has its own unique organization, and I see this diversity as an asset.

Then, as individuals, we’ve also gone through a lot of shit, which has taught us a lot. We know what not to do, we have learned the lessons. Now we can function even in difficult circumstances. Whether there are police investigations going on, people getting killed, all kinds of intrigue, difficult discussions involving very opposing points of view.

We have a very strong culture of debate here that might confuse a lot of people. Nobody leaves the room; everyone stays and trades views even if it goes on until 3 in the morning.


But this process of discussion and formulating new ideas is more difficult today because there are so many us. If you asked me who makes up the core of our organization, I couldn’t tell you. In a congress with 3,000 people, there are expectations in the room that have to be addressed. At the same time, it’s not a show. It’s a moment where everyone should be involved. But how do you discuss things with 500 people in the room?

 

So how do you organize it? The Pirate Party uses a tool called Liquid Feedback for example.

Yes, but they are a political party, so they need to reach agreement on certain topics. Liquid democracy also involves delegating a topic to a person who has more knowledge and can act in your best interest.

But for communication we do also use tools, such as chat rooms or Jabber. But I’m a bit conservative about tools like Twitter. I’m sorry but as a German, when I see the word “follower” I think of Nazi Germany. I can’t use it.

 

To return to your regrets, is Daniel Domscheit-Berg one of them?

What should I regret? The problem is that you are recording this interview, and we made an agreement with the CCC spokesmen not to comment on Domscheit-Berg. It’s too controversial. People are very divided on this episode, some think he was a decent guy and others that he was an American spy. I said what I said in my statement, which I think is totally accurate on the subject.

 

What was the decision process to oust him?

The board of the CCC took the decision. In reality, there was already a history of people within the club who were uneasy with his attitude. But we didn’t want to take sides. We like the idea of leaking documents and of providing logistical support for people in a vulnerable position with a government, because we’re in favor of freedom of information. It’s always been one of our goals.

Concerning the personal problems between certain people – we were not there, so we’re not taking sides. But what we didn’t want and what became problematic was that Daniel regularly used the premises of the CCC to give his interviews to the press or television. That left the impression that the CCC was directly involved in the Open Leaks project. All the members here have personal projects or projects that they contribute to. Actually, no one here knew Daniel before he came to us through WikiLeaks, and he was not a long term member of the CCC. He was not asking for permission even though people were constantly reminding him that he should stop this behavior.

What he did at the CCCamp was the last straw. People felt abused by his behavior, the fact that he used the camp as a test for his project and then declared it secure. He still didn’t consult the opinions of the Club. I was not against his project or him as a person. But, for example, during his introductory speech I realized there was no mention of open source software. The structure of the project was not transparent. Nothing was open about OpenLeaks. Everything about it was in opposition to the values and principles of the CCC.

Perhaps I had more of an opportunity to express my discomfort with the situation. I did an interview with Der Spiegel. “This is unacceptable”, that’s what I said. At the same time, I was surprised by people’s reactions. Kicking him out was not my idea but that’s what we agreed in the end, unanimously.

People wanted to give him another chance or to at least wait until the end of the camp. Don’t get me wrong, I understand the desire for harmonious relations in life. But to have consistency in our processes and our political ideas, having frank discussions is unavoidable. It’s much healthier to call things as they are.

 

Hackers affiliated with the CCC have been linked to intelligence services in the past. Some of those stories, such as Karl Koch and Tron, have ended badly. We know that intelligence services are recruiting hackers, sometimes against their will. How do you handle these issues?

When I visited the first conference of hackers in the US, I was surprised to see how government services were openly recruiting there, how it was normal to work for the government. If your value system is based on your technical ability, it doesn’t matter who you’re working for. But if it is based around something like the freedom of information, then the intelligence services represent the opposite of what you believe. Their goal is to keep information secret.

I was invited to a conference in Washington called Open Source Intelligence, and I met some people from the German Embassy who had worked in the offices of the German secret service. I asked them what this culture of secrecy was about, and they told me directly. “We’re trying to slow down processes in order to better control them.”

Hackers, as the CCC define them, want to give everyone the power to know what is going on, in order to help them make an informed decision. So from this point of view, it’s not acceptable for our members to work for these organizations.

We have experienced difficult situations, with Karl Koch, but not just with him. Others have worked for the KGB. It was the Cold War, the 80’s, a difficult time with police investigations, arrests and house searches. It was difficult amongst ourselves as well: who could we trust? Today, it’s pretty much just about money and careers. Of course there are still real spies, and informers, but they’re easily identified and we know how to deal with them. What I find more troubling are the technically talented people who don’t care who pays them, working on the infrastructure of the Internet or intercepting data.

Money has always been an fly trap and not just among young people. Of course, when your situation is not stable financially it becomes easier to sell out. But you have to build a kind of immunity against it.

 

How do you build that immunity?

Karl Koch and Tron are examples of well-known figures who have died for these reasons and they are therefore historical examples for the younger generation. That’s knowledge that we try to pass on. Some people have come to us saying they were tricked into working for the secret services. At first, these are private companies who contact them for a job, but gradually it becomes clear that the work required is less and less innocent.

If you came here and asked someone to hack for the government, they will send you on your way. But if you entice them with a technical challenge that’s relevant to their field, and a little money, it’s not so clear cut. They do that very well. It’s like the story of the boiling frog.

 

Economy, science, telecommunications, etc. The program of the last Chaos Communication Camp was a real political program. Have hackers started to formulate a response to the crisis? Do you believe in their ability to come up with solutions?

From a practical point of view, we use these camps as survival training. For a few days can we provide power, an Internet connection, Club-Mate? All these things…For the first camp we actually lost a lot of money. We didn’t anticipate some essential stuff in terms of infrastructure, such as toilets that flush or having hot water for showers.

This experience can be very useful in other ways. Learning how to build an Internet network when there is no infrastructure available, for example. The hacker scene brings with it this understanding of the principles and the physical characteristics of technology, an approach of raising technical and political questions and being prepared to do everything by yourself. Those that have already done something can share their knowledge with others and everyone contributes, participating in this open system. I don’t know whether what we do is super serious, but it’s at least an approach and a state of mind.

 

What do you think of the Pirate Party? Four of their fifteen members elected to Parliament in Berlin are members of the CCC, is that pleasing?

Let’s put it this way – political parties are complex organizational forms. By participating in this process for at least the past fifty years, you had to agree with what the majority decided, even if you have other ideas or knowledge about it. Hence the existence of micro-groups within the major parties. Democracy has been defined differently. The Pirate Party is an opportunity to get out of this process. I love that idea, it’s nice.

The most interesting thing is to see how many other politicians are afraid of this new organization. They try to get involved in issues surrounding the Internet, they call PR agencies, read the CCC’s articles and try to speak the same language as the younger generation. Politicians can no longer ignore young people, which they did for a long time, and they can no longer be content to talk about networks only when raising the specter of pornography on the Internet.

They’re adopting the “hugging strategy” – “we’re your friends”. They’ve tried to invite us but we keep our distance, even with the Pirate Party. We talk to everyone. The Pirate Party is nice and we’ll see how they get on. What is interesting is that they are careful to keep clear of the traditional functions.

Photo Credits: Ophelia Noor