The introduction of radio in the USA and Germany is compared, the role amateurs played and how the respective authorities reacted to them. Questions arise as to how those reactions were models for the treatment of younger communications technologies, and the different approaches to uncontrolled communication will be sketched out. Is "everybody can listen in" a scary thing? The role of radio amateurs in the introduction of radio and the development of radio legislation is sketched out, as well as the ways in which they were treated (by this legislation). The First World War serves as an important point of reference in making clear the differences between the two countries: The American army could already access a significant number of self-educated amateurs, while in Germany many radio operators where educated during the war for the military, and only became effective as independent amateurs after the war, when they seized military radio equipment in great numbers (the phenomen whose name gave this talk its title). While in the USA self-organised amateur organisations where listened to by Congress regarding radio legislation, and their interest actually considered, in Germany the involvement of many amateurs in the November Revolution scared the authorities so much that they became obsessed with the control and taming of radio, censorship and elimination of 'Funkerspuk' - these aims shaped radio legislation in the Weimar Republic. It was noticed how well radio is suited to broadcasting news, but nobody got the idea that freedom of the press might apply to it, too. One of the consequences was that Goebbels did not so much have to build a new control apparatus for radio than seize an existing one. Later the German quest for control boosted the development and spread of magnetic tape, while the economic interests of the commercial radio networks inhibited its use in the USA. More details in the lecture.
Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.
Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.