Fact-checked by Grok 2 weeks ago

Chaos Computer Club

The Chaos Computer Club e. V. () is Europe's largest association of , founded in 1981 as a non-profit organization dedicated to analyzing and publicizing the technical and societal effects of computer technology while advocating for and resistance to undue . With approximately 5,500 members, the CCC organizes the annual —a major international held since that attracts thousands for lectures, workshops, and demonstrations on digital security and —and publishes the long-running magazine Die Datenschleuder to share investigative findings on technology's implications. The group has distinguished itself through hands-on security audits, including early unauthorized penetrations of systems like the German postal service's network in 1984 to prove ignored warnings about flaws, and later analyses of state malware such as the Bundes-Trojaner, which exposed backdoors enabling ; these actions, though sparking legal and public debates, have empirically driven improvements in security practices and heightened scrutiny of government overreach in .

Founding and Organization

Establishment in 1981

The Chaos Computer Club (CCC) was founded on 12 September 1981 in by a group of computer enthusiasts led by Wau Holland (real name Frank-Michael Holland) and including Steffen Wernéry. The inaugural meeting took place in the offices of the newspaper , at a table salvaged from the former commune, reflecting the group's countercultural roots and interest in alternative social structures. This gathering marked the formal establishment of Europe's oldest and largest hacker association, initially comprising a small number of members focused on exploring emerging digital technologies. From its inception, the CCC positioned itself as a dedicated to examining the societal implications of computerization, particularly emphasizing , data , and technological in the German-speaking world. The founders, drawing from backgrounds in , , and , sought to counter potential abuses of power in electronic communication systems amid the early personal era and the rise of state-controlled like Bildschirmtext (BTX). Wau Holland, a key visionary, coined the name "Chaos Computer Club" to evoke the unpredictable yet innovative nature of as a tool for societal critique rather than criminality. The group's early structure was informal, evolving into regional "Erfakreisen" (expert circles) and local meetups known as "Chaostreffs," which facilitated hands-on experimentation and knowledge sharing among members. This decentralized model underscored the CCC's commitment to grassroots technical research, distinguishing it from commercial or governmental entities. By prioritizing ethical disclosure of security vulnerabilities—often through public demonstrations—the organization aimed to educate the public and policymakers on digital risks, laying the groundwork for its role as a watchdog on technology policy.

Membership and Internal Structure

The Chaos Computer Club (CCC) is structured as an eingetragener Verein (registered association) under German civil law, governed by its statutes (Satzung) originally adopted on February 16, 1986, and last amended by decision on May 21, 2023. Membership is restricted to natural persons, who qualify as ordinary members upon board approval of their application and payment of the initial annual contribution; the board retains discretion to reject or terminate acceptance within the first membership year without stated cause. The standard annual fee stands at 72 euros, with a reduced rate of 36 euros available to students, pupils, the unemployed, pensioners, and individuals with disabilities upon submission of verifying documentation; fees are prorated from the joining date and remain due for the current year even upon resignation or exclusion. Applications require completion of an official form submitted by mail or email to the membership administration, which issues a unique "Chaos number" for identification and handles subscriptions to the club's magazine, Die Datenschleuder. Supporting members contribute dues without or electoral rights, while honorary members—nominated for exceptional contributions—are exempt from fees but may participate without formal powers. Exclusion from membership occurs at board discretion for conduct damaging the club's reputation, persistent non-payment after reminders (typically after one year), or other grave violations, with affected parties able to appeal to the general assembly within four weeks, suspending their status pending resolution. The club enforces a , updated unanimously at the April 2025 general meeting in , barring membership alignment with ideologies or organizations contradicting its core principles of information freedom and societal , such as right-extremist groups. Governance centers on the general assembly (Mitgliederversammlung), the supreme decision-making body, which convenes biennially or extraordinarily upon board or member petition (with five percent quorum threshold); it elects the board and auditors, amends statutes by three-quarters majority, and decides by simple majority otherwise, with one vote per ordinary member and no proxies permitted. The board (Vorstand), elected for two-year renewable terms, comprises five voluntary positions—a chairperson, two deputy chairpersons, a treasurer, and an Erfa representative—responsible for daily administration, finances, staff oversight, and advisory council formation, with expense reimbursement but no salaries. Following the April 6, 2025, general assembly election, the board includes Stefan Böhm as chairperson, Kathrin Grannemann and Tobias Kunze as deputies, Birte Friesel as treasurer, and Mika Andre as Erfa representative. The CCC's internal organization emphasizes , with over two dozen regional subgroups (Erfa-Kreise or experience-exchange circles) operating semi-autonomously in cities and affiliated hackerspaces, coordinating local events, workshops, and advocacy while linking to national initiatives through the board's Erfa representative and annual assemblies. This flat structure aligns with the club's statutes preamble, framing it as a "galactic of living beings" unbound by age, origin, or status, prioritizing collaborative over rigid hierarchy.

Principles and Ethical Framework

Commitment to Information Freedom and Privacy

The Chaos Computer Club (CCC) upholds hacker ethics that emphasize unrestricted access to as a foundational , articulated as "All should be " and the imperative to "make public data available" while "protect[ing] private data." These rules, adapted from Steven Levy's 1984 documentation of early and expanded by the CCC in the 1980s, promote total access to computers and systems that reveal operational realities, coupled with a hands-on approach to learning and a mistrust of centralized in favor of . This framework positions the CCC as advocates for transparency in public data dissemination, viewing information hoarding by institutions as antithetical to societal progress, while insisting on robust safeguards for individual to prevent misuse or . In practice, the CCC's mission includes disseminating knowledge on technologies and risks to empower public awareness and resistance against erosions of . The organization routinely critiques governmental overreach, such as initiatives, arguing that resources spent on network infiltration should instead fund secure infrastructure and technical education. For instance, in January 2015, the CCC demanded universal for online communications, rejecting European proposals for backdoors that would compromise , and called for penalties on unencrypted handling of sensitive information. The CCC has actively opposed legislation perceived to undermine information freedom, including the 2017 Network Enforcement Law (NetzDG), which it condemned as enabling privatized by pressuring platforms to preemptively remove content under threat of fines, thereby stifling minority viewpoints and bypassing judicial oversight. More recently, in October 2025, the group urged rejection of "chat control" proposals, aligning with its broader stance against biometric monitoring and surveillance expansions that violate data protection norms. Through such interventions, including legal challenges and public campaigns, the CCC reinforces its dedication to in communication, prioritizing empirical demonstrations of vulnerabilities to advocate for resilient, privacy-preserving systems over authoritarian controls.

Approach to Hacking and Security Research

The Chaos Computer Club (CCC) defines its approach to hacking and security research through a codified hacker ethics that prioritizes hands-on access to computers and knowledge, the free flow of information, and a profound mistrust of centralized authority in favor of decentralization. Originating from principles outlined in Steven Levy's 1984 book Hackers: Heroes of the Computer Revolution and adapted by the CCC in the 1980s, these ethics explicitly call for judging hackers by their actions rather than extraneous factors like degrees, age, race, or position, while mandating the availability of public data alongside strict protection of private data. This framework positions hacking not as destructive mischief but as a methodical, exploratory practice aimed at uncovering systemic flaws to foster technological improvement and societal benefit. At the core of CCC's methodology is responsible, reflective guided by the mantra "use data, protect private data," which demands ethical conduct beyond technical skill and insists on critical self-examination to avoid misuse of for or harm. The group employs practical experimentation— systems, probing vulnerabilities, and simulating attacks—to demonstrate weaknesses in areas like tools, protocols, and digital infrastructures, often culminating in disclosures to highlight risks and urge remediation. This process integrates knowledge-sharing events, such as workshops and congresses, where findings are presented transparently to educate developers, policymakers, and the , emphasizing , , and mutual within a unbound by formal hierarchies. The views security research as intertwined with broader , challenging instrumental uses of tech that enable control while promoting its potential to enhance life through creative applications, such as generating and in . By rejecting pollution—"don't litter others' data"—and advocating against authority-driven centralization, their work underscores causal links between unexamined systems and erosions, prioritizing empirical demonstrations over theoretical advocacy to drive real-world reforms. This ethic explicitly bars behaviors like or , deeming them incompatible with hacking's constructive ethos, as affirmed in declarations.

Key Technical Demonstrations

BTX System Breach (1980s)

In November 1984, members of the Chaos Computer Club (CCC), including Herwart Holland (known as Wau Holland) and Steffen Wernéry, exploited vulnerabilities in the Bildschirmtext (BTX) system operated by the Hamburger Sparkasse, a Hamburg-based savings bank. BTX was West Germany's national network, launched in the late as a government-backed initiative to provide online information services, including banking transactions, via telephone lines connected to television sets or terminals, with charges billed per session. The system's security relied on a four-digit PIN derived from the last four digits of the user's account number, which the CCC identified as easily guessable due to its predictability and lack of additional authentication layers. On the night of November 16–17, 1984, the hackers accessed a BTX account without authorization, transferring 135,000 to a second account under their control, then reversing the transaction to return the funds, all while demonstrating that the operations initially left no traceable logs. Prior to the demonstration, the had warned the bank and (the state postal service overseeing BTX) about these flaws, but received no substantive response, prompting the group to publicize the breach on November 19, 1984, through media outlets including and a . The action underscored fundamental weaknesses in early electronic transaction systems, such as inadequate and reliance on static identifiers, which could enable unauthorized access via brute-force or social engineering methods. The BTX hack drew widespread attention to the risks of digital financial services at a time when BTX was promoted as a secure platform for e-commerce and home banking, influencing public and policy debates on data security in West Germany. No funds were permanently misappropriated, aligning with the CCC's stated intent to expose systemic risks rather than commit theft, though the incident led to legal scrutiny of the hackers under West German computer crime laws, which were then nascent. It catalyzed improvements in BTX protocols, including stronger PIN requirements and logging mechanisms, and elevated the CCC's profile as advocates for robust information security through adversarial testing.

GSM Network Vulnerabilities (1990s)

In 1998, members of the (CCC) publicly demonstrated the of a () subscriber identity module () card, exposing critical weaknesses in the system's mechanism. By exploiting flaws in the COMP128-1 algorithm—a proprietary implementation of the A3 and A8 session key generation functions—the group extracted the 128-bit subscriber key () from a target . This process involved issuing approximately 150,000 challenge-response queries to the card via a modified , leveraging the algorithm's predictable output patterns in the signed response (SRES) and ciphering key (Kc) to reconstruct Ki through cryptanalytic analysis. The cloned SIM enabled full impersonation of the original, allowing unauthorized access to the GSM network for voice calls, data services, and location tracking, with all charges billed to the legitimate subscriber. CCC researchers, including key figures like (Boris Floricic), reverse-engineered COMP128-1's internal structure, revealing that it insufficiently protected due to deliberate weaknesses introduced for and export reasons, such as truncated outputs and reliance on a reduced effective key space. This vulnerability stemmed from GSM's design compromise between security and , where operators adopted a single, non-open algorithm from without rigorous independent scrutiny, rendering billions of early SIM cards susceptible to physical attacks requiring only brief access to the card. The demonstration, conducted without network operator cooperation, underscored broader insecurities, including the absence of —SIMs verified the network, but networks did not robustly verify SIMs—facilitating fraudulent and risks when combined with weak stream ciphers like A5/1. CCC's disclosure prompted limited immediate responses from the GSM Association, such as algorithm audits, but upgrades to stronger variants like COMP128-2 and COMP128-3 were gradual, affecting deployment into the ; the event highlighted the risks of closed-source in mass-market systems, influencing later shifts toward open standards like 3G's . No evidence indicates CCC exploited this for illicit gain; the focus was ethical disclosure to advocate for enhanced and in telecommunications infrastructure.

Biometric and Authentication Flaws

In September , shortly after the release of the , members of the Chaos Computer Club (CCC) demonstrated vulnerabilities in Apple's fingerprint sensor by creating a spoofed using a high-resolution of the target's print, glue, and powder to form a thin, flexible mold that successfully unlocked the device. The technique, executed by CCC researcher Jan Krissler (known as "Starbug"), required no specialized equipment beyond a camera and household materials, highlighting the ease of bypassing optical scanners reliant on surface pattern matching without liveness detection. Building on this, in December 2014, Krissler cloned the of German Defense Minister from standard photographs taken at public events, using photo editing software to enhance ridge details and a commercial artificial material to produce a replica that fooled both and GigaFox scanners. This demonstration underscored systemic flaws in biometric systems dependent on publicly obtainable images, as the photos were sourced from distances of 1 to 3 meters without physical contact, raising concerns over their deployment in high-security contexts like government access controls. CCC has extended critiques to other biometrics, with Krissler exposing iris scanning weaknesses in systems like those proposed for devices, where high-resolution images from 3 meters away could generate printable masks to spoof recognition algorithms lacking robust anti-spoofing measures. In authentication beyond biometrics, CCC researchers in August 2022 circumvented Video-Ident protocols—video-based remote identity verification used by German banks—by employing deepfake techniques and manipulated video streams to impersonate users without accessing the underlying biometric data. More recently, in July 2024, CCC illustrated persistent risks in SMS-based two-factor authentication (2FA), showing how service providers' bulk SMS gateways could be socially engineered or exploited to intercept codes, bypassing the second factor entirely despite its widespread adoption as a security enhancement. These demonstrations consistently emphasize that authentication mechanisms, including biometrics, fail against determined low-tech attacks when not paired with multi-layered defenses like behavioral analysis or hardware tokens, prompting CCC to advocate for open disclosure of such flaws to drive systemic improvements.

Project Blinkenlights (2001)

Project Blinkenlights was an interactive public art installation initiated by the Chaos Computer Club (CCC) in Berlin to mark the group's 20th anniversary. The project converted the facade of the Haus des Lehrers building at Alexanderplatz into a massive monochromatic display by placing high-powered lamps behind the windows of the upper eight floors, effectively creating the world's largest computer screen using rudimentary hardware. This setup highlighted CCC's emphasis on innovative, low-cost technical experimentation, transforming an underutilized structure into a visible demonstration of hacker ingenuity visible from afar, including Tegel Airport. Technically, the installation comprised 144 pixels, with each of the 18 windows per floor equipped with a 150-watt mounted on a custom and controlled by relay switches. Approximately 5,000 meters of cabling connected the lamps to a network of three dedicated computers handling overall control, playback, and user interactivity via or web interfaces. Content was rendered in simple black-and-white animations at low resolution, limited by the hardware's on-off states, yet capable of displaying user-submitted short films, drawings via a called Blinkenpaint, and classic games like and . Remote participants accessed these features through the project's at blinkenlights.de, allowing global contributions that cycled through a of submissions. The display operated from , 2001, until , 2002, drawing significant public engagement with roughly daily visitors to the control site and generating crowds at the site itself. Organized by members such as Tim Pritlove and Andy Mueller-Maguhn, it exemplified the club's approach to blending technical demonstration with cultural commentary, occasionally featuring messages like peace symbols amid contemporary events. The project's success underscored the accessibility of digital interactivity using off-the-shelf components, influencing subsequent media architecture initiatives while avoiding reliance on proprietary or surveillance-prone technologies.

Advocacy and Political Interventions

Critiques of Surveillance Legislation

The (CCC) has long opposed surveillance legislation in and the , arguing that such measures disproportionately infringe on fundamental privacy rights and enable unchecked state overreach without adequate safeguards or proven necessity. In a expert opinion on the German data retention law (Vorratsdatenspeicherung), the CCC detailed how mandatory storage of telecommunications metadata—such as call durations, locations, and connections—permits reconstruction of individuals' daily routines, social networks, and private activities, effectively ending anonymous and unobserved communication. The group contended that the law's broad application lacks proportionality, as it collects data on innocents en masse for speculative future investigations, violating constitutional protections under Article 10 of the German Basic Law. In response to proposed expansions of , the CCC issued warnings in 2023 against a draft law on "digital violence" that would indirectly mandate retention of addresses and user data from online platforms, describing it as a "massive intrusion into citizens' " disguised as . The organization has similarly criticized efforts to weaken through legislative backdoors, signing an in 2019 that rejected such mandates as they undermine global IT security and facilitate abuse by both governments and criminals. On the international front, the CCC condemned the Cybercrime Convention draft in August 2024 as a "surveillance agreement" that grants excessive powers for data interception and compelled decryption, potentially criminalizing security researchers and journalists while ignoring standards. Regarding EU proposals, the group urged the German government in October 2025 to reject the "Chat Control" regulation (CSAR), which requires scanning encrypted messages for child sexual abuse material, warning that it introduces incompatible with encryption commitments in Germany's coalition agreement. The CCC has also advocated for a Europe-wide ban on biometric surveillance laws permitting facial recognition, highlighting in June 2024 how such technologies enable real-time tracking without judicial oversight, as evidenced by flawed accuracy rates and discriminatory error margins in peer-reviewed studies.

Staatstrojaner Analysis (2011)

In October 2011, the Chaos Computer Club (CCC) reverse-engineered and publicly analyzed a program known as Staatstrojaner, deployed by the Bavarian Criminal Office (Landeskriminalamt Bayern) for remote monitoring of suspects' computers under judicial warrants. The , developed by DigiTask GmbH, was designed to enable keylogging, screen capture, and access, and file exfiltration, ostensibly limited to communications data as permitted by German law. CCC obtained the anonymously and disassembled it, revealing implementation flaws that undermined its security and proportionality. The analysis exposed multiple vulnerabilities, including the use of weak encryption with a hardcoded key, default administrator passwords unchanged from vendor defaults, and unrestricted remote code execution capabilities that allowed unauthorized third parties to load arbitrary programs or escalate privileges beyond the warrant's scope. For instance, the trojan's command-and-control server lacked proper authentication, enabling man-in-the-middle attacks, while its logging mechanisms could be disabled remotely, evading oversight. CCC demonstrated these issues through proof-of-concept exploits, arguing that the software not only failed to protect innocent users' data but also exported " with a " unfit for use. Following the October 8, 2011, publication of CCC's report, including excerpts and diagrams, several German states admitted deploying similar variants, prompting investigations by the Federal Ministry of the Interior and parliamentary inquiries. The Bavarian interior ministry defended the tool as compliant but acknowledged partial flaws, leading to temporary halts in its use. CCC's findings contributed to subsequent rulings, such as in 2014, deeming unrestricted content surveillance via trojans unconstitutional without strict safeguards, emphasizing the risks of overreach in digital investigations. This episode highlighted tensions between state security needs and privacy protections, with CCC positioning its disclosure as a necessary check on unchecked technical incompetence in tools.

Engagements with Political Parties and Data Leaks

The Chaos Computer Club has exerted significant influence on the (PIRATEN), which traces its origins to the broader hacker subculture encompassing CCC members and events. Founded in 2006, the adopted core CCC principles such as , opposition to excessive , and demands for transparent information policies, with early activists often overlapping between the two groups. This alignment facilitated informal collaborations, including shared advocacy on issues like and criticism of proprietary voting software, though CCC maintained its non-partisan stance by avoiding formal endorsements. In contrast, CCC's interactions with established parties like the (CDU) have involved direct security disclosures leading to disputes over data handling. In May 2021, CCC-affiliated security researcher Lilith Wittmann identified a in the CDU's "CDU Connect" app, where an unprotected exposed of approximately 18,500 volunteers—including addresses and profile photos—and 1,350 registered users, encompassing full addresses, birth dates, and stated political interests. Wittmann promptly reported the flaw responsibly to the CDU, Germany's federal CERT team (CERT-Bund), and Berlin's data protection authority, adhering to protocols. The CDU responded by immediately shutting down the app on May 25, 2021, and notifying potentially affected users of the exposure risk, but then initiated a criminal complaint against Wittmann for alleged unauthorized access, which the party withdrew on August 4, 2021, amid public backlash, accompanied by an apology from CDU digital policy spokesperson Stefan Hennewig. criticized the initial complaint as an attempt to intimidate ethical researchers—""—and announced on August 5, 2021, that it would terminate all future cooperation with the CDU, including refusals to disclose additional vulnerabilities unless mediated through independent authorities. This episode underscored 's policy of prioritizing empirical security assessments over political alliances, while highlighting perceived deficiencies in parties' incident response maturity. Beyond specific incidents, has engaged parties through advisory roles on election integrity, such as analyzing insecure vote-counting software like PC-Wahl in 2017, which multiple parties relied upon, and urging reforms to prevent manipulation without attributing faults to any single entity. These interventions reflect CCC's broader pattern of non-partisan technical scrutiny, often pressuring parties across the spectrum to address systemic data risks rather than endorsing partisan outcomes.

Events and Knowledge Dissemination

Chaos Communication Congress Series

The is the Chaos Computer Club's annual flagship conference, held over four days from December 27 to 30, emphasizing discussions on , , and utopian possibilities. Established in 1984 as the club's primary gathering for knowledge exchange, it originated in , , and has since become Europe's premier conference, drawing participants interested in digital security, advocacy, and critical infrastructure analysis. The event format includes expert lectures, interactive workshops, hands-on demonstrations, assembly meetings, and entertainment such as live music and art installations, fostering collaboration among hackers, researchers, journalists, and activists. Attendance has expanded from hundreds in early editions to over 17,000 in recent years, supported by more than 2,000 volunteers, with features like real-time multilingual interpretation in main halls. Venue locations have shifted to accommodate growth: after initial Hamburg events, the congress relocated to Berlin in 1998 for nearly two decades, returned to Hamburg in 2012 for five iterations, moved to Leipzig for three years from 2018, transitioned to a fully remote "rC3" format in 2020 and 2021 amid the , and resumed in-person in Hamburg starting with the 37C3 in 2022. Sessions often highlight ethical hacking demonstrations, critiques of technologies, and policy interventions, aligning with the club's mission to promote transparency and in digital domains. The congress's volunteer-led structure and open call for proposals ensure diverse, peer-reviewed content, positioning it as a key venue for advancing public discourse on information freedom and technological risks.

Chaos Communication Camp and CryptoParties

The Chaos Communication Camp is a quadrennial open-air gathering organized by the Chaos Computer Club (CCC), first held in 1999 as an international for hackers to technical, social, and political ideas in a relaxed outdoor . Held every four years in August over five days near , , the event emphasizes free knowledge sharing among participants, including workshops, demonstrations, and informal networking. Early editions took place near Paulshof in Altlandsberg in 1999 (August 6–8) and 2003, followed by the Luftfahrtmuseum Finowfurt site in 2007 and 2011, with subsequent camps returning to Ziegeleipark Mildenberg in Zehdenick for 2015, 2019, and 2023 (August 15–19). Attendance has grown significantly, reaching thousands of hackers, artists, and activists by recent iterations, fostering self-organized "villages" and infrastructure like temporary networks for collaborative projects. Activities at the camp prioritize hands-on , with participants erecting tents, setting up power grids, and conducting sessions on topics from tinkering to advocacy, all under 's ethos of transparency and . Unlike indoor conferences, the 's remote setting encourages extended stays and emergent communities, such as themed sub-camps focused on specific technologies or causes. The edition, for instance, hosted over 4,000 attendees amid discussions on contemporary issues like policy and resistance. Complementing larger events like the camp, the CCC promotes CryptoParties through its local chapters and congress assemblies to democratize practical and skills. These grassroots workshops, integrated into CCC gatherings since at least the 30th in 2013, teach attendees— from novices to experts—tools for , such as for anonymity and encryption software for data protection. Sessions emphasize knowledge transfer, covering applications like browser extensions for secure data handling and best practices for hosting similar events, aligning with CCC's long-standing for individual empowerment against state and corporate . Local chapters, including in , have organized standalone CryptoParties since the early 2010s, providing free, non-commercial instruction on topics like and metadata minimization. By fostering these decentralized initiatives, the CCC extends its educational outreach beyond formal events, prioritizing verifiable, open-source methods over proprietary solutions.

Publications like Datenschleuder

Die Datenschleuder, translated as "data slingshot," serves as the Chaos Computer Club's primary , emphasizing technical dissections of digital systems, , and critiques of state surveillance. Launched in 1984 with a modest two-page introductory letter outlining the CCC's , the publication has appeared irregularly thereafter, often synchronized with like the Chaos Communication Congress. Issues feature articles on , flaws, and policy implications of technologies such as and . Examples include analyses of the XMPP , intelligence agency networks like the BND, and broader themes of ideology alongside data protection strategies. Print subscriptions operate independently of CCC membership, while digital editions in PDF and ePUB formats are freely downloadable, fostering community submissions and reflecting the club's commitment to dissemination. Beyond Die Datenschleuder, the CCC has issued specialized books like the Hackbibel series, which detail practical and ethical methodologies as of editions released around 2024. These complement the magazine by providing focused, actionable resources, though the club prioritizes event media archives and audio formats like the monthly Chaosradio broadcast for ongoing discourse over additional periodical prints.

Karl Koch's Involvement and Suicide (1980s)

Karl Koch, born on August 22, 1965, in , , joined the Chaos Computer Club (CCC) in the early 1980s as a young enthusiast exploring boundaries. While loosely associated with the CCC during this period, Koch operated through an independent hacking group that was not sanctioned by the , which later distanced itself from his activities. His pseudonym, "," derived from the countercultural The Illuminatus! Trilogy, reflected his immersion in conspiracy theories and esoteric interests. In 1986, Koch collaborated with hackers including to breach U.S. military networks via , targeting sites such as the and the U.S. European Command (USEUCOM). The group extracted non-critical data, which Koch sold to a KGB agent, , in for cash and drugs amid his struggles with and financial desperation. This , known as the "KGB Hack," marked one of the earliest documented cases of state-sponsored cyber-espionage involving Western hackers, though the intelligence obtained was of limited strategic value. Koch's motivations blended ideological fascination with conspiracy narratives and personal gain, rather than direct alignment with CCC's advocacy for transparency and . Following investigations triggered by U.S. authorities detecting the intrusions, Koch faced charges related to and unauthorized access. He was arrested but released pending trial, agreeing to cooperate with prosecutors, which exposed internal tensions within circles and drew media scrutiny to the CCC's peripheral links. On May 23, 1989, Koch, aged 23, was last seen alive before driving to a forest north of Hannover near , where his charred body was later discovered, having been doused in and set ablaze. Authorities ruled the death a by self-immolation, citing the absence of signs of struggle and the presence of a melted canister, though no was found. Speculation of foul play persists among associates and theorists, fueled by the timing shortly before his testimony, his paranoia over conspiracies, and the dramatic method, but forensic evidence supported the official determination without conclusive proof of external involvement. The incident underscored risks in underground but did not implicate the directly, which maintained its focus on ethical over .

Domscheit-Berg Internal Dispute (2010s)

Daniel Domscheit-Berg, a former WikiLeaks spokesperson and CCC member since the mid-2000s, faced internal repercussions within the Chaos Computer Club following his departure from WikiLeaks in September 2010 and the launch of his alternative platform, OpenLeaks. Domscheit-Berg had initially connected with Julian Assange at the CCC's 2007 Chaos Communication Camp, which facilitated his involvement in WikiLeaks' early operations. By 2011, amid escalating public disputes with Assange—including Domscheit-Berg's admission of destroying over 3,500 unpublished WikiLeaks submissions to prevent mishandling—tensions arose over his use of CCC platforms to promote OpenLeaks. On August 11, 2011, during the 's annual summer camp in , Domscheit-Berg presented OpenLeaks, announcing its preliminary launch and soliciting CCC members to test its security features. This action prompted immediate backlash from CCC leadership, who accused him of exploiting the club's reputation and network for personal gain without authorization, thereby risking the organization's impartiality in data transparency advocacy. CCC spokesman Andy Müller-Magahn publicly stated doubts about Domscheit-Berg's integrity, citing concerns over his handling of sensitive materials and the potential for OpenLeaks to undermine broader whistleblower principles through opaque data management. The board formalized the dispute by expelling Domscheit-Berg on August 14, 2011, via an official statement emphasizing the need to protect the club's credibility amid his controversial actions. This decision highlighted internal fractures within the hacking community over ethical standards for handling and organizational independence, with critics arguing that Domscheit-Berg's unilateral destruction of submissions contradicted CCC's emphasis on verifiable . However, following member feedback and a review process, the reversed the expulsion on February 6, 2012, reinstating Domscheit-Berg without further public commentary on the underlying issues. The episode underscored broader debates in the CCC about balancing individual initiatives with collective reputation, particularly in the context of post-WikiLeaks fragmentation, where Domscheit-Berg's failed to gain traction despite initial CCC-adjacent . No ensued, but the dispute strained relations and contributed to scrutiny of whistleblower platforms' internal .

Unauthorized Access Repercussions and Government Responses

In October 1984, members of the Chaos Computer Club (CCC) demonstrated vulnerabilities in the German Bildschirmtext (BTX) online service operated by by gaining unauthorized access to a bank's account and initiating transfers totaling 135,000 Deutsche Marks to a CCC-controlled account. The group promptly reversed the transactions and notified authorities, framing the action as a proof-of-concept to highlight systemic flaws in the nascent . No criminal charges were filed against the perpetrators, though the incident prompted to acknowledge the weaknesses and implement rudimentary fixes, marking an early instance where CCC's unauthorized access yielded without direct legal penalties. During the mid-1980s, loosely affiliated CCC members, including and Karl Koch, conducted unauthorized intrusions into U.S. military and research networks, such as , extracting sensitive data that was subsequently sold to the Soviet for approximately $54,000. was arrested on June 29, 1987, following tracing by astronomer Cliff Stoll, and convicted of espionage on February 15, 1990, alongside two accomplices, facing potential sentences of up to five years under German law. Koch, implicated in the same network, died by suicide in May 1989 amid investigations, amplifying scrutiny on the broader German hacker community. These cases, while not officially endorsed by CCC leadership, led to widespread media condemnation of the group, tarnishing its reputation and prompting internal reflections on affiliations with ideologically motivated actors. German authorities responded to these and similar incidents by intensifying monitoring of hacker associations, contributing to the enactment of stricter data protection statutes like § 202a-c of (StGB), which criminalize unauthorized access and with penalties up to five years imprisonment. Subsequent police actions included raids on CCC-affiliated spaces, such as the 2018 searches of the OpenLab and homes of Tor-supporting group Zwiebelfreunde members, justified by tenuous links to anonymous online calls for protests rather than proven . CCC criticized these operations as disproportionate overreach, arguing they reflected government discomfort with privacy advocacy rather than evidence of criminality, though no convictions directly tied to CCC-organized unauthorized access have resulted in modern cases.

Imitation Groups and Fraudulent Claims

In 1989, French intelligence agency Direction de la Surveillance du Territoire (DST), via informant Jean-Bernard Condat and handler Jean-Luc Delacour, orchestrated the creation of the Chaos Computer Club France (CCCF) in as a entity imitating the German Chaos Computer Club to penetrate and monitor emerging French networks. This sham organization masqueraded as an official national affiliate, hosting fabricated events and gatherings to attract genuine for intelligence gathering, but operated without any affiliation to or endorsement from the authentic CCC. The deception was later exposed through disclosures by former participants and community investigations, highlighting state-sponsored mimicry to subvert digital subcultures under the guise of grassroots activism. Beyond institutional imitations, the CCC's name has been exploited in online fraud schemes, particularly emails purporting to originate from a ""—a misspelled variant leveraging the CCC's established reputation for technical exploits. These campaigns, documented since August 2019, falsely claim hackers accessed victims' email and webcam data between specific dates (e.g., March to September 2024 in recent variants), demanding payments (often 0.5–1 BTC) to withhold alleged compromising videos or information. Such impersonations follow standard templates, fabricating details without evidence of actual intrusion, and prey on recipients' fears amplified by the CCC's real-world demonstrations of vulnerabilities like spoofing. No genuine CCC involvement exists in these operations, which authorities classify as opportunistic scams unrelated to the group's ethical principles.

Recent Developments and Broader Impact

Activities from 2020 Onward

The Chaos Computer Club resumed its annual after a hiatus following the 36C3 in 2019, with the 37C3 titled "Unlocked" held from December 27 to 30, 2023, in , focusing on themes of digital access and amid post-pandemic recovery. This event marked a return to in-person gatherings, featuring lectures on , , and societal impacts, with subsequent editions including the 38C3 "Illegal Instructions" in 2024 and preparations for the 39C3 "Power Cycles" scheduled for 27 to 30, 2025, emphasizing energy, power dynamics, and technological cycles. In response to pandemic-era digital tools, the CCC criticized Germany's contact-tracing app in April 2021, demanding an immediate moratorium due to its flawed software, dubious , and irregularities in awards, which risked user privacy through inadequate handling. The organization also scrutinized centralized versus decentralized approaches in tracing apps, highlighting pseudonymization delays and potential for government overreach in data collection. From 2024 onward, the CCC intensified efforts against expansions, signing an in December 2024 rejecting recommendations for unrestricted access to and mass scanning of encrypted communications, arguing such measures undermine without proven security benefits. In March 2025, it advocated for "digital firewalls" including bans on biometric in public spaces and untargeted analysis, prioritizing resilience against and corporate overreach. Later that year, in October 2025, the CCC co-published a report with partners decrying the illegality of proposed biometric plans and integrations, citing violations of data protection laws. The CCC continued exposing data vulnerabilities, revealing leaks in February 2025 at legal-tech platforms myright.de and euflight.de, compromising of 325,000 users through misconfigured access controls, and in June 2025 at hotel chain Numa, affecting over 500,000 invoices and identification documents. It also supported ethical hackers in 2024 by fundraising €30,000 at 38C3 for those demonstrating vulnerabilities in railway systems, underscoring ongoing commitments to transparency in . These actions align with the club's tradition of proactive security audits, often prompting affected entities to remediate flaws.

Influence on Policy, Security Practices, and Criticisms of Overreach

The (CCC) has exerted considerable influence on German policy regarding and surveillance. In 2006, CCC researchers demonstrated how Nedap ES3B electronic voting machines could be manipulated without detection, prompting a nationwide debate and legal challenges against their deployment. This analysis contributed to the Federal Constitutional Court's 2009 ruling that electronic voting systems violated constitutional requirements for verifiable elections, mandating transparent, publicly observable processes. CCC's 2011 reverse-engineering of the "Bundestrojaner," a state-authorized deployed by German authorities, revealed severe implementation flaws, including remote code execution capabilities, unencrypted data transmission, and the potential for interception by third parties. The disclosure highlighted risks of abuse and inadequate safeguards, fueling parliamentary inquiries and stricter judicial oversight on "quellen-TKÜ" (source telecommunications ) under Article 10 of the German Telecoms Act, though the practice persisted with modifications. In terms of practices, CCC's demonstrations have promoted principles of and open auditing across sectors. Their exposure of vulnerabilities in systems like biometric passports in and online video identification in underscored the dangers of proprietary, unverified software, advocating for open-source alternatives and rigorous independent testing. These efforts have informed standards, encouraging organizations to prioritize verifiable over opaque implementations, as seen in subsequent EU-wide discussions on frameworks. Criticisms of CCC's methods center on perceived overreach through unauthorized system intrusions to prove points, which some argue blurs ethical lines and could legitimize broader hacking. For instance, the 1986 breach of government networks to uncover suppressed radiation data, while exposing official underreporting, involved illegal access that drew condemnation for circumventing legal channels. Security commentators have also questioned the maturity of debates sparked by CCC's Bundestrojaner analysis, suggesting it overstated risks relative to necessary tools and ignored contextual safeguards. Despite such views, empirical outcomes like policy reforms indicate CCC's interventions have enhanced systemic resilience without evidence of systemic harm from their .

References

  1. [1]
    CCC | Home - Chaos Computer Club
    The Chaos Computer Club e. V. (CCC) is Europe's largest association of hackers. For more than forty years we are providing information about technical and ...Calendar · Club · Kontakt · Kampagne
  2. [2]
    CCC | Chaos Computer Club
    We are a non-profit association and have about 5,500 members. Since 1984 the CCC hosts its annual Chaos Communication Congress and edits its publication Die ...
  3. [3]
    The Chaos Communication Congress - CCC Event Blog
    About · Calendar · Teams · CCC · Recordings · Streaming. Upcoming Event. 27 – 30 Dec 39 ... Between Christmas and New Year's Eve the Chaos Computer Club hosts the ...
  4. [4]
    Hacktivism: The Chaos Computer Club - Purdue cyberTAP
    Nov 21, 2024 · The Chaos Computer Club, founded in 1981, is Europe's largest association of hackers. As an organization they stand for 'freedom of information'.Missing: key achievements
  5. [5]
  6. [6]
    Wau Holland starts Chaos Computer Club, the first computer hacker ...
    Sep 12, 1981 · Wau Holland, a German security analyst, founds the white-hat hacking group on 12th September 1981, in West Berlin. The Chaos Computer Club is ...
  7. [7]
    40 years Chaos Computer Club (2) - CAcert Blog
    Sep 19, 2021 · 40 years ago, the Chaos Computer Club was founded in Germany. Steffen Wernéry (on the picture in the middle) was there from the beginning.
  8. [8]
    Alles ist eins. Außer der 0 - American Women's Club of Hamburg
    Jul 1, 2021 · The Chaos Computer Club was founded by Wau Holland and Steffen Wernéry in West Berlin, September 12, 1981. Hamburg quickly became the main ...
  9. [9]
    RFID Zapper Workshop - Mediamatic
    by Chaos Computer Club. Share. Facebook · Twitter · LinkedIn · Pinterest · E-mail ... CCC was founded in Berlin on September 12, 1981 at the Kommune 1's table in ...
  10. [10]
    The History of the Chaos Computer Club - WIRED
    Jul 7, 2008 · Founded in 1981, it has grown to an astounding 2,000 members. With causes like ensuring secure voting machines, protecting privacy, defeating ...
  11. [11]
    Chaos Computer Club e.V.: Biography - Media Art Net
    The Chaos Computer Club (CCC) was founded in 1981 as an association of computer and media experts who discussed the means of electronic communication.<|separator|>
  12. [12]
    Chaos Computer Club: how did computer 'freaks' in Germany come ...
    Jan 8, 2019 · Read about German hacker collective with a highly political profile that has been very active in the defence of freedom of information and the right to privacy.Missing: notable actions
  13. [13]
    Chaos Computer Club - Lab for the Unstable Media
    The Chaos Computer Club (CCC), founded in 1981 in Berlin, is a large hacker organization advocating for freedom of information and transparency.
  14. [14]
    Satzung des Chaos Computer Club e. V. - CCC
    Satzung des Chaos Computer Club e. V. vom 16.02.1986. Zuletzt geändert durch Beschluss vom 21.05.2023. ... Innerhalb des ersten Beitragsjahres kann der ...§ 3 Mitgliedschaft · § 5 Ausschluss eines Mitglieds · § 8 Mitgliederversammlung
  15. [15]
    CCC Supporter - Chaos Computer Club
    You will also receive our erratically published magazine Die Datenschleuder, which informs about our members' work in an entertaining way. Non-material ...
  16. [16]
    CCC modernizes its incompatibility of membership
    Apr 8, 2025 · At its general meeting in Frankfurt/Main at the weekend, the Chaos Computer Club (CCC) renewed its declaration of incompatibility and adopted it unanimously.Missing: structure | Show results with:structure
  17. [17]
    Vorstand - CCC
    Der Chaos Computer Club ist eine galaktische Gemeinschaft von Lebewesen ... Der Vorstand des CCC besteht laut § 9 der Satzung aus fünf Mitgliedern: dem ...
  18. [18]
  19. [19]
    CCC | Hacker Ethics - Chaos Computer Club
    The hacker ethics evolved in a time when computers were scarce; and the people sharing a machine had to think about rules of cooperation. The last two point are ...
  20. [20]
    German hackers demand full data privacy - DW
    Jan 22, 2015 · The CCC demanded that the millions spent by nations to "militarize" networks to spy on their citizens be invested instead in the construction of ...Missing: commitment freedom principles<|separator|>
  21. [21]
    Chaos Computer Club supports Declaration on Freedom of ... - CCC
    Apr 10, 2017 · The Chaos Computer Club (CCC) joins an alliance of organizations that protests against the adoption of the Network Enforcement Law („ ...Missing: privacy | Show results with:privacy
  22. [22]
    German government must reject chat control - Chaos Computer Club
    Oct 3, 2025 · The German government has declared IT security to be one of its core issues. In its coalition agreement, it promised: „As a matter of principle, ...
  23. [23]
    CCC | Incompatibility of membership - Chaos Computer Club
    Apr 6, 2025 · History. The world has changed in the past 42 years since the Chaos Computer Club set out to analyse the impact of technological development ...Missing: founding | Show results with:founding
  24. [24]
    CCC | Home
    ### Summary of Chaos Computer Club (CCC) Structure and Governance
  25. [25]
    Support-Angebote | Principles - Chaos Computer Club
    "The Chaos Computer Club is a galactic community of living beings, independent of age, gender, ancestry or social status…" Preamble of the CCC statutes. The ...Missing: bylaws | Show results with:bylaws
  26. [26]
    Thomas von Randow, Btx System (1984)
    The hackers seized 135,000 DM, which they then transferred back to the bank. The CCC's data hack aimed to point out security deficiencies in the German Federal ...Missing: 1980s | Show results with:1980s
  27. [27]
    BTX Hack 30th Year Anniversary - Wau Holland Stiftung
    "), who didn't put the CCC hackers in the "Computer criminals" category. ... On Monday, November 19th, 1984, the BTX hack was made public as Wau and ...
  28. [28]
    40 years ago: the Btx hack celebrates a happy birthday | heise online
    Nov 18, 2024 · The famous Btx hack by the Chaos Computer Club in 1984 revealed security loopholes and made the CCC instantly famous.Missing: 1980s | Show results with:1980s
  29. [29]
    Cloning of a GSM mobile phone - akira.ruc.dk
    This web page describes my research into the attack conducted in 1998 by members of the German hacker group, Chaos Computer Club, on GSM's authentification ...Missing: vulnerabilities 1990s
  30. [30]
    Chaos Computer Club breaks Apple TouchID - CCC
    Sep 22, 2013 · The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means.
  31. [31]
    iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer ...
    Sep 23, 2013 · iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club ... The Chaos Club details its methods for the fingerprint hack, which ...
  32. [32]
    iPhone 5S Fingerprint Sensor Fooled by German Hacker Group
    Sep 23, 2013 · A German hacker known as "Star Bug" has claimed to have hacked the iPhone 5S fingerprint sensor.
  33. [33]
    Politician's fingerprint 'cloned from photos' by hacker - BBC News
    Dec 29, 2014 · Hacker Jan Krissler claims to have cloned the fingerprint of a German politician using standard photographs taken at an event.
  34. [34]
    Hackers have minister's fingerprint – DW – 12/28/2014
    Dec 28, 2014 · ... fingerprint can trick the iPhone fingerprint sensor. In ... The Chaos Computer Club, or CCC, is the largest hacker organization in Europe.
  35. [35]
    Chaos Computer Club hacks Video-Ident - CCC
    Aug 10, 2022 · Security researchers with the Chaos Computer Club (CCC) have successfully circumvented established solutions for video-based identification ...Open Source Software And A... · Only A Minor Effort · Fundamental Concerns About...Missing: methodology | Show results with:methodology
  36. [36]
    Second Factor SMS: Worse Than Its Reputation - CCC
    Jul 11, 2024 · The Chaos Computer Club (CCC) now demonstrates a previously neglected attack on 2FA-SMS: Service providers are commonly used to send these ...
  37. [37]
    Hackers Show Light in a New Art | WIRED
    Dec 20, 2001 · Chaos Computer Club has been dazzling, if not completely surprising, Berlin with a lights display that Internet users can program and even play ...
  38. [38]
    Blinkenlights 2001, Germany, Berlin - Media Architecture Biennale
    Blinkenlights 2001 was an interactive computer display in Berlin, using illuminated windows with lamps and a control system, with 144 big pixels.
  39. [39]
    Chaos Computer Club veröffentlicht Stellungnahme zur ... - CCC
    Jul 6, 2009 · Sollte die Vorratsdatenspeicherung vor Gericht Bestand haben, bedeutet das praktisch ein Ende der Freiheit, unbeobachtet und ungestört zu leben" ...Missing: Kritik | Show results with:Kritik
  40. [40]
    Gutachten zur Vorratsdatenspeicherung: Tiefe Einblicke ins Private
    Jul 6, 2009 · Das Gutachten des Chaos Computer Clubs macht deutlich, welch tiefe Einblicke ins Privatleben mit der Vorratsdatenspeicherung möglich sind. So ...
  41. [41]
    Chaos Computer Club warnt vor geplantem Gesetzesvorhaben zu ...
    Apr 12, 2023 · Die dadurch erzwungene Vorratsdatenspeicherung durch die Hintertür wäre ein massiver Eingriff in die Privatsphäre der Bürgerinnen und Bürger.
  42. [42]
    IT security: CCC against weakening of encryption by law
    Jun 11, 2019 · Chaos Computer Club (CCC) signed the open letter against backdoors. TO: German Federal Ministry of the Interior, Building and Community.
  43. [43]
    Cybercrime Convention: Extensive surveillance powers, abuse ...
    Aug 10, 2024 · The UN Cybercrime Convention turns out to be a surveillance agreement that tramples on human rights and endangers IT security experts and journalists worldwide.Missing: critiques legislation
  44. [44]
    CCC calls for ban on biometric surveillance in public spaces
    Jun 23, 2024 · The Chaos Computer Club (CCC) is calling for the long overdue ban on controversial biometric surveillance in public spaces.Missing: position | Show results with:position
  45. [45]
    Chaos Computer Club analyzes government malware - CCC
    The largest European hacker club, "Chaos Computer Club" (CCC), has reverse engineered and analyzed a "lawful interception" malware program used by German ...
  46. [46]
    Chaos Computer Club: Anatomy of a digital pest | FAZ
    Oct 27, 2011 · It sets severe restrictions on the secret services and investigation authorities when they seek permission to infiltrate computers in Germany ...<|separator|>
  47. [47]
    Official Malware from the German Police - Schneier on Security
    Oct 13, 2011 · Official Malware from the German Police. The Chaos Computer Club has disassembled and analyzed the Trojan used by the German police for ...
  48. [48]
    German police accused of using a Trojan backdoor for interceptions
    Oct 19, 2011 · Analysis of Government malware ... Chaos Computer Club analyzes government malware (8.10.2011) http://ccc.de/en/updates/2011/staatstrojaner.
  49. [49]
    [PDF] Analysis State Trojans: Germany exports “spyware with a badge”
    Oct 11, 2011 · The largest European hacker club, "Chaos Computer Club" (CCC), has reverse engineered and analyzed a "lawful interception" malware program used ...
  50. [50]
    Government spyware? – DW – 10/11/2011
    Oct 11, 2011 · The CCC, which came across the software through an anonymous tip, alleges the Trojan was developed by German police forces for intercepting ...Missing: reverse engineering
  51. [51]
    Germany spyware: Minister calls for probe of state use - BBC News
    Oct 11, 2011 · The Berlin-based Chaos Computer Club, external (CCC) said it had analysed a "lawful interception" malware programme called Federal Trojan, used ...Missing: reverse engineering<|separator|>
  52. [52]
    State Trojan again on trial in Constitutional Court - CCC
    Jul 6, 2015 · In 2011, the Chaos Computer Club has analysed a state trojan developed by DigiTask, which has been used by several police authorities. [2] This ...Missing: Bundesamt BKA
  53. [53]
    Pirate politics between protest movement and the parliament
    With its origins in the anarchist-oriented hacker organization the Chaos Computer Club, the Berlin Pirate Party has close ties to the anarchist movement, which ...
  54. [54]
    Dispute erupts between Chaos Computer Club and Germany's CDU ...
    Aug 6, 2021 · According to Wittman's findings, the app's web API had a security flaw that gave unauthorized access to the personal information of 18,500 ...
  55. [55]
  56. [56]
    The CDU's leaky campaign app - Berliner Zeitung
    Aug 10, 2021 · The CDU lodged a criminal complaint against Wittmann after she told the party about a security vulnerability in the CDU-Connect election campaign app.
  57. [57]
  58. [58]
  59. [59]
    PC-Wahl software used in Germany for vote counting lack of security
    Sep 8, 2017 · According to a study conducted by the hacker collective Chaos Computer Club (CCC), the software used in Germany for vote counting is insecure.<|control11|><|separator|>
  60. [60]
    The Hackers Russia-Proofing Germany's Elections - Bloomberg.com
    Jun 26, 2017 · The Chaos Computer Club, a multigenerational army of activists, has made the country's democracy a lot tougher to undermine.Missing: notable actions demonstrations
  61. [61]
    Chaos Communication Congress: A Very German Hacking ... - VICE
    Jan 25, 2016 · Members of dozens of Chaos Computer Club (CCC) chapters spread ... And then just recently, in an echo of the '84 BTX hack, German news ...Missing: demonstration | Show results with:demonstration
  62. [62]
    30C3: 30th Chaos Communication Congress - CCC Event Blog
    The 30th Chaos Communication Congress (30C3) is an annual four-day conference on technology, society and utopia.Missing: details | Show results with:details
  63. [63]
    CCC - Ettus Knowledge Base
    Feb 6, 2018 · Overview. Chaos Communication Congress (CCC) is annual conference organized by the Chaos Computer Club. The congress features a variety of ...
  64. [64]
    38th Chaos Communication Congress
    In December is congress time again: the Chaos Computer Club invites you to the 38th Chaos Communication Congress at the CCH in Hamburg under the motto 'Illegal ...Missing: engagements | Show results with:engagements<|separator|>
  65. [65]
    Feeling and being safe at Chaos Communication Congress - CCC
    Nov 16, 2018 · The Chaos Communication Congress rapidly grew in size over the past few years: From 3,500 attendees in Berlin, we scaled to 6,000, then 12,000 ...Missing: history | Show results with:history
  66. [66]
    Chaos Communication Camp - CCC Event Blog
    The Chaos Communication Camp is an international, five-day open-air event for hackers and associated life-forms. It provides a relaxed atmosphere.
  67. [67]
    Chaos Communication Camp 2023 - CCC Event Blog
    The Chaos Communication Camp is an international, five-day open-air event for hackers and associated life-forms.
  68. [68]
    Cryptoparty - 30C3_Public_Wiki - CCC Event Blog
    Dec 1, 2013 · The Cryptoparty assembly will basically focus on two aspects: Doing practical workshops on cryptographic computer applications; Collecting ...
  69. [69]
    events:cryptoparty [Chaos Computer Club Lëtzebuerg]
    Oct 3, 2021 · Everything you need to know about cryptography in 1 hour by Colin Percival. Read / Watch on! CryptoParty.org · CryptoParty - Handbook.
  70. [70]
    Chaos Computer Club – DW – 12/27/2017
    Dec 27, 2017 · The Chaos Computer Club (CCC) is one of the world's leading white-hat hacker meetings and maker fairs, and its annual general meeting in Leipzig this week was ...Missing: achievements | Show results with:achievements
  71. [71]
    Die Datenschleuder - Chaos Computer Club
    In der Download-Sektion gibt es alle Datenschleudern, derer wir in der pdf-Version habhaft werden konnten, zum kostenlosen Herunterladen. Eventuelle Links zu ...
  72. [72]
    Die Datenschleuder - Issue 95 : Chaos Computer Club
    May 10, 2014 · Die Datenschleuder - Issue 95 ; Topics: Cyberpunk, Hacking, Freedom of Information, Data Privacy, CCTV, Privacy, Cryptography, magazine, zine.
  73. [73]
    Hackbibel 3 - Chaos Computer Club: Books - Amazon.com
    30-day returns200 pages. Language: German. Publisher: Katapult. Publication date: January 1, 2024. Dimensions: 8.23 x 0.59 x 11.65 inches.
  74. [74]
    Hall of Fame: Karl Koch - Search Guard
    May 17, 2023 · In May 1989, he was found dead in a forest near Celle, Germany. The cause of death was officially listed as suicide, although there have been ...
  75. [75]
    Death by Numbers - WIRED
    Aug 27, 1998 · Loosely associated with the Chaos Computer Club in the mid-'80s, Koch headed an independent group not sanctioned by the CCC that stole ...
  76. [76]
    Malicious Life Podcast: Deception - Cybereason
    In 1986, Koch gathered around him a group of young hackers who wanted to make money by hacking into computers. Koch contacted a KGB agent in East Berlin named ...
  77. [77]
    SPY SUSPECT FOUND DEAD - The Washington Post
    Jun 3, 1989 · HANOVER, WEST GERMANY -- The charred body of a West German involved in a club ... Police said the death of Karl Koch, 24, was an apparent suicide.Missing: Chaos | Show results with:Chaos
  78. [78]
    WORLD : Hacker Suspect Apparent Suicide - Los Angeles Times
    Jun 5, 1989 · The body of a man found burned to death Thursday near the city of Gifhorn, about 25 miles east of Hanover, has been identified as that of Karl ...
  79. [79]
    'I Doubt Domscheit-Berg's Integrity': Top German Hacker Slams ...
    Aug 15, 2011 · Former WikiLeaks deputy Daniel Domscheit-Berg has been expelled from Germany's top hacker group, the Chaos Computer Club.Missing: dispute | Show results with:dispute
  80. [80]
    Chaos Computer Club wirft OpenLeaks-Gründer raus - DER SPIEGEL
    Aug 14, 2011 · Streit zwischen Hackern und Enthüller: Der Chaos Computer Club hat Daniel Domscheit-Berg ausgeschlossen. Er soll den guten Ruf des Clubs für ...
  81. [81]
    Assange Battle Escalates: Ex-Wikileaks Spokesman Destroyed ...
    Aug 22, 2011 · Former WikiLeaks spokesman Daniel Domscheit-Berg claims to have destroyed more than 3,500 unpublished files obtained from unknown informants.Missing: dispute | Show results with:dispute
  82. [82]
    Streit nach Sicherheits-Test: CCC schließt Domscheit-Berg aus
    Der Chaos Computer Club (CCC) hat den WikiLeaks-Aussteiger Daniel Domscheit-Berg aus seinen Reihen ausgeschlossen. Als Grund nannte der Vorstand die ...
  83. [83]
    Chaos Computer Club schließt Ex-Wikileaks-Sprecher aus - Wirtschaft
    Aug 16, 2011 · Daniel Domscheit-Berg - Chaos Computer Club schließt Ex-Wikileaks-Sprecher aus ... Konflikt brach auf und der CCC schloss Domscheit-Berg aus.
  84. [84]
    Hacker: Zweifel an Domscheit-Berg - DIE ZEIT
    Seite 1Chaos Computer Club misstraut OpenLeaks. Seite 2Zweifel an Domscheit-Berg. Der Streit zwischen dem CCC und Domscheit-Berg, der ebenfalls CCC-Mitglied ...
  85. [85]
    CCC macht Entscheidung rückgängig: Domscheit-Berg zurück im Club
    Feb 6, 2012 · Erst raus, nun wieder rein: Der Chaos Computer Club hat den Rausschmiss von Daniel Domscheit-Berg rückgängig gemacht.
  86. [86]
    Streit unter Hackern: Einmal auf die Löschtaste drücken | FAZ
    Aug 24, 2011 · Der Streit zwischen Wikileaks-Gründer Assange, Aussteiger Domscheit-Berg und dem Chaos Computer Club eskaliert. Es geht um die Vernichtung ...
  87. [87]
    Kommentar: Vorstand schmeißt Daniel Domscheit-Berg aus dem CCC
    Aug 14, 2011 · Ich befürchte einfach das einen CCC-internen Konflikt ... Der Vorstand des Chaos Computer Club e.V. hat Herrn Daniel Domscheit-Berg ...<|separator|>
  88. [88]
    First incident of cyber-espionage - Guinness World Records
    The first documented case of cyber espionage was carried out by a group of German computer hackers between September 1986 and June 1987.Missing: mobile | Show results with:mobile
  89. [89]
    COMPUTER HACKERS FACE SPY CHARGES - The Washington Post
    Aug 16, 1989 · The prosecutor's office identified the three suspects, who face prison sentences of up to five years if convicted, only as Markus H., 28, and ...Missing: Chaos Club
  90. [90]
    The KGB Hack: 30 Years Later - media.ccc.de
    Dec 27, 2019 · ... about it. It took three more years of relentless investigation on ... Chaos Computer Club. The reporting on the KGB Hack had a ...
  91. [91]
    Clause 202c of German penal code endangers German IT industry
    Jul 21, 2008 · The CCC also studied, the likely consequences this new law will have and whether the use of potentially harmful software is necessary for the ...
  92. [92]
    Police searches homes of „Zwiebelfreunde“ board members as well ...
    Jul 4, 2018 · On June 20th, board members of the „Zwiebelfreunde“ association in multiple German cities had their homes searched under the dubious pretence that they were „ ...
  93. [93]
    German police raids privacy group's premises
    Jun 20, 2018 · The locations were raided because of an alleged connection to an anonymous internet website, which called for protests against the far-right ...
  94. [94]
    International scenes -.:: Phrack Magazine ::.
    May 27, 2007 · A good example of this was the fake hacking meeting created in the middle 1990' so called the CCCF (Chaos Computer Club France) where a lot ...
  95. [95]
  96. [96]
    'ChaosCC Hacker Group' Email Scam - Enigma Software
    'ChaosCC Hacker Group' Email Scam · A 'Sextortion' Scheme · Do You Suspect Your Computer May Be Infected with 'ChaosCC Hacker Group' Email Scam & Other Threats?
  97. [97]
    Remove “ChaosCC hacker group” email scam - Soft2Secure
    Sep 4, 2019 · One of such hoaxes circulating in August 2019 revolves around an impersonation of the ChaosCC hacker group, which is probably a peculiar way the ...<|separator|>
  98. [98]
    Lectures, music, art, punk: Join us at the 39th Chaos Communication ...
    Sep 28, 2025 · The Chaos Computer Club (CCC) is inviting to the 39th Chaos Communication ... The deadline for all submissions for the stages is October 24, 2025, ...Missing: activities | Show results with:activities
  99. [99]
    Luca App: CCC calls for an immediate moratorium
    Apr 13, 2021 · Dubious business model, defective software, irregularities in the awarding of contracts: The Chaos Computer Club (CCC) demands an immediate end ...Missing: criticism | Show results with:criticism
  100. [100]
    Germany's epic corona-tracing debate: a risky game with public trust
    May 6, 2020 · ... Chaos Computer Club pointed out delays in the pseudonymization of personal data. Contact tracing: centralized or decentralized? Among all ...
  101. [101]
    Against new excessive surveillance plans - CCC
    Dec 11, 2024 · The Chaos Computer Club signs an open letter rejecting the recommendations of an EU working group that call for unrestricted access to all personal data.
  102. [102]
    CCC demands digital infrastructures that are resilient against ...
    Mar 6, 2025 · We are calling for a serious paradigm shift in German digital policy to prevent the foreseeable abuse of power. Mass surveillance must be clearly rejected.
  103. [103]
  104. [104]
    CCC | Updates
    ### Summary of Chaos Computer Club (CCC) Activities, Statements, and Events (2020–2025)
  105. [105]
    CCC | They have not been trained for this - Chaos Computer Club
    Dec 27, 2024 · We assume that the current lawsuits are aimed at preventing these - and future - publications about such 'illegal instructions'. But at ...<|separator|>
  106. [106]
    Chaos Computer Club condemns e-voting machine - The Register
    Oct 10, 2006 · The German Computer Chaos Club, Europe's largest hacker group, has called for a ban on the Nedap ES3B voting machine and similar computers ...
  107. [107]
    Federal Constitutional Court Stops Electronic Voting Roulette - CCC
    Mar 4, 2009 · The Federal Constitutional Court decided today that the use of voting computers is unconstitutional. Rather, elections in Germany must be ...
  108. [108]
    The Chaos Computer Club Exposes Chernobyl Data
    May 1, 2024 · A deadly incident, fabrication of truth: In 1986, Chaos Computer Club hacked German Govt's systems, revealing Chernobyl data. Read more.
  109. [109]
    German "government trojan" debate is infantile - Risky Business Media
    By now you've likely read about the German Chaos Computer Club's (CCC) reverse engineering of the so-called "Bundestrojaner," or "federal trojan". Someone ...