Location, Dates & Times


Mobile World Congress 2015 will take place 2-5 March 2015. The event will once again take place at Fira Gran Via in Barcelona, Spain.

The physical address of the venue is:

Fira Gran Via
Av. Joan Carles I,
64 08908 L’Hospitalet de Llobregat,

Unless otherwise noted, all events take place at Fira Gran Via. However, selected events will take place at Fira Montjuïc, a venue 4 km down the road.

Fira Montjuïc
Avda. Reina Maria Cristina,
s/n 08004

Please do not send any MWC materials or shipments to these addresses as they will be refused.


DEF CON 22 – Philip “Soldier of Fortran” Young – From root to SPECIAL: Pwning IBM Mainframes

Publicado el 6 de ene. de 2015

Slides Here:…

From root to SPECIAL: Pwning IBM Mainframes
Philip “Soldier of Fortran” Young
1.1 million transactions are run through mainframes every second worldwide. From your flight to your ATM withdrawal a mainframe was involved. These critical, mainstays of the corporate IT world aren’t going anywhere. But while the hacker community has evolved over the decades, the world of the mainframe security has not.

This talk will demonstrate how to go from meeting an IBM, zSeries z/OS mainframe, getting root and eventually getting system SPECIAL, using tools that exist currently and newly written scripts. It will also show you how you can get access to a mainframe to help develop your own tools and techniques.

This talk will teach you the ‘now what’ after you’ve encountered a mainframe, returning the balance from the ‘computing mystics’ who run the mainframe back to the community.

Phil “Soldier of Fortran” Young is a mainframe security researcher at a large corporation where he develops audit and security requirements guidelines for the various ‘legacy‘ mainframe systems. In polite company he is referred as a ‘Mainframe Security Enthusiast’ and amongst mainframers “that f***ing guy making my life harder”. He has given talks about mainframe security at various security conferences including BlackHat, BSidesLV and Shmoocon. While at work and at home he devotes his time to researching z/OS design and implementation flaws, developing tools and writing articles and resources for other security experts to leverage as they “discover” the mainframe.

twitter: @mainframed767


Pax Americana and the Weaponization of Space #PAXAMERICANA




Actualizado el 7 de feb. de 2012…

The prospect of Earth being ruled from space is no longer science-fiction. The dream of the original Dr. Strangelove, Wernher von Braun (from Nazi rocket-scientist to NASA director) has survived every US administration since WW2 and is coming to life. Today the technology exists to weaponize space, a massive American industry thrives, and nations are maneuvering for advantage.

PAX AMERICANA tackles this pivotal moment. Are war machines already orbiting Earth? Can treaties keep space weapons-free? Must the World capitulate to one super-cop on the global beat?

With startling archival footage and unprecedented access to US Air Force Space Command, this elegant, forceful documentary reveals the state of play through generals, space-policy analysts, politicians, diplomats, peace activists, and hawks.

As if there weren’t enough weapons here on earth, space has become the newest arena for countries around the globe to launch their struggle for supremacy. Denis Delestrac’s film Pax Americana and the Weaponization of Space is packed full of some truly startling facts — everything from the “Rods of God” (space weapons that can launch from orbit) to the fact that fifty cents of every American tax dollar goes towards military spending. The astronomical costs of arming and policing the heavens (more than $200 billion) has largely fallen to the US Air Force, but with China and other nations challenging American supremacy, there is the potential for a war to take place right over our heads.

Comparison of the space race to the sea battles of the 18th and 19th Century are apt, since so many global interests are at stake. As per usual, economics are at the heart of the struggle. Noam Chomsky draws analogies between the US weaponization of space to good old-fashioned colonialism in the tradition of empire. In the name of protecting commercial investment, the US has charged itself with being the arbiter of peace in space. But with the weapons industry replacing almost all other manufacturing in America, is this simply a ruse? Many experts unequivocally state that missile defense is the longest running fraud in the history of US defense. That it, in fact, disguises true American intentions to dominate space as a means of dominating the entire globe. (Getting rid of the anti-ballistic missile treaty was one of the first activities undertaken by the Bush Administration.)

If a space war were to happen, the effects could prove catastrophic. Since there is no way to clean up debris and space junk, it stays in orbit, circling the globe at some 14,000 miles per hour. At this speed, even a pea-sized piece of debris has the capacity to destroy whatever is in its path. This includes satellites that regulate most of the world’s information systems (everything from GPS to banking to media). But with China shooting down one of their own aging satellites, the race shows every sign of heating up. This time, the sky may indeed be falling.

See also…


11S, Historia de una demolicion controlada – Gery Warner ( Ingeniero )

Publicado el 15 de dic. de 2014

Porqué y Cómo se hundieron las Torres Gemelas y La Torre 7 en los atentados del 11S… Gery Warner, Ingeniero miembro de Arquitectos e Ingenieros por la verdad del 11S nos explica su punto de vista como profesional del hundimiento de las Torres, analizando sobretodo lo ocurrido con el Edificio 7 que es donde mas pruebas hay de una demolición controlada.

La Conferencia tuvo lugar el 30 de Octubre en la sede de Plural 21 en Barcelona.

Video Documental “September Clues”:

Si te ha gustado el vídeo haz un “me gusta”
Suscríbete a nuestro canal de youtube:
Visita nuestra web y apúntate a la lista de correo:


Doc 1:…

Doc 2:…

Doc 3:…

Doc 5:…

GERY WARNER ( ingeniero canadiense )

Miembro de la asociación estadounidense

Como fundador del Internacional Tentnology Corporporaton, fue pionero en la arquitectura tensada, creando y patentando estructuras originales de tela durante 40 años. Bajo su dirección,Tentnology desarrolló un innovador software de diseño estructural basado en el análisis de elementos finitos. G. Warner presentó “Tentnology CAE (“ingeniería asistida por ordenador en sus siglas en inglés”) en las universidades de Berlín, Sevilla, UVIC, en la Conferencia de Arquitectura de Costa Rica, la Asociación Internacional de Telas Industriales y en la famosa Escuela de Arquitectura de la Bauhaus. Ingenieros, arquitectos y diseñadores usan el software de Tentnology.

Gery Warner también mostró pruebas explosivas sobre el tema del 11-S a diversos públicos de la prestigiosa Mesa Redonda de Vancouver y de la Bauhaus en Dessau, Alemania. Durante 1970 y 1971 residió en Afganistán, donde desarrolló ropa y se dedicó a la exportación de antigüedades a Canadá.



Producido por: La Caja de Pandora –
Música: Miquel Sala –
Grabado en: Plural 21 –
Traducen: Nicole y Lluís Botinas


Conversations with History: Jennifer E. Sims

Actualizado el 7 de feb. de 2008

Writer, lecturer and consultant Dr. Jennifer Sims joins UC Berkeley’s Harry Kreisler to discuss government intelligence and how it has changed post 9/11. Series: “Conversations with History” [9/2002] [Public Affairs] [Humanities] [Show ID: 6728]

Jennifer Sims Interview: Conversations with History, Institute of International Studies, UC Berkeley

Dr. Jennifer E. Sims

Jennifer SimsDr. Sims is currently a Professorial Lecturer at Johns Hopkins University School of Advanced International Studies (SAIS), a freelance writer and private consultant in Washington D.C. She has served as Deputy Assistant Secretary of State for Intelligence Coordination (1994-98), and as the Department of State’s first Coordinator for Intelligence Resources and Planning (1998-2001), a position reporting directly to the Under Secretary of State for Management. Before coming to the Department of State, Dr. Sims served as Senator John Danforth’s defense and foreign policy advisor and his designee to the Senate Select Committee on Intelligence (1990-94). During her tenure in government, Dr. Sims lectured regularly for the Armed Forces Communications and Electronics Association (AFCEA) and the Defense Intelligence Agency’s training courses for mid-level and senior intelligence managers. On September 21, 1998, the Director of Central Intelligence awarded Dr. Sims with the National Intelligence Coommunity’s Distinguished Service Medal.

Dr. Sims received her BA from Oberlin College and her MA and Ph.D. in European Politics and National Security Policy from Johns Hopkins SAIS. Dr. Sims’ recent publications include Icarus Restrained, An Intellectual History of Nuclear Arms Control, 1945-1960 (Westview Press, 1990); “The Arms Control Process: The US Domestic Context” in Jeffrey A. Larsen & Gregory J. Rattray, Arms Control Toward the 21st Century, (Lynne Riener, 1996); “What is Intelligence? Information for Decision-Makers,” in Roy Godson, Ernest R. May, and Gary Schmitt, U.S. Intelligence at the Crossroads, (Brassey’s, 1995); “The Cambridge Approach Reconsidered” in Daedalus, (Winter 1991); and chapters in numerous edited volumes on arms control and intelligence. During the 1980s, while a research associate with the International Institute for Strategic Studies (London) and L’Istituto Per Gli Studi di Politica Internazionale (Milan, Italy), she published articles on strategic defense and NATO strategy. From 1988 to 1990 she served as U.S. Coordinator for the Nuclear History Program, a multi-national research program administratively based at the University of Maryland.

Jennifer Sims visited the Berkeley campus in the spring of 2002 as a guest lecturer in the class, Issues in Foreign Policy after 911. Read the Conversations with History interview, Intelligence and National Security in a Democracy (February 2002).

Jane Scherr photo

© Copyright 2002, Regents of the University of California

“Protests continue in Ukraine” ~#Ukraine: PM says he doesn’t want country to become a “battlefield” between EU and Russia

Ukraine Prime Minister Mykola Azarov says he does not want his country to become a “battlefield” between the EU and Moscow.



Brussels’ criticism of Russia after Kiev backed out of a trade deal with the EU has prompted a robust response from Moscow. It was “inappropriate” said President Vladimir Putin’s spokesman to speak of pressure from Russia.

On the streets of the capital Kiev opinions among the protesters differed.

“Ukraine is Europe and we have to consider ourselves as Europeans, our culture is closer to Europe. We are fed up with obeying the elder brother (Russia) for the past 70 years,” said Melnikova Olga a pensioner from Kiev.

Another protester Vadim Torpov used more strident language:

“Until the signing of the agreement with the EU if this doesn’t happen we’re going to change the authorities and the only question then will be which way to do it – the military way? Because after yesterday’s beatings by the riot police, people are ready to fight,” he opined.

It was on Monday night that violence flared around a van that some claimed was an undercover police patrol spying on protesters.

Prime Minister Mykola Azarov has confirmed President Viktor Yanukovich will attend the summit in Vilnius with the EU and discuss possible three-way talks on Ukraine’s economic problems which would also involve Russia.

Azarov also announced that Kiev would start talks with Russia on reviving economic relations with Moscow in December. “We will draw up a ‘road-map’ for re-establishing our relations,” he said.

Are you in Ukraine? Send us your thoughts, pictures and videos to witness[at]

Copyright © 2013 euronews

La oposición ucraniana sale a la calle para exigir el acuerdo entre Kiev y Bruselas

Protests continue in Ukraine

Publicado el 25/11/2013

In Ukraine, thousands of demonstrators took part in a second day of protests against their government’s decision to turn its back on a landmark European trade deal. Meanwhile, former prime minister Yulia Tymoshenko has announced from her jail cell that she’s on a hunger strike. Al Jazeera’s Nick Spicer reports from Kiev.

Ukraine: more clashes in Kyiv as protests continue against suspension of EU trade talks





West not Best: Sparks fly as Ukraine rejects EU

Publicado el 26/11/2013

Angry protests in Ukraine erupted into clashes with both police and protesters firing tear gas and pepper spray at each other. Tens of thousands took part in rallies after Kiev backtracked on signing an association agreement with the European Union. That’s as jailed ex-Prime minister Yulia Timoshenko has announced a hunger strike – in support of an EU deal.








US Mounted 231 Offensive Cyber-operations In 2011, Runs Worldwide Botnet

An anonymous reader sends this news from the Washington Post:”U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war, according to top-secret documents [from Edward Snowden]. Additionally, under an extensive effort code-named GENIE, U.S. computer specialists break into foreign networks so that they can be put under surreptitious U.S. control. Budget documents say the $652 million project has placed ‘covert implants,’ sophisticated malware transmitted from far away, in computers, routers and firewalls on tens of thousands of machines every year, with plans to expand those numbers into the millions. … The implants that [an NSA group called Tailored Access Operations (TAO)] creates are intended to persist through software and equipment upgrades, to copy stored data, ‘harvest’ communications and tunnel into other connected networks. This year TAO is working on implants that “can identify select voice conversations of interest within a target network and exfiltrate select cuts,” or excerpts, according to one budget document. In some cases, a single compromised device opens the door to hundreds or thousands of others.”


FBI Taps Hacker Tactics to Spy on Suspects

Law-Enforcement Officials Expand Use of Tools Such as Spyware as People Under Investigation ‘Go Dark,’ Evading Wiretaps



Edificio FBI

Edificio FBI

DOCUMENT : general data protection regulation #data #1984 #1776


#Data USA





Removal of a section of the CMS beam pipe

Over recent weeks, seven components of the beam pipe located at the heart of the CMS detector have been removed. The delicate operations involved have been performed in several stages as the detector opening work has progressed.

Of the seven components concerned, only the central vacuum pipe will be replaced. The other six will be stored in a special radiation-shielded area on the surface and subsequently reinstalled ready for the resumption of machine operation.

This video, which was filmed on 15 May, shows one of the seven components of the vacuum pipe — located to the right of the interaction point — being brought up from the CMS cavern to the surface by the transport team.

NSA Whistleblower Exposes Obama’s Dragnet

An ex-CIA employee working as a contractor at the U.S. National Security Agency said he leaked documents and details of a top secret U.S. surveillance program in order to protect the “basic liberties for people around the world.”

Holed up in a hotel room in Hong Kong, Edward Snowden, 29, said he had thought long and hard before publicizing details of an NSA program code-named PRISM, saying he had done so because he felt the United States was building an unaccountable and secret espionage machine that spied on every American.…

Edward Snowden, the Booz Allen Hamilton staffer with a top-secret security clearance who leaked details of NSA surveillance, is welcome to seek asylum in Iceland, according to lawmaker Birgitta Jónsdóttir and Smari McCarthy, executive director of the International Modern Media Institute, an organization dedicated to protecting whistleblowers.…





[eFoodsDirect] SPECIAL OFFER**


Shadows of Liberty Denver Q&A

Q&A from the U.S. Premiere of Shadows of Liberty hosted by ArgusFest and the Free Press in Denver on April 4, 2013. Speakers from left to right; Jean-Philippe Tremblay, Amy Goodman, Norman Solomon and Robert McChesney. This event was held at the Mercury Cafe and preceded the National Conference for Media Reform.























Good morning Big Brother, I’m watching you.

Good morning Big Brother, I’m watching you.


Data, data, data. Hack the universal code. #HackUniversalCode #HelloDave #werther-bureau #TheGarage #ZombieFarm

5_cirkloj_en_60_60_60_triangulo_v2 (2)

Proyecto: Estudio sobre el código universal. Hack the universal code.

Esta comunidad te necesita. Somos eticos y pacificos, estamos interesados en la decodificación del codigo universal que organiza la realidad que conocemos. Aqui está por ejemplo, Adrian Lamo, Chet Uber, John Draper, Steve Wozniak, etc. Te pido tu opinión sobre el proyecto y que participes. Gracias.

This community needs you. We are ethical and peaceful, we are interested in the decoding of the universal code that organizes the reality we know. Here is, for example, Adrian Lamo, Chet Uber, John Draper, Steve Wozniak, etc.. I ask your opinion about the project and to participate. Thank you.

Project: Study on the universal code. Hack the universal code.


Idiomas oficiales: Inglés y Español.

Este proyecto de investigación consiste en el descubrimiento para su comprensión del código universal que organiza la realidad que conocemos.

Queremos hackear el universo, romper el código para poder interpretarlo. Somos curiosos y queremos saber. Queremos ser los primeros, este es el reto

fundamental, en comprender la teoría del todo. Necesitamos a personas interesadas en el proyecto que puedan aportar información, ideas, derramar luz,

necesitamos programadores, maestros budistas, expertos en genética, matemáticos, hackers, code breakers, científicos generalistas, queremos impulsar un

Nuevo Renacimiento Universal basado en el conocimiento libre, cualquier persona interesada será bien recibida, no pedimos nada y lo ofrecemos todo.

Data, data, data.

Hack the universal code.

Hack the universal code.