
/*** T3SB identifier: bgimgutility-1149 */
@media (max-width: 2560px) {#s1149 {background-image: url("/fileadmin/media/Themen/Gesellschaft/Verschwoerungstheorien/hacking-2903156_1920.jpg") !important;}}@media (min-width: 2561px) {#s1149 {background-image: url("/fileadmin/media/Themen/Gesellschaft/Verschwoerungstheorien/hacking-2903156_1920.jpg") !important;}}@media (max-width: 1920px) {#s1149 {background-image: url("/fileadmin/media/Themen/Gesellschaft/Verschwoerungstheorien/hacking-2903156_1920.jpg") !important;}}@media (max-width: 1200px) {#s1149 {background-image: url("/fileadmin/_processed_/d/b/csm_hacking-2903156_1920_b37b748d59.jpg") !important;}}@media (max-width: 992px) {#s1149 {background-image: url("/fileadmin/_processed_/d/b/csm_hacking-2903156_1920_96f8128bcc.jpg") !important;}}@media (max-width: 768px) {#s1149 {background-image: url("/fileadmin/_processed_/d/b/csm_hacking-2903156_1920_bb1d6ae2c2.jpg") !important;}}@media (max-width: 576px) {#s1149 {background-image: url("/fileadmin/_processed_/d/b/csm_hacking-2903156_1920_17cc850409.jpg") !important;}}

