HACK PHREAK 101:
This track is for either those people new to the scene or those who want to get into a new area. These are overview talks that give the audience exposure to all the areas of a particular technology skill. For example "An overview of phone switching technology" or "A introduction to network attacks" could be descriptions of talks in this category.
PRIVACY & ANONYMITY:
This track explores privacy issues, both physical and technical. What technical means can be used to protect your network communications? How would you know if you are being followed? What does a "bug sweep" entail? What are the limits of computer forensics? These are just suggested topics, but you get the idea!
Before you can attack or defend it helps to know what is on your network. This track covers the tools and techniques used to explore and map a network as well as passively and actively identify nodes on that network. Suggested topics could include "How to scan an IDS protected network" or "The limits of Passive O/S Detection."
THE BIG PICTURE:
While all this technology is cool, what about the bigger picture? Will you go to jail if you try any of it? Will China kidnap your ass and chop off your hands? This track explores the legal, political, moral, and media side of both legal and illegal hacking.
ATTACK + TOOLS:
It is always easier to attack than defend, and you're going to show why. These talks will cover new attack methods and tools. Talks could cover protocols, applications, embedded devices, and operating systems. Demonstrations, for any talk, are always well received by the audience.
With everything going wireless, this is a chance to show the strengths and weaknesses of various technologies. The technologies covered could be two-way pagers, GSM phones, BlueTooth, Sat-Phones, wireless Ethernet, packet data on HF(or even FRS) radios, Public Safety use of CDPD, etc. There are so many technologies all around us. We want to know what's up with them.
AGENTS, TROJANS & VIRUSES:
Distributed attack and DDoS agents, evil Trojans, super smart viruses, and hybrid tools that combine aspects of all the above. What is the state of the art in this area, and what can be done to defend against them? In the last year much work has been done in this area; let's try to shed some light on them.
This is the more difficult piece of the security puzzle. Talks could cover everything from "How to lock down your FreeBSD install," "Using IPSEC and S/Wan to help protect your network communications," "Using free firewalls, O/S, IDS, and Logging tools to defend on the cheap," or even "Building a web server that is immune to attack as possible" are all of interest. You can see where I am going with these talks. Practical talks that people can go and mess with once they leave the DEF CON.
The Breakout area is a new speaking area for DEF CON TEN, and is an experiment this year. The purpose of the break out area is for people who want to either speak on a topic that will not draw the large numbers needed to take up a big speaking area, or who want more of a classroom setting to deliver their materials. The seating for these talks will be on a first come, first served basis.
What got me thinking about adding this track was this: What if someone wanted to give a talk or class on modifying a TiVO, or some sort of other electronic device? Not everyone in a big room is going to break out and work on a TiVO in their lap, but I would find the talk very interesting, and I am sure others would too. Because we have several smaller rooms this year we are going to give this a try.
If you want to give a breakout talk please submit just as you would for any other talk, but instead of telling us what track you want to speak in, tell us that you want a break out space. Then tell us in detail about the subject, how many people max you can have in the class (For example, if the rooms hold 100 but you only have tools for 50 people to use, set the class size at 50.) and any special requirements the attendees should plan for.
Because this is a new track this year we expect to sort this out as time goes on. Please only submit if you are serious, it is always a pain in the ass when people cancel at the last minute.
Please make your talks as technical as possible, unless you are submitting for the Hack Phreak 101 or the Big Picture Track. DEF CON wants to increase to quality and content of the presentations, and that is why we are paying speakers this year. If you are selected to speak on some uber topic, and then instead give a weak talk, don't expect to get paid.
NOTE: The examples of topics used above are to give ideas and direction to potential speakers, and is not the ultimate list. Because of the unique nature of this conference, the emphasis is on where the rubber meets the road, what is new and cool, major announcements (al la BO2k), and topics hackers wouldn't normally come across.
Talks will be either one hour or one and a half hours in length, and it is expected the speaker will make time for audience participation and Q&A.
Submissions should be in an outline format to give us a good idea of the quality and depth of your speech. Please include what track you are submitting to, and how much time you would like for your talk. If you need more than one LCD wall projector for a demonstration, please advise how many you need. By speaking at DEF CON you are granting DEF CON, Inc. permission to reproduce, distribute, and potentially advertise your presentation on www.defcon.org, in our streaming media Send submissions to email@example.com.
We can accommodate most any request if it enhances your presentation. Current tools made available to speakers include LCD projectors, overhead projectors, and slide projectors.
This year there will be up to two LCD projectors in a session. If your talk requires any sort of demonstration we encourage you to set up a network (Machines can be provided) and have each machine projecting on one of the LCDs. Audience members will be able to follow along what is occurring on each node as the talks progress, or the speaker may provide different information on different screen, etc.
This year the 802.11b network will extend to the speaking areas, so if you need to include net access to your presentation, plan on bringing a WI FI card, or asking for wired (10Bt) network access.
Please forward any additional resource questions to firstname.lastname@example.org. Speakers will be subscribed to a mailing list that includes the other conference speakers in an attempt to allow a level of collaboration between presentations.
This year we are going to increase the quality of the talks by screening people and topics better. I realize you guys are speaking for basically free, but some talks are better than others. Some people put in a bit more effort than others. I want to reward the people who do the work by making sure there is room for them.
After an outline is received speakers will be contacted if there are any questions about their presentations. If your talk is accepted you can continue to modify and evolve it up until the last minute, but don't deviate from your accepted outline.
Talks that are more technical or reveal new vulnerabilities are of more interest than a review of firewall technologies will be given more consideration, as will original content or research that have been created specifically for DEF CON and has not been seen before.
If you are selected we will mail you with information on deadlines for when we need your presentation to be burnt on the CD ROM as well as information for the printed program.
Speakers get in to the show free, get paid $200 (AFTER they give a good presentation!- details to follow should you be selected to speak), get a coolio badge, and people like you more. Heck, most people find it is a great way to get or change a job. I should rename DEF CON to Head Hunter Con.
Than You for or your time.
Any questions please email The Dark Tangent, speaking submissions should get mailed to talks at defcon d0t org