|The Last Convention Announcement
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB
DEF CON V Convention Announcement #1.19 (06.30.97)
July 11-13th @ the Aladdin Hotel and Casino in Las Vegas
XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON V Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON V Convention Announcement
XXXXXXxxxxxxXXXXXX X X DEF CON V Convention Announcement
XXXXXxxxxxxxxXXXXXXX X DEF CON V Convention Announcement
XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON V Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON V Convention Announcement
XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON V Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXX DEF CON V Convention Announcement
XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON V Convention Announcement
XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON V Convention Announcement
XXXXXXxxxxxxXXXXXXXXX X DEF CON V Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON V Convention Announcement
XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON V Convention Announcement
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIB
The only convention with free beer!
WHAT: Speakers and partying in Vegas for all hackers
WHEN: July 11th - 13th
WHERE: Las Vegas, Nevada @ the Aladdin Hotel and Casino
COSTS: $30 in advance, $40 at the door
MORE INFO: http://www.defcon.org or email info.at.defcon.dot.org
It's time to brave Las Vegas again for DEF CON! This is an initial
announcement and invitation to DEF CON V, a convention for the "underground"
elements of the computer culture. We try to target the (Fill in your
favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers,
Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks,
Futurists, Artists, Criminally Insane, Hearing Impaired. It seems that
books about the culture are becoming more popular, so of course reporters
are also welcome. You won't be hurt. I promise. Just bring cash for
So you heard about DEF CON IV, and want to hit part V? You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person? You want to do weird shit _away_ from the hotel
where you can't get me in trouble? You have intimate knowledge of the SWIFT
network, and want to transfer millions of dollars to the Def Con account?
Then you're just the person to attend!
What DEF CON is known for is the open discussion of all ideas, the free
environment to make new contacts and the lack of ego. More people have made
great friends at DEF CON over the years than my brain can conceive of. DEF
CON is also known for letting the "Suits" (Government / Corporate) mix with
everyone and get an idea of what the scene is all about. The media makes an
appearance every year and we try to educate them as to what is really going
on. Basically it has turned into the place to be if you are at all
interested in the computer underground.
Now last year over 800 people showed up and threw my whole program for a
loop. I was thinking 500+ people, but when 800 showed up it got a little
crazy for the planning staff. This year I am planning for 1,000. This
way I will be able to accommodate everyone and have less logistical screw-
I would also like to apologize to everyone last year who had temporary
badges for half the convention, etc. I will do all that is possible for
maximum coolness, and minimum hassles. Anyway, enough of my shit, on with
Over the years DEF CON has had many notable speakers. This year there will
be more of an emphasis on technical talks. There will be a separate smaller
room for break-out sessions of more specific topics. While the talks of the
past have been great, it always seems some tech people drop out and general
talks fill in. I will load it tech heavy so when people do drop out there
will still be plenty of meat left for the propeller heads.
There will be some speaking on Friday evening before Hacker Jeopardy, all
day Saturday and Sunday. About 20 people will speak, plus smaller tech
sessions. If you are interested in speaking or demonstrating something
please contact me.
Current speakers include:
[> Nhil - Windows NT (in)security. The challenge response system, NT 5.0
Kerb security services, man in the middle attacks on domain controllers.
This will be a more technical discussion of NT related security.
[> Koresh - Hacking Novell Netware.
[> Yobie - Emerging infrastructures made possible by Java. He will describe
and talk about Java as the foundation for a global, object-oriented
distributed network. New concepts and computing paradigms will discussed
as well as applications for both applications development or straight-out
[> Mudge - System Administrator for L0pht Heavy Industries. He will present
a technical talk on something cool.
[> Clovis - From the Hacker Jeopardy winning team. He will discuss issues
with security and networked object systems, looking at some of the
recent security issues found with activeX and detail some of the
potentials and problems with network objects. Topics will include
development of objects, distributed objects, standards, ActiveX, corba,
and hacking objects.
[> Bruce Schneier - Author of Applied Cryptography and the Blowfish
algorithm - Why cryptography is harder than it looks.
[> FBI Computer Crime Squad - They will make another appearance this year
only if I can bribe them with the audio from last years convention. Can
I do it in time?
[> Richard Thieme - "The Dynamics of Social Engineering: a cognitive map for
getting what you need to know, working in networks, and engaging in
espionage quietly; the uses of paranoia, imagination, and grandiosity
to build the Big Picture.
[> Wrangler - Packet Sniffing: He will define the idea, explain everything
from 802.2 frames down to the TCP datagram, and explain the mechanisms
(NIT, bpf) that different platforms provide to allow the hack.
Wrangler has been programming since seven column paper tape. He is a
loner with the social skills of a California Condor. He has never been
a member of LOD, MOD, or any other group. He has written no books, is
not currently employed, and refuses to discuss what he refers to as "that
credit card provider thing back when I used to do mainframe shit." His
current projects include looking for his next Fortune 100 contract and
writing the DEFCON V virus.
[> Seven - What the feds think of us.
[> Richard K. - Electronic countermeasures, counter espionage, risk
management. Should include a demonstration of electronic
countermeasures equipment as well as a talk on what works, what doesn't,
and the industry.
[> Tom Farley the Publisher of the "Private Line" journal, and Ken
Kumasawa of TeleDesign Management - Toll Fraud in the 90s: Two
perspectives. An overview of phreaking from a hackers point of view and
an industry/security consultants point.
[> Michael Quattrocchi - The future of digital cash and a presentation about
the modernization and state of register-level debit cards; in effect
currently throughout Canada.
[> The Deth Vegetable - "The Cult of the Dead Cow embarks on a new era of
Global Domination for the 21st Century three years early -- if you're
not at Defcon this year, you won't be down with the master plan.
Important announcements and startling new developments that will affect
the entire history of the Computer Underground as you know it."
[> Ira Winkler - Real life case studies of successful and unsuccessful
[> Sameer Parekh - c2.net - Why cryptography is harder than it looks, part
two. A look at implementation and production problems facing people and
companies wishing to develope and distribute strong encryption.
[> Carolyn P. Meinel - Moderator of the Happy Hacker Digest and mailing
lists. She will preside over a seperate Happy Hacker discussion
pannel that will cover the topics of wether or not "newbies" should have
information handed to them, or should they learn for themselves?
[> Dan Veeneman - Low Earth Orbit satellites are nearing the launch stage,
and this talk will cover the different systems that are planned and some
of the services they'll offer. A bit on GPS that wasn't covered last
year as well as the ever popular question and answer section.
[> Hobbit - CIFS is a load of CACA - Random SMB CIFS stuff in Microsfot
[> Cyber - An overview and explanation of available crypto-tools. What
tools and programs do what, when to use them and on what platforms.
From someone who has spent lots of time playing around with the
currently available set of applications.
[> Keith - Has some experience writing firmware for embedded
microcontroller applications, and is giving a technical talk on
applications of microcontrollers in the h/p community.
[> James Jorasch - Hacking Vegas - How to games the gamers. From someone
who used to deal with hotel casino security. What really goes on?
FRIDAY: Network Setup, Sign in, Informal PGP Keysigning at the "PGP table",
Lots of Partying. Capture the Flag Contest Starts at 16:00
On Friday there will be the demonstrations of the Radio Burst Cannon, a
"real" rail gun, and an omni-directional cell phone jammer. Times to be
10:00 - Doors open, sign in starts
10:00 - Movies start in main conference room
16:00 - Capture the Flag II starts
15:30 - Round up and head off for demonstrations of HERF, and
rail gun madness. Nothing may happen, then again..
23:30 - 23:00 James Jorasch - "Hacking Vegas" how to beat the system in
Vegas by someone who knows it inside and out.
23:00 - 03:00 Hacker Jeopardy Starts.
10:00 - 10:50 Richard Thieme - The Dynamics of Social Engineering.
11:00 - 11:50 Yobie - Emerging infrastructures made possible by Java.
12:00 - 12:50 Clovis - issues with security and networked object systems.
13:00 - 13:50 FBI Computer Crime Squad -
14:00 - 14:50 Deth Veggie - Global Domination, cDc style.
15:00 - 15:50 Seven - What the feds think of us.
16:00 - 16:50 Richard K. -
17:00 - 17:50 Tom Farley and Ken K. - Toll Fraud in the 90s: Two
Saturday Breakout Tech Sessions:
Koresh - Novell issues.
Mudge - Secure Coding.
Hobbit - Why CIFS is CACA.
Nihil - NT security issues.
Wrangler - Packet Sniffing.
Keith - firmware for embedded microcontroller applications.
24:00 (Midnight) Final rounds of Hacker Jeopardy.
10:00 - 10:50 Ira Winkler - Industrial Espionage.
11:00 - 11:50 Sameer - Why cryptography is harder than it looks, part two.
12:00 - 12:50 Cyber - An overview and explanation of available crypto-tools.
13:00 - 13:50 Carolyn Meinel - Happy Hacker Panel.
14:00 - 14:50 Michael Q. - The future of digital cash.
15:00 - 15:50 Dan Veeneman - Low Earth Orbit satellites.
Sunday Breakout Tech Sessions:
Happy Hacker track
Panel: "The Newbie Experiments"
Moderator is Carolyn Meinel, author of the Guides to (mostly) Harmless
Hacking series. Other panel members are:
- Matt Hinze, editor of the Happy Hacker Digest.
- Bronc Buster, who runs a Web forum, IRC server and the New Buckaroos Web
site for his fast-growing band of newbies.
- Mark Biernacki of Shellonly.com will talk about this new ISP which is
designed to make it easy for newbies to learn to hack. Just say "Telnet
- Jericho, who will hold forth on "Let the newbies fend for themselves."
We will allow each panel member to open with a brief presentation of his or
her work, followed by debate first among panel members, followed by Q&A from
the audience. We expect some intense debate:-)
Then if the Aladdin hotel hasn't yet been demolished yet by riots, we will
continue with a series of individual presentations:
- Jon McClintock, editor of Happy-SAD (Systems Administrator Digest) will
demonstrate how to install Linux.
- Bronc Buster will hold forth on the Windows 95 denial of service programs
his Web site offers.
- Carolyn Meinel will demonstrate how to read email headers, create, and
decipher forged email.
Breakout Tech Sessions:
16:00 Awards for Capture the Flag
End of it all, cleanup, etc. See you all next year!
[> HACKER JEOPARDY:
Winn is back with Hacker Jeopardy!! The third year in the running!
Can the all-powerful Strat and his crypto-minion Erik, whose force
cannot be contained, be defeated?! Will the powers that be allow
Strat-Meister to dominate this beloved event for the third year in
a row?! Can Erik continue to pimp-slap the audience into submission
with a spoon in his mouth?!? Only Skill, Time, and booze will tell
The Holy Cow will help supply the beer, you supply the answers.
The first round starts at 12 midnight o'clock on Friday and lasts
until it is done. The second and secret rounds will happen Saturday
6 teams will be picked at random and compete for the final round.
There can be only one! Strat's Team, the winners from last year
will defend if all the members can be found.
[> FREE BEER!
Holy Cow will provide free beer tickets! If you are over 21 prepare
to consume "hacker" beers. Actually it's whatever beer they have on
tap, but it's the best beer in Las Vegas. Follow Las Vegas Blvd. up
until you see the florescent cow with the big sunglasses. All taxi
drivers know of this Mecca. Over 1,000 free beers in all!
[> BLACK AND WHITE BALL:
We've talked it over, and the verdict is in. For the last two years
at DEF CON there has been a sort of unspoken Saturday night dress up
event. People have worn everything from party dresses and Tuxedoes
to AJ's ultra pimp Swank outfit with tiger print kilt. This year it
is official. Wear your cool shit Saturday night, be it gothic or PVC
vinyl or Yakuza looking black MIBs. No prizes, just your chance to
be the uber-bustah pimp.
[> THE TCP/IP DRINKING GAME:
If you don't know the rules, you'll figure 'em out.
[> CAPTURE THE FLAG:
ALL NEW, ALL IMPROVED, MORE CONFRONTATIONAL,
1997 ILLUMINATI INVITATIONAL,
CAPTURE THE FLAG, HACKER STYLE.
The goal is to take over everybody else's server while protecting your
own. To cut down on lag time and federal offences we're providing a
playing field of 5 flag-machine networks connected by a big router in
1) No taking the network down for more than 60 seconds.
2) No taking any flag machine (including your own) down for more than
3) In order to be counted in the game, a team's flag machine must
- be directly connected to the network;
- have a text file flag on the machine readable by at least 2
- keep at least 3 *normal* services running in a way that a
client could actually get their work done using them.
- run a web server if technically possible.
4) No goonery/summoning of elder gods/Mickey Finns/physical
coercion... you get the idea. ( You had the idea, but we're
trying to prevent you from using it. )
The field of play :
Each network will have a "server" of some kind on it, called the flag
machine. At the start of the game, these servers will be stock
installations a lot like what you'd see on the average academic/secret
cabal/military/megacorp network. Each of these machines will have a
PGP private key, named root.flag, and a web server.
There will also be a machine to provide DNS, called the scoreboard.
Teams can be one human or more. In order to be a team, you have
to generate 20 256bit PGP key pairs, have a DEFCON goon pgp-sign
them and put the public keys on the scoreboard webserver. We'll
generate a hundred key pairs in advance, so the first five teams can
just grab a floppy disk (if they're trusting).
To prove that you've hacked a flag machine, PGP - sign a message with
the root.flag from the hacked machine, then with one of your own.
Post the doubly-signed message on the scorekeeper web server, and
you've captured that flag (and invalidated the captured root.flag).
When you've captured a flag, decide between conquest and
condescension: either take over the server yourself, or hand it back
to its not-so-eleet owners. To conquer, put one of your PGP private
keys on the captured server to become the next root.flag. (Of
course, you have to properly secure the server to maintain your new
To condescend, just wait until the original owners see their shame
spread across the scoreboard. (It would sure be a pity if
they had to put up a new key before they figured out how you got in
last time, wouldn't it?)
Two Ways to Win:
#1 EVIL EMPIRE: Whoever has the most servers responding with their
teams' private keys at the end wins.
#2 PIRATE: Fabulous prizes will also be given to whoever racks up the
highest total number of flags captured.
Rough game mechanics (why is everyone so untrusting?):
Once every 5 minutes or more, the scoreboard machine will post a
plaintext challenge. Every team that claims to own a server has to
PGP-sign that challenge with the private key registered for that
server and post the signed version on their machine. If a server
can't respond within 3 minutes, then nobody owns it, and it's fair
game to be taken back over by the goons.
Specific rules will be available in print at DefCon before the game
This was a message from The People
[> QUAKE COMPETITION:
This year knightPhlight contacted me and wanted to organize a single
elimination Quake competition to find out who that badest ass 'mo 'fo
is. Check out the web site to get the rules, sign up, or to
donate a computer the greater good of destruction.
It is IMHO that Quake by id Software rules 3D action gaming. But who
rules Quake? We'll find out this July 11th-13th at the DefCon
Conference in Las Vegas. This isn't going to be a networked game
intent on quickly eliminating as many players as possible in a single
round. Rather, one-on-one games will be played to absolutely
determine who the best really is.
Of course, you already know your the best so why would you feel
obligated to prove it? Because we'll give the first place winner
$750. Now, being the wily person you are, I bet you would like to
know where I got the money for the prizes. It'll come from your
registration fee of $7.50. Any half wit can do the math and see the
10,000% return for the winner. But just for entering you'll be in a
drawing for really kewl stuff. If you don't think its kewl you can
just give us your email address and we'll be happy to send you a
couple hundred thousand messages explaining why the prizes are great.
[> NET CONNECTION AND TOPOLOGY:
DefCon 5 Network Plan (v.99)
Media Type: T1 ESF/B8ZS (not D4/AMI)
Service Provider: Las Vegas Digital Internet
Equipment needed Equipment on-hand
CSU/DSU Verilink AS2000's with NCC 2301 cards (JC)
Router Cisco 2501 (Lock)
Net Admin server (Lock )
10bT Hubs 16-port from Lock - need more to populate the room
10bT Cable (miles) Everybody bring their own - will need some extra
to link hubs
This year we are pre-building many of the network boxes so the net
can go up first thing Friday. It looks like we will have a T1 line
and we will break it out to 10 BaseT hubs. If you want in on the
network bring along the appropriate cables and adapters.
More Net Madness! The T1 bandwidth will allow us to do the
following cool stuff:
- Have several color quickcams and a CU-SeeMe reflector site set
up so people not at the con can check out what's going on. During
the convention check out the DEF CON web site to get the location
of the reflector site. You should get and install the software
needed to view CU-SeeMe streams in advance!
- Have a RealAudio server set up to stream the speakers talks to
those who can not attend.
- Potentially play a competitive multi user game(s) over the net.
NOTE! If you wish to participate interactively with the convention
please e-mail me and we can coordinate something. It would be
great to get people from all over the world involved.
[> 5th ANNUAL SPOT THE FED CONTEST:
The ever popular paranoia builder. Who IS that person next to you?
"Like a paranoid version of pin the tail on the donkey, the
favorite sport at this gathering of computer hackers and phone
phreaks seems to be hunting down real and imagined telephone
security and Federal and local law enforcement authorities who the
attendees are certain are tracking their every move.. .. Of course,
they may be right."
- John Markhoff, NYT
Basically the contest goes like this: If you see some shady MIB
(Men in Black) earphone penny loafer sunglass wearing Clint Eastwood
to live and die in LA type lurking about, point him out. Just get
my attention and claim out loud you think you have spotted a fed.
The people around at the time will then (I bet) start to discuss the
possibility of whether or not a real fed has been spotted. Once
enough people have decided that a fed has been spotted, and the
Identified Fed (I.F.) has had a say, and informal vote takes place,
and if enough people think it's a true fed, or fed wanna-be, or
other nefarious style character, you win a "I spotted the fed!"
shirt, and the I.F. gets an "I am the fed!" shirt.
NOTE TO THE FEDS: This is all in good fun, and if you survive
unmolested and undetected, but would still secretly like an "I am
the fed!" shirt to wear around the office or when booting in doors,
please contact me when no one is looking and I will take your
order(s). Just think of all the looks of awe you'll generate at
work wearing this shirt while you file away all the paperwork
you'll have to produce over this convention. I won't turn in any
feds who contact me, they have to be spotted by others.
DOUBLE SECRET NOTE TO FEDS: This year I am printing up extra "I
am the Fed!" shirts, and will be trading them for coffee mugs,
shirts or baseball hats from your favorite TLA. If you want to
swap bring along some goodies and we can trade. Be stealth about
it if you don't want people to spot you. Agents from foreign
governments are welcome to trade too, but I gotta work on my mug
collection and this is the fastest way.
[> RAIL GUN DEMONSTRATION: (Friday)
On Friday afternoon there will be a demonstration of a hand held
rail gun. This garage project should be able to fire a graphite
washer very, very fast.
[> OMNIDIRECTIONAL CELL PHONE JAMMER DEMONSTRAITON: (Friday)
Another interesting creation to be tested on Friday in the desert.
Come along and watch you cell phone antenna explode with power!
See control channels crumble before you.
[> RADIO BURST CANNON DEMONSTRATION: (Friday)
While not quite a HERF gun, this should come close. The RBC should
be able to produce up to or less than one MegaWatt for up to or less
than one second. What will this do? Who knows! Come and find out.
Obviously the above demonstrations will take place away from the
local hospitals and casinos out in the desert someplace, so be
[> Book your room NOW!!! We have a block of rooms, but it is first come,
[> first served. Rooms get released about one month before the convention.
[> Book by June 9th or risk it. The room rates are quite cool this year.
PRIMARY HOTEL: The Aladdin Hotel and Casino
3667 Las Vegas Blvd. South, Las Vegas, Nevada
Built in 1966 it is one of the oldest hotels in Las Vegas that
hasn't been blown up to make room for newer ones. It is quite nice
and has Tennis courts, two swimming pools, Chinese, Vietnamese and
Korean. A Seafood and steakhouse, Joe's Diner and a 24 hour coffee
shop too. It's located next to the MGM Theme park on the strip.
PHONE: 1-800-634-3424, reference the "DC Communications conference"
for reservations. 702-736-0222
RATES: Single & Double rooms are $65 in the Garden section, $85 for
the Tower. Suites are $250 to $350. All costs are plus 8% room tax.
Rollaway beds are available for an additional $15 a night.
STUFF IN VEGAS:--------------------------------------------------------------
Listings of other hotels in Las Vegas, their numbers, WWW pages, etc.
VENDORS / SPONSORS / RESEARCH:-----------------------------------------------
If you are interested in selling something (shirts, books,
computers, whatever) and want to get a table contact me for costs.
If you have some pet research and you want to have the participants
fill out anonymous questioners please contact me for the best way
to do this.
If you want to sponsor any event or part of DEF CON V in return for
favorable mentions and media manipulation please contact me. For
example in the past Secure Computing has sponsored a firewall
[> DEF CON Voice Bridge (801) 855-3326
This is a multi-line voice bbs, VMB and voice conference system.
There are 5 or so conference areas, with up to eight people on each
one. Anyone can create a free VMB, and there are different voice
bbs sections for separate topics. This is a good neutral meeting
place to hook up with others.
The Voice bridge will be changing numbers soon, but the old number
will refer you to the new location. The new spot won't suffer from
[> MAILING LIST
send emial to firstname.lastname@example.org and in the body of the message
include the following on a separate line each.
dc-announce is used for convention updates and major announcements,
dc-stuff is related to general conversation, planning rides and
[> WWW Site http://www.defcon.org/
Convention updates and archives from previous conventions are housed
here. Past speakers, topics, and stuff for sale. Also a growing
section of links to other places of interest and current events.
[> The Third Annual California Car Caravan to DEF CON!
There are also some resources (links to other web sites and text
files) generally related to DefCon--not specifically the California
Caravan. These resources are available at:
[> The DEF CON V Car ride sharing page: Use this site to arrange ride
sharing to the convention from all over North America. If you can
spare a seat for someone, or need to leech a ride go to the ride
sharing page set up by Squeaky.
[> EMAIL dtangent at defcon døt org
Send all email questions / comments to dtangent.at.defcon.dot.org. It has
been said that my email is monitored by various people. If you want
to say something private, please do so with my pgp key (At the
bottom of this announcement) I usually respond to everything, if
not I'm swamped or had a system problem.
[> GIVE ME MONEY! SNAIL MAIL PRE-REGISTRATION
Send all written materials, pre-registrations, etc. to:
DEF CON, 2709 E. Madison, Seattle WA, 98112
If you are pre-registering for $30 please make payable to DEF CON
and include a name to which you want the registration to apply.
I don't respond to registrations unless you request.
DO YOU WANT TO HELP?---------------------------------------------------------
Here is what you can do if you want to help out or participate in
Donate stuff for the continuous giveaways and the various contests.
Got extra ancient stuff, or new cool stuff you don't use anymore?
Donate it to a good cause! One person was very happy over winning
an osborne "portable" computer.
ORGANIZE sharing a room or rides with other people in your area.
Join the mailing list and let people know you have floor space or
some extra seats in your car. Hey, what's the worst that can
happen besides a trashed hotel room or a car-jacking?
CREATE questions for hacker jeopardy (you know how the game is
played) and email them to email@example.com. No one helped out last
year, so this year let's try. Everything from "Famous narks" to
"unix bugs" is fair game.
BRING a machine with a 10bt interface card, and get on the local
network, trade pgp signatures, etc.
FINAL CHECK LIST OF STUFF TO BRING:------------------------------------------
Here is a list of items to bring to DefCon. These are only
suggestions. Your mileage may vary. :)
Items to bring to DefCon
~~~~~ ~~ ~~~~~ ~~ ~~~~~~
- Comfortable shirts and pants/shorts
- Socks, underwear, etc
- Bathing suit
- Toiletries (deodorant, toothbrush, comb, hair spray,..., giant
tub of hair grease, Oxy pads, etc)
- An extra towel (don't leave home without it. Anyway, doesn't
it always seem that you run out of clean towels in the
- Something cool, hip, pimp-o-matic, or ninja-riffic to wear
Saturday night at the Black and White Ball
You can skip the deodorant and extra clothing if all you are going
to do is play "Magic: The Gathering" and "Quake." Everyone else
- Your shades. Vegas is hot. The sun is bright. 'Nuff said.
(If you wear eye glasses, I hear the clip-on, flip-up sunglasses
are quite the fashion statement)
- Sunscreen of at least SPF 100. After spending hundreds of hours
in front of the monitor, who needs the sun to ruin their ghostly
- A hat--preferably with a cool logo or catchy phrase like "Gandalf
Routers," "Netscape," "Microsoft [with "sucks" scrawled below it
in permanent marker]", "I [heart] [insert government institution:
Cops, Feds, etc]"...you get the idea
- Note book, palmtop, or laptop to take notes on during the speeches
- [Micro]casette recorder to record the speeches (or everyone
getting drunk in your room Saturday night, not knowing what they
are saying, with no hope of remembering it...excellent blackmail
- Camcorder (see above...)
- Digital camera--for all of the above reasons PLUS you can
instantly upload the images through the T1 onto the net
- Fake ID for all of you under 18/21
- Fake ID for everyone else, if you're planning something illegal
- Your best jokes (Nooooo! Not the superman joke! Not the pink
- Your best hacking stories...these are all about something "your
friend" did, aren't they? You wouldn't admit to doing anything
illegal, now, would you?
- Someone else's--oops, I mean "your" credit card numbers
- Your drug(s) of choice -- From caffeine to pot to speed to acid
- Zippo and extra fuel. And while you're at it, put an extra flint
(assuming you can find one in the back of your junk drawer) in
the bottom. You always run out at just the wrong time.
- Extra smokez (Splurge: get some cigars or cloves for the weekend)
- Handcuffs and chains, nipple clamps, etc.
- Saran wrap, duct tape, electrical tape, gaffer's tape
- Candles (the drippy kind)
- Your copy of "The Pocket Kama Sutra" (ISBN 0-7894-0437-0)
- That corn starch and water "slime" that Light Ray (I believe) and
others believed to be the ultimate thing, several DefCon's back.
- Laptop w/ Ethernet card
- Extra laptop battery
- A zip drive with a stack of disks containing all your soooper
k-rad haxing utilities and g-files
- 10bt/10b2 cabling
- A small hub
- You did remember to put a packet sniffer on your zip disk, right?
- Every power cord you could possibly need
- A serial cable with a plethora of adapters so you can get each
end to be male/female, 9pin/25pin, null-modem/straight
- Cable to connect the above mentioned digital camera to the laptop
- Scanner (modded, of course)
- Frequency counter (I hear the "Scout" is pretty good)
- HAM radio. Any band, any frequency. You didn't modify it to
transmit on arbitrary frequencies, did you? Naughty monkey!
- An assortment of tuned antennas
- That zip disk has the FCC frequency allocations on it, right?
- Your uber-elite organizer (the DOS based HP palmtops are quite
cool) to collect handles and email addresses from people
- High energy weapons ("Is that an unlicensed nuclear accelerator
on your back?" "No, it's just a HERF gun." "Oh.")
- Laser pointer (don't get kicked out of the hotel again, youz
- Your "white courtesy phone" that you stole from the Monte Carlo
- A microbroadcasting station with plenty of tuneage
- Your lock picks or lock picking gun
- A pocket-sized tool kit containing a modular screwdriver and
plenty of attachments (flathead, philips, torx, hex, etc)
- A pocket knife, pliers and wire cutters--or alternatively a
- Hell, while you're at it: why not some bring bolt cutters, a
sledge hammer, and a hack saw?
- Telephone handset with alligator clips. Or, if you're uber-
31337, you have a lineman's butt set (with the serial number
and telco logo filed off)
- Bubble gum or epoxy putty--anything maleable and hardens.
This is good for fixing hoses under the hood of your car.
It's also useful to jam mechanical sensors (What would happen
if the microwave always though it's door was open? Or if the
elevator always thought there was someone blocking the path
of the door? Wouldn't hotel security be pissed if they
couldn't get into their security room because someone jammed
a toothpick into the keyhole with krazy glue?)
- An alabi
- Cordless electric soldering iron
- Parts box
MY PGP KEY:------------------------------------------------------------------
-----BEGIN PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----