Please email DT with any DEF CON related links, articles, pictures, etc. Thanks!
12-31-1999SPEECHES NOW ONLINE!
A special thanks to NetNevada for providing network connectivity at DEF CON 6.0
A special thanks to the London Pirate Radio crew for Video & Audio feeds
Tananda has added pictures from DEF CON 6.0, and is working on a ride share page for 7.0!
Speck has just been working on her archive of DEF CON pictures.
Black Cat has put up a directory of her pictures here.
The stolen DC 6.0 Poster was spotted at a party!
Krystalia put her defcon pictures up here.
Snowdog has a directory full of pictures here.
Reverend Krusty has been putting together a DEF CON 6.0 page. [Find new address]
Mike the Monkeyboy has a page that has some real video clips and will soon have pictures of the missing defcon 6.0 signs... [Hmm, I wonder who stole $500 worth of my signs?? :) ] Clip 1 is 56k, clip 2 is T-1.
Evil Pete has his pictures up here at dis.org. [ Find new address]
Freak has put up a section on NevadaUnderground with their stuff from the convention. [section gone]
Deco's cool pictures page is well put together.
People "Hacked" the FREE KEVIN bumper stickers, and an archive page was set up.
A more comprehensive picture archive is being set up by -RAT- [gone?]
Mushin's pictures and links for pretty much the 303 crowd from DEF CON.
Mugugypan's had a small collection of pictures set up.
Kill-9 has set up an Uberspace Media Library that is mostly Real Video, but Real Audio will be up soon!
Kapital's defcon pics. [being redone]
Blisters the Elf's comentary & pictures page is well set up.
Erika has a page up with 52 pictures.. and some are quite cool.
Robert Rouse has put up a page with images.
Courtnee's site at TDYC with pictures from the covnention. [down - New site up soon]
The L0pht's TCP/IP Drinking Game.
Hear it! Real Audio (28k-isdn surestream)
Secret Scientology Update, (Only Partial amount was recorded)
The Black & White Ball.
Live DJ action with your guest DJ's:
Lockpicking demonstration in the main speaking hall by Gurney Halleck and *hobbit*. Gurney has a homepage with his speech and defcon links here. [updated]
Live streaming video & audio was reflected worldwide from the London Pirate Radio site. Archives will be available here!
System Failure had another scavenger hunt with prizes. Check out what was on the list here. [web page moved]
J-Dog has created a simple page for the Group tattoo / piercing occoured at DC 6.0. [elitehackers.org gone]
Here are the questions from Friday.
Hear it! Real Audio (surestream)
See It! Real Media 7 (surestream)
Gurney's Homepage! *Hobbits* Homepage!
Richard Thieme is a business consultant, writer, and professional speaker focused on the human dimension of technology and the work place. His creative use of the Internet to reach global markets has earned accolades around the world. "Thieme knows whereof he speaks," wrote the Honolulu Advertiser. He is "a prominent American techno-philosopher" according to LAN Magazine (Australia), "a keen observer of hacker attitudes and behaviors" according to Le Monde (Paris), "one of the most creative minds of the digital generation" according to the editors of Digital Delirium, and "an online pundit of hacker culture" according to the L A Times.
Thieme's articles are published around the world and translated into German, Chinese, Japanese and Indonesian. His weekly column, "Islands in the Clickstream," is published by the Business Times of Singapore, Convergence (Toronto), and South Africa Computer Magazine as well as distributed to subscribers in 52 countries. Recent clients include: Arthur Andersen; Strong Capital Management; System Planning Corporation; UOP; Wisconsin Power and Light; Firstar Bank; Northwestern Mutual Life Insurance Co.; W. H. Brady Company; Allstate Insurance; Intelligent Marketing; and the FBI.
Bruce Schneier - Author of Applied Cryptography - Tradecraft on Public Networks. Dead drops, semaphores, cut outs, telltales...the tools of spying. In a world of continuous communications and ubiquitous eavesdropping, is there any hope for covert communications? Learn about some old tricks of the trade, and some new ones.
Bruce Schneier is president of Counterpane Systems, the author of Applied Cryptography, and the inventor the Blowfish algorithm. He serves on the board of the International Association for Cryptologic Research and the Electronic Privacy Information Center. He is a contributing editor to Dr. Dobb's Journal, and a frequent writer and lecturer on cryptography.
Ian Goldberg - ISAAC Research Group, UC Berkeley - Cryptanalysis of the GSM Identification Algorithm.
Ian Goldberg is a Graduate Student Researcher and founding member of the Internet Security, Applications, Authentication and Cryptography (ISAAC) research group at UC Berkeley. His research areas include cryptography, security, privacy systems, and digital cash.
Jennifer Grannick - Attorney at Law - A review of several major computer crime cases from the past year or two. [Salgado AKA Smak, Kashpureff and one other] This review will describe the hack (in relatively non-technical terms), what laws applied to criminalize the hack, how the hacker got caught, the prosecution that ensued, and the result of that prosecution. Through these case studies, audience members should be able learn what not to do, and why.
Jennifer Stisa Granick is a criminal defense attorney in San Francisco, California. She defends people charged with computer-related crimes, as well as other offenses. Jennifer has been published in Wired and the magazine for the National Association of Criminal Defense Lawyers.
Lorenzo Valeri - Why are we talking about Information Warfare? Lorenzo will try to assess the reasons of the growing fame of information warfare subject. The world is changing but not that much. He will speak at continuity and changes in information warfare in relation to military and strategic thinking. Most of the ideas developed in relation to information warfare have been thought at the beginning of this century. Moreover, there is the problem of intelligence requirements for performing information warfare. The main argument of his speech can be that what has changed is the TIME and SPEED factors but not the strategic and military thinking behind.
Mr. Valeri is a researcher in the information warfare programme of the International Centre for Security Analysis, which is part of the Department of War Studies, King's College London. He is also a PhD candidate at the Department of War Studies at King's College. His research interests are information security policies, the impact of the Internet and other online services on military and strategic thinking and, in general, non-military threats to national and international security and stability.
Ira Winkler - Author of Corporate Espionage - As I have often said, most hackers display skills that can be picked up by a monkey in a few hours. Hacking is mindless the way the clear majority of hackers seem to be practicing it. In this presentation, you will learn tasks that require real technical skills and abilities. Not only will this provide you with more of a challenge, it will provide you with real marketable skills. If you "really" want to challenge your abilities and stay out of jail, you won't want to miss this session. Otherwise go play with the other Tools Kiddies.
Cult of the Dead Cow - The announcement of Back Orfice, DirectXploit, and the modular ButtPlugins for BO. Last year it was an anniversary world domination party with the divinity of the bovinity + drinks from Lady Carolyn. What will it be this time?!?! The release of the Microsoft their Back Orfice Tool! Read their announcement here, and cow-er in their presence!@# Since the announcement, check out all of their media coverage here, here, here, here, and here.
Mike Peros - Principle of Privacy Electronics - Massive illegal wiretapping exposed. View the evidence from over 65,000 illegal wiretaps from local, state and federal agents, and the ensuing coverup by prosecurits, judges, and even the FBI's Louis Freech! Scanned original documents soon!
Winn Schwartau -President of Interpac, Inc. - Introducing the Time Based Security model and applying military strategies to network and infrastructural securitues.
As president of The Security Experts, Inc & Interpact, Inc., he provides valuable consultation services to industry and governments on Information Warfare, enterprise information security, policy, hackers, US and International policies and standards, electronic privacy and related issues. His work and clients span three continents. He created and still manages the two most popular www sites on the subject: www.Infowar.Com and www.Info-Sec.Com.
Mr. Schwartau is also the author of "Terminal Compromise" which details a fictionalized account of an information war waged on the United States. This prophetic book predicted a number of cyber-events, including the Clipper Chip, chipping, magnetic weapons' assaults, data and hardware viruses, to name a few. He other popular writings include "CyberChrist Meets Lady Luck" and "CyberChrist Bites the Big Apple," which cover underground hacker events, "Firewalls 101" for DPI Press, Information Warfare, Mehrwert Information (Schaffer/Poeschel, Germany), for "Introduction to Internet Security" for DGI and MecklerMedia, several chapters for Auerbach's Internet and Internetworking Security Handbook and Ethical Conundra of Information Warfare for AFCEA Press. He is currently writing two more books (to appear by the end of 1997) and is working on two major movie projects about Information Warfare and privacy..
Austin Hill-President of Zero-Knowledge Systems Inc., and Ian Goldberg - ISAAC Research Group, UC Berkeley. Zero-Knowledge Systems will release the first complete Internet privacy utility for consumers in September 1998. Using full strength, fully exportable encryption technology developed by some of the worlds leading cryptographers this product allows Internet users to become completely anonymous on the Internet, using digital pseudonyms and public key cryptography to establish and authenticate digital identities. The Zero-Knowledge Systems development team includes Ian Goldberg who achieved international recognition for his part in breaking the Netscape encryption scheme as well as the development team of the Archie Internet protocol. Forrester Research has estimated that 9 million people will have purchased an Internet privacy solution by the year 2000. There are currently very few Internet privacy tools on the market making this one of the highest growth areas of Internet business.
Previous to starting Zero-Knowledge Systems, Mr. Hill was the Chief Technology Officer for TotalNet Inc., which was one of the 3 largest Internet Providers in Canada. This company was sold in March 1997 to MPACT Immedia which is Canada's largest E-Commerce company.
Dan Veeneman - Writer & communications consultant - Several low earth orbiting satellite systems are already in orbit, and commercial service is just around the corner. Global wireless voice and data services will be available from handheld terminals. Dan Veeneman will bring us up to date on existing and future systems and answer questions from the audience.
Dan Veeneman has served in various management and technical positions in the computer industry since 1980. He has developed financial programs for the banking, investment and real estate industries, as well as software for a variety of companies including A.C. Nielsen, McDonalds, Reuters and Baxter-Travenol. Dan has installed and supported many local and wide area networks, including a nation-wide data delivery network. He also has experience supporting Internet connectivity, including Motorola's world-wide Network Information Center. Dan has provided data security and encryption services for a number of government and civilian clients, encompassing video and data delivered over telephone, satellite and the Internet. He also edits a quarterly newsletter concerning cryptography. Dan holds an engineering degree from Northwestern University. Dan also writes a monthly column for Monitoring Times magazine called PCS Front Line.
Marc Briceno is the Director of the Smartcard Developer Association <http://www.scard.org>, the only vendor-independent smartcard industry association. The SDA's member base is comprised of smartcard and security experts in Europe, Asia, the Americas, and Australia. The SDA distributes universal smartcard analysis and integration tools to software developers worldwide.
Tananda has a review and blow by blow page set up. Pictures soon!
The LA Hackers (714)scene has a Top Ten list put together by Professor Feedlebom.
TJ has written up an excellent and extensive bit of coverage. It's in word '97format, and plain text.
Boogah 187 wrote up this long review of his experiences at the convention.
The TOP 14 Things Prof. Feedlebom learned at DEF CON 6.0.. many in jokes.
Infoworld had this nice piece about Black Hat and DEF CON.
CNN has a large section set up covering the convention with audio, video, all the goodies!
Here is a transccript from a CNN piece about DEF CON 6.0.
Inforworld had this Security Watch piece by Stuart McClure and Joel Scambray.
ZDTV's Cyber Crime section has a large section on DEF CON 6.0.
ZDTV also has a raft of video and audio coverage on def con 6.
Computer security: Fear and fascination in Las Vegas.
Baring of 'Back Orifice' lures SRO crowd at DEF CON.
There is a good 3-4 hours of video archived at Pseudo in the section.