HOPE 2014 July 18, 2014 to July 20, 2014, New York,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A Conversation with Edward Snowden Edward Snowden We had to keep this bombshell quiet til the last minute since some of the ...
Keynote Address – Daniel Ellsberg Daniel Ellsberg We’re thrilled that the whistleblower of all whistleblowers – Daniel Ellsberg – will be one ...
The Hacker Wars – A Conversation with NSA Whistleblower Thomas Drake Thomas Drake , Vivien Lesnik Weisman Vivien Lesnik Weisman, director of the upcoming documentary film The Hacker Wars, speaks with Drake ...
#radBIOS: Yelling a Database across the Room Richo Healey How can you distribute digital information using only sounds and computers? Frustrated by the lack ...
(Geo)location, Location, Location: Technology and Countermeasures for Mobile Location Surveillance Matt Blaze We all know that law enforcement (and private companies, for that matter) can track you ...
A Beautiful Mosaic: How to Use FOIA to Fight Secrecy, Explore History, and Strengthen American Democracy Michael Morisy , Michael Ravnitzky The Freedom of Information Act (FOIA) is a simple but powerful tool that permits any ...
A Sea of Parts Per Sjoborg Have you heard of Self Re-Configuring Modular Robotics (SRCMR)? This new technology enables robotic modules ...
Apophenia: Hunting for the Ghost in the Machine Wil Lindsay This discussion will look at the practice of exposing anomalies in network communications and computer ...
Are You Ready to SIP the Kool-Aid? Richard Cheshire , Gaston Draque Session Initiation Protocol (SIP) is the gateway drug to VoIP (Voice over Internet Protocol). You ...
Art under Mass Surveillance Mediengruppe Bitnik Mediengruppe Bitnik are contemporary artists. In their talk, they will show two examples of their ...
Ask the EFF – This Year on the Internet Peter Eckersley , Kurt Opsahl , Eva Galperin , Nate Cardozo , Adi Kamdar Hear from lawyers, activists, technologists, and international policy analysts from the Electronic Frontier Foundation, the ...
Barrett Brown and Anonymous: Persecution of Information Activists Gabriella Coleman , Kevin Gallagher , Ahmed Ghappour Barrett Brown, a Dallas-based writer and freelance journalist, was arrested in late 2012 and indicted ...
Biohacking and DIYbiology North of the 45th Parallel Kevin Chen , Connor Dickie , Alessandro Delfanti In the past few years, there have been foundational developments enabling hobbyists and seasoned professionals ...
Bless the Cops and Keep Them Far from Us: Researching, Exploring, and Publishing Findings While Staying out of Legal Trouble Alexander Muentz We all like to tinker and explore. Hacking, exploring, and publishing findings is important to ...
Blinding The Surveillance State Christopher Soghoian We live in a surveillance state. Law enforcement and intelligence agencies have access to a ...
Bootkits: Step-by-Step Eric Koeppen Basic Input/Output System (BIOS) is firmware that boots older machines. Unified Extensible Firmware Interface (UEFI) ...
Bringing Down the Biological System: How Poisons Hack the Body Jennifer Ortiz Poisons can kill… but how? Why are some chemicals beneficial in small quantities but lethal ...
Building an Open Source Cellular Network at Burning Man Willow Brugh , Johnny Diggz There is literally nowhere else on earth where you can run an experimental mobile phone ...
Can You Patent Software? Ed Ryan Patent law is a subject of general loathing among hackers and those in the open ...
Codesigning Countersurveillance Sasha Costanza-chock Recent revelations about massive data collection by the National Security Administration have brought sustained popular ...
Community Infrastructure for FOSS Projects James Vasile At HOPE Number Nine in 2012, James spoke to people about how to build community ...
Community Owned and Operated Cellular Networks in Rural Mexico Peter Bloom , Maka Muñoz Why try to avoid them spying on us on their networks when we could just ...
Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs Josh Datko As more devices join the Internet of Things, it is increasingly important that these devices ...
Cultures of Open Source: A Cross-Cultural Analysis Douwe Schmidt , Sandra Ordonez , Bryan Nunez While a common philosophical and cultural thread ties all of us in open source together, ...
Cyber Security in Humanitarian Projects as a Social Justice Issue Lisha Sterling Without secure code and implementation, humanitarian projects can be used against the very people they ...
Dark Mail Stephen Watt , Ladar Levison The Dark Mail Initiative represents a collaborative effort to bring about a new generation of ...
Disruptive Wearable Technology Becky Stern As technology becomes ever more embedded in the fabric of our society and even our ...
DIY Usability Research: A Crash Course in Guerrilla Data Gathering Kaytee Nesmith Good news: it’s becoming abundantly clear that more and more people want to use surveillance ...
Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists Harlo Holmes , Aurelia Moser , Barton Gellman As developer-journalists, Harlo and Aurelia work with sensitive information about critical investigations of governments, institutions, ...
Echoes of Returns Lost: The History of The Telecom Digest Bill Horne This talk is a brief history of the people and events which shaped The Telecom ...
Electric Waste Orchestra: Learning and Teaching Music, Electronics, Programming, and Repurposing Colten Jackson The technology to turn e-waste into musical instruments is free, open source, and waiting to ...
Elevator Hacking: From the Pit to the Penthouse Deviant Ollam , Howard Payne Throughout the history of hacker culture, elevators have played a key role. From the mystique ...
Ergonomic Human Interface Hacking Carl Haken Do you experience numbness or weakness in your hands? Do you have a permanent case ...
Ethical Questions and Best Practices for Service Providers in the Post-Snowden Era Declan Mccullagh , Nicholas Merrill , Ladar Levison Service providers have always had to shoulder a tremendous ethical burden because of the volume ...
Fuckhackerfucks! An Audience Bashing Johannes Grenzfurthner Johannes of art tech group monochrom will indulge in a public rant about hacker culture ...
G-code: The Programming Language of Machining and 3D Printers Todd Fernandez This talk will provide an explanation of the G programming language commonly known as “G-code.” ...
Hacking Money, from Alexander the Great to Zerocoin Finn Brunton Cryptocurrencies are here. Bitcoin is in the news and in the courts, and many other ...
Hacking the Patent System: The Vulnerabilities That Allow for Bad Patents and How to Stop Them Charles Duan We are hearing about the problems of software patents everywhere: in the tech blogs, in ...
Hearses and Hand-Held Calculators: The Unlikely Connections That Shaped Modern Technology and Tech Culture Bill Degnan Explore unlikely connections between well known milestones in technology, tech culture, and seemingly mundane things ...
How to Prevent Security Afterthought Syndrome Sarah Zatko Outside of the hacker community, security as an afterthought has always been the norm. Too ...
HTTP Must Die Parker Higgins , Yan Zhu We all know that HTTP is insecure, but the Snowden revelations of 2013 showed that ...
I Am The Cavalry: Lessons Learned Fuzzing the Chain of Influence Beau Woods , Andrea m. Matwyshyn , Geoff Shively , Jen Ellis I Am The Cavalry is a relatively new grassroots organization with volunteers from around the ...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices Jonathan Zdziarski The iOS operating system has long been a subject of interest among the forensics and ...
Jumping the Carbon-Silicon Boundary for Fun and (Mostly) Profit Tom Keenan Kevin Warwick made history in 1998 with an RFID chip implanted under his skin. He ...
Keeping Old Code Alive: The Venerable LambdaMOO Server in 2014 Todd Sundsted The LambdaMOO server, the application server that still powers the LambdaMOO online community and that ...
Lessons Learned from Implementing Real Life Whistleblowing Platforms Jurre van bergen , Sacha Van Geffen Whistleblowers and online whistleblowing platforms have received quite a bit of attention recently. Discussions range ...
Lockpicking, a Primer Jos Weyers If you’re curious about what lockpicking is all about, this is the talk for you. ...
Media, Popular Misconceptions, and the CSI Effect – What Does It Mean for InfoSec and Tech Policy? Joshua Marpet , Sandy Clark (mouse) Forensics is tedious and occasionally mind numbing. Exploit discovery and development is extremely detail oriented, ...
Movie: “Algorithm” Jonathan Schiefer A feature-length movie about computer hackers directed by Jonathan Schiefer Running time: 91 minutes (trailer ...
Movie: “Die Gstettensaga: The Rise of Echsenfriedl” Johannes Grenzfurthner A post-apocalyptic science fiction nerd agitprop comedy feature directed by Johannes Grenzfurthner. Running time: 72 ...
Movie: “The Internet’s Own Boy: The Story of Aaron Swartz” Brian Knappenberger A documentary directed by Brian Knappenberger Running time: 105 minutes (trailer at www.takepart.com/internets-own-boy) The story ...
Movie: “War on Whistleblowers: Free Press and the National Security State” Mark Fahey A documentary directed by Robert Greenwald Running time: 67 minutes (more info at www.waronwhistleblowers.com) This ...
Obfuscation and its Discontents: DIY Privacy from Card Swap to Browser Hack Daniel C. Howe Data collection, aggregation, and mining have dramatically changed the nature of contemporary surveillance. Refusal is ...
Per Speculum In Ænigmate Maximus Clarke In the fall of 2013, artist Maximus Clarke was inspired by news of government and ...
Postprivacy: A New Approach to Thinking about Life in the Digital Sphere Tante The social construct of privacy is rather new, a result of the civil society. It ...
PRISM-Proof Email: Why Email Is Insecure and How We Are Fixing It Phillip Hallam-baker We have had the technology to make email secure against criminals and government spies for ...
Privacy-Friendly Hypertext? Do Not Track, Privacy Badger, and the Advertising-Funded Web Peter Eckersley This talk will introduce the design and implementation of Privacy Badger, EFF’s new browser extension ...
Project PM: Crowdsourcing Research of the Cyber-Intelligence Complex Kevin Gallagher , Andrew Blake , Gregg Housh , Joe Fionda , Douglas Lucas In April 2013, the FBI sought information on what the journalist Barrett Brown was doing ...
Reverse Engineering – Unlocking the Locks Matthew Mog If you can’t tear it apart, drive it, or modify it, do you really own ...
Rickrolling Your Neighbors with Google Chromecast Dan "altf4" Petro Take control over your neighbors’ TVs like in the movies! The Google Chromecast is a ...
SecureDrop: A WikiLeaks in Every Newsroom Yan Zhu , Garrett Robinson , William Budington SecureDrop is an open-source whistleblower submission system that media organizations can use to securely accept ...
Securing a Home Router Michael Horowitz Routers sit between all your computing devices and the Internet, making them a perfect target ...
Self Publishing Success John Huntington Just days before HOPE Number Nine, John Huntington released a self-published version of his book, ...
Shortwave Pirate Radio and Oddities of the Spectrum Andrew Yoder Radio has become marginalized and governments are curtailing international shortwave broadcasting, yet these bands remain ...
Showing Keys in Public – What Could Possibly Go Wrong? Jos Weyers If a reporter wants to get the point across that certain people shouldn’t have access ...
Skeuomorphic Steganography Joshua Fried Skeuomorphic steganography is spawned in the terrain where art, code, and digital media interbreed. Steganography ...
Social Engineering Emmanuel Friends The tenth incarnation of this panel, which officially makes it a tradition. One of our ...
Solve the Hard Problem Gillian (gus) Andrews The biases run deep: from early in our school careers, we’re taught that “smart people” ...
Spy Improv: Ask Me Anything Robert Steele The former spy, honorary hacker, former candidate for the Reform Party presidential nomination, and #1 ...
SSL++: Tales of Transport-Layer Security at Twitter Jimio You’ve enabled HTTPS on your site. Now what? How do you protect against sslstrip attacks, ...
Steepest Dissent: Small Scale Digital Fabrication Nadya Peek High precision in fabrication is often required for building useful hardware and tools – including ...
Stupid Whitehat Tricks Sam Bowne How can you improve security at companies that haven’t hired you or given you permission ...
Surveillance, Sousveillance, and Anti-Surveillance: Artistic Responses to Watching Gregg Horton It’s impossible to imagine a world without surveillance. Its presence reflects a symbiotic relationship with ...
Teaching Electronic Privacy and Civil Liberties to Government Greg Conti Privacy advocates and government officials are often at odds. Ironically, both groups want the same ...
Technology and Jamming of XKEYSCORE Robert Graham XKEYSCORE is possibly the most “big-brother” tool in the NSA arsenal, eavesdropping on network traffic ...
The Hidden World of Game Hacking Nick Cano A common misconception in the world of online gaming is the idea that the only ...
The Internet Society Speaks – The History, Futures, and Alternate Directions of the Internet and Its Governance Jeremy Pesner , David Solomonoff , Avri Doria In 1992, TCP/IP co-inventors Vint Cerf and Robert Kahn founded the Internet Society, instilling their ...
The Many Faces of LockSport Deviant Ollam , Doug Farre , Ray , Jos Weyers , Jgor In the past decade, the hacker subculture of LockSport has seen a tremendous explosion. What ...
The Repair Movement Tiffany Strauchs Rad , Sandra Goldmark , Michael Banta , Vincent Lai , Miriam Dym Mending (or fixing/repairing) – part of the spectrum that includes hacking, alteration, and making – ...
The Science of Surveillance Jonathan Mayer The National Security Agency is bound by legal constraints. It hasn’t always followed the rules, ...
The Sex Geek as Culture Hacker Kristen Stubbs “Being a nerd is not about what you love, it’s about how you love it.” ...
The Web Strike Back – Fighting Mass Surveillance with Open Standards Harry Halpin After the Snowden disclosures, it was revealed that the NSA and NIST were subverting the ...
This Is the X You Are Looking For Eric (xlogicx) Davisson , Ruben Alejandro (chap0) When you hear you are being profiled for which books you check out in a ...
Threat Modeling and Security Test Planning Eleanor Saitta How do I figure out if the application I’ve designed is secure? What do I ...
Thwarting the Peasants: A Guided and Rambunctious Tour Through the 2600 DeCSS Legal Files Jason Scott In 2000, a whole lot of movie companies sued a whole lot of people over ...
Travel Hacking with The Telecom Informer Tprophet When people talk to TProphet (also known as The Telecom Informer) about how he travels ...
Unmasking a CIA Criminal Ray Nowosielski “Her name is Alfreda Frances Bikowsky.” While those six words may seem innocuous, according to ...
Updates from the Online Identity Battlefield Aestetix , Kaliya Identitywoman At HOPE Number Nine, aestetix gave a general introduction to the world of nyms (short ...
Usable Crypto: New Progress in Web Cryptography Nadim Kobeissi This talk will provide an outline of the pitfalls, dangers, benefits, and progress when it ...
Using Travel Routers to Hide in Safety Ryan Lackey , Marc Cyberjunky In light of the past year’s NSA revelations and the long history of SIGINT, safe ...
Vigilante Justice: Masks, Guns, and Networks Zimmer Barnes This talk will cover the state of vigilante action around the world, what they fight ...
Visualization for Hackers: Why It’s Tricky, and Where to Start Tamara Munzner Computer-based visualization systems provide visual representations of datasets designed to help people carry out tasks ...
When Confidentiality and Privacy Conflict Daniel Kahn Gillmor We have many mechanisms to provide confidential communications so that network operators and other would-be ...
When Whistleblowers Are Branded as Spies: Edward Snowden, Surveillance, and Espionage Jesselyn Radack When The Guardian and Washington Post published the first stories exposing the National Security Agency’s ...
When You Are the Adversary Quinn Norton If your name isn’t Barton Gellman, Laura Poitras, or Glenn Greenwald, chances are that while ...
Why the Future is Open Wireless Nate Cardozo , Adi Kamdar , Ranga Krishnan How do we begin the movement to create a world of ubiquitous open wireless, where ...
Will It Blend? How Evil Software Clogs the Pipes Michael Sikorski During an investigation, Michael discovered an attacker who was emailing himself from an infected user’s ...
Wireless Meshnets: Building the Next Version of the Web Kevin Carter , Peter Valdez , Kurt Snieckus This panel will feature discussion and debate about the exciting current state of wireless meshnet ...
You’ve Lost Privacy, Now They’re Taking Anonymity (aka Whistleblowing is Dead – Get Over It) Steve Rambam Government and private entities are working to shred privacy and warehouse personal, relationship, and communications ...