HOPE 9 July 13, 2012 to July 15, 2012, New York

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
3D Printing: Making Friends in DC Before People Start Freaking Out Michael Weinberg This talk is about protecting 3D printing from industries that are not excited about disruption. ... Security
Activist DDoS Attacks: When Analogies and Metaphors Fail Molly Sauter What are we talking about when we refer to activist Distributed Denial of Service (DDoS) ... Security
Advanced Handcuff Hacking Ray Handcuffs always have been a special kind of challenge to lockpickers. This talk will cover ... Security
Advancements in Botnet Attacks and Malware Distribution Aditya K Sood , Rohit Bansal Third Generation Botnets (TGBs) have circumvented the normal stature of the World Wide Web. These ...
An Aesthetic Critique of Fictional Media Sean Mills , Syl Turner This survey of visuals used in motion pictures explores their design implications. Motion pictures play ...
Anti-Censorship and Anti-Surveillance Tools - Improving the Landscape James Vasile Every day, world news informs us of more and greater threats to free communication. Nations ... Security
Anti-Censorship Best Practices: How to Make Keeping It Up Easy and Taking It Down Hard Maymay What do bananas have to do with censorship? What do polyamorous people have in common ... Security
The ARRIStocrats: Cable Modem Lulz Charlie Vedaa , Chris Naegelin The ARRIS TG852G is a DOCSIS 3.0 cable modem/router thats being deployed en masse by ...
The Autism Spectrum and You Mary Robison , Alex Plank , Jack Robison , Kirsten Lindsmith As a kid, were you considered precocious? Considered eccentric (or just plain weird) by other ...
Brain Chemistry: How Psychoactive Chemicals Hack the Central Nervous System Jennifer Ortiz People have been using chemistry to hack their bodies and their brains since antiquity. In ... Security
Building Radios to Talk to the Dead Wil Lindsay Apophenia is the human ability to perceive patterns and meaning in completely random data sets. ... Security
Cell Site Location Data and Nontrespassory Surveillance after U.S. v. Jones Hanni Fakhoury With the rise of smartphones, the governments use of cell site location data to pinpoint ... Security
Combat Robots Then and Now David Calkins , Simone Davalos Fighting robots have been around since the first gearhead figured out that it was really ...
Community Fabrication: Four Years Later Far Mckon One hackers view of the last four years in 3D printing and the expansion of ... Security
Computer Forensics: Possibility, Probability, Opinion, and Fact Joe Cicero How easy is it to end up with illegal content on your computer? How expensive ... Security
Countermeasures: Proactive Self Defense Against Ubiquitous Surveillance Greg Conti , Lisa Shay From governments fighting terrorists to companies hawking products to free online services where you are ...
Crimeware Tools and Techniques of 2012: Past, Present, and Future Alexander Heid Much has evolved in the brief 24 months that have passed since the last presentation ... Security
Cryptome Tracks the NYPD Ring of Steel John Young , Deborah Natsios Cryptomes digital multimedia presentation of original cartography, animations, video, and architectural documentation will explore the ...
DARPA Funding for Hackers, Hackerspaces, and Education: A Good Thing? Mitch Altman , Matt Joyce , Psytek , Willow Brugh , Fiacre Oduinn Mitch Altman caused a stir this spring when he publicly announced that he would not ...
Dead in a Pool of Blood and Millions of Dollars of Net Art Jeremiah Johnson , Don Miller 0-Day Art is a warez group for art, focusing primarily on digitally represented works. The ...
Declassifying Government and Undermining a Culture of Insecurity N/a It is critically important to obtain and publicize declassified government intelligence documents in order to ... Security
Designing Free Hardware: Scratching Your Own Itch with a Soldering Iron Matthew Ogorman , Tim Heath So you have played with free and open source software? Time for things to get ...
Destroying Evidence Before Its Evidence Hanni Fakhoury Covering your tracks out of fear of getting caught with your hands in the digital ... Security
Digital Security in Health Care Institutions Jorge Cortell , Alvaro Gonzalez Health care institutions usually have a large number of digital devices, networks, and databases. Lots ...
DKIM: Youre Doing It Wrong Quincy Robertson DomainKeys Identified Mail (DKIM) is the most effective, widely deployed email forgery countermeasure available today... ... Security
DUI/DWI Testing - A Hackers View of the Technology and Process Behind the BAC and Standard Field Sobriety Test Alexander Muentz , Wj This talk will look behind the process, techniques, and technology (or lack thereof) used by ...
Electric Bodies and Possible Worlds Jaime Magiera , Micha Cardenas , Cayden Mak Though there are many expensive, mainstream solutions for wearable computing, augmented/virtual reality, and alternate reality ...
The Emergence of Hacker as Artist and Artist as Hacker Andrew cameron Zahn , Katherine Bennett , William Cromar , Chris Thompson The new direction and emergence of hackers working like artists and artists working like hackers ...
Exploiting ZigBee and the Internet of Things Travis Goodspeed Now that ZigBee is finally appearing in the wild, Travis will take a look back ... Security
Explosive Steganography Eric Xlogicx Encryption makes information secret, steganography hides the information in plain sight. We fancy hiding it ... Security
Geeks and Depression Meredith L. Patterson , Mitch Altman , Jimmie Rodgers , Daravinne , Robin Debates Many of us in the geek community suffer greatly from serious depression. Enough so that ...
Hackers and Media Hype or Big Hacks That Never Really Happened Space Rogue Media will often report hacks that either never actually happened or have extremely flimsy evidence. ... Security
Hacking Mindsets: Conceptual Approaches to Transmission Art, Improvisation, Circuitbending, and Gaming Technology Tamara Yadao , Nicole Carroll , Joshua Kopstein In Richard Stallmans On Hacking from 2000, he addresses the stigma attached to the notion ...
Hacking the Cosmos via Crowdsourced Particle Astronomy Jr. , Ray h. Oneal The Cosmic Cube is a proposed desktop astroparticle or cosmic ray detector enabling ad-hoc formation ...
Hacking the Spaces Johannes Grenzfurthner , Sean Bonner In 2009, Johannes and Frank Apunkt Schneider published their critical pamphlet Hacking the Spaces, causing ...
Hack the Law Brendan Oconnor Recent bills such as ACTA, COICA, and SOPA in legislatures worldwide demonstrate that there exists ... Security
Hacktivism, Tools, and the Arab Spring Meredith L. Patterson , Peter Fein , The Doctor During the Arab Spring of 2011, agents of Telecomix, members of Anonymous, and a multitude ...
HIDIOUS Methods of Keystroke Injection Jp Dunning Its amazing what can be accomplished with just a few keystrokes. Changing user passwords, formatting ... Security
Historic Hacks in Portable Computing Bill Degnan , Evan Koblentz Portable computing began with handheld calculating aides such as the abacus and slide rule, continued ...
Hosting irc.2600.net - My Life with the Thrill Kill Cult Andrew R0d3nt An overview of the history of 2600net for at least the last ten years. This ... Security
How to Communicate with Your Cars Network Robert Leale Modern vehicles are essentially mobile computers and controller networks. On average, there are around ten ... Security
How to Retrofit the First Law of Robotics Eben Moglen We live with robots now, as we always knew we would. But they have no ... Security
ICANNs New gTLD Program: Implications on Security, Stability, and Governance Alexander Urbelis The Internet is about to rapidly expand. Through ICANNs new generic top level domain (gTLD) ... Security
Im Not a Real Friend, But I Play One on the Internet Tim Hwang This talk examines the topic of socialbots - realistic, automated bot identities online that are ... Security
Information Distribution in the Arab Spring - No Hacks Required Griffin Boyce From pirate radio, livestreaming, and video-sharing apps, to asynchronous mesh networks, Bluetooth, SMS/MMS, i2p, and ... Security
Infrastructure Mediated Sensing of Whole-Home Human Activity John Mcnabb Devices are being developed to monitor what you do in your home. Even without Orwells ... Security
The Internet is for Porn! How High Heels and Fishnet Have Driven Internet Innovation and Information Security Chris Kubecka A dark and seedy journey to explain the real driver behind Internet innovation: porn. How ... Security
IPv6 Now! What Does This Mean? Joe Klein On June 6th, World IPv6 Launch Day occurred, another step in the replacement of the ... Security
Jason Scotts Strange and Wonderful Digital History Argosy Jason Scott With a few small seeds of facts, digital and computer historian Jason Scott will draw ... Security
Keynote Address - William Binney William Binney N/A Security
Keynote Address - The Yes Men The yes Men N/A Security
Kill The Internet Memefactory (mike Rugnetta , Stephen Bruckert , Patrick Davison) As grassroots Internet culture grows and flourishes, pushing out into international mainstream recognition, top-down cultural ...
Legal Processes As Infrastructure Attacks Alexander Muentz Law enforcement and lawmakers have been showing much more of an interest in regulating the ... Security
Make Your Laws: Practical Liquid Democracy Sai This talk will include background on the concepts of direct, representative, and liquid democracies; the ... Security
Manufacturing Modern Computer Chips Queuetard Modern computer chips are using transistors with features as small as 22nm. They are produced ... Security
Mastering Master-Keyed Systems Deviant Ollam , Babak Javadi The world of locks is one in which, so very often, things old become new ...
Messing with Nmap Through Smoke and Mirrors Dan ( altf4 ) Petro Reconnaissance on a network has been an attackers game for far too long. Wheres the ... Security
No Natural Resources Were Hurt Assembling This Sofa Per Sjoborg This talk is an introduction and overview of a new and exciting field in robotics ... Security
Nymwars: Fighting for Anonymity and Pseudonymity on the Internet Eva Galperin The last year has seen an Internet-wide debate over real names, pseudonyms, and anonymity online, ... Security
Occupy the Airwaves: Tools to Empower Community Radio Stations Maggie Avener , Ana Martina The Prometheus Radio Project started with radio pirates fighting for local groups to be able ...
Old School Phreaking Cheshire Catalyst , John Draper , Tom santa Monica Members of The Old School will regale the assembled throngs with tales of The Golden ...
The Open Secure Telephony Network Lee Azzarello , Mark Belinsky All of the necessary technologies and communications standards exist today for voice communications that are ...
The Original WWII Hackers George Keller A look at some of the history of code breakers in the second World War. ... Security
Patents: How to Get Them and How to Beat Them Ed Ryan Patents are a distasteful reality for hackers, open source programmers, and entrepreneurs alike. This talk ... Security
Phone Phreak Confidential: The Backstory of the History of Phone Phreaking Phil Lapsley Five years in the making, Phil has finally finished Phone Phreaks, his book on the ... Security
Practical Insecurity in Encrypted Radio Travis Goodspeed , Sandy Clark , Matt Blaze APCO Project 25 (P25) is a suite of wireless communications protocols used in the United ...
Printable Electronics and the Future of Open Hardware John Sarik Many open hardware projects use integrated circuits (ICs), but these ICs are literal black boxes ... Security
Privacy - A Postmortem(or Cell Phones, GPS, Drones, Persistent Dataveillance, Big Data, Smart Cameras and Facial Recognition, The Internet of Things, and Government Data Centers Vacuuming Google and F Steven Rambam With a few keystrokes, it is now possible for an investigator to determine a targets ... Security
Privacy by Design - a Dream for a Telecommunications Provider That Uses Strong Cryptography to Ensure Your Privacy Nick Merrill This is a talk about launching a nonprofit organization that has some unique and disruptive ... Security
Privacy Tricks for Activist Web Developers Micah Lee Do you care about the privacy of your websites visitors, but also depend on social ... Security
Project Byzantium: An Ad-Hoc Wireless Mesh Network for the Zombie Apocalypse The Doctor , Haxwithaxe , Sitwon Project Byzantium (a working group of HacDC) is proud to announce the release of Byzantium ...
Protecting Your Data from the Cops Marcia Hofmann What should you do if the police show up at your door to seize your ... Security
Pwn the Drones: A Survey of UAV Hacks and Exploits Trevor Timm , Parker Higgins Drones are no longer a scary possible future of surveillance and remote force - theyre ...
Real Advances in Android Malware Jimmy Shah Attackers are starting to move on from simple attacks, mainly because users are beginning to ... Security
Recent Advances in Single Packet Authorization Michael Rash Single Packet Authorization (SPA) is a security technology whereby vulnerable services are protected behind a ... Security
Re-wired: Hacking the Auditory Experience Amelia Marzec Re-wired is a wearable device that translates ambient sound into haptic feedback using bone conduction ... Security
SCADA/PLC Exploitation and Disclosure Tiffany Rad , Teague Newman , And Guests Last year, a few groups of independent security researchers disclosed significant vulnerabilities in SCADA systems ...
Sierra Zulu. Or How to Create a Feature Film About the Digital Age - and Why Thats Pretty Hard Johannes Grenzfurthner Movies are exciting. Things crash and burn. Bolts and fists fly. There are bangs and ... Security
The Smartphone Penetration Testing Framework Georgia Weidman As smartphones enter the workplace, sharing the network and accessing sensitive data, it is crucial ... Security
Social Engineering Emmanuel Goldstein Since the very first HOPE conference in 1994, the social engineering panel has been a ... Security
Solving More Than #firstworldproblems Willow Brugh , Johnny Diggz For the past two years, Geeks Without Bounds has been using technology to assist people ...
Spy Improv: Reality Unfiltered Robert David Steele Several HOPES ago, Robert Steele started doing separate Q&A sessions using his knowledge as a ... Security
The State of HTTPS Adam Langley Over the past couple of years, a flurry of developments and events have been happening ... Security
The State of Open Source Hardware Dustyn Roberts , Catarina Mota In the last few years, open source hardware went from an obscure hobby to a ...
Taking a Bite Out of Logs with Sagan Da Iii) In protecting todays network infrastructures, organizations have a lot of shiny tools at their disposal. ... Security
Technology to Change Society: What Not to Do Chris Anderson , Gus Andrews , Matt Curinga , Christina Dunbar-hester Many of us in the hacker/maker communities have a powerful desire to change society by ...
Testing the Two Party Tyranny and Open Source Everything: The Battle for the Soul of the Republic Robert David Steele Robert was the opening speaker at the first Hackers On Planet Earth conference in 1994 ... Security
Twitter Revolution Meets Surveillance State: Now What? Tprophet In the past decade, authoritarian governments have witnessed political upheaval ranging from the Orange Revolution ... Security
Using a Space Camp Model for Next Generation Security Training Marc Weber Tobias , Matt Fiddler , Tommie r. Blackwell Marc Tobias says the U.S. intelligence community lacks imagination because it doesnt have any kids. ...
Using Browser-based Tools to Open Up the Web Ben Combee In this talk, Ben will show how to use tools already included in the popular ... Security
The Weather is Not Boring! Forecasting, Following, and Photographing Storms John Huntington In recent years, real time weather data and numerical forecast model information has moved from ... Security
We Will Be Legion: Decentralizing the Web Deb Nicholson The popularity of massive centralized services presents challenges for collective privacy, a full diversity of ... Security
When the Founder is Gone: Longevity for Open Projects Greg Newby A single visionary is often credited with shaping innovation and leading to success in open ... Security
Why Browser Cryptography is Bad and How We Can Make It Great Nadim Kobeissi Web apps are becoming almost exponentially responsible for handling user data. This incredible increase summons ... Security
Why Names Matter: How Online Identity is Defining the Future of the Internet Aestetix As the Internet becomes more public and universal, the world is beginning to have an ... Security
Why You Shouldnt Write Off Higher Education, Young Grasshopper John Linwood Griffin This talk is addressed to that kid in the back whos wearing a Utilikilt and ... Security
WikiLeaks, Whistleblowers, and the War on the First Amendment Ben Wizner , Catherine Crump The Director of ACLUs Speech, Privacy, and Technology Project will provide an overview of the ...