HOPE 9 July 13, 2012 to July 15, 2012, New York
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
3D Printing: Making Friends in DC Before People Start Freaking Out | Michael Weinberg | This talk is about protecting 3D printing from industries that are not excited about disruption. ... | Security |
Activist DDoS Attacks: When Analogies and Metaphors Fail | Molly Sauter | What are we talking about when we refer to activist Distributed Denial of Service (DDoS) ... | Security |
Advanced Handcuff Hacking | Ray | Handcuffs always have been a special kind of challenge to lockpickers. This talk will cover ... | Security |
Advancements in Botnet Attacks and Malware Distribution | Aditya K Sood , Rohit Bansal | Third Generation Botnets (TGBs) have circumvented the normal stature of the World Wide Web. These ... | |
An Aesthetic Critique of Fictional Media | Sean Mills , Syl Turner | This survey of visuals used in motion pictures explores their design implications. Motion pictures play ... | |
Anti-Censorship and Anti-Surveillance Tools - Improving the Landscape | James Vasile | Every day, world news informs us of more and greater threats to free communication. Nations ... | Security |
Anti-Censorship Best Practices: How to Make Keeping It Up Easy and Taking It Down Hard | Maymay | What do bananas have to do with censorship? What do polyamorous people have in common ... | Security |
The ARRIStocrats: Cable Modem Lulz | Chris Naegelin , Charlie Vedaa | The ARRIS TG852G is a DOCSIS 3.0 cable modem/router thats being deployed en masse by ... | |
The Autism Spectrum and You | Mary Robison , Alex Plank , Jack Robison , Kirsten Lindsmith | As a kid, were you considered precocious? Considered eccentric (or just plain weird) by other ... | |
Brain Chemistry: How Psychoactive Chemicals Hack the Central Nervous System | Jennifer Ortiz | People have been using chemistry to hack their bodies and their brains since antiquity. In ... | Security |
Building Radios to Talk to the Dead | Wil Lindsay | Apophenia is the human ability to perceive patterns and meaning in completely random data sets. ... | Security |
Cell Site Location Data and Nontrespassory Surveillance after U.S. v. Jones | Hanni Fakhoury | With the rise of smartphones, the governments use of cell site location data to pinpoint ... | Security |
Combat Robots Then and Now | David Calkins , Simone Davalos | Fighting robots have been around since the first gearhead figured out that it was really ... | |
Community Fabrication: Four Years Later | Far Mckon | One hackers view of the last four years in 3D printing and the expansion of ... | Security |
Computer Forensics: Possibility, Probability, Opinion, and Fact | Joe Cicero | How easy is it to end up with illegal content on your computer? How expensive ... | Security |
Countermeasures: Proactive Self Defense Against Ubiquitous Surveillance | Greg Conti , Lisa Shay | From governments fighting terrorists to companies hawking products to free online services where you are ... | |
Crimeware Tools and Techniques of 2012: Past, Present, and Future | Alexander Heid | Much has evolved in the brief 24 months that have passed since the last presentation ... | Security |
Cryptome Tracks the NYPD Ring of Steel | John Young , Deborah Natsios | Cryptomes digital multimedia presentation of original cartography, animations, video, and architectural documentation will explore the ... | |
DARPA Funding for Hackers, Hackerspaces, and Education: A Good Thing? | Mitch Altman , Matt Joyce , Psytek , Willow Brugh , Fiacre Oduinn | Mitch Altman caused a stir this spring when he publicly announced that he would not ... | |
Dead in a Pool of Blood and Millions of Dollars of Net Art | Jeremiah Johnson , Don Miller | 0-Day Art is a warez group for art, focusing primarily on digitally represented works. The ... | |
Declassifying Government and Undermining a Culture of Insecurity | N/a | It is critically important to obtain and publicize declassified government intelligence documents in order to ... | Security |
Designing Free Hardware: Scratching Your Own Itch with a Soldering Iron | Matthew Ogorman , Tim Heath | So you have played with free and open source software? Time for things to get ... | |
Destroying Evidence Before Its Evidence | Hanni Fakhoury | Covering your tracks out of fear of getting caught with your hands in the digital ... | Security |
Digital Security in Health Care Institutions | Jorge Cortell , Alvaro Gonzalez | Health care institutions usually have a large number of digital devices, networks, and databases. Lots ... | |
DKIM: Youre Doing It Wrong | Quincy Robertson | DomainKeys Identified Mail (DKIM) is the most effective, widely deployed email forgery countermeasure available today... ... | Security |
DUI/DWI Testing - A Hackers View of the Technology and Process Behind the BAC and Standard Field Sobriety Test | Alexander Muentz , Wj | This talk will look behind the process, techniques, and technology (or lack thereof) used by ... | |
Electric Bodies and Possible Worlds | Jaime Magiera , Micha Cardenas , Cayden Mak | Though there are many expensive, mainstream solutions for wearable computing, augmented/virtual reality, and alternate reality ... | |
The Emergence of Hacker as Artist and Artist as Hacker | Andrew cameron Zahn , Katherine Bennett , William Cromar , Chris Thompson | The new direction and emergence of hackers working like artists and artists working like hackers ... | |
Exploiting ZigBee and the Internet of Things | Travis Goodspeed | Now that ZigBee is finally appearing in the wild, Travis will take a look back ... | Security |
Explosive Steganography | Eric Xlogicx | Encryption makes information secret, steganography hides the information in plain sight. We fancy hiding it ... | Security |
Geeks and Depression | Meredith L. Patterson , Mitch Altman , Jimmie Rodgers , Daravinne , Robin Debates | Many of us in the geek community suffer greatly from serious depression. Enough so that ... | |
Hackers and Media Hype or Big Hacks That Never Really Happened | Space Rogue | Media will often report hacks that either never actually happened or have extremely flimsy evidence. ... | Security |
Hacking Mindsets: Conceptual Approaches to Transmission Art, Improvisation, Circuitbending, and Gaming Technology | Tamara Yadao , Nicole Carroll , Joshua Kopstein | In Richard Stallmans On Hacking from 2000, he addresses the stigma attached to the notion ... | |
Hacking the Cosmos via Crowdsourced Particle Astronomy | Jr. , Ray h. Oneal | The Cosmic Cube is a proposed desktop astroparticle or cosmic ray detector enabling ad-hoc formation ... | |
Hacking the Spaces | Sean Bonner , Johannes Grenzfurthner | In 2009, Johannes and Frank Apunkt Schneider published their critical pamphlet Hacking the Spaces, causing ... | |
Hack the Law | Brendan Oconnor | Recent bills such as ACTA, COICA, and SOPA in legislatures worldwide demonstrate that there exists ... | Security |
Hacktivism, Tools, and the Arab Spring | Meredith L. Patterson , Peter Fein , The Doctor | During the Arab Spring of 2011, agents of Telecomix, members of Anonymous, and a multitude ... | |
HIDIOUS Methods of Keystroke Injection | Jp Dunning | Its amazing what can be accomplished with just a few keystrokes. Changing user passwords, formatting ... | Security |
Historic Hacks in Portable Computing | Bill Degnan , Evan Koblentz | Portable computing began with handheld calculating aides such as the abacus and slide rule, continued ... | |
Hosting irc.2600.net - My Life with the Thrill Kill Cult | Andrew R0d3nt | An overview of the history of 2600net for at least the last ten years. This ... | Security |
How to Communicate with Your Cars Network | Robert Leale | Modern vehicles are essentially mobile computers and controller networks. On average, there are around ten ... | Security |
How to Retrofit the First Law of Robotics | Eben Moglen | We live with robots now, as we always knew we would. But they have no ... | Security |
ICANNs New gTLD Program: Implications on Security, Stability, and Governance | Alexander Urbelis | The Internet is about to rapidly expand. Through ICANNs new generic top level domain (gTLD) ... | Security |
Im Not a Real Friend, But I Play One on the Internet | Tim Hwang | This talk examines the topic of socialbots - realistic, automated bot identities online that are ... | Security |
Information Distribution in the Arab Spring - No Hacks Required | Griffin Boyce | From pirate radio, livestreaming, and video-sharing apps, to asynchronous mesh networks, Bluetooth, SMS/MMS, i2p, and ... | Security |
Infrastructure Mediated Sensing of Whole-Home Human Activity | John Mcnabb | Devices are being developed to monitor what you do in your home. Even without Orwells ... | Security |
The Internet is for Porn! How High Heels and Fishnet Have Driven Internet Innovation and Information Security | Chris Kubecka | A dark and seedy journey to explain the real driver behind Internet innovation: porn. How ... | Security |
IPv6 Now! What Does This Mean? | Joe Klein | On June 6th, World IPv6 Launch Day occurred, another step in the replacement of the ... | Security |
Jason Scotts Strange and Wonderful Digital History Argosy | Jason Scott | With a few small seeds of facts, digital and computer historian Jason Scott will draw ... | Security |
Keynote Address - William Binney | William Binney | N/A | Security |
Keynote Address - The Yes Men | The yes Men | N/A | Security |
Kill The Internet | Memefactory (mike Rugnetta , Stephen Bruckert , Patrick Davison) | As grassroots Internet culture grows and flourishes, pushing out into international mainstream recognition, top-down cultural ... | |
Legal Processes As Infrastructure Attacks | Alexander Muentz | Law enforcement and lawmakers have been showing much more of an interest in regulating the ... | Security |
Make Your Laws: Practical Liquid Democracy | Sai | This talk will include background on the concepts of direct, representative, and liquid democracies; the ... | Security |
Manufacturing Modern Computer Chips | Queuetard | Modern computer chips are using transistors with features as small as 22nm. They are produced ... | Security |
Mastering Master-Keyed Systems | Deviant Ollam , Babak Javadi | The world of locks is one in which, so very often, things old become new ... | |
Messing with Nmap Through Smoke and Mirrors | Dan ( altf4 ) Petro | Reconnaissance on a network has been an attackers game for far too long. Wheres the ... | Security |
No Natural Resources Were Hurt Assembling This Sofa | Per Sjoborg | This talk is an introduction and overview of a new and exciting field in robotics ... | Security |
Nymwars: Fighting for Anonymity and Pseudonymity on the Internet | Eva Galperin | The last year has seen an Internet-wide debate over real names, pseudonyms, and anonymity online, ... | Security |
Occupy the Airwaves: Tools to Empower Community Radio Stations | Maggie Avener , Ana Martina | The Prometheus Radio Project started with radio pirates fighting for local groups to be able ... | |
Old School Phreaking | Cheshire Catalyst , John Draper , Tom santa Monica | Members of The Old School will regale the assembled throngs with tales of The Golden ... | |
The Open Secure Telephony Network | Lee Azzarello , Mark Belinsky | All of the necessary technologies and communications standards exist today for voice communications that are ... | |
The Original WWII Hackers | George Keller | A look at some of the history of code breakers in the second World War. ... | Security |
Patents: How to Get Them and How to Beat Them | Ed Ryan | Patents are a distasteful reality for hackers, open source programmers, and entrepreneurs alike. This talk ... | Security |
Phone Phreak Confidential: The Backstory of the History of Phone Phreaking | Phil Lapsley | Five years in the making, Phil has finally finished Phone Phreaks, his book on the ... | Security |
Practical Insecurity in Encrypted Radio | Travis Goodspeed , Sandy Clark , Matt Blaze | APCO Project 25 (P25) is a suite of wireless communications protocols used in the United ... | |
Printable Electronics and the Future of Open Hardware | John Sarik | Many open hardware projects use integrated circuits (ICs), but these ICs are literal black boxes ... | Security |
Privacy - A Postmortem(or Cell Phones, GPS, Drones, Persistent Dataveillance, Big Data, Smart Cameras and Facial Recognition, The Internet of Things, and Government Data Centers Vacuuming Google and F | Steven Rambam | With a few keystrokes, it is now possible for an investigator to determine a targets ... | Security |
Privacy by Design - a Dream for a Telecommunications Provider That Uses Strong Cryptography to Ensure Your Privacy | Nick Merrill | This is a talk about launching a nonprofit organization that has some unique and disruptive ... | Security |
Privacy Tricks for Activist Web Developers | Micah Lee | Do you care about the privacy of your websites visitors, but also depend on social ... | Security |
Project Byzantium: An Ad-Hoc Wireless Mesh Network for the Zombie Apocalypse | The Doctor , Haxwithaxe , Sitwon | Project Byzantium (a working group of HacDC) is proud to announce the release of Byzantium ... | |
Protecting Your Data from the Cops | Marcia Hofmann | What should you do if the police show up at your door to seize your ... | Security |
Pwn the Drones: A Survey of UAV Hacks and Exploits | Trevor Timm , Parker Higgins | Drones are no longer a scary possible future of surveillance and remote force - theyre ... | |
Real Advances in Android Malware | Jimmy Shah | Attackers are starting to move on from simple attacks, mainly because users are beginning to ... | Security |
Recent Advances in Single Packet Authorization | Michael Rash | Single Packet Authorization (SPA) is a security technology whereby vulnerable services are protected behind a ... | Security |
Re-wired: Hacking the Auditory Experience | Amelia Marzec | Re-wired is a wearable device that translates ambient sound into haptic feedback using bone conduction ... | Security |
SCADA/PLC Exploitation and Disclosure | Tiffany Rad , Teague Newman , And Guests | Last year, a few groups of independent security researchers disclosed significant vulnerabilities in SCADA systems ... | |
Sierra Zulu. Or How to Create a Feature Film About the Digital Age - and Why Thats Pretty Hard | Johannes Grenzfurthner | Movies are exciting. Things crash and burn. Bolts and fists fly. There are bangs and ... | Security |
The Smartphone Penetration Testing Framework | Georgia Weidman | As smartphones enter the workplace, sharing the network and accessing sensitive data, it is crucial ... | Security |
Social Engineering | Emmanuel Goldstein | Since the very first HOPE conference in 1994, the social engineering panel has been a ... | Security |
Solving More Than #firstworldproblems | Willow Brugh , Johnny Diggz | For the past two years, Geeks Without Bounds has been using technology to assist people ... | |
Spy Improv: Reality Unfiltered | Robert David Steele | Several HOPES ago, Robert Steele started doing separate Q&A sessions using his knowledge as a ... | Security |
The State of HTTPS | Adam Langley | Over the past couple of years, a flurry of developments and events have been happening ... | Security |
The State of Open Source Hardware | Dustyn Roberts , Catarina Mota | In the last few years, open source hardware went from an obscure hobby to a ... | |
Taking a Bite Out of Logs with Sagan | Da Iii) | In protecting todays network infrastructures, organizations have a lot of shiny tools at their disposal. ... | Security |
Technology to Change Society: What Not to Do | Chris Anderson , Gus Andrews , Matt Curinga , Christina Dunbar-hester | Many of us in the hacker/maker communities have a powerful desire to change society by ... | |
Testing the Two Party Tyranny and Open Source Everything: The Battle for the Soul of the Republic | Robert David Steele | Robert was the opening speaker at the first Hackers On Planet Earth conference in 1994 ... | Security |
Twitter Revolution Meets Surveillance State: Now What? | Tprophet | In the past decade, authoritarian governments have witnessed political upheaval ranging from the Orange Revolution ... | Security |
Using a Space Camp Model for Next Generation Security Training | Marc Weber Tobias , Matt Fiddler , Tommie r. Blackwell | Marc Tobias says the U.S. intelligence community lacks imagination because it doesnt have any kids. ... | |
Using Browser-based Tools to Open Up the Web | Ben Combee | In this talk, Ben will show how to use tools already included in the popular ... | Security |
The Weather is Not Boring! Forecasting, Following, and Photographing Storms | John Huntington | In recent years, real time weather data and numerical forecast model information has moved from ... | Security |
We Will Be Legion: Decentralizing the Web | Deb Nicholson | The popularity of massive centralized services presents challenges for collective privacy, a full diversity of ... | Security |
When the Founder is Gone: Longevity for Open Projects | Greg Newby | A single visionary is often credited with shaping innovation and leading to success in open ... | Security |
Why Browser Cryptography is Bad and How We Can Make It Great | Nadim Kobeissi | Web apps are becoming almost exponentially responsible for handling user data. This incredible increase summons ... | Security |
Why Names Matter: How Online Identity is Defining the Future of the Internet | Aestetix | As the Internet becomes more public and universal, the world is beginning to have an ... | Security |
Why You Shouldnt Write Off Higher Education, Young Grasshopper | John Linwood Griffin | This talk is addressed to that kid in the back whos wearing a Utilikilt and ... | Security |
WikiLeaks, Whistleblowers, and the War on the First Amendment | Ben Wizner , Catherine Crump | The Director of ACLUs Speech, Privacy, and Technology Project will provide an overview of the ... |