H2K2: Hackers on Planet Earth 2002



Introduction
Panels
Music
Location
Travel
Registration
Volunteering





Speakers and Panels

Schedule grid for Friday July 12 | Saturday July 13 | Sunday July 14

Click here for Speaker Info

Alphabetical Index of Events
      (mp3's available for all panels from this site - video copies can be obtained through our store)
(Click on "L" to download a local copy to store on your machine, click on "S" to stream the audio)

Abuse of Authority
Access Control Devices
The Argument Against Security Through Obscurity for the Non-Digital World
Black Hat Bloc or How I Stopped Worrying About Corporations and Learned to Love the Hacker Class War
Bullies on the Net - The Ford and Nissan Cases
Caller ID Spoofing
Conspiracies
"The Conscience of a Hacker"
Crypto for the Masses
Cult of the Dead Cow Extravaganza
Databases and Privacy
A Day in the Life of a Directory Assistance Operator
The DeCSS Story
Digital Demonstrations: Criminal DDoS Attack or Cyber Sit-in?
DMCA Legal Update
Domain Stalking
Educating Lawmakers - Is It Possible?
Everything you ever wanted to know about spying and did not know who to ask....
Face Scanning Systems at Airports: Ready for Prime Time?
"Freedom Downtime"
Freedom: File Not Found
Fucking Up the Internet at ICANN: Global Control Through the Domain Name System and How to Escape
Fun With 802.11b
Fun With Pirate Radio and Shortwave
GNU Radio: Free Software Radio Collides with Hollywood's Lawyers
H2K2 Closing Ceremonies
Hacking for Community Radio
Hacking Nanotech
Hacking National Intelligence: Possibilities for a Public Intelligence Revolution
Hacking the Invisible World
Hardware Q&A
How to Start an IMC in Your Town
Human Autonomous Zones: The Real Role of Hackers
"I Am Against Intellectual Property"
The Ins and Outs of Webcasting
Introduction to Computer Viruses
Jello Biafra's State of the World Address
Keynote: Aaron McGruder
Keynote: Siva Vaidhyanathan
"Life in a Distributed Age"
Lockpicking
LPFM Basics
Magical Gadgets: The Profound Impact of Yesterday's Not-So-Trivial Electronics on Our Digital World
Magic Lantern and Other Evil Things
Making Money on the Internet While Still Saying "Fuck"
Negativland - Past, Present, Future
The New FBI and How It Can Hurt You
"Owned"
Open Source Security Testing Methodology Manual
The Password Probability Matrix
The Patriot Act
Protection for the Masses
Proximity Cards: How Secure Are They?
Report From Ruckus
RetroComputing
Secure Telephony: Where ARE the Secure Phones?
The Shape of the Internet: Influence and Consequence
Social Engineering
Standing Up To Authority
Steganography: Wild Rumors and Practical Applications
Strategic Thought in Virtual Deterrence and Real Offense: The Computer's Role
Teaching Hacker Ethics with a Common Curriculum
Technomanifestos: Visions of the Information Revolutionaries
Tracking Criminals on the Internet
The Ultimate Co-location Site
The Vanished Art of Human Intelligence
or Why the World Trade Center Would Still Be Standing if Defense Against Terrorism Had Been Contracted Out to the Private Sector


Abuse of Authority

Sunday, 11 am
Area "A"
mp3 streaming

Over the years, there have been many stories in the hacker world of law enforcement personnel who have abused their authority. Two of the more dramatic cases in recent memory both come out of Philadelphia. Many of us are already familiar with the horror story of Bernie S. who toured five dangerous prisons for over a year - not because of what he was charged with - but because the United States Secret Service was upset about his collection of information about them. Then there is the case of ShapeShifter, 2600 layout artist, who was arrested at the Republican National Convention in 2000 (shortly after leading a panel on the RNC at H2K) and held on half a million dollars bail as if he were a terrorist mastermind - all because he had been targeted for speaking out in public. Hear the games the authorities play and how public education really can make a difference in putting an end to such abuse.

Hosted by Bernie S. and ShapeShifter


Access Control Devices

Saturday, 11 am
Area "B"
mp3 streaming

There are all kinds of access control devices that we come in contact with every day. They include such things as magnet readers, proximity card readers, fingerprint readers, camera systems, biometrics, and basic standard operating procedures for a business. This talk will be a comprehensive guide to what's out there.

Hosted by Mike Glasser


The Argument Against Security Through Obscurity for the Non-Digital World

Saturday, 10 am
Area "B"
mp3 streaming

In the world of networked computers, security through obscurity is generally ineffective. Hiding algorithms, protecting source code, and keeping procedures secret might be effective initially, but eventually the cloak of secrecy is penetrated. This talk will examine how security through obscurity is relied upon in the non-computerized world. When can security through obscurity work? What risk analysis should we use to examine the role of obscurity in the non-computerized world? The talk will present and examine the hypothesis that an "open source" mentality should be applied to security procedures for public places. This is a logical extension of the lesson in cryptanalysis - that no cryptographic method can be considered trustworthy until it has undergone a rigorous examination by qualified persons. Similarly, can we trust security procedures in the physical world designed, ostensibly, to protect the public if these procedures never undergo public scrutiny?

Hosted by Greg Newby


Black Hat Bloc or How I Stopped Worrying About Corporations and Learned to Love the Hacker Class War

Sunday, 2 pm
Area "A"
mp3 streaming

Hackers must deal with governments and ultimately the corporations that wield most of the decision making power within them. Looking over the past few decades of hacker interaction with corporations, we notice some interesting trends in the two worlds that indicate strong influences of the corporate and hacker worlds on the other's ethics and culture, often only hinted at to the rest of the world via biased corporate PR machines in the form of broadcast and publishing media. Hacker posts to Bugtraq become resumes, hacker tech like BBSes and IRC become the technical implementations of every Internet startup's business plan, hackers testify in front of Congress to warn them of impending doom directly resulting in increased federal cybercrime funding, while piracy is accepted by governments and media (but not the public) as theft. Has hacking become the fast venture capitalist track to shiny gadgets that go fast and make noise, a la Slashdot? Should we ignore intellectual property legislation and treaties that are passed solely to make rich people richer? This talk takes a look at where hacker/corporate/government relationships have been, where they are now, and where they could be going - hopefully shedding some light on everyone's motivations along the way.

Hosted by Gweeds


Bullies on the Net - The Ford and Nissan Cases

Saturday, 6 pm
Area "A"
mp3 streaming

We could fill the entire weekend with stories like these and we have no doubt there will be many more such tales in the years to come. With the help of agencies, corporations, treaties, and laws with acronyms like ICANN, WIPO, WTO, and the DMCA, the individual very often finds himself at the mercy of corporate giants with virtually unlimited funding - and seemingly unlimited power. Throughout it all however, there remains hope. Hear the story of Uzi Nissan, who is being sued by the Nissan Motor Company for daring to use his own name on the Internet. We'll also talk about how the Ford Motor Company sued 2600 - and lost.

Hosted by Emmanuel Goldstein, Eric Grimm, and Uzi Nissan


Caller ID Spoofing

Friday, 2 pm
Area "B"
mp3 streaming

A demonstration of how Caller ID works as well as methods that can be used to emulate and display spoofed Caller ID messages on Caller ID and Caller ID with Call Waiting boxes using a Bell 202 modem. Details on the technical aspects such as Caller ID protocol for both regular and Call Waiting Caller ID. If all goes well, you may actually see a live demonstration of spoofed Caller ID.

Hosted by Lucky225 and Tray Smee


"The Conscience of a Hacker"

Saturday, 3 pm
Area "A"
mp3 streaming

Probably the most famous single essay about what it's like to be a hacker is "The Conscience of a Hacker" by The Mentor, written in 1986. It's been quoted all over the place, including the movie "Hackers." It remains one of the most inspirational pieces written about the hacker community and it's survived well over time. This year, we're pleased to have The Mentor himself give a reading of it and offer additional insight.


Conspiracies

Sunday, 12 noon
Area "B"
mp3 streaming

Technology can be a wonderful thing, but it can be quite harmful as well. Unenlightened corporate interest as well as government interest can make for some savage bedfellows. This panel will deal with technology, its good uses and some of its evil ones.

Hosted by Gonzo, Leo, and Rev. Sergey


Crypto for the Masses

Friday, 12 noon
Area "B"
mp3 streaming

This panel will approach cryptography from the perspective of enabling a "digital world" where key social schemes are preserved - personal identity, anonymity, and the right to privacy. We'll talk about the basic inner workings of cryptosystems, and discuss how they can be applied now to create and enforce cyber rights. We'll also discuss the hurdles faced by crypto and its adopters, along with the public at large. And we'll learn just how crypto is being threatened and abused by certain global goons.

Hosted by Matt Blaze, Greg Newby, and Anatole Shaw


Cult of the Dead Cow Extravaganza

Saturday, 4 pm
Area "7"
(No recordings are known to exist)

This year, the megamerican computer hackers of patriotism, Cult of the Dead Cow, honor our country with "Hooray for America!" -- an all-star revue including the Anheuser-Busch Clydesdales, NASCAR champion Dingus McProstate, and the Dallas Cowboy Cheerleaders. Reid Fleming will give a thorough and thoroughly educational description of the history and symbology of the Great Seal (which you can find on the back side of a $1 bill). Grandmaster Ratte himself will lead the audience in a sustained chant of "U.S.A.! U.S.A.! U.S.A.!" Oh, and maybe there will be some new software too.


Databases and Privacy

Saturday, 2 pm
Area "A"
mp3 streaming

Once again, world renowned private eye Steve Rambam will enlighten and frighten attendees with the latest updates on the personal information that is out there about each and every one of us. Find out which databases contain the most invasive information and who has access to them, as well as what you can do to protect your privacy. There will also be a discussion on truth and accountability on the net as well as live demonstrations.


A Day in the Life of a Directory Assistance Operator

Friday, 10 am
Area "A"
mp3 streaming

Odds are most of us take things about the phone companies for granted. But there is a whole world that we don't see which is always operating. Hear how the system really works from The Cheshire Catalyst.


The DeCSS Story

Friday, 4 pm
Area "A"
mp3 streaming

At our last conference, we were preparing to go on trial for daring to have the code to DeCSS on our web site. Quite a lot has happened since then. The public perception of entities like the MPAA and the RIAA has gone down the toilet as their true motives became apparent. We were the first in what will be a long line of courtroom battles to defend freedom of speech, fair use, and open source technology. While we lost the case and the subsequent appeal, we still somehow feel victorious. Find out why.

Hosted by Emmanuel Goldstein, Robin Gross, and Ed Hernstadt


Digital Demonstrations: Criminal DDoS Attack or Cyber Sit-in?

Sunday, 11 am
Area "B"
mp3 streaming

Being able to carry political opinions to the public by showing them on the street is a basic part of democratic rights. Nowadays, a steadily increasing part of our life takes place in cyberspace. Things which aren't happening in cyberspace will therefore get less and less public attention. How can protest be taken into the virtual realm? What strategies for "online demonstrations" have we seen so far? How about the ethical and legal dimensions? Who gets hurt? Host Maximillian Dornseif will present a new approach for conducting online demonstrations without adversely affecting other users on the net.


DMCA Legal Update

Saturday, 11 am
Area "A"
mp3 streaming

Since we last met, the Digital Millennium Copyright Act has claimed more victims and been at the forefront of all kinds of legal action. We even had the first instance of a programmer being thrown into prison because of a program he wrote while in his native Russia! Hear the latest on the Dmitry Sklyarov case and others that the DMCA is responsible for as well as what is being done to put an end to it.

Hosted by Mike Godwin, Eric Grimm, and Robin Gross


Domain Stalking

Sunday, 6 pm
Area "A"
mp3 streaming

Ever wanted to legally have a $900 million dollar company in your debt? Intellectual property is a big deal to a lot of companies (witness the 2600 vs. Ford case) and it can be very easy to legally screw with it. This presentation will be a discussion of how easy it can be to get a company in your debt by simply watching their domains and catching them when they neglect to renew. It's a bigger problem with large companies than you think and can be exploited for many good causes. Hear how everyone from Symantec to the Red Cross to Jello Biafra has benefited from RenderMan's watchful eyes.


Educating Lawmakers - Is It Possible?

Saturday, 12 noon
Area "A"
mp3 streaming

Trying to educate Congress about technology is approximately as useful as teaching a pig to type. It doesn't work and you get one peeved pig. But there are sometimes ways to make a difference in law and policy circles without becoming a wholly owned tool of the Demopublican Party. A discussion with journalist Declan McCullagh and cryptologist Matt Blaze.


Everything you ever wanted to know about spying and did not know who to ask....

Saturday, 8 pm
Area "B"
(incorporated into "Hacking National Intelligence")

This is pure balls-out fun. Former spy Robert Steele will answer questions about any aspect of intelligence or counterintelligence, to include covert action in Central America, ECHELON, how and why we completely missed the warnings on bin Laden and 9/11, etc. This can be considered an extension of the H2K session, which lasted for hours.


Face Scanning Systems at Airports: Ready for Prime Time?

Saturday, 5 pm
Area "B"
mp3 streaming

A talk about the technical problems of face scanning systems being used at airports to pick out terrorists. Will these systems work like the promoters are claiming they will? Or will they fail to catch terrorists and instead turn our airports into round-up zones for petty criminals?

Hosted by Richard M. Smith


"Freedom Downtime"

Saturday, 10 pm
Area "D"

A presentation of the 2600 documentary on the Free Kevin movement followed by a Q&A session with some of the key people involved in the making of the film.


Freedom: File Not Found

Friday, 8 pm
Area "B"
mp3 streaming

Since the explosion of the world network in the early 1990's, visionaries and pundits have been promising that "information wants to be free" and the web's free exchange of knowledge and ideas would be a liberating political and economic force throughout the world. It's been almost ten years now: where is this newfound freedom, especially in places like China? The Middle East? What about right here at home? This talk will discuss government/corporate efforts to restrict the free flow of information on the Internet and the political, ethical, and socioeconomic consequences. Topics will include hardware in use by the People's Republic of China to monitor and censor information it deems "subversive," routing tactics in Saudi Arabia to enhance government oversight and censorship, and the constitutionality of email snooping hardware and software in use in America. A Q&A session will follow.

Hosted by Bryan Maloney


Fucking Up the Internet at ICANN: Global Control Through the Domain Name System and How to Escape

Friday, 3 pm
Area "A"
mp3 streaming

Did you know that the entire Internet domain structure is controlled by a mysterious group called the Internet Corporation for Assigned Names and Numbers (ICANN)? Andy Mueller-Maguhn, longtime member and spokesman of Germany's Chaos Computer Club and currently elected from European users to be on the board of ICANN, will explain the latest developments at ICANN and how the mixture of intellectual property and governmental interests affects the freedom of the Internet. Paul Garrin, founder of name.space and FREE.THE.MEDIA!, will talk about his initiatives to establish rights to access to the legacy ROOT.ZONE, from the historical antitrust action against Network Solutions in 1997 through the US Department of Commerce's IFWP process (the predecessor to ICANN), and Name.Space's $50,000.00 TLD application to ICANN in 2000 (ICANN kept the money and took three TLD's previously published by Name.Space). The question is raised: Is there hope for seeking fair access to the legacy ROOT.ZONE through due process or is it time to treat ICANN as "damage" and route around it?


Fun With 802.11b

Friday, 5 pm
Area "A"
mp3 streaming

Would you be surprised if you could turn on your laptop anywhere in the city and find yourself on someone else's network? How about if you were able to connect to the Internet? Or see someone's private data go flying by? It's all possible and it happens all the time - all over the country. This panel will cover 802.11 wireless ethernet networking basics, as well as detecting and monitoring wireless networks with active and passive methods. Community free networks, custom antennas, and methods of securing wireless networks will also be covered.

Hosted by dragorn, Porkchop, and StAtIc FuSiOn


Fun With Pirate Radio and Shortwave

Sunday, 10 am
Area "B"
mp3 streaming

Too few people take the time to appreciate shortwave radio. Even fewer have the opportunity to appreciate pirate radio. Here's your chance to learn more about these fascinating subjects. Allan Weiner will talk about his days operating Radio New York International, a famous pirate station from the 80's that served the New York area before it was raided by federal authorities in international waters. (We have no idea how the feds got away with that.) Today Weiner operates shortwave station WBCQ - along with chief engineer Timtron - which serves nearly the entire western hemisphere from studios in Maine. Craig Harkins joins the panel to talk of his experiences operating Anteater Radio during much of the 90's from an 18-wheeler truck. He received international acclaim from listeners while consistently evading American and Canadian radio police.

Hosted by Craig Harkins and Allan Weiner


GNU Radio: Free Software Radio Collides with Hollywood's Lawyers

Sunday, 2 pm
Area "B"
mp3 streaming

The GNU Radio project is building a platform for experimenting with software radios - systems where the actual waveforms received and transmitted are defined by software, not special purpose hardware. One of their projects is building an all-software ATSC (HDTV) receiver. An all-software free ATSC receiver would allow among other things the construction of the mother of all "personal video recorders." Think Tivo or Replay on steroids. The folks from the Broadcast Protection Discussion Group (BPDG) have other ideas. They'd like to lock up the cleartext signal and make sure that only members of their club would be allowed to build receivers, modulators, and storage devices for digital TV. A discussion of where this is all likely to head. Panel participants include GNU Radio technical folks Eric Blossom and Matt Ettus as well as representatives from the EFF.


H2K2 Closing Ceremonies

Sunday, 7 pm
Area "A"
mp3 streaming

A final review of the events of the weekend along with all kinds of guests, giveaways, and more. Remember, only wimps leave early.


Hacking for Community Radio

Saturday, 3 pm
Area "B"
mp3 streaming

The technical and political struggle to take back the airwaves for the community. A panel discussion about the attempt to build linux based free software that can stream broadcast quality audio over the Internet from a studio to a transmitter site. In addition, there will be discussion on attempts to use wireless ethernet to shoot broadcast quality audio across town with high gain antennas and 2.4 gigahertz amplifiers.

Hosted by Pete Tridish from the Prometheus Radio Project, Josh Marcus, Dave Arney, and Roland Aguilar from the Philadelphia Independent Media Center, and K. Clair from the Genderchangers.


Hacking Nanotech

Sunday, 4 pm
Area "B"
mp3 streaming

Nanofabrication technology is an up and coming field that will revolutionize the way humans live on a day to day basis. Host Jim "Cips" tells what the future projections about nanofabrication are - things like robots so small you would need an electron microscope to see them. There will also be an examination of some amazing achievements that have been accomplished already as well as an analysis of the possible ethical problems that may arise with nanofabrication in the future.


Hacking National Intelligence: Possibilities for a Public Intelligence Revolution

Saturday, 7 pm
Area "B"

Part 1
mp3 streaming

Part 2
mp3 streaming

Part 3
mp3 streaming

Robert David Steele, author of two books on intelligence reform and sponsor of the Council on Intelligence, will provide a briefing on the state of the world, 21st Century tradeoffs that are NOT being made by our elected leaders, and how citizens can take back the power by practicing the new craft of intelligence to monitor and instruct their elected officials on key national security decisions. Among other major aspects, this would translate into a freezing of the Pentagon budget at $250 billion a year and redirection of $150 billion a year toward global education, public health, water and energy conservation, and "soft power" options including diplomacy and information peacekeeping, a term Steele devised in the early 1990's.


Hacking the Invisible World

Sunday, 5 pm
Area "A"
mp3 streaming

Everything you could possibly want to know about the workings of scanners, frequency counters, intercepting/spoofing RF A/V feeds, STL's, pagers, infrared signs, night vision, electronic surveillance, etc.

Hosted by Craig Harkins, Bernie S., and Barry "The Key" Wels


Hardware Q&A

Saturday, 12 noon
Area "B"
mp3 streaming

Explore a different form of hacking and interface directly with fellow electronics enthusiasts. Javaman and friends will try to answer any questions related to hardware and electronics including but not limited to hardware tokens, radio/wireless technologies, embedded systems, smart cards, and secure hardware design.


How to Start an IMC in Your Town

Sunday, 10 am
Area "A"
mp3 streaming

At H2K, Jello Biafra urged attendees to become the media. Since then, many people have done just that. One of the most powerful tools in fighting the corporate media's stranglehold on information in this country has been the Indymedia network. Learn what's involved with becoming a part of Indymedia, the various hurdles and roadblocks you can expect to face, and how you can make a difference.


Human Autonomous Zones: The Real Role of Hackers

Sunday, 1 pm
Area "A"
mp3 streaming

How the role of hackers in society has changed. They used to be a necessary counterbalance to corporate and government power. Now, it's more like hackers are the only ones who understand the technology. They have become a balance to the power of technology itself. A discussion by renowned author Doug Rushkoff.


"I Am Against Intellectual Property"

Friday, 5 pm
Area "B"
mp3 streaming

In the words of host Nelson Denoon: "Quit fucking apologizing for filesharing. Intellectual property is evil, filesharing is freedom fighting, and the sooner Jack Valenti is bumming quarters for a living, the better. The question is not how to protect artists, it is how to muster enough force to protect the right to hack."


The Ins and Outs of Webcasting

Saturday, 10 am
Area "A"
mp3 streaming

While the airwaves have been almost completely taken over by corporate interests, there is a whole world of broadcasting on the Internet just waiting for creative minds. Find out what it takes to get an Internet station going and what kinds of creative programming are possible. Also, learn what the recently mandated RIAA licensing fees will mean to the future of this broadcasting medium.

Hosted by Lee Azzarello, Lynea Diaz-Hagan, Tarikh Korula, Lazlow, and Kevin Prichard


Introduction to Computer Viruses

Saturday, 1 pm
Area "B"
mp3 streaming

Understanding the fundamentals of how to identify, remove, and defend against hostile code. Robert Lupo will cover how different computer viruses work - boot sector, file infector, multi-parti, VBS, Java, the different OS viruses, etc. He will also explain how to remove different computer viruses with and without anti-virus software and discuss the future of computer viruses and hostile code.




Jello Biafra's State of the World Address

Saturday, 9 pm
Area "D"

Part 1
mp3 streaming

Part 2
mp3 streaming

Part 3
mp3 streaming

Since his keynote address at the H2K conference in 2000, Jello Biafra has witnessed further corporate consolidation and censorship of mass media. He's also been on the front lines of the growing uprising against corporate power itself. He may speak about that, and/or the Bush mob's cynical exploitation of the tragedy on September 11, or the corporate music biz convention on "the future of digital music" he was invited to speak at a few days before H2K2. He's not sure yet so stay tuned.


Keynote: Aaron McGruder

Saturday, 1 pm
Area "A"
mp3 streaming

Just about everyone has at one time or another read the daily comic strip "The Boondocks." Not everyone has appreciated it. In fact, it's generated a share of controversy among the mainstream for its "alternative" views. In addition, McGruder has devoted space to hacker issues, most notably the DeCSS case - which was presented accurately for probably the first time in most of the papers his strip appears in. McGruder is one of those rare individuals with access to the mainstream who actually "gets" the technical issues. Needless to say, he has been targeted relentlessly by censors for daring to speak his mind. Sound familiar?


Keynote: Siva Vaidhyanathan

"Life in a Distributed Age"

Friday, 1 pm
Area "A"
mp3 streaming

Distributed information systems of all kinds are challenging cultural and political assumptions. The moral of the story is that whether we like it or not, it's time to take anarchy seriously. We have spent the past 200 years thinking centralization of power and information was the greatest challenge to republican forms of government and corporatized commerce. But now, it should be clear, decentralization and encryption have emerged as the most important dynamics of power.


Lockpicking

Sunday, 12 noon
Area "A"
mp3 streaming

Barry "The Key" Wels returns from The Netherlands to provide details of some high security lock weaknesses and to demonstrate some state of the art techniques of exploiting them. He will tell the story of a company that had the famous line "Nobody can pick this lock" on their website. Of course, this was the ultimate motivation for the sport-lockpickers. This panel is where you can find out if a particular lock can be picked or not. Spare locks are always welcome, as TOOOL (The Open Organization of Lockpickers) is short of good locks.


LPFM Basics

Friday, 6 pm
Area "A"
mp3 streaming

Learn exactly how to navigate the LPFM licensing process. Pete Tridish of the Prometheus Radio Project and John Ramsey of Ramsey Electronics will present background about the fight for community radio and explain the absurd technical limitations placed on low-power community FM radio stations by powerful corporate interests.


Magical Gadgets: The Profound Impact of Yesterday's Not-So-Trivial Electronics on Our Digital World

Friday, 7 pm
Area "B"
mp3 streaming

Rewind to an age when electronics had originality; the era when a new product was inspired by creativity. Get the story about the evolution of IC-based devices, and see for yourself how the soul of electronics has been sold out.

Hosted by Jay Hanson and Paul Zurek


Magic Lantern and Other Evil Things

Friday, 4 pm
Area "B"
mp3 streaming

A talk by Rudy Rucker Jr. on the BadTrans worm and the FBI's Magic Lantern software. Both of these pieces of software are very similar and install keystroke logging software on clients' machines. Rucker has collected a couple of gigabytes of the BadTrans data and will explain how he parsed it and created a web-based tool for people to browse the database.


Making Money on the Internet While Still Saying "Fuck"

Saturday, 5 pm
Area "A"
mp3 streaming

Pud of fuckedcompany.com will speak about his experiences setting up and maintaining a popular Web site for corporate rumors. How does he handle confidentiality of rumor-mongers, avoid lawsuits, provide custom software to drive the site, and make money from it?


Negativland - Past, Present, Future

Saturday, 7 pm
Area "D"

Part 1
mp3 streaming

Part 2
mp3 streaming

If there is any one group who personifies the concept of "fair use," that group would have to be Negativland. The Bay Area based band has, over the years, drawn the ire of everyone from rock band U2 to American Top 40 host Casey Kasim to angry parents to confused legislators. Founding member Mark Hosler hosts this presentation which will focus on media literacy as well as the activism, pranks, and hoaxes that Negativland has engaged in over the years. A number of rare Negativland films will also be shown.


The New FBI and How It Can Hurt You

Friday, 9 pm
Area "A"
mp3 streaming

On May 29, the Federal Bureau of Investigation dramatically changed its focus. Now, instead of investigating crimes, its mission is to prevent them, meaning they have virtual carte blanche to infiltrate any law abiding organization or gathering to make sure all is right. And, even better, their third priority of dangerous crimes to stop (next to terrorism and espionage) is "cybercrime." We all know what a wide net that can be. Hear the dangers firsthand from the people who follow this kind of thing.

Hosted by Mike Levine, Declan McCullagh, and Robert Steele


Open Source Security Testing Methodology Manual

Sunday, 1 pm
Area "B"
mp3 streaming

The OSSTMM came about as a need for an open, free security testing methodology in response to the numerous security testing companies who claimed to have a secret, internal, and corporate confidential methodology for testing. It was this methodology that they used to differentiate themselves from other testing companies. The problem was that often it didn't exist and the tests turned out to be no more than commercial scanners set loose on a list of systems. The development of the OSSTMM began as a series of logical steps to make a good test and grew into the need to make the most thorough test. This presentation will show the origin of the OSSTMM and the logic behind it, as well as results of reverse-engineering the reports of corporate tests, commercial tools, and commercial presentations.

Hosted by Tyler Shields


"Owned"

Friday, 10 pm
Area "D"

A new film on the hacker culture, produced and directed by Jennifer Read. From the inception of modern-day hacking in the 1960s to the current state of hacking art, this is an oral history of a tech tradition that spans five decades.


The Password Probability Matrix

Saturday, 2 pm
Area "B"
mp3 streaming

A winnowing method for brute-force password cracking using lossy compression. Cryptologist Jon Erickson will present the specifics for a newly developed password cracking method and perform a demonstration of it. The method is a hybrid between using computational power and storage space for an exhaustive brute-force attack utilizing a compressed matrix of probabilistic values. He will demonstrate the ability to crack any 4 character password with a fixed salt in under 8 seconds (assuming 10,000 cracks per second), using only a 141 meg file. A normal exhaustive brute-force on the same system would take over 2 hours, and flat text storage of the plaintext/hash pairs would normally use over a gigabyte of storage. This translates to 99.9% keyspace reduction and 89% storage compression.


The Patriot Act

Sunday, 3 pm
Area "B"
mp3 streaming

Members of the New York City People's Law Collective will be discussing the dangers of the Patriot Act and providing information on warrants, hacktivism, what is legal and what is not, and ways that hackers, activists, and normal citizens can protect themselves from The Man.


Protection for the Masses

Saturday, 6 pm
Area "B"
mp3 streaming

Host Rop Gonggrijp gives updates on two projects designed to help people protect their privacy from prying eyes. One is a localhost mail proxy for PGP that is really nice and could "save the world" as the PGP plugins stop working (soon...). The other one is Secure Notebook, a project to create a notebook which runs Windows, yet is secure against theft. Source for all projects will be open for review.


Proximity Cards: How Secure Are They?

Sunday, 6 pm
Area "B"
mp3 streaming

They're used everywhere but they could be making you even more vulnerable to privacy invasion. Delchi has been working with proximity based card systems for two years and has developed a method of casually extracting data from proximity cards in a public environment. Riding in an elevator, subway, or just walking down the hall, a person can bump into you, say "excuse me," and walk away with the decoded information from the proximity card in your pocket. It could then be possible to build a device that can capture and replay these snippets of information on demand or to even brute force a proximity card system. This talk will focus on the vulnerabilities of the systems and show a low power working prototype. Alternatives will be discussed, as well as other vulnerable aspects of proximity based building and computer access systems.


Report From Ruckus

Sunday, 5 pm
Area "B"
mp3 streaming

Very recently, history was made in California as The Ruckus Society held its first-ever Tech Toolbox Action Camp. It lasted for a week and brought together geeks and activists from around the world who shared information on how they're using the Internet and other technologies in working for change. Part of the goal was to emerge from this and show others what they learned. Some of the attendees of the Ruckus Camp will be here to do just that.


RetroComputing

Friday, 12 noon
Area "A"
mp3 streaming

This year's retrocomputing panel will focus on hardware hacking and cloning such systems as the Apple ][ and C64. Also included will be a discussion on homebrew microcomputers and kits from the 70's as well as antique cellphone hacking. Witness firsthand genuine pieces of history. Attendees are encouraged to bring their really old (working) computers for the "retrocomputer neighborhood" in the network room.

Hosted by Mr. Ohm, Sam Nitzberg, Nightstalker, and Bernie S.


Secure Telephony: Where ARE the Secure Phones?

Saturday, 4 pm
Area "B"
mp3 streaming

Panel participants will take a look at the history of secure phones, what's worked and what hasn't, who the players are, and what needs to happen to make truly secure telephony a ubiquitous reality. Panel members include former Starium CTO Eric Blossom and Rop Gonggrijp of NAH6.


The Shape of the Internet: Influence and Consequence

Friday, 10 am
Area "B"
mp3 streaming

Network researchers have discovered strong power law relationships in the Internet. These can be interpreted as a direct fingerprint of the fractal structure present on the net. Work has only recently begun on analyzing the implications of such a structure on attack tolerance, government snooping, and the like. In this talk, a review of these topics will be presented, along with a proposed network structure that can avoid such issues.

Hosted by Javaman


Social Engineering

Sunday, 4 pm
Area "A"
mp3 streaming

A tradition started at the first HOPE conference in 1994, the social engineering panel remains one of our most popular each and every time. It would be wrong for us to tell you what we have planned because then our victims might have a fighting chance of escaping. Suffice to say, we will find someone somewhere who will tell us something they really shouldn't have because they believed we were somebody we weren't. This panel is always open to participants so if you feel you're worthy, just let us know during the conference and you might find yourself up on stage trying to be clever on the phone.


Standing Up To Authority

Friday, 11 am
Area "A"
mp3 streaming

"How is it you folks have gotten away with not getting shut down by the powers-that-be?" is the question most frequently asked of Cryptome (www.cryptome.org) since its inception in 1996. Post-9/11 H2K2 is an opportune time and place to reconsider implications of this question with Cryptome founders John Young and Deborah Natsios, New York City-based architects (of bricks and mortar), who will discuss their means and methods of sustaining activism in the face of opposition, with reference to ongoing cases.


Steganography: Wild Rumors and Practical Applications

Friday, 2 pm
Area "A"
mp3 streaming

Is Osama bin Laden sending coded messages in the pictures of goods for sale on EBay? Is that MP3 file carrying a secret note that tracks the listeners? Steganography is the art and science of hiding information in digital data and it stretches the boundaries of information theory and philosophy. An artful programmer can hide secret messages in such a way that a 1 is not always a 1 and a 0 is not always a 0. This talk will explore some of the popular schemes for inserting messages and discuss how they're used by hackers, poets, corporate bean counters, and programmers on a deadline.

Hosted by Peter Wayner


Strategic Thought in Virtual Deterrence and Real Offense: The Computer's Role

Friday, 3 pm
Area "B"
mp3 streaming

Computers are pivotal components in modern society: daily life, banking, and military. What must be considered and what risks do we all face when they are used in conflict? These concerns are societal in nature and apply to both "minor" and "major" groups, governments, and militaries. There will be opportunity for ample questions from the audience. The intention is to share the overall attendee perspective. The goal is to be thought provoking, not scare-mongering.

Hosted by Wanja Eric Naef and Sam Nitzberg


Teaching Hacker Ethics with a Common Curriculum

Friday, 11 am
Area "B"
mp3 streaming

An introduction of a new proposed curriculum guideline for teaching information ethics to students in elementary school, high school, and college. This curriculum is being proposed through the North Carolina chapter of Computer Professionals for Social Responsibility. The idea is to foster creative, exploratory, effective, and intelligent use of information tools (aka, the hacker ethic), rather than powerless end-user mentality. There are many reasons to desire a common suggested curriculum for different educational levels. We might argue that most major advances in computing were brought about by hackers. We could point out that it's necessary to encourage creative and exploratory behavior for the next generation of computer users to do brilliant things. For today's hackers, the goal is simply to shape tomorrow's hackers so that they will use their abilities to help create a better society.

Hosted by Greg Newby


Technomanifestos: Visions of the Information Revolutionaries

Friday, 1 pm
Area "B"
mp3 streaming

Author Adam Brate discusses the seminal works of the information age, from Norbert Wiener's Cybernetics to Abbie Hoffman's Steal This Book to Richard M. Stallman's GNU Manifesto, uncovering the remarkable stories behind the beginnings of the personal computer and the Internet and how they are changing society.


Tracking Criminals on the Internet

Friday, 6 pm
Area "B"
mp3 streaming

How certain criminal investigations have been investigated in the past couple of years with perps being tracked by IP addresses, email, and web surfing. Such cases include the murder of Daniel Pearl, the search for Bin Laden, the Melissa virus release, the Clayton Lee Waagner escape, the anthrax attacks, and the Wakefield mass murders.

Hosted by Richard M. Smith


The Ultimate Co-location Site

Sunday, 3 pm
Area "A"
mp3 streaming

Sealand was founded as a sovereign principality in 1967 in international waters, six miles off the eastern shores of Britain. The island fortress is conveniently situated from 65 to 100 miles from the coasts of France, Belgium, Holland, and Germany. HavenCo has been providing services since May 2000 and is fully operational, offering the world's most secure managed servers in the world's only true free market environment - the Principality of Sealand. Avi Freedman and Ryan Lackey of HavenCo will talk about the challenges and potential of this unique working environment and what it could mean to the future of the net.


The Vanished Art of Human Intelligence

or Why the World Trade Center Would Still Be Standing if Defense Against Terrorism Had Been Contracted Out to the Private Sector

Friday, 7 pm
Area "A"

Part 1
mp3 streaming

Part 2
mp3 streaming

A collection of videos and analysis by WBAI talk show host and 25 year federal agent Mike Levine. Learn about the dangers of the use of human intelligence in the hands of amateurs and imagine what is about to happen under the new anti-terrorism laws.



Speaker Info

Lee Azzarello.  Lee Azzarello is a musician who works with computers. When he's not creating generative compositions with the SuperCollider programming language, he works as an audio engineer and network admin for a small art studio in Manhattan.

Bernie S..  Bernie S. started playing with microcomputers in 1978 when he built one using RCA's 1802 microprocessor (since it controlled the first Viking Mars Lander, he though it was cool). Shortly thereafter he built an intelligent video terminal (a big deal back then) and 110 baud modem, then started hacking the local Sperry Univac mainframe at Mansfield State College. Since then he's stayed involved with computers and telecommunications, and pushed the envelope a bit too much for the U.S. Secret Service.

Loyd Blankenship.  Loyd Blankenship has at various points throughout his career been an author, game designer, sports reporter, computer programmer, multimedia developer, cook, musician, and convenience store clerk. He lives in Austin, Texas, with his wife, two dogs, and three cats, where he is developing Palm applications for use in political canvassing. You may also know him as The Mentor, author of "The Conscience of a Hacker."

Matt Blaze.  Matt Blaze has been involved in all sorts of stuff, from evaluating Carnivore and Key Escrow for the government to writing the crypto file system to writing dozens of papers on crypto. He was the co-designer of swIPe, a predecessor of the now standard IPSEC protocol for protecting Internet traffic. In 1994, he discovered a serious flaw in the U.S. government's "Clipper" encryption system, which had been proposed as a mechanism for the public to encrypt their data in a way that would still allow law enforcement to have access to it.

Eric Blossom.  Eric Blossom has been designing telecommunications software and hardware systems for 25 years. He founded Communications Security and Starium, where he designed and manufactured portable secure telephony devices that operate over standard phone lines. He also founded the gnuradio project, which seeks to develop an open source, multiprotocol RF receiver/transmitter.

Adam Brate.  Adam Brate is a freelance science and technology writer who has followed the Information Revolution around the globe to places such as India, Argentina, and Finland. His first book, with David Bunnell, was Making the Cisco Connection, The Story Behind the Real Internet Superpower. His latest release is Technomanifestos: Visions from the Information Revolutionaries.

The Cheshire Catalyst (Richard Cheshire).  The Cheshire Catalyst (Richard Cheshire) was the last editor/publisher of the TAP Newsletter of the 1970's/1980's, while hacking the World Telex Network. He has pretty much rested on his laurels since then, only coming out every couple of years to speak at HOPE conferences and to carry on the fight to make web sites accessible to non-graphic Internet users. His web site is at CheshireCatalyst.com.

Jim "Cips".  Jim "Cips" received an Associate's Degree in nanofabrication from PSU in 2000 (first graduating class in the U.S. for that degree). Since then he has stayed in college learning and getting degrees in electronics, optoelectronics, and computer networking and picked up skills in microradio, hacking, lockpicking, and other activities along the way.

The Cult of the Dead Cow (cDc).  The Cult of the Dead Cow (cDc) has worked since 1984 to disrupt the digital status quo. For nearly two decades, this collective of freethinkers and malcontents has structured their activities on a set of principles involving personal liberty, security, and availability of access. Opposed by commercial enterprises and government institutions the world over, the Cult of the Dead Cow has focused public attention on problems affecting the communication networks, including insecure systems, intrusive monitoring, and corrosive censorship. In recent years, the cDc has involved itself in online hacktivism, as well as human rights generally. The cDc is probably best known for releasing the remote administration tool Back Orifice, and its open source successor Back Orifice 2000.

Cyberjunkie.  Cyberjunkie has been part of the BBS scene in England since the late 80's and became part of the hacker scene in the early to mid 90's. He's the co-founder of the British hacking group The AoHP. He now works as a security consultant and lecturer to organizations such as the British Ministry of Defence (the other MoD).

Delchi.  Delchi has been covertly undermining the known universe as a member of the cDc Ninja Strike Force. Weaving together 15 years of experience from satellite earth stations, NOC operations, consulting, physical security audits, appearances in comic books, and behind the scenes convention work, he has earned the name "The Entropy Technician." Now all he needs is a tour bus, a knowledge of brain surgery, and an oscillation overthruster.

Nelson Denoon.  Nelson Denoon is a picker, a grinner, a lover, and a sinner. He gets his loving on the run.

Lynea Diaz-Hagan.  Lynea Diaz-Hagan has been involved with the New York City Independent Media Center since the fall of 2000, working with the sound collective and the outreach working group. With a background in music, film, and theater production, she is interested in the relationship between creative culture and technology.

Maximillian Dornseif.  Maximillian Dornseif is a hacker turned law scholar. Once involved with the Chaos Computer Club in Germany, he is now a Ph.D. student at the University of Bonn. He also still appears at the annual CCC Congress in Berlin to trade information with fellow hackers.

Dragorn.  Dragorn is the author of the wireless network detection program Kismet, several wireless security articles, and is an all-around paranoid Linux security guy.

Jon Erickson.  Jon Erickson has over seven years of experience in the realm of computer security. He has spoken at computer security conferences around the world. He works as a cryptologist and enterprise security designer for a health care infrastructure consulting company in San Francisco.

Avi Freedman.  Avi Freedman started the first ISP in Philadelphia in 1992 (netaxs.com - now part of FastNet) and grew it into a regional backbone and hosting provider on the east coast. In 1998 he became VP of Engineering at AboveNet, a global hosting and backbone provider (though MFN has since driven it into the ground). In 1999 he went to Akamai where he's in charge of the overall network architecture and technology, though he spends most of his time on special projects for special customers. Freedman also was a founder of HavenCo on the Principality of Sealand in 1999.

Paul Garrin.  Paul Garrin founded the name.space project in 1996 to catalyze the divestiture of the U.S.- sanctioned monopolies that govern the Internet and bring new and expressive extensions to the Internet Domain Name System while reforming domain policy, an initiative that continues to this day. Garrin recently co-founded Free.The.Media!, a non-profit, member-supported autonomous network and cultural think tank whose purpose is to reclaim public space on the net and preserve free expression, privacy, and access for all through education, community ownership of media infrastructure, and the development of open source software. Garrin is also known for capturing on video a controversial "police riot" in New York City back in 1988, one of the earliest sparks that ignited the "camcorder revolution."

Mike Glasser.  Mike Glasser is a manufacturers' rep for electronic security products. He is a certified registered locksmith licensed by New York as a burglar and fire alarm installer as well as a member of both the Associated Locksmiths of America and the North Jersey Master Locksmith Association. And of course, he is also a phreak and hacker, as he's been most of his life.

Mike Godwin.  Mike Godwin served as the first Staff Counsel for the Electronic Frontier Foundation, where he informed users of electronic networks about their legal rights and responsibilities, instructed criminal lawyers and law enforcement personnel about computer civil liberties issues, and conducted seminars about civil liberties in electronic communication for a wide range of groups. Currently a senior policy fellow at the Center for Democracy and Technology, he also remains an "IP Land" columnist for The American Lawyer magazine, and is a contributing editor at Reason.

Emmanuel Goldstein.  Emmanuel Goldstein is editor and co-founder of 2600, chief organizer of the HOPE conferences, host of WBAI's "Off The Hook," director/producer of the documentary "Freedom Downtime," and the target of lawsuits and threats from all elements of Corporate America. He has been playing with and breaking phone systems and computers since his childhood.

Rop Gonggrijp.  Rop Gonggrijp founded ITSX in 1998. He began hacking in his teens and founded the magazine Hack-Tic in 1989. In 1993, he was a co-founder of the Netherlands' first public Internet provider (xs4all.nl). He also played a role in the founding of De Digitale Stad, Amsterdam's Digital City. He is well known in the Netherlands and abroad as an expert in computer and telecommunications security. He has regularly been an expert witness for court cases, and is a guest lecturer on the Information Revolution and its political impact.

Gonzo.  Gonzo is a member of the now disbanded L.O.S., and has been involved with the hacker community for 12 years. He is also editor-in-chief of the new ezine Reprimand, which can be reached at www.reprimandmag.com.

Eric Grimm.  Eric Grimm and his law firm CyberBrief, PLC, specialize in the resolution of technology-related legal disputes. Most recently, he represented 2600 when we were sued by the Ford Motor Company for pointing www.fuckgeneralmotors.com to www.ford.com. And, not surprisingly, he won.

Robin Gross.  Robin Gross is an intellectual property attorney with the Electronic Frontier Foundation and specializes in digital music and intellectual property policy. In June 1999, she founded EFF's Campaign for Audiovisual Free Expression (CAFE) that works to protect freedom of expression in digital media. Gross frequently publishes and speaks on intellectual property, digital copyright, and the DVD/DeCSS and MP3 legal wars.

Gweeds.  Gweeds is a hacker activist (not a hactivist) and wants to be your friend!

Jay Hanson.  Jay Hanson has been a collector of personal electronics since his first digital watch over 20 years ago. His obsession with the development and evolution of integrated circuit-based products has led to his career in commercial radio in Connecticut and Maine. He co-hosts a shortwave radio show and web site on the golden age of electronics, both called "Pocket Calculator."

Craig Harkins.  Craig Harkins has been operating Anteater Radio International since the 80's from an 18-wheeler truck over pirate shortwave.

Edward Hernstadt.  Edward Hernstadt, part of 2600's legal team during the DeCSS case, specializes in First Amendment and media, intellectual property, employment discrimination/Title VII law, and entertainment litigation. He has written and spoken numerous times about the DMCA, including on National Public Radio and CNNfn.

Mark Hosler.  Mark Hosler is a founding member of Negativland, the experimental music and art collective that has been recording music/audio/collage works since 1980, producing a weekly three hour radio show ("Over The Edge") since 1981, and performing live on occasional tours throughout America and Europe. Negativland have released 18 CDs, one video, and one book ("Fair Use: The Story Of The Letter U And The Numeral 2") since 1980. They were the subject of the 1995 feature film "Sonic Outlaws" by Craig Baldwin, and composed the soundtrack/sound design for a critical 1997 documentary on advertising, "The Ad and the Ego". Negativland coined the term "culture jamming" in 1984, and this phrase is now often used to describe the work of many different media artists and activists.

Javaman.  Javaman is a Philadelphia-based hacker with a background in RF engineering, specifically high UHF/low SHF. He has done design work for major telecommunication companies, the military, and universities. Past projects have included RF amplifiers, phase shifters, web-based remote instrumentation control, and data acquisition.

Philip J. Kaplan (known as Pud).  Philip J. Kaplan (known as Pud) is a 25-year-old computer programmer, creator of fuckedcompany.com, and uber-geek. In May 2000, on Memorial Day weekend, Kaplan started his own consultancy, PK Interactive as well as fuckedcompany.com. He emailed the web address to six friends, took off on a planned trip to Rio, and came back to 20,000 new registered users, press interviews, and just a few "cease and desist" letters. Now attracting over 3.5 million unique readers per month and a flurry of press attention, fuckedcompany.com has turned Kaplan into a hero amongst millions of fellow "dilberts" throughout the world - and into a nemesis to dot-com executives and venture capitalists.

Tarikh Korula.  Tarikh Korula is an artist, computer programmer, and media activist. His work has been exhibited internationally from Siggraph to London's ICA. He received his Masters in Interactive Telecommunications from NYU in 1999. Korula is a founding member of the New York City Independent Media Center, where he helped start the sound collective in August of 2000.

Ryan Lackey.  Ryan Lackey is the CTO and co-founder of HavenCo Ltd. He lives on the Principality of Sealand full-time.

Lazlow.  Lazlow is a nationally syndicated host of a daily technology update aired on hundreds of radio stations nationwide. He gives listeners an honest and opinionated look inside the world of technology. For years, he has been warning of the danger of media conglomeration in the world of radio - and today, media giant ClearChannel owns over 1200 radio stations with no end in sight. Lazlow has seen the industry from the inside - and it ain't pretty.

Leo.  Leo is a fan of alternative science and spends his time posting news article links on his live journal. He is currently a writer for e-zine Reprimand.

Mike Levine.  Mike Levine is the host of The Expert Witness Radio Show on WBAI-FM in New York. He is a veteran of 25 years of covert and deep cover operations for the Drug Enforcement Administration and one of its most highly decorated officers. He is also a world recognized court-qualified expert witness, trial consultant, and lecturer in all matters relating to human intelligence, covert operations, narcotics trafficking, police procedures, RICO and conspiracy investigations, and the use of force. Levine has testified as an expert in over 500 civil and criminal trials internationally and domestically. He is the author of the New York Times best-seller Deep Cover and the national best-seller The Big White Lie.

Lucky225.  Lucky225 is a writer for 2600 Magazine and Hacker's Digest. At age 19, he has been involved in telephony for as long as he can remember and has a vast variety of knowledge about phones - everything from regular telephones, payphones, cellphones, and voicemail systems to ANI, Caller ID, PBX's, switches, and much more.

Robert Lupo aka "V1RU5".  Robert Lupo aka "V1RU5" is a network security engineer and holds several network and security certifications. He lectures nationwide on computer viruses and network security and has been featured on CNN.

Bryan Maloney.  Bryan Maloney first saw a computer when his father brought home a Macintosh in 1984. He grew up using the old Mac to call up BBSes and experiment with scripting and wardialing, but eventually took to the philosophical implications of computers in the world. He currently works in high end server engineering for Sun Microsystems.

Josh Marcus.  Josh Marcus is a community activist and programmer living in Philadelphia. He has been a developer on the open source projects that underlie the Philadelphia Independent Media Center, including the Slashcode based open publishing system and the studio-transmitter link software that powers WPEB 88.1 FM. He is also a contributor to various open source projects, and the Director of Technology of Datarealm Internet Services, a Philadelphia based webhosting company.

Declan McCullagh.  Declan McCullagh is the chief political correspondent and a senior writer for CNET's news.com. An award-winning journalist, he writes and speaks frequently about technology, law, and politics. For the last four years, he has been the Washington bureau chief for Wired News. Previously he was a reporter for Time Digital Daily, Time's The Netly News, and Time Magazine, as well as a correspondent for HotWired. McCullagh moderates Politech, a well-known mailing list looking broadly at politics and technology that he founded in 1994.

Aaron McGruder.  Aaron McGruder is the writer and illustrator of the daily comic strip Boondocks which has been entertaining, educating, and outraging members of the populace for years. Some of these strips have focused on hacking and have come closer to accuracy than virtually anything else in the newspapers they appear in. McGruder graduated from the University of Maryland with a degree in Afro-American Studies with a concentration in Social and Cultural Analysis, and has no intention of ever returning to school for a graduate degree of any sort. Occasionally he can be heard co-hosting the Soul Controller Mix Show on WMUC 88.1 FM, College Park, Maryland. McGruder also has an unhealthy and expensive affinity for Star Wars merchandise and Japanese animation.

Mixter.  Mixter has been into full disclosure since 1999 and is known for writing code such as the NSAT scanner, LibMix, and TFN (early DDoS technology), as well as some technical and political papers (mixter.warrior2k.com/papers.html). He worked as a security consultant in Israel at Ehud Tenenbaum's 2XS Ltd. and is now core developer at RedICE, an IT security company specializing in cryptography-based communication. Since mid 2000 he's been a member of Hacktivismo and is strongly interested in both technical aspects and political pro-freedom goals of the movement, and in creating the projects with which we will achieve those goals.

Andy Mueller-Maguhn.  Andy Mueller-Maguhn has been a vital member and spokesperson for Germany's Chaos Computer Club since the 1980's. He's become even more dangerous by getting elected (by a landslide) to the Board of Directors of the Internet Corporation for Assigned Names and Numbers (ICANN) where he's been keeping a watchful eye on that organization and reporting back to people like us.

Wanja Eric Naef.  Wanja Eric Naef is a graduate of the Department of War Studies at King's College in London. He is currently reading for an MSc in Information Security at the Information Security Group, Department of Mathematics, Royal Holloway. He has a particular interest in Information Operations and Critical Infrastructure Protection. He is also a partner with the National Center for Manufacturing Sciences (NCMS) in supporting the InfraGard Manufacturing Industry Association. He also maintains the Infocon newsletter.

Deborah Natsios.  Deborah Natsios has practiced architecture in New York City since 1981, and taught in graduate architecture programs at Columbia University, Parsons School of Design, Pratt Institute, and The University of Texas. She received a BA in Mathematics from Smith College in 1975 and a Master of Architecture degree from Princeton University in 1979. She currently operates cartome.org, an archive of news and spatial/geographic documents on privacy, cryptography, dual-use technologies, national security, and intelligence.

The New York City People's Law Collective.  The New York City People's Law Collective is the first standing anarchist legal collective that is dedicated to aiding activists. They have been providing aid since the Republican Convention of 2000 and have worked with groups ranging from community gardeners, black blockers, the mentally ill, and anti-globalization protesters in Washington, New York, Quebec, Philadelphia, and elsewhere. They also provided help for the raisethefist.com case.

Greg Newby.  Greg Newby is a professor at UNC Chapel Hill with a Ph.D. in Information Transfer. He teaches Unix/Linux systems administration and information security, and has a research project to develop open source search engines. He is a founding member of the North Carolina chapter of Computer Professionals for Social Responsibility (CPSR), and the CEO of Project Gutenberg.

Nightstalker.  Nightstalker has been a Commodore enthusiast since the mid-80s, and a retrocomputing/retrotechnology fan. He's been a member of the Cult of the Dead Cow since 1990. He built an Altair back in the 70s, as well as a Don Lancaster designed TV typewriter terminal with a 110 baud acoustic coupled modem to use with it. Bending over printed circuit boards, soldering iron in hand, for almost 40 of his 50 years, Nightstalker has probably inhaled far too many fumes from molten solder.

Uzi Nissan.  Uzi Nissan came to the US from Israel in 1976 and used his surname to identify a number of business enterprises. The first was Nissan Foreign Car in 1980 (while Nissan Motors was still known as Datsun). In 1987 he started an import/export business known as Nissan International, Ltd. and in 1991 he founded Nissan Computer Corporation. On June 4, 1994, he registered the domain name nissan.com to promote Nissan Computer's related products and services on the Internet. In 1996 he registered the domain name nissan.net and began offering Internet services, including dial-up and direct connections to business. In 1999 legal action was instituted by Nissan Motors for trademark infringement, trademark dilution, and cybersquatting. He's spent a fortune since then literally battling for his name.

Sam Nitzberg.  Sam Nitzberg is a consultant with an extensive background in software engineering and information security. He has bachelors and masters degrees in Computer Science and Software Engineering, respectively, as well as several years of doctoral studies in Computer Science. He has published and presented on subjects relating to computer security, information warfare, technology and ethics, and military informatics in numerous national and international venues. His web sites include www.iamsam.com and www.NitzbergSecurityAssociates.com.

Mr. Ohm.  Mr. Ohm has been involved in the New York City 2600 community for four years. He is an advocate for the exploration of archaic technology and the use of hacking in politically and socially conscious roles, including hacktivism and electronic sabotage.

Porkchop.  Porkchop started with 2600 when he began the live streaming of the radio show Off The Hook over the Internet in 1997. Since then, he has been involved in many projects including filming and editing Freedom Downtime. He spends his days in upstate New York finishing school and using technology in an attempt to effect social change there.

Kevin Prichard.  Kevin Prichard is a particle physicist, neurosurgeon, and martial arts master, and also plays in a band. When he's not working as an open source software developer, he can occasionally be heard on the New York City Indymedia radio stream (http://nyc.indymedia.org/sound/) discussing civil liberties, online freedoms, and other critical issues of the day. In his copious free time he contributes to the ROACH project at Indymedia (Ratty Old Arrays of Computer Hardware).

Steven Rambam.  Steven Rambam is a licensed private investigator and the owner and CEO of Pallorium, Inc., an investigative agency with offices and affiliates throughout the world. During the past 21 years, he has conducted and coordinated investigations in more than 50 countries and in nearly every U.S. state and Canadian province. For the past eleven years, he has also been the owner and director of PallTech, an online service which provides database and investigative support services to investigative agencies, special investigative units (SIUs), and law enforcement. PallTech offers interactive and non-interactive access to nearly 600 data sources, including five major proprietary databases such as Skiptrace America and BusinessFinder America. The Skiptrace America database, which currently contains more than 5.3 billion unique records, is believed to be the largest individual reference database in the United States, excluding those databases maintained by the three U.S. credit bureaus. Ten years ago Rambam forced the tightening of airport security in Texas airports by publicly exposing those airports' security flaws. In 1997 he exposed the presence in Canada of 162 Nazi war criminals and also conducted investigations which resulted in the prosecution and conviction of war criminals on murder charges. He is also the inspiration for "Rambam the detective" in Kinky Friedman's series of murder mysteries.

John Ramsey.  John Ramsey founded Ramsey Electronics 30 years ago and has been producing innovative kits for electronics hobbyists and hackers ever since. His low-power radio transmitter kits have received worldwide acclaim, and are used by thousands of microbroadcasting stations around the globe.

RenderMan.  RenderMan is an anti-virus critic who has been making a hobby of annoying anti-virus vendors and other large companies for the last two years. He also fought successfully for the recategorizing of Netbus as a trojan by several anti-virus vendors.

Rudy Rucker, Jr..  Rudy Rucker, Jr. is an ex-dot-commer who owns and operates a local ISP in San Francisco. Fascinated with pop culture, he makes websites which amuse some and trouble others.

Douglas Rushkoff.  Douglas Rushkoff is the author of eight best-selling books on new media and popular culture, including Cyberia, Media Virus, Playing the Future, Coercion: Why We Listen to What "They" Say, and the novels Ecstasy Club and Exit Strategy. His radio commentaries air on NPR's All Things Considered, and his monthly column on cyberculture is distributed through the New York Times Syndicate and appears in over 30 countries. Rushkoff lectures about media, art, society, and change at conferences and universities around the world. He hosts and writes documentaries for PBS, Channel Four, and the BBC.

Rev. Sergey.  Rev. Sergey, having emigrated from Russia, is a member of the Barbelith Underground, founding member of the Weird Science Club, and is an ordained minister with the Universal Light Church. His site can be reached at www.enamon.com.

ShapeShifter.  ShapeShifter became a bit of a national figure shortly after the H2K conference in 2000 when he was jailed for a week during the Republican National Convention in Philadelphia and held along with three others for over half a million dollars bail. The odd thing was that there was no actual evidence that he did anything wrong and eventually all charges were dismissed. But it was a frightening example of how individuals can be targeted simply because they speak out. (He had given a talk on planned protests at the RNC during H2K.) ShapeShifter is also the layout artist for 2600.

Anatole Shaw.  Anatole Shaw is an independent researcher and engineer, self-employed professor, and longtime advocate of practical cryptography.

Tyler Shields.  Tyler Shields is the director of OSSTMM (Open Source Security Testing Methodology Manual) Knowledge Transfer project and co-founder/lead technical resource for Security Sciences Corporation (www.securitysciences.com). He is heavily involved in penetration testing, information reconnaissance, and developing the OSSTMM Security Testing Certification training courses for the USA. His name is known to many open source security projects and a few old-school hacker groups.

Tray Smee.  Tray Smee has been a network administrator and computer programmer since 1995. He is a Microsoft Certified Professional and is involved with many different aspects of communications equipment, from programming 2-way radios, pagers, and cell phones to modifying them. He has been an amateur radio operator since 1996. He loves to take things apart to see what makes them tick. Reverse engineering and learning protocols for different types of systems are what take up most of his free time.

Richard M. Smith.  Richard M. Smith once headed the nonprofit Privacy Foundation but now focuses on technology related to security issues. He's been described by The New York Times as "perhaps the nation's most vocal authority on data privacy." A former software entrepreneur, Smith is credited with uncovering dozens of incidents in which high technology companies were trying to breech consumers' privacy by secretly tracking online movements. He has teamed up with the ACLU to show that facial scanning technology would be largely ineffective in identifying terrorists. Smith operates a web site that reports "computer bites man" stories, named ComputerBytesMan.com.

StAtIc FuSiOn.  StAtIc FuSiOn has been infatuated with computers, electronics, and technology since he first laid hands on a computer. After getting his feet wet in hacking at an early age he instantly found his calling which led to many years of exploring, learning, and practice in computer security. He has become a regular at the Calgary 2600 meetings over the last few years and has come to know many wireless hacking enthusiasts in the area. Recently he has become interested in wireless 802.11b, advanced aspects of TCP/IP, various spoofing methods and authentication bypass, and social engineering - due to its relation to another one of his passions: psychology.

Robert Steele.  Robert Steele, a 25 year veteran of the U.S. national security community and counter of oss.net, is the author of The New Craft of Intelligence: Personal, Public, & Political - Citizen's Action Handbook on Fighting Terrorism, Genocide, Disease, Toxic Bombs, and Corruption. He gave the keynote address back in 1994 at the first HOPE conference. He's been described by writer Bruce Sterling as "10,000 times as dangerous as the best of the hackers, for he is successfully hacking the most challenging of bureaucracies, the U.S. intelligence community, and doing it for the right reasons."

Pete Tridish.  Pete Tridish is one of the founders of Radio Mutiny, 91.3 FM in Philadelphia, and its successor RadioVolta.org. He is also a founder of the Prometheus Radio Project, an organization that organizes for low power radio and provides free assistance to LPFM applicants. He actively participated in the FCC rulemaking and the grassroots organizing campaign that led up to the adoption of LPFM. He tours the country regularly to help start community radio stations and fight for democratization of media.

Siva Vaidhyanathan.  Siva Vaidhyanathan, a cultural historian and media scholar, is the author of Copyrights and Copywrongs: The Rise of Intellectual Property and How It Threatens Creativity. He is currently working on a book about Napster and the ways we regulate our information ecosystem. He has written for many periodicals, including The Dallas Morning News, the Fort Worth Star-Telegram, The Chronicle of Higher Education, msnbc.com, The New York Times Magazine, Salon.com, and The Nation. After five years as a professional journalist, Vaidhyanathan earned a Ph.D. in American Studies from the University of Texas at Austin. He has taught at the University of Texas, Wesleyan University, and the University of Wisconsin at Madison. He is an assistant professor in the Department of Culture and Communication at New York University.

Peter Wayner.  Peter Wayner is the author of 11 books, the latest two being Translucent Databases and Disappearing Cryptography. He lives in Baltimore.

Allan Weiner.  Allan Weiner operated a famous pirate radio station back in the 80's - Radio New York International. Now he operates a 50,000 watt shortwave radio station in Maine called WBCQ.

Barry "The Key" Wels.  Barry "The Key" Wels is one of the founders of TOOOL, The Open Organization of Lockpickers, a European lockpick sportclub. He also assists in professional lockpick/safe opening seminars given by the famous Paul Crouwel in the Netherlands. More info on lockpicking as a sport can be found on www.lockpicking.org or www.toool.nl.

John Young.  John Young has been a New York City architect since 1970, and taught in graduate architecture programs at Columbia University, Pratt Institute, and through Urban Deadline, which he co-founded in 1968. He received a BA in Philosophy from Rice University in Houston in 1962, a Bachelor of Architecture from Rice in 1963, and a Master of Science in Architecture from Columbia University in 1969. He currently operates cryptome.org, a site that has become a vital source of free information on the net and which "welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and blast protection - open, secret, and classified documents."

Paul Zurek.  Paul Zurek had his electronic eyes opened at the age of 7 when he received his very first handheld game, a Parker Brothers Merlin. He graduated to coin-ops and then computers when his mom bought him a $30 TI99/4A from K-Mart. Today he pursues all sorts of old electronic devices from games to stereos to computers.

Again, this is merely a preliminary list of what we're working on for the conference. You can also look forward to panels and talks on social engineering, pirate radio, conspiracies of all sorts, 802.11 fun, lockpicking, nanotechnology, Indymedia, cryptography, steganography, satellite hacking, and a whole lot more plus showings of your favorite hacker movies including "Freedom Downtime" and a brand new one called "Owned."

Back to top of page





Introduction | Speakers | Music | Location | Travel | Registration | Volunteering


Comments on site: webmaster@2600.com
©Copyright 2002 2600 Enterprises, Inc. All rights reserved.
Site Designed By: Frogman, KittenNYC and Silicon Druid