April 4th - 6th, 2008

Cleveland, Ohio

Presented by

FTS Conventures


Speakers and Presenters

Last Updated : 3/11/2008

Elonka Dunin speaks on Kryptos at Notacon 2006
Elonka Dunin speaks on Kryptos
Notacon 2006
-- Image credit AmishOne

Notacon 5 speakers will be listed here as they are accepted. Don't forget to pre-register.

To see what sort of presentations Notacon has offered in the past, please see our our archives.

We hope to see you in 2008.

Guests of Honor
Drew CurtisCreator: FARK.com
Michael DeAloiaCleveland technology icon
Emmanuel GoldsteinEditor: 2600 Magazine
Ab3ndE-drugs, Pokemon, and the Bhodi Tree: Building a Hardware and Software Environment for Wireheading
aestetixZen and the Art of the Turing Machine
algormorBagcam - How Did TSA and/or the Airlines Manage to Do That to Your Luggage?
Jeremy AndersonHacking Habitation: A Computer Nerd's Guide to DIY Construction
Jon BroadwellCreating Something Some People Want But May Not Know It
Tim CowleyAutomated Psychedelia : Translating Sound Into Color and Motionblockparty 2008
Dead AddictPermanent Records - Managing Electronic Identities in an Increasingly Paranoid World
Jon DeVreeThe Nightmare Filesystem
Mark DonerTo Boldly Go Where No Broadband Has Gone Before.
dosmanLock Picking into the New Frontier: From Mechanical to Electronic Locks
Pete Edwards &
Fred Owsley
Circuit-Bending Will Get You Laid!! (Maybe)blockparty 2008
Jeri EllsworthCPU Not Required: Making Demos with FPGAsblockparty 2008
The Fat ManArt Behind Enemy Lines: A Target-Rich Environmentblockparty 2008
Nate GrahamNew Media Art: Dropping Humanity in Non-Places
Sam HarmonYour Circuits, Let Me Help You Bend Them
Emma HogbinHICK Tech: The Rural Technology Experience
Leigh Honeywell &
Kate Raynes-Goldie
Internets as Serious Business: Academic and Journalistic Perspectives on Net Culture
Drew IvanWasn't HyperCard Cool?
Jake "virt" KaufmanFM Synthesis - Beyond the Adlibblockparty 2008
Jim "Trixter" Leonard   Self-Preservation Mode: Lessons Learned While Archiving Demoscene Historyblockparty 2008
Eric MeyerBeyond the Blue "E" Horizon
David MortmanIs Privacy A Lost Cause?
NexusProtecting Your Personal Information
Alex PapadimoulisCurious Perversions in Information Technology
Physics PanelPhysics of Radio and Wireless Networking Panel Discussion
Bruce PotterFinding Bad Guys can be Fun
Enno Rey &
Angus Blitter
Data Loss Protection - Hope or Hype?
Jason ScottNow and Then, Here and There: Editing
Dan Sinclair &
Sahba Kazerooni
Exploit-Me Series: Firefox Plug-ins for Application Penetration Testing
Smoke &
Current Election Technologies and How to Improve
ZaxObject Capabilities, Chroot for System Calls
E-drugs, Pokemon, and the Bhodi Tree: Building a Hardware and Software Environment for Wireheading
People have been hacking their brains for years, mostly without realizing it. As technology improves, it will become simpler and cheaper for end-users to make more complex alterations to their own wetware. This talk introduces the hardware and software environment currently available to amateur neurohackers and the upcoming technologies. In addition to the technological state of the art, there will be a brief glance at the ethics and philosophy behind brain hacking, along with diversions into TV, beat poets, techno, and Buddhism. Come for the science, stay for the random historical tangents!
Ab3nd has no particular qualifications for giving presentations, but that didn't keep him off the stage at Shmoocon, Defcon, or Chaos Communication Camp. He has no formal training in most of the fields that interest him, but he covers for it by reading a lot and being curious. People are sometimes surprised to find out that he has a degree in Computer Science from a fairly good school.
Zen and the Art of the Turing Machine

The fight of art versus engineering
Has inspired many passions to date.
Computers, conceived by Alan Turing,
Are just one form of this ancient debate.
Maybe there really is no differing?
For, just as code and data are the same,
When we explore the world of reversing
We will see the conflict is but a game.

Use the concepts within Reverse Code Engineering to pull the veil over your own eyes and get back control over your computer.

aestetix was last seen tied to a mast floating past the Sirens.
Bagcam - How Did TSA and/or the Airlines Manage to Do That to Your Luggage?
Ever wonder exactly how TSA or the airlines managed to destroy your luggage, or what security measures are actually in place once your checked luggage disappears from view? After having yet another bag destroyed while flying several months ago, I decided to build bagcam to find out what happens once the airlines have control of your luggage. Bagcam is a small suitcase with a mini-DVR and pinhole camera in it. This presentation will cover the construction of bagcam and will include footage from select flights including a flight through Washington, DC\'s Reagan National Airport (DCA). In addition, the various security measures currently in place for commercial passenger flights and the efficacy of these measures will be discussed.
algormor has worked in IT for over fifteen years. During this time, he has worked in areas such as UNIX kernel devlopment, a vehicle crash test facility, real time backup products, an evil Fortune 500 insurance company, and is currently at a startup working on search technologies.
Jeremy Anderson
Hacking Habitation: A Computer Nerd's Guide to DIY Construction
You build your own DVRs, mailservers and webservers, so why would you trust someone else to build on your house or garage? This same mentality led Jeremy to add nearly six hundred square feet (in the form of a second story) on to his garage. In the process, he learned a great deal about construction techniques, dumpster diving and recycled building materials. He also learned that construction is the one of the oldest open-source endeavors, and is in fact, mandated to be that way by law. His one-hour presentation will cover the process of his construction, how to estimate materials and costs, and navigating the joys of construction permits. Furthermore, coverage of the necessary starting skills (surprisingly few), and the tools without which the weekend handyperson cannot survive.
Jeremy is a linux wonk, garage mechanic, and munitions aficionado. Having built a fair number of solutions using perl, python, shell and various pieces open-source software, he decided that construction couldn't be that difficult. For the most part, he was almost right. He was co-author on Multitool Linux, and teaches networking classes at Hennepin Technical College.
Jon Broadwell
Creating Something Some People Want But May Not Know It
Have an idea? How do you turn it into something other people want? This presentation is a sum-up of everything I've learned about learning everything you can about people who might want your something. This isn't about being a commercial success (Something I've largely failed at), but rather how to think, from the beginning, in order to create a loyal following among people who actually take the leap of faith and use what you're offering. Whether its something you're sharing, giving away, or selling, these thoughts will help you build that following.
Jon Broadwell is the creator of the Serial Wombat, a chip designed to make it easy to interface stuff to a computer. The Serial Wombat was sold through Notacon in 2007.
Tim Cowley
Automated Psychedelia : Translating Sound Into Color and Motion
blockparty 2008
If you've always wanted to know how to create programs that simulate the neurological disorder 'synesthesia', or the effects of hallucinogenic drugs, look no further! This seminar will rocket through a brief history of psychedelia and synesthesia and how it relates to computer graphics and music, define key technological elements of a generic music visualization framework, discuss important problems relating to meaning extraction and presentation, and present a simple HLSL-powered, graphics hacker oriented, visualization framework. All of the source code for the framework will be available as well.
Madman. Genius. Visionary. Psychonaut. Graphics God. Bodhisattva. These are all words that Tim Cowley would write into his own bio, if he were a little more arrogant. Tim has been shovelling triangles as fast as he could since he got his hands on an OpenGL Red book in 1999. Since 2003, he's been making demos with the Northern Dragons, on the GBA, PSP, in TextMode, and occasionally using one of them expensive 'graphics cards.' He currently works on the 3d engine inside MS Office, is preparing to start his M.Sc. at Digipen, and is about to reach 1 million downloads on the Psychedelia visualization pack.
FARK.com Drew Curtis
Creator FARK.com, Author
Creator of Fark.com and author of It's Not News, It's Fark: How Mass Media Tries to Pass Off Crap As News.
Dead Addict
Permanent Records - Managing Electronic Identities in an Increasingly Paranoid World
The idea of a permanent record is one that lasts throughout your life. As a child I imagined the permanent record available to all sorts of people, almost arbitrarily. The details that were threatened for inclusion, elementary school marks and attendance records were actually quite inconsequential. The quickly emerging future that is upon us contains many financial, personal, surprising pieces of information that are available to seemingly random people. Being aware of the implications of the availability of this data, will help you manage your personal risk, if not drive you completely nutty. It is not the unlikely specter of a hostile government that will destroy your personal life, it is petty bickering amongst friends, intrusion of family on your personal life, and your professional colleagues potentially having access to your personal life. With ubiquitous archiving along with the eventual tying of pseudonyms becoming inevitable, I will raise difficult and troubling questions and give no satisfactory answers.
Dead Addict has spoken at Rubicon, DEFCON, the Black Hat Briefings, as well as invitational security conferences. Professionally his employers have included a dominant operating system manufacturer, a respected computer security think tank, an internationally recognized financial infrastructure company, a popular telecommunications hardware and infrastructure company, as well as other smaller security and software firms. He lives in a strange foreign land with a beautiful intelligent creative mischievous hacker/speaker as well as two affectionate rats. His credentials do not ensure the value of his words; analyze and determine their usefulness for yourself.
Michael DeAloia
Cleveland technology icon
Michael is currently the Senior Director of Business Development at SchoolOne and was formerly the Tech Czar for the city of Cleveland.
Jon DeVree
The Nightmare Filesystem
NFS is the standard method of sharing file on UNIX but it has many security pitfuls. This presentation will cover the various design flaws that make NFS an insecure protocol, how these can be exploited, and how a sysadmin can mitigate these problems. This will include an actual demonstration of an attack via NFS. This will include a demonstration of some software Jon wrote for this purpose and some discussion about new things (NFSv4) that aren't widely deployed yet.
Jon has a degree in Computer Science from Michigan Technological University. During his time at MTU he helped the IT department find many security problems with the network. Since graduating he has worked in various areas of computer programming before finally moving over to working on computer security related software.
Mark Doner
To Boldly Go Where No Broadband Has Gone Before.
The rural market has been completely neglected by the massive DSL and Cable providers. The current consensus is that the potential return on investment is far too low. This presentation will demonstrate how to bring fast, reliable, and affordable internet service to this neglected frontier, all while making the accountants happy. I will cover abstracts and basics for network infrastructure, disaster planning, and last mile technologies. I will also discuss customer relations, building a sense of brand loyalty, and the importance of maintaining what I call an honest network policy. When local cable company X does build out to that town second star to the left, and straight on until morning, your customers won't care, because you are better, faster, and friendlier than they ever can hope to be.
Mark attended Bowling Green State University, where he pursued a degree in History, with a minor in Computer Science. He worked as a freelance consultant from 2001 to 2003, at which time he was hired by Amplex Electric, a then small wireless internet service provider. He has been with Amplex ever since, as the company has grown in size by an order of magnitude. He tinkers with networking concepts and implementations in his free time, and is an avid BSD/Linux user.
Lock Picking into the New Frontier: From Mechanical to Electronic Locks
We will start with a brief introduction to demonstrated lock picking fundamentals moving quickly towards how more advanced mechanical locks operate. Several high security cutaway locks will be shown with their additional security features explained in full view. We will then move into electronic locks. Several electronic lock systems will be discussed concluding with a discussion of the development of a brute force tool for a specific electronic lock system.
dosman is a member of The Fraternal Order Of Lock Sport (FOOLS), a Midwest locksport group interested in exploring all types of lock systems. He also has interests in about all geekly subjects including locks, electronics, unix, radio, etc. He started the locksport reference site Lockenpedia and is a co-founder of FOOLS. You may also know him from The Packet Sniffers TV show.
Pete Edwards and Fred Owsley
Circuit-Bending Will Get You Laid!! (Maybe)
blockparty 2008
Circuit-Bending is the art of taking things apart, putting them back together, and ending up with a brand new, completely unexpected mutation of the original parts. Think of sampling, but with hardware. Nothing's out of bounds when you circuit-bend the piles of consumer electronics available around you, and the results can be insightful, weird, or just a great way to spend a weekend. Circuit-bender Fred Owsley will walk you though an introduction to the tools and trades of circuit-bending as well as show off his own recent works involving everything from a gas mask to a "that was easy" button that is anything but easy.
Pete Edwards: Pete Edwards' extensive resume, as well as videos, sounds and articles about his years of professional circuit bending are available at his website, casperelectronics.com.
Fred Owsley: From a very young age, Fred has always liked to take things apart, from all his toys to the interior of the family van, few screws were left intact. With an interest in electronic music, a soldering iron, some electronics know-how and toys from goodwill, he started circuit bending in 2005. So far his projects have included various keyboards, keytars, a gas mask, a musini, and a recently finished x0xb0x. When not at his regular job as a computer security researcher, he can be found at his workbench abusing some electronic toy into producing amazingly horrible noise.
Jeri Ellsworth
CPU Not Required: Making Demos with FPGAs
blockparty 2008
In the endless battle to make your demo quicker, more impressive and yet still balance the changes in CPU, a whole other way of approaching this situation exists: FPGAs. Short for Field-Programmable Gate Arrays, this dedicated hardware, well-documented and fun to program, will give you speed and flexibility that a world of softcode and compilers just can't touch. After going over the basics of this hardware, a simple demo will be presented and the process explained.
Jeri Ellsworth is best known as the engineer behind the C64-DTV, a Commodore-64-in-a-Joystick that has sold over half a million units. She has founded a computer store chain, designed race cars, and is hard at work building a classic arcade in Oregon.
fatman.comThe Fat Man
Art Behind Enemy Lines: A Target-Rich Environment
blockparty 2008
In the first five minutes of his talk, Fat will define Art once and for all, especially in context of high technology creation and experience. Thus having taken the mystery out of it and having reduced it to a science, he will quickly realize that he has ruined the whole damn thing. The rest of the talk will consist of his backpedalling like mad, trying in vain to put the cork back in the giant monkey's butt before the whole Blockparty is covered with icky, sticky dogma.

The Fat Man, George Alistair Sanger, has been creating music and other audio for games since 1983. He is internationally recognized for having contributed to the atmosphere of over 250 games, including such sound-barrier-breaking greats as Loom, Wing Commander I and II, The 7th Guest I and II, NASCAR Racing, Putt-Putt Saves the Zoo, and ATF. He wrote the first General MIDI soundtrack for a game, the first direct-to-MIDI live recording of musicians, the first redbook soundtrack included with the game as a separate disk, the first music for a game that was consclassered a "work of art," and the first soundtrack that was considered a selling point for the game.

On a 380-acre ranch on the Guadalupe River, The Fat Man hosts the annual Texas Interactive Music Conference and BBQ (Project Bar-B-Q), the computer/music industry's most prestigious and influential conference.

2600 Emmanuel Goldstein
Editor: 2600 Magazine
Emmanuel is the editor of 2600 Magazine and also the host of the weekly radio show, "Off the Hook" on WBAI in New York City.
Nate Graham
New Media Art: Dropping Humanity in Non-Places
How can art and technology collide to add humanity to a world increasingly filled with non-places? Using his own project, Invisible Narrative, as an introduction, Nate plans on explaining new media art in the context of supermodernity. Citing numerous examples of contemporary artists, Nate will delve into the use of art and technology as a tool for adding life and personality to the otherwise cold and sterile environments inhabited daily by nameless and faceless people.
Nate is pursuing dual bachelors degrees in English and Telecommunications at Michigan State University. He will graduate in May of 2009. Interested in narrative, Nate plans to pursue a career in new media art. With work experience at the Graffiti Research Lab and Thunderdog Studios, not only was Nate exposed to a broader scope of artistic ideas, but it created in him a great passion to continue exploring the intersection of art and technology.
Sam Harmon
Your Circuits, Let Me Help You Bend Them

Do you build or circuit-bend your own instruments? Have some awesome techniques for your favorite music software to share? Just want to show off your incredibly awesome modular synthesizer? This is the workshop for you. Part presentation, part collaboration, this workshop will show how to circuit bend instruments and allow others the opportunity to show off of their projects.

More Information.

Sam has been involved with the Cleveland electronic music scene as a radio DJ and occasional performer since 1994. He has been involved with the long running WRUW show "Press the Button", and its spinoff band, The Button, since 1997. He blogs at glacialcommunications.com and is starting a regional electionic music site at neoelectro.org.
hicktech.comEmma Hogbin
HICK Tech: The Rural Technology Experience
HICK Tech is a new way of thinking about how technology affects communities and how communities affect technology. In 2007 HICK Tech launched its first-ever rural technology conference. An unexpected audience arrived for the conference: technology end-users wanted to make their experience more human. Technology producers felt they were not smart enough to lead a session; but when the sessions were announced they didn't feel the topics were advanced enough. In the first year of the conference technologists did not see the opportunities offered by educating potential customers, developing their community or engaging in co-opetition. This presentation will show you how HICK Tech engaged local technophobes and inspired its community to demand more from technology. A two-hour workshop will follow. The workshop will focus on helping participants: earn media and gain sponsorships; engage their physical community in technology; understand how technical training can be enhanced by belly dancing; and assess a community's capacity for Web 2.0 ventures.
Emma Jane Hogbin is a Canadian Internet consultant and the conference chair of HICK Tech: The Rural and Modern Technology Conference. After spending ten years in Canada's largest city working as a college professor and open source Web developer, Emma brought her urban Web 2.0 experiences back to the country. She has been learning about what really makes the Web work ever since. She likes her Scotch peaty, her rabbits angora and her anti-histamines in shades of blue.
Leigh Honeywell and Kate Raynes-Goldie
Internets as Serious Business: Academic and Journalistic Perspectives on Net Culture

From cat macros to the sociology of facebook vs. myspace, journalists and academics are starting to pay attention to the cultures of online communities. Some "get it", and some don't - often with hilarious results.

We will go through a quick tour of the most important academic "Internet Studies" researchers, journals, and discussion lists, as well as the technology journalists who are covering online communities in the mainstream media. We are particularly interested in the questions of which communities "merit" coverage, and the cases where people miss the point.

Leigh Honeywell has been on the interwebs since having a GeoCities page was cool (ok, it never was). Now she does VOIP and security consulting in Toronto.
Kate Raynes-Goldie is a Canadian internet researcher and pervasive game maker, now living down under doing a PhD in internet studies at Curtin University (how awesome is that).
Drew Ivan
Wasn't HyperCard Cool?
HyperCard was a category-crossing software authoring tool that was far ahead of its time. It was a simple database, a message driven programming language, a GUI design tool, and a hypermedia browser. It was distributed for free with every Macintosh sold, making it the novice's tool of choice for Mac programming. Although it is no longer sold or supported, its concepts and culture are worth reflecting upon.
Drew worked with Hypercard in the early 1990s. He promises to be more interesting than he was last year.
vgmix.comJake "virt" Kaufman
FM Synthesis - Beyond the Adlib
blockparty 2008

Like Silly Putty, potato chips, and penicillin, FM synthesis was a delightful accident. It was most famously used in the Yamaha DX-7 keyboard, allegedly designed by the Japanese as revenge for World War II, and seen by the knob-twisting analog crowd as "like trying to paint your hallway from outside through the letterbox." Despite this, it took pop music by storm, and inexpensive one-chip FM synthesizers flooded into in video games, home computers, and even mobile phones.

Luckily for us, an entire industry of pointy-headed sound programmers has largely tamed FM since the 80s, and figured out how to create every type of sound imaginable. In an uncanny impression of an expert synthesist, Jake will show that for all its mathematical intrigue and spy-novel thrills, FM is easy, free, and fun to use, and sounds neat!

Jake Kaufman is equally happy writing for a Game Boy or an orchestra. He recently created music and sound effects for Konami's Contra 4 for the Nintendo DS, described by critics as "awesome" and "dude, awesome". Following in the footsteps of pioneers like the Fat Man (see above), he aims to advance the state of the art even as he squeezes every drop of goodness out of older technology. He participates in the chiptune community and the demoscene, and is the founder of VGMix, a site devoted to fan arrangements of game music.
Mobygames Jim "Trixter" Leonard
Self-Preservation Mode: Lessons Learned While Archiving Demoscene History
blockparty 2008
To stay ahead of the curve, demos have always used hardware to the fullest extent available, sometimes in unorthodox and unauthorized ways. But when that hardware becomes yesterday's news, it is those very tricks that cause such demos to become lost to history. For half a decade, Hornet has been working on the Mindcandy series, a collection of DVDs reproducing demos to the best of their ability. But what's involved in that process? Trixter of Hornet will discuss how a combination of ebay, charity, soldering, and software is used to restore for the present what has nearly been lost to the past.
Jim Leonard is the founder of MobyGames, the world's largest online game database, and the MindCandy series of demoscene DVDs. Jim was involved in the PC demo scene in the 1990s as well as the archival demogroup Hornet, and the residual flashbacks of that episode prompt him to code 8088 assembler for fun in his spare time. Every few months, some part of the Internet discovers "8088 Corruption" and freaks out. Jim, meanwhile is musing about Mindcandy Part III and the next big thing to save.
meyerwebEric Meyer
Beyond the Blue "E" Horizon
Thanks to a five-year hiatus between IE6 and IE7 and the minimal advances in new (to IE) CSS support by IE7, there's been a stagnation in web development. Nothing new has come forth and nothing new is coming forth. Right? Wrong! In fact, the last seven years have seen a number of advancements in web design techniques. Further, with the upcoming release of new browsers such as Firefox 3, opera 10, and IE8, there may be all kinds of new development vistas opening before our eyes. And even if that were not true, there's still much we don't know about what CSS and browsers can do. So take an hour to dig into the surprising present and blossoming future of web design, and see why there's still plenty of new in the web.

An internationally recognized expert on the subjects of HTML, CSS, and Web standards, Eric Meyer has been working on the web for almost 15 years now. He is the founder of Complex Spiral Consulting, which counts among its clients America On-Line, Apple Computer, Macromedia, Progressive Insurance, Sherwin-Williams, and more; one of the three authors of XFN and a founder of the microformats movement; and co-founder (with Jeffrey Zeldman) of An Event Apart, the conference series for people who make web sites.

Beginning in early 1994, Eric was the campus Web coordinator for Case Western Reserve University, where he also authored a widely acclaimed series of three HTML tutorials and was project lead for the online version of the Encyclopedia of Cleveland History combined with the Dictionary of Cleveland Biography, the first example of an encyclopedia of urban history being fully and freely published on the Web.

Eric first encountered CSS at a conference in 1996, and the rest flowed from there, including the authoring of early CSS support information and the first O'Reilly book on the subject, CSS: The Definitive Guide (currently in its third edition). A widely read author, his books and articles have been translated into a number of languages. In recognition of his extensive work in promoting web standards and web design, he was inducted into the International Academy of Digital Arts and Sciences (IADAS) in 2006.

In his personal time, Eric acts as List Chaperone for the highly active css-discuss mailing list, tinkers with side projects like S5 and HYDEsim, enjoys a good meal whenever possible, and considers almost no type of music to be worthless. He lives in Cleveland Heights with his wife and daughter.

David Mortman
Is Privacy A Lost Cause?
These days it seems like we've lost our entire right to privacy; RealID is giving us a national id card, secret NSA wiretaps, and PATRIOT Act national security letters just for starters. This combined with corporate America being unable to protect our personal information (Choicepoint, CardSystems, TJX etc etc ) creates the perception that privacy is a lost cause. Is it time to move to Canada or New Zealand? This talk will start with a review of the state of privacy laws here in the US conclude with a discussion of where privacy is headed.
David is the CSO-in-Residence at EchelonOne where he runs their research and analysis program. Previously, he was the CISO at Siebel Systems and before that, ran infosec at Network Associates. David is a regular speaker at conferences including Blackhat, Defcon and RSA. He's a recovering systems administrator and holds a B.S. in Chemistry from the University of Chicago.
Protecting Your Personal Information
As the internet expands the concept of privacy becomes more and more of a issue. Lack of understanding and ignorance causes many people to call victim to criminals looking to get their personal information. But how do they do it? How can they find this information with such ease? And how can we make it harder? Nexus presents several methods in which people use to find information which can lead to a complete compromise of one's personal information, and ways we can go about making this information harder to compile if not stop it all together using common sense and simple practices.
Nexus holds a degree in Computer Networking Systems, and has been playing a active role in the local 2600 scene. He has been playing a active role with the n0ths as a intelligence researcher, over the past year he has acquire a methodology to finding information over the Internet dealing with a wide range of subjects.
The Daily WTFAlex Papadimoulis
Curious Perversions in Information Technology
Alex Papadimoulis lives in Berea, Ohio. As a managing partner at Inedo, LLC, he uses his 10 years of IT experience to bring custom software solutions to small- and mid-sized businesses and to help other software development organizations utilizebest practices in their products.
Physics Panel
Physics of Radio and Wireless Networking Panel Discussion
Most hackers tend to focus on the intricacies of hardware, software, networks or algorithms. However, an understanding of the Physical Layer of a network is just as important as all of the higher layers which rest upon it. If you've ever wondered what causes interference on your radio or wireless network, or just how those antennas manage to get signal from one point to another, this panel discussion is for you. Bring your questions, no matter how basic or advanced, and our panel of physicists and radio experts will (attempt to) answer them. We will cover these topics with an eye to their applications to real world problems in wireless communications, hardware installation and site survey.
Mark Lenigan holds a degree in Physics from the University of Michigan. He was a founding member of the Champaign-Urbana community wireless project (now called CuWiN) and Direct of Research and Development for the Detroit Wireless Project. He currently holds a Technician class amateur radio license. A renaissance man, he has many other areas of interest outside of physics and wireless networking; feel free to chat if you see him around the Con.
Bunsen (Brian Bezanson) is a graduate student of theoretical physics who messes with computers, electronics, and ham radio in his copious free time. As a teaching assistant and all-around tactless scientific know-it-all, he has years of experience in imparting physics-related knowledge to variously willing and unwilling audiences.
Joseph Bender is the owner of Bendorius Consulting, LLC, a network engineering and telecom consulting firm located in Michigan. Licensed as a amateur radio operator since 1993, he set up his first TCP/IP connection on amateur packet radio in 1994, and somehow he turned that into a career.
Dennis Boone is a system administrator for a humanities computing research center. He has been a licensed amateur radio operator since 1995, was part of a group that taught ham radio licensing classes for some years, and helped organize the ham exam session at Notacon 4. He pursues too many hobbies including photography, amateur radio, and collecting vintage computing equipment, to the detriment of his wallet and floorspace.
Jeff Goeke-Smith has spent 7 years as an amateur radio operator, very rarely actually using voice. His focuses have been on packet radio, satelite, ATV, and APRS. When not fighting with antenas, coax, and feed line, Jeff writes code to attempt to support the radios he's using. As a professional network security engineer, he is attempting to make every radio he can find speak IP, sometimes very slowly.
Bruce Potter
Finding Bad Guys can be Fun
Oooo... a security talk. Firewalls, anti-virus, and IDS. The triumvirate of security products. Is that all there is? Modern attack tools have become adept at turning these products into Swiss cheese. Attacks come in over port 80 making the firewall about useless. Malicious code has become adept at evading AV and even shutting it down. And IDS... well, let's not go there. There are other emerging tools at your disposal to find and stop the bad actors on your network This talk will focus on the use of network flow analysis tools for finding signs of malicious activity on your network. The talk will cover the history of netflow, examine netflow analysis tools, and provide specific examples of how to find bad traffic. We'll be covering Psyche, an OSS netflow anlaysis tool full of charts, graphs, and disk-hogging IO. Also, there will be cake.
Bruce Potter is the founder of the Shmoo Group of security professionals, a group dedicated to working with the community on security, privacy, and crypto issues. His areas of expertise include wireless security, software assurance, pirate songs, and restoring hopeless vehicles. Mr. Potter has co-authored several books including "802.11 Security" and "Mastering FreeBSD and OpenBSD Security" published by O'Reilly and "Mac OS X Security" by New Riders. Mr. Potter was trained in computer science at the University of Alaska, Fairbanks. Bruce Potter is the co-founder of Ponte Technologies, a company focused on advanced defensive technologies.
Enno Rey and Angus Blitter
Data Loss Protection - Hope or Hype?

To lose control over one's own data is one of the primal fears of the digital age. More than ever this applies in particular to the world of corporations and organizations with all their trade secrets and peachy marketing plans to be protected from leaking outside. To prevent such leakage is the promise of salvation of a new set of security tools called \"Data Loss Protection\" or \"Extrusion Prevention\" solutions. All relevant vendors are already offering such pieces (mostly by acquisition of smaller companies specialized in the field).

This talk will discuss why the approach these solutions take will fail in most environments and which pre-requisites must be fulfilled before even thinking about such a piece. We will further discuss on a structural level how individuals and organizations can use the existing tool set of the infosec space to protect their sensitive data.

Enno and Angus are long time network geeks who love to explore (and break) new technologies.
textfiles.comJason Scott
Now and Then, Here and There: Editing
The problems of having access to information have shifted - from too little we now have too much, and from a small number of sources we have thousands. In this rambunctious presentation, Jason Scott walks you through the basics of collating and assembling information for easier transfer to others while maintaining its integrity. Issues, credos and examples will be rampant, and the presentation is accompanied by multiple audio-visual examples. This one will move fast.
Jason Scott is a historian, computer engineer and occasional filmmaker, who has created a number of films related to computer history, as well as finding himself involved in a range of other creative works ranging from podcasts to music videos. He created "BBS: The Documentary", "Get Lamp (the Text Adventure Documentary)" and is working on "Arcade". He is a graduate of Emerson College, class of 1992, in Mass Communications, Concentration in Film.
Dan Sinclair and Sahba Kazerooni
Exploit-Me Series: Firefox Plug-ins for Application Penetration Testing
security compass

The cost of fixing bugs is drastically reduced in the development stage compared to production. If developers and QA engineers have the proper tools they will be able to scan their applications for security vulnerabilities. The Exploit-Me series of tools is the basis for this tool set. The XSS-Me plug-in provides the ability to scan for reflective Cross-Site Scripting vulnerabilities. SQL Inject-Me provides the ability to look for SQL injection vulnerabilities. By building these plug-ins into the development cycle developers and QA engineers will be able to find security issues early.

This presentation will take a demonstration based approach and will provide examples of advanced XSS and SQL Injection attacks and display how the Exploit-Me tools can be used to identify these vulnerabilities in the application thus empowering the attendees with the ability to search for such vulnerabilities in their applications.

Dan Sinclair is a Security Consultant with a strong background in application development. Prior to joining Security Compass, he worked as a solutions architect, web developer, and, most recently, as a Solaris 10 migration specialist and instructor for TrekLogic Advanced Solutions. Dan is a contributor to several Open Source projects including the Enlightenment project and OpenSolaris where his work has included design, development, testing and documentation. He serves as a lead developer for the Enlightened Widget Library (Ewl).
Sahba Kazerooni, Security Consultant at Security Compass is an expert in application security assessments, having performed penetration testing and source code review of many client applications. He is also an internationally renowned speaker on Web Services security topics, and has provided presentations at security conferences around the world including BlackHat Security Conference in Amsterdam, Security Opus in San Francisco, and IDC WebSec in Mexico City. Mr. Kazerooni also plays a critical role in the development of curriculum for and delivering of Security Compass training services. He has developed and taught courses on various topics such as Exploiting and Defending Web Applications, Application Security Awareness and Secure Coding in J2EE.
Smoke and Phreak
Current Election Technologies and How to Improve
This presentation will cover the current voting technologies from touch screens to optical scanners. We will also be covering the future of electronic election technologies, focusing on more securable software and hardware cryptographic protocols such as the Trusted Platform Module.
Smoke was originally trained as a plumber 25 years ago but has worn many hats over the years like TV repairman, electrician, cook, locksmith, property manager, and pc technician. He currently works for a national ISP and spends his spare time attending cons, computer shows, and other interesting events/destinations.
Phreak will be a 2008 college graduate of a Penn State affiliated college with two Bachelors and four Associates degrees in the fields of Information Security Technologies and Computer Sciences. Her specialty is Information Security and Network Security. She is A+ and Network+ equivalency certified and is currently working on several research projects in preparation for graduate-level studies.
Object Capabilities, Chroot for System Calls

Currently, many programs are secured via locking down explicitly what they can not do. While this method has intuitive appeal, it is prone to mistakes. It is likely there is some avenue of attack that will be missed. Conceptually the program can still theoretically perform any operation the OS is capable of executing.

I will present an alternative approach where programs must instead be delegated what they are capable of knowing and doing. In this case the program does not even know how to do anything not allowed. Usually this approach requires changes at the operating system level. I will show how you can start using this technique right now.

Zax is a student at Rutgers University studying how programming languages can be designed to make writing secure programs easy and intuitive. In the past I have explored the effects of security though use of obscure technologies. These include operating systems, languages, and obsolete protocols.

Audio Visual rentals provided by Rentech Solutions

© 2008 FTS Conventures | Contact Webmaster
fax: 216-221-1409 | Contact Us