April 15th - 18th, 2010

Cleveland, Ohio

Presented by

FTS Conventures

 

Speakers and Presenters

Last Updated : 04/14/2010

Jeri Ellsworth speaks at Notacon 5
Jeri Ellsworth speaks
Notacon 2008
-- Image credit Ben Chodroff

Schedule will be available starting in March. Don't forget to register.

Click here for Workshops and Performance listings


SpeakerTopic
James ArlenSCADA and ICS for Security Experts: How to avoid cyberdouchery
Melissa BarronHacking 73H 0r3g0n 7r41L for the Apple ][
Angus Blitter"Do You Want To Play A Game?": Game Theory And Simulated Cyber War
Marc CanterBuilding A Digital City
catfoodWhy Your Software Project Sucks (and how to make it not suck)
Chris Clymer, Mick Douglas, Brandon Knight and James ArlenSocial Engineering Security Into Your Business
Adrian CrenshawAnti-forensics
Dead AddictHidden Trust relationships, an exploration
Sacha DeAngeliMine's Smaller Than Yours: Chemistry and Nanotechnology in a Hackerspace and/or Home Lab
Tod Detre and Gina HoangComputer Geeks can do humanitarian work too
Mick DouglasU R Doin it Wrong Info Disclosure over P2P Networks
Scott DunlopNoSpex -- Giving Process Interaction a Visual Context
Sai EmrysConlanging 101
Steve ErdmanDefense In-Depth: Penetration starts with a Lack of System Hardening
Tom Eston, Chris Clymer, Matthew Neely, The Confused GreeniesSurviving the Zombie Apocalypse
Thomas FritzBots and copper: Milling circuit boards
Leigh Honeywell, Tiffany Rad, Jillian Loslo and James ArlenHacking The Future: Weaponizing the Next Generation
int eightyMalicious PDF Analysis
Matt JoyceA treatise on optoelectronics in art and electronic design.
David KennedyThe Social-Engineering Toolkit (SET) - Putting cool back into SE
Jeff "ghostnomad" KirschThe Haiku of Security: Complexity through Simplicity
Ne0nRa1n & Tottenkoph Newbie Neurohacking
Nicolle "rogueclown" NeulistHey, Don't Call That Guy A Noob: Toward a More Welcoming Hacker Community
Peter NitschFlash Hackery
Joe PeacockThe Art Of Akira - Why Doing It The Hard Way Matters
Christina "Fabulous" PeiHow to Finance a Supercomputer in Three Easy Step
Tiffany RadHacking Your Car: Reverse Engineering Protocols, Legalities and the Right to Repair Act
Eleanor SaittaDesigning the Future of Sex
Eleanor SaittaPlaying with the Built City & a TBA topic
Emily SchooleyIndependent Filmmaking - Bringing Your Ideas from Paper to the Screen, and Everything in Between
Sidepocket"Thinking Outside the Mushroom Kingdom": Homebrew VS Piracy in Video Games
Eli SkippHomewreckery: Soft Circuits, HARD-CORE!
Brad (theNURSE) SmithStealing from God!
Mark StanislavWhat's a Linux?: Creating & teaching college courses at 24.
Dan ZarrellaMemetic Engineering
 
James Arlen
SCADA and ICS for Security Experts: How to avoid cyberdouchery
James Arlen
Synopsis
The traditional security industry has somehow decided that they are the white knights who are going to save everyone from the horror of insecure powergrids, pipelines, chemical plants, and cookie factories. Suddenly, every consultant is an expert and every product fixes SCADA. And because they don't know what the hell they're talking about -- 'fake it till ya make it' doesn't work -- they're making all of us look stupid.

Attendees will gain a practical level of knowledge sufficient to keep them from appearing foolish should they choose to opine on any of the various real issues stemming from Industrial Control or SCADA systems. Attendees will also feel embarrassed for something they've said, empowered to call out charlatans, and much less worried about cyberhackers unleashing cyberattacks which cybercause cyberpipelines and cybermanufacturing plants to cybergonuts and cybertakeovertheplanet using cybercookiesofdeath.

Bio
James Arlen, CISA, is a security consultant most recently engaged as the CISO of a mid-market publicly traded financial institution. He has been involved with implementing a practical level of information security in Fortune 500, TSE 100, and major public-sector corporations for more than a decade. James has a recurring column on Liquidmatrix Security Digest. His areas of interest include organizational change, social engineering, blinky lights and shiny things.
Melissa Barron
Hacking 73H 0r3g0n 7r41L for the Apple ][
Melissa Barron
Synopsis
Melissa will talk about her art mod of the Apple ][ game "The Oregon Trail" where she changed all of the text in the game to a blend of L337, chatspeak, and LOLcats grammar.
Bio
Melissa is an Apple ][ hacker and enthusiast.
 
HackSecKlahnAngus Blitter
"Do You Want To Play A Game?": Game Theory And Simulated Cyber War
Angus Blitter
Synopsis
Modern warfare is more about bandwidth than bombs. Powerful nations boast amazing technical capabilities. However, technological dependent nations develop critical infrastructure that is vulnerable to attack. For a modest investment a properly motivated and capable adversary can disrupt global networks impacting communications, banking, government and media services. Learn how simulated cyber war can educate and entertain.
Bio
Angus is the founder of HackSecKlahn a group of like-minded technologists who believe diversity is good for the species and hackers are a national resource. Old school, grey hat and previously plump, Angus still likes to eat, drink and hack. "To hack is not to crack." (Whatever that means). He has a day job but he doesn't talk about it.
 
Marc Canter
Building A Digital City
Marc Canter
Synopsis

Creating Jobs by producing on-line multimedia content and putting that content onto free shared servers with APIs is at the heart of the Digital City project. Marc will explain a new kind of software infrastructure, where dashboard interfaces utilize standardized 'containers' to facilitate distributed friending or access controls. This new software infrastructure provides an open platform for innovation and a 'Citizen Dashboard' framework - which would be available as free open source.

But Content is still King and the need for a monetization model essential - so Marc will tell the tale of the multimedia revolution - which began back in the '80's and was ground to a halt when the dial-up web come into being. After 15 years of waiting, we're finally seeing multimedia come to Wikipedia. So now go count up how much work it's gonna take to update 3+M entries with video, animation, photos, interactive simulations and games, visualizations, maps, 3D environments - you name it - it's all an expression of knowledge and information. Not just text.

Who's gonna pay for all this?

Well you'll have to come to the presentation to find out!

http://people.tdooner.com/content/cid=33
http://blog.broadbandmechanics.com/2010/03/26/6812/
http://www.slideshare.net/secret/gdY41E0CDelsA8

Bio
Marc has recently moved ot NEO after 21 years in Silicon Valley/SF Bay area - where he started MacroMind, which became Macromedia. Marc is an Oberlin graduate, pre-TIMARA '80 and has been a software developer ever since. Software is the new rock and roll - has been tatooed onto his cerebral cortext ever since.
 
catfood
Why Your Software Project Sucks (and how to make it not suck)
catfood
Synopsis

Most software projects suck. They're often ill-defined, resource-deprived, badly managed, and very often not even necessary in the first place. Even the projects that eventually succeed do so with far too much stress and by wearing good people out.

This painful and wasteful situation has got to stop. And this presentation will show you how.

This presentation is for anyone who has wondered why SMART PEOPLE who WORK REALLY HARD still get stuck on Death March projects. And particularly for anyone who wants to break that cycle and work on cool projects that succeed!

Bio
catfood has been hacking artlessly since implementing a FORTRAN preprocessor in the Lotus 1-2-3 macro language in 1988. Now, he helps software dev teams get projects done faster without burning out. This presentation is based on 22 years of making projects not suck.
 
sethchromick.com/ Seth Chromick
The Past, Present, and Future of Advanced Attacks
Seth Chromick
Synopsis
There are hundreds of thousands of malware, worms, and viruses that can annoy or destroy, but more recently, companies are getting hit with advanced, multi-staged attacks against their networks and intellectual property. This presentation will cover the early days of advanced persistent threats, real-world examples of current tools and techniques, and a look at the transition from "theoretical" to "owned".
Bio
Seth Chromick is a person that works for a company that has a network on Earth. He lives somewhere and frequently enjoys doing things. He's said too much already.
 
James Arlen, Chris Clymer, Mick Douglas, and Brandon Knight
Social Engineering Security Into Your Business
Synopsis
Finding security vulnerabilities is easy. Getting them remediated is HARD. Many of the real problems in information security are not about technical prowess with packet dumps or disassemblers, they're about exercising the "soft skills" you discarded when entering IT. In this talk the four of us will show how social engineering can be applied not to break into systems, but to secure them. How do you convince your DBAs they really do need to apply the latest Oracle patch? How do you convince the CIO that you need funds and people to perform dedicated vulnerability scanning? How do you convince your users that they really shouldn't put that password on their monitor? We'll cover all this and more with a little shouting, a lot of scolding, and some live demonstrations.
Bio

James Arlen is a contributor to Liquidmatrix.org Security Digest, a frequent ranter at security cons, and originator of the term "cyberdouchery."

Chris Clymer is a frustrated security professional and co-host of the Security Justice podcast.

Mick Douglas is a P2P seal clubber and co-host of PaulDotCom Security Weekly podcast.

Brandon Knight is a security professional and Notacon organizer, which has nothing to do with this panel being accepted. Honest!

Irongeek.com Adrian Crenshaw
Anti-forensics
Adrian Crenshaw
Synopsis
This talk will intro the basics of Anti-forensics, how people hide data and events on their computer for both legitimate and illegitimate reasons. We will cover data carving, disk wiping, encryption, steganography , timestamps, clearing logs and other ways people may attempt to cover their digital tracks. The subject matter should be of interest to many groups, it's "Not about just hiding your stash from the Fuzz.".
Bio
Adrian Crenshaw has worked in the IT industry for the last twelve years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools.
 
Dead Addict
Hidden Trust relationships, an exploration
Synopsis
Some time ago I was asked to analyze a very simple dialog box - "Do you trust this application?" I realized that I had no clear concept of what trust was, and I wasn't alone in my ignorance. This talk aims to discuss what trust is and then explore trust relationships that are often times undisclosed, implicate, and codified. I will discuss trust and PKI, online banking and social networking. While I may help the audience understand the impact of the implicate trust relationships, I don't intend on putting you at ease or giving you the tools to feel comfortable about the risks you take online.
Bio
Dead Addict has been trusting family, friends, strangers, software, governments, corporations, and hackers at various degrees his entire life. He has worked at many multinational corporations in various sectors, has spoken at various hacker and security conferences. He has associated with criminals, hackers, artists, madmen, lawyers, journalists, military folks, criminal justice folks, but generally not politicians. He trusts that you will trust him accordingly.
Sacha DeAngeli
Mine's Smaller Than Yours: Nanotechnology and Chemistry in a DIY Setting
Sacha De'Angeli
Synopsis
In the past few decades, public opinion of chemistry has changed from a benign and fairly wholesome activity to an inherently suspicious and dangerous one. While chemical experimentation should be approached with a degree of caution, scientific history is filled with important discoveries made by at-home tinkerers. This talk will explain how to create a functioning lab capable of exploring current research topics such as nanotechnology on a home tinkerer's budget, and how to use that equipment to make materials suitable for use in art and general hacking projects.
Bio
Sacha has worked with chemistry as a technician, student, researcher, hobbyist, and entrepreneur for over 14 years. He is currently the president of Pumping Station: One, Chicago's premier hackerspace where he mostly herds cats and hackers. He also runs chemhacker.com where he discusses the intersection between science, art, opera, creativity, and chemistry.
 
Tod Detre and Gina Hoang
Computer Geeks can do humanitarian work too
Gina HoangTod Detre
Synopsis
We recently had the experience of doing humanitarian work in Haiti. The demand for a computer geek's skills was higher than either of us expected. We would like to raise awareness that you don't have to be a Doctor to help people in need. We would review our trip, what we did right, what we did wrong, etc. We would want to spark conversation on how others could make their own trip.
Bio

Tod is a professional geek who is currently working at the University of Maine at Augusta.

Gina is a medical resident at the Maine Dartmouth Family Medicine Residency.

 
PaulDotCom Mick Douglas
U R Doin it Wrong Info Disclosure over P2P Networks
Synopsis
Brief recap on the P2P data leakage work the PaulDotCom crew has done in the past year. New tools and techniques will be released!
Bio
Mick is a white hat hacker who hates the term white hat. He is a member of the PaulDotCom podcast. While he will join in pentests, his passion is network and system defense.
Scott Dunlop
NoSpex -- Giving Process Interaction a Visual Context
Synopsis

Hackers use abstract terms to describe the interaction between processes in a system. Terminologies like Flow, Actor, Connections and Messages give us a syntactic way to grapple with the exchange of information in systems of increasing complexity. But, when you need to understand a race condition at three in the morning, it becomes a challenge to follow the exchange of information between processes using the lowest common denominator -- the logfile.

NoSpex is a framework for consolidating information from these logfiles and providing a visual context for analysis. The resulting window into your process interaction can be shifted in time, dilated, and uninteresting elements culled using a simple expressions.

This presentation will include a visual demonstration of using NoSpex for tracing API calls in a simple application, and merging information from multiple HTTP servers to depict the flow of information through a complicated web application.

Bio
Scott Dunlop is a Senior Security Consultant at IOActive, experienced in application assessment and consultation. At IOActive he performs penetration testing, identifies system vulnerabilities, and designs custom security solutions for clients in software development, telecommunications, financial services, and professional services. Previous public works include MOSREF, a secure remote execution framework for penetration testers, and Wasp Lisp, a compact, portable Lisp implementation with strong concurrency features.
Sai Emrys
Conlanging 101
Sai Emrys
Synopsis
Learn why people make languages (aka the art & craft of conlanging), what kinds of conlangs there are, with some notable examples, how one goes about making a language, and participate in creating a new language on the spot
Bio
Sai Emrys twice created and taught a semester long class on conlanging at UC Berkeley, founded the nonprofit Language Creation Society, ran three Language Creation Conferences, and is co-host of the interview series of the Language Creation Society Podcast. His personal conlanging interests are primarily in engelangs, particularly in novel ways of using language, such as non-linear writing systems and tactile language.
 
Steve Erdman
Defense In-Depth: Penetration starts with a Lack of System Hardening
Steve Erdman
Synopsis
Looking at the exploits and malware that have been discovered and unleashed over the last decade, we will dive into how individuals and companies could have been better prepared for the breaches that happened. We will go over how simple hardening techniques could have turned the tables for these companies. Also for normal end users, we will go into how to protect your own home system from outside threats. We will also go into showing how anti-virus cannot always defend against attackers and how free software can be better for your system than some paid software. We'll show that every OS can be insecure; just depends on how much rights the end user has and how much they pay attention to what's going on.
Bio
Through the years Steve has been a consultant and an employee for companies that range from a few hundred thousand a year in revenue to Fortune 100 Enterprises. Steve currently works as a Senior Security Consultant on the Profiling team at SecureState where he takes part in many client engagements. While at SecureState he has conducted many types of assessments including, Minimum Security Baselines, Firewall Ruleset Reviews, Digital Forensics, Incident Response, Internal and External Penetration Tests, Physical Penetration Assessments, Network Vulnerability Assessments, Web Application Security Assessments, and helped in building security programs for companies. These assessments have been conducted at companies ranging in revenue from one million dollars a year up to Fortune 100 companies.
 
Tom Eston, Chris Clymer, Matthew Neely, The Confused Greenies
Surviving the Zombie Apocalypse
Synopsis
Outbreaks of new virus such as H1N1 are a disturbing trend in recent medical history. However, the true zombie virus Solanum has caused more serious outbreaks throughout recorded history. In fact, international governments have recently covered up a "strain" of virus similar to H1N1 that was caused by Solanum. Recent reports have indicated that Solanum is being found in more geographic regions in the world then ever before. It's only a matter of time until the real zombie apocalypse is upon us. What will you do if a zombie outbreak takes over your community? How do you defend yourself and your loved ones? How can you properly combat the undead to ensure survival of yourself and the human race? This panel of experts will address these topics and more. In addition, a live zombie specimen captured in the wild will be used for medical analysis during the panel discussion.
Bio
Weapons specialist Cpl. Tom Eston, USMC will discuss weapons, defense and attack strategies. Matthew Neely, PhD a world famous chemical physicist will discuss the Solanum virus, mutation and infection as well as recent research on a vaccine. Chris Clymer, MD a top orthopedic surgeon will discuss zombie characteristics such as movement, intelligence, strength and the zombie decomposition problem. Additional resources and support will be provided by the Confused Greenies: - The Greatest, The Loudest, and The Most Pompous commedia dell'arte troupe at Case Western Reserve University.
Thomas Fritz
Bots and copper: Milling circuit boards
Synopsis
One of the basic technologies of modern gadgets, the printed circuit board, requires expensive equipment, dangerous chemicals, and volumous knowledge - or does it? Milling PCBs is a great way to prototype, and can do surprisingly good quality. Areas covered will be design process, tools, workflow, and achievable results.
Bio
Thomas is a lone hacker hermit and a jack-of-many.
 
James Arlen, Leigh Honeywell, Tiffany Rad and Jillian Loslo
Hacking The Future: Weaponizing the Next Generation
Synopsis
James ArlenLeigh HoneywellTiffany RadJillian Loslo
Join this panel of experts who will discuss, debate, enlighten, and do battle on the topic of Hacker Parenting. From a multitude of viewpoints - paternal, maternal, fictive aunt and victim - the methodologies and techniques of applying the hacker mindset to parenting will be discussed. It is expected that the audience will participate as this topic is one on which everyone has an opinion. Maybe it's possible to do great work and develop a generation of people primed to hack the planet and take over.
Bio

James Arlen, CISA, is a security consultant most recently engaged as the CISO of a mid-market publicly traded financial institution. He has been involved with implementing a practical level of information security in Fortune 500, TSE 100, and major public-sector corporations for more than a decade. James has a recurring column on Liquidmatrix Security Digest. His areas of interest include organizational change, social engineering, blinky lights and shiny things.

Leigh Honeywell is a jane of many trades. She works at one of the big information security companies while finishing up a degree at the University of Toronto. By night (and sometimes over lunch) she is a co-founder and director of HackLab.TO, Toronto's hacker space. She also serves on the board of advisors of the SECtor security conference, is a Google Summer of Code mentor, as well as an avid cyclist, book nerd, and traveler.

Tiffany Strauchs Rad, MA, MBA, JD, is a lawyer, hacker, and college professor. She has presented privacy and technical research at Black Hat USA, DEFCON, Hackers on Planet Earth, Hacking at Random, and Pumpcon. She also likes cars and hacks them.

Jillian Loslo is a full-time college student, part-time everything else currently working on pulling the eject handle and going from mid-western all-american girl to globe-trotting sophisticated executive in 6.1625 semesters. When she's not telling you how to make your kids awesome, she's clicking on random facebook crap and noodling on how to take over the world.

 
int eighty
Malicious PDF Analysis
int eighty
Synopsis
This presentation covers the identification, extraction, and analysis of malicious code in PDF files. Your viewer has unpatched vulnerabilities that are being exploited (lol adobe, adobe lol). We will do a brief high-level overview followed by a demo with open source tools. Bring a laptop; tools and specimens will be provided.
Bio
int eighty is the rapper in Dual Core.
 
Matt Joyce
A treatise on optoelectronics in art and electronic design.
Matt Joyce
Synopsis
So last year I embarked upon an incredible journey into the world of display technology. From the post apocalyptic surplus stores of the rust belt, to the international nooks and crannies of E-bay I sought down a large and diverse collection of display components. It began as an educational venture but ended up an obsession. In this presentation I would like to share with you the adventure, and what I learned from it. If you are interested in designing unique art pieces involving electronic displays, or if you are simply a curious engineer, stop by and enjoy the blinkenlights.
Bio
Matt Joyce is an original member at NYC Resistor. Matt is also a co-founder of Make:NYC. He's built some zany stuff in the past, in fact last year one of his projects made it onto the TSA blog twice. You may also remember him from helping to put together the hardware hacking room at Notacon last year. In his spare time Matt automates datacenters for a major financial institution.
 
David Kennedy
The Social-Engineering Toolkit (SET) - Putting cool back into SE
Synopsis
The Social-Engineer Toolkit (SET) has become a standard when it comes to social-engineering attacks and new and innovative ways in attacking the end-user. This talk will cover SET and its capabilities as well as introduce some new features and a new release. SET combines multiple attack vectors into an easily drivable interface that allows the attacker to perform advanced social-engineering attacks and compromise the intended host. Metasploit browser exploits, Custom-built Java Applet attacks, E-Mail Spear-Phishing, and much more is all integrated into the toolkit. Don't miss this talk on how to hack the human mind and utilize one of the most powerful social-engineer tools ever made.
Bio
David Kennedy is a security ninja that likes to write code, break things, and develop exploits when he has spare time. Heavily involved with BackTrack and the Social-Engineer Framework, David continues (and strives) to contribute to a variety of open-source projects. David has had the privilege in speaking at some of the nations largest conferences including Defcon and Shmoocon. David is the creator of the Social-Engineer Toolkit, Fast-Track, has released modules/attacks for Metasploit, and has (responsibly) released a number of public exploits, including attacks that affect some of the largest software vendors in the world. Currently David is a Director and Regional Security for an international Fortune 1000 company and is in charge of ensuring that security is maintained in over 60 countries.
ghostnomad.comJeff "ghostnomad" Kirsch
The Haiku of Security: Complexity through Simplicity
Jeff Kirsch
Synopsis
You may ask yourself what Japanese poetry and information security have in common. What is more important is not how they are common, but how they can complement each other. Infosec professionals often find themselves struggling with describing complex technology to non-technical people. Haiku takes a concept and coveys it in a manner that is short and sweet. As IT professionals we need to take the time to understand complex concepts so well we can explain them in the most simplistic manner that still educates. This talk will focus on developing communication skills in ways that we may not always think of, and provide you with some tools that will help you find simplicity in complexity.
Bio
Jeff Kirsch is an IT auditor by day and ghostnomad, an infosec geek alter ego, every chance he can get. Always trying to learn new things drives him to find better ways to help others learn about technology. What started as a whimsical project to create Haiku about IT has opened up a new way to learn and research technology both old and new. You can find his daily IT Haiku at www.ghostnomad.com
 
Ne0nRa1n & Tottenkoph
Newbie Neurohacking
Synopsis
Have a keen interest in the many flavours of neurohacking, but don't know where to get started? Discover the direction that is right for you and let our understanding and passionate advisers with a proven success record help guide you through the basics on your exciting path to becoming a neurophyte, in 60 minutes or less. Being a neurophyte can offer curious and adaptable individuals an opportunity to try a variety of different ethically complex issues to see where they fit best, all while continuing to build on the skill set that they already have. Move towards your own personal path of self-discovery though DIY enhancement and let us help you find the satisfaction and confidence that comes from knowing that you are on your way to being the smartest person in the room.
Bio

Ne0nRa1n was raised by a coven of nocturnal city attorneys in the then-unspoiled wilderness of Northern Ontario, and has since drawn upon the survival skills learned during these early times to thrive in today's burgeoning culture of new technology. After spending her formative years living under the sea, she then made inroads to Cusco, before subsequently traveling to Lemuria, Skull Island, and briefly and most recently a base camp in Mare Vaporum on the Moon. She currently splits her time between summers in Moaning Moose, Montana and winters in a research laboratory of indeterminate location.

Tottenkoph spends her days completing experiments in exchange for delicious cake, killing hordes of zombies in South Africa, battling terrorists in the streets of Las Vegas, and protecting the planet from the Covenant.

www.rogueclown.netNicolle "rogueclown" Neulist
Hey, Don't Call That Guy A Noob: Toward a More Welcoming Hacker Community
Nicolle 'rogueclown' Neulist
Synopsis
The hacker community strives to develop and exchange cutting-edge ideas. A key component of achieving that goal is continuing to involve new people in the community, since they can add fresh perspectives from which to view any kind of hacking. However, either because of the perception of the hacker community as something secretive or because of nervousness about interacting with people who are supposedly more knowledgeable, it can be a daunting experience for someone new to get involved and stay involved in the community. This talk aims to make people in the hacker community aware of the concerns that people new to it face, and provide concrete steps for building a culture of making new people feel welcomed and valuable.
Bio
Nicolle Neulist, otherwise known as rogueclown, is a founding member of Pumping Station: One, the hackerspace in Chicago. She is an attorney by training, although her heart is into playing with computers and computer networks, and that is where her career is headed as well. Not very long ago, in the spring of 2008, she was making her first tiny steps into the hacker community. Two years later, she's still bright eyed, bushy tailed, and learning new things every day. She dedicates this talk to all of the fascinating, brilliant, and welcoming people that she has met since then who have helped her realize that the hacker community is home. She is often found at www.rogueclown.net.
 
peternitsch.netPeter Nitsch
Flash Hackery
Synopsis
Peter, a self-professed code art addict, will chronicle his work and shed some light into Adobe's little know research project called 'Alchemy'. With the aid of a browser window, this session will explore the worlds of terminal communication, ASCII art, demoscene, cheese factories, and the iPhone.
Bio
Peter has been heavily involved in Flash development for the past 10 years, doing work for top interactive agencies in Toronto. But it is his experimental code work with ActionScript that earned his blog the 2009 FITC Best Canadian Developer Website can-opener. An obsession with retro-computing and all things textmode gravitated Peter to playing with Alchemy where he has subsequently helped push the boundaries of visual programming and code art in Flash.
Joe Peacock
The Art of Akira - Why Doing It the Hard Way Matters
Synopsis

Believe it or not, there was a time when animation was done without the use of computers. Strange, I know. And in a time of artwork reuse, cost-cutting and grist-for-the-mill animation production, one man - Katsuhiro Otomo - challenged the rules of both animation and film, despite having zero experience in either field. He started Akira knowing only one thing: how he wanted it done. And he changed the world forever.

No animation has ever matched the level of detail and craftsmanship of Akira. In this presentation, Joe Peacock, owner of the world's largest private collection of original Akira production art and cels, will show you how things were done back when doing things right meant doing them the hard way.

Joe has brought selections from his collection to share with Notacon to show those true do-it-yourselfers how doing things the hard way paid off.

Bio
Joe Peacock writes books (well, two of them, both called Mentally Incontinent. But they're different books, he swears). He's a journalist for AOLNews. He designs stuff for Fark.com. And he also has been collecting original production cels and artwork from the film Akira since he was 12 years old. Now 33 and the owner of the largest private collection of Akira production art in the world, he's on a crusade to teach today's youngsters how animation was done pre-computers.
Christina "Fabulous" Pei
How to Finance a Supercomputer in Three Easy Step
Christina Pei
Synopsis
I want to discuss financial hacking for new and existing hacker spaces, and to attack the myths that have been built up against money and money management. Money is a tool, a means to an end. Just as a laser cutter enables you to cut accurate models to build, careful management of your finances enables you to do what you want, such as getting a supercomputer for your space. Topics I will cover include: organizing a sustainable hacker space in which membership adequately covers overhead expenses (rent, utilities, tools, maintenance), smart long-term saving to fund cool projects, filing for 501(c)(3) status, fiscal sponsorship, and marketing/PR to raise funds. The presentation will end with a discussion on the future potential of hacker spaces, their role in revolutionizing public education, as well as the importance of creativity in science.
Bio
I'm Christina "Fabulous" Pei. I'm a student turned creative turned financial analyst turned math teacher turned hacker non-profit organizer, and still going. I teach math in NYC public schools, I create art and fiction, and I travel the world meeting new people and finding new projects to change the world. Along the way, I did finance at BlackRock in NYC, worked with the math pirate of the University of Chicago on what I can only call "educational hacking", and discovered Chicago's hacker space, Pumping Station: One. This has brought me to the intersection of these hacker spaces sprouting up all over the world, public education, and innovation.
 
Tiffany Rad
Hacking Your Car: Reverse Engineering Protocols, Legalities and the Right to Repair Act
Tiffany Rad
Synopsis
Car sales are declining and now service on your old car is what's keeping large car manufacturers afloat. When your car needs service, it's becoming difficult for non-dealer car repair garages to compete with the computers used by licensed dealers. If you do the repair work yourself, it's likely that you will have to break encryption thus triggering a DMCA anti-circumvention provision or you'll have to do laborious reverse engineering of the car's computer protocols. However, with the Right to Repair Act being currently debated and hotly contested by car manufacturer lobbyists, you might have a choice with aftermarket car computer diagnostic computers without having to take your car to a licensed dealer. This talk will analyze the intellectual property ownership of car computers, anti-circumvention measures of the DMCA, how to circumvent or break the encryption legally and how the Right to Repair Act will change how you fix your car.
Bio
Tiffany Strauchs Rad, MA, MBA, JD, is a lawyer, hacker, and college professor. She has presented privacy and technical research at Black Hat USA, DEFCON, Hackers on Planet Earth, Hacking at Random, and Pumpcon. She also likes cars and hacks them.
 
Eleanor Saitta
Designing the Future of Sex
Eleanor Saitta
Synopsis
Humans use tools, and the tools we use change us. This is true for everything we do, and we're rarely more inventive than where sex is concerned. To understand the future of sex, we need to think like designers, and look at the future of sexual technology. The most basic frontiers of sexual technology are relatively well-trodden. An IP connected dildo is boring---fun to use, and certainly not an exhausted category, but superficial and limited. Let's explore new territory, ask questions, and answer them with design fictions.
Bio
Eleanor Saitta is a designer, artist, hacker, and researcher working at the intersections between mediums ranging from interaction design and architecture to fashion, with an emphasis on the seamless integration of technology into lived experience and the humanity of objects and the built environment. Her work takes a variety of form, from sketches to abstract painting to functional objects, actual clothing, essays, and talks like this one. She lives mostly in New York.
 
Eleanor Saitta
Playing with the Built City & a TBA Topic
Eleanor Saitta
Synopsis

Architecture and urban planning define the world we interact with. This has many deep and not always obvious effects ---everything from what we can do in public spaces to the kinds of families we can live with. The cities end up with rarely allow us the flexibility and humanity we want.

Cities, buildings, infrastructure are heavily politicized systems with embodied power structures on many different levels. We can intervene, alter those structures, and create the spaces we need and want. Architecture is generally the domain of the rich and powerful, but it doesn't have to be ---we can intervene and hack the city.

In this talk, we'll explore modern urban power structures and look at different ways we as individuals can subvert the city. We'll move outside the design-culture consumer conversation around architecture and urban futurism, and explore how to change our cities, one brick at a time.

Her second TBA talk will be listed in the program booklet at Notacon

Bio
Eleanor Saitta is a designer, artist, hacker, and researcher working at the intersections between mediums ranging from interaction design and architecture to fashion, with an emphasis on the seamless integration of technology into lived experience and the humanity of objects and the built environment. Her work takes a variety of form, from sketches to abstract painting to functional objects, actual clothing, essays, and talks like this one. She lives mostly in New York.
 
emilyschooley.com Emily Schooley
Independent Filmmaking - Bringing Your Ideas from Paper to the Screen, and Everything in Between
Emily Schooley
Synopsis
Do you have a burning passion to make something better than the latest Hollywood blockbuster? How about on a fraction of the budget? If so, you might have what it takes to immerse yourself in the world of independent film making. Whether you're ideally creating for love, money, or to be the next internet web-series sensation, having a good handle on what needs to happen behind the scenes is essential for your success. A dynamic one-hour presentation covering everything from pre to post-production, with plenty of opportunity for open discussion, will be followed by a workshop designed to jump-start or refine your creative imaginings.
Bio
Emily is an actor/writer/photographer/perfectionist, not necessarily in that order. She holds an Honours BA in Dramatic Arts from the University of Waterloo, and draws much of her knowledge from first-hand experience on set. She has worked on a number of short and full-length Canadian productions - both in front of and behind the camera in varying roles - including production managing (and writing, casting, producing, costuming, performing in, &c.) a series featuring a cast and crew of over 100 people.
 
jordanwhite.net Sidepocket
"Thinking Outside the Mushroom Kingdom": Homebrew VS Piracy in Video Games
Sidepocket
Synopsis
The hot subject in today's gamer media is the increasing threat of piracy. Companies losing millions of dollars each year has forced the industry to put a choke hold on anyone who does anything with their systems outside of the norm. What the industry is unaware of is the world of people who find exciting new ways to play with their devices. However with the "piracy scare" causing the industry to lump these DIY explorers with the malicious pirates, how can both users and the industry learn to evolve peacefully? This presentation will look into the past, present and future of both piracy and homebrew; detailing the parasitic relationship between the two as well as highlight the vast differences. A one-hour presentation on this topic with live examples will be followed by a Half-Hour round-table with attendees expressing their opinions on the issue.
Bio
Some people have called Sidepocket a hacker but he prefers the term "Trafficker of Information". Sidepocket has been playing video games since he was in diapers and has been interacting with the Video Game Industry since he was twelve. Various hats that he wears are International Game Developers Association Member, Game Developers Conference attendee, Yes Man Activist, Do It Yourself buff and Phone Loser. You can read more of his exploits at: www.jordanwhite.net
 
Eli Skipp
Homewreckery: Soft Circuits, HARD-CORE!
Eli Skipp
Synopsis
The integration of electronics into fibers arts and clothing is a revolutionary thing. Until recently clothing has been pretty static -- styles have changed, trends have continued to push the boundaries of those styles, but for the most part clothing just, you know, covers your nakedness and protects you from the elements. "NO MORE!" say the hackers, "Our clothing must do great things!" Heeding that cry, various people have taken to progressing clothing in endlessly innovative ways. Leah Buechley's Lilypads and associated components have made it simple to include microcontrollers in soft circuits. Conductive fabric has made it easy to create low-resistance projects, and conductive thread (with all of its drawbacks) has inspired people to think up new ways to make their clothing blink, beep, and be way more interesting.
Bio
Eli Skipp is currently achieving a BFAW at SAIC, an artsy fartsy college in Chicago, IL. Aside from that she is a member and erstwhile director for Pumping Station: One, where she spends as much time as possible collaborating with electrical engineers to learn how to put her arts practices together with POWER. She has eight years of clothing design and sewing experience, including pattern-making, embroidery, and customization, which has helped her build some cool blinky projects. She eats scrap metal and sawdust for breakfast to maintain a competitive edge, and sometimes teaches internet memes classes and waxes poetic about radiation trivia.
 
Brad (theNURSE) Smith
Stealing from God!
Brad Smith
Synopsis

Ever get writer's/designer's/developer's block? Ever need a great idea but nothing seems to come? Well, this session shows you a technique that other great minds used to overcome their blocks. Simply steal an idea from God! Yes, great thinkers have stolen ideas for centuries, Da Vinci, Bell, Wright brothers and more, all borrowed ideas that changed the world. Wouldn't you like to learn how to get creativity from Nature? Maybe even change the World?

You'll be introduced to the science of Biomimicry (Bio=life, Mimesis=Imitation). You'll understand how Biomimicry has changed the world, how you can use it to help improve your creative process and the 12 simple rules to applying Biomimicry to your problems. The small group experience on using Biomimicry to solve problems reinforces the entire process. Let theNurse lead you through this new science and help you remove that creative block. http://www.endhack.com/biomimicry.html

Bio
As the first Registered Nurse (RN) and Certified Information System Security Professional (CISSP) in America, Brad has a unique view of reality. He has seen how creative people can benefit from understanding Biomimicry. When he.s not working as a computer security penetration tester or teaching security somewhere, he.s spreading the word of Biomimicry to any who will listen. Brad has spoken to such diverse groups as Defcon, HIMSS, CSI and Interop. He finds combining dissimilar items to create entirely new entities exciting and expansive.
Mark Stanislav
What's a Linux?: Creating & teaching college courses at 24.
Synopsis
Ever wondered how to get into university teaching or what it's like once you jump in? How about if you no older than any of your students? Mark will explore his experiences with teaching at Eastern Michigan University and ITT Technical Institute, going through everything from how to break into teaching, to what it's like to write curriculum, to how to deal with 27 students and 24 computers in your Linux labs. Mark will share not only his opinions and thoughts on the journey, but also give tips to make yours easier.
Bio
Mark Stanislav holds his Bachelor's in Networking and IT Administration and is currently pursuing his Master's in Network Security -- both from Eastern Michigan University. Mark is a Linux systems administrator for a popular digital promotions company just outside of Detroit by day, and an adjunct lecturer at EMU by night (literally). Mark teaches both the entry-level and advanced Linux courses at EMU and created the curriculum for both from scratch. Mark's technology interests involve Linux, PHP-based web development, information security, and Apple products. Mark also runs a security news web site called uncompiled.com and last presented here at NOTACON 2005.
Dan Zarrella
Memetic Engineering
Dan Zarrella
Synopsis
How do memes spread online and offline? What can we learn from areas of academic study like urban legends, homeric poems, gossip, and rumors that can be used to engineer contagious ideas? This session will study the science, history and statistics of contagious ideas both online and off.
Bio
Dan Zarrella is an award-winning social, search, and viral marketing scientist and author of the O'Reilly media book "The Social Media Marketing Book". Dan has written extensively about the science of viral marketing, memetics and social communications on his own blog and for a variety of popular industry blogs, including Mashable, CopyBlogger, ReadWriteWeb, Plagiarism Today, ProBlogger, Social Desire, CenterNetworks, Nowsourcing, and SEOScoop. He has been featured in The Twitter Book, Fast Company, The Financial Times, AdAge , NYPost, The Boston Globe, Forbes, Wired, The Wall Street Journal, Mashable and TechCrunch. He was recently awarded Shorty and Semmy awards for social media & viral marketing.
 

RANDOM NOTACON SHOUTOUT: Visiting Cleveland? Make sure to stop at the Makers' Alliance.

Audio Visual rentals provided by Rentech Solutions

© 2010 FTS Conventures | web2010 -at- notacon dot org
fax: 216-221-1409 | Contact Us