Hey, man, you don't talk to Cory. You listen to him. The
man's enlarged my mind. He's a poet-warrior in the classic sense. I mean
sometimes he'll, uh, well, you'll say hello to him, right? And he'll just
walk right by you, and he won't even notice you. And suddenly he'll grab
you, and he'll throw you in a corner, and he'll say do you know that if is
the middle word in life? If you can keep your head when all about you are
losing theirs and blaming it on you, if you can trust yourself when all men
doubt you -- I mean I'm no, I can't -- I'm a little man, I'm a little
man, he's, he's a great man. I should have been a pair of ragged claws
scuttling across floors of silent seas -- I mean --
He can be terrible, he can be mean, he can be right. He's fighting the war.
He's a great man. I mean... I wish I had words. I can tell you the other day
he wanted to kill me.
Kevin Bankston, an attorney specializing in free speech and privacy law,
is the Electronic Frontier Foundation's Equal Justice Works/Bruce J. Ennis
Fellow for 2003-05. His fellowship project focuses on the impact of
post-9/11 anti-terrorism laws and surveillance initiatives on online privacy
and free expression. Before joining EFF, Kevin was the Justice William J.
Brennan First Amendment Fellow for the American Civil Liberties Union in
New York City. At the ACLU, Kevin litigated Internet-related free speech
cases, including First Amendment challenges to both the Digital Millennium
Copyright Act (Edelman v. N2H2, Inc.) and a federal statute regulating
Internet speech in public libraries (American Library Association v. U.S.).
Kevin received his J.D. in 2001 from the University of Southern California
Law Center, and received his undergraduate degree from the University of
Texas in Austin.
Valerie Blanchard (CISSP, NSA-IAM, CBCP) is a Security Consultant with a
management and technology consulting firm specializing in the financial
In her career as a security consultant and technologist, Valerie has
developed security and incident response policies and has designed and
implemented wide-area network security architectures. She has planned and
implemented encryption schemes, VPN solutions, high availability
strategies, intrusion detection systems, data and application servers, and
backup and recovery strategies for national and international clients,
three letter agencies and local government entities. Valerie has also
become quite adept at "geek-wrangling."
Valerie's most recent projects include investigating crypto modification
for the Air Force, IPV6 implementation for the .mil and re-engineering the
security infrastructure for a global telecommunications company. When not
practicing her craft, Valerie can be found haunting bookstores, listening
to music all the way to "11", and mucking around trying to IP enable her
Beyond Ethereal: Crafting A Tivo for Security Datastreams BlackHat
Countering Denial of Information Attacks DefCon 13
Greg Conti is an Assistant Professor of Computer Science at a university in
the Northeast United States. His areas of expertise include network
security, information visualization and information warfare. Greg has worked
at a variety of military intelligence assignments specializing in signals
intelligence. Currently he is on a fellowship and is working on his PhD in
Computer Science at large university in the Southeast United States.
Gene Cronk, ISSAP, CISSP, NSA-IAM, resides in Jacksonville, FL and is
currently providing system administration services to an advertising and
He has 12 years of experience in electronics, system administration,
networking and system security. Gene is best known for his work with the
North American IPv6 Task Force, and his work on FairuzaWRT, a fork of
OpenWRT designed to have security tools built into a wireless access
point (the WRT54GS). He has spoken on IPv6 and other topics at several
When not totally absorbed by system security related issues, Gene can be
found working on his lab, actively participating as Vice President of
the Jacksonville Linux User's Group, and building a successful and
dynamic 2600 chapter, of which he is currently president.
Nick Farr spent the first decade of his career serving in non-profit
management roles in academia, public radio, print journalism and computer
recycling. While pursuing a new career in Public Accounting, he continues to
serve in his role as Treasurer of the Hacker Foundation which he co-founded.
Surgical Recovery from Kernel-Level Rootkit Installations Defcon 13
Julian Grizzard is a PH.D. candidate in the School of Electrical
and Computer Engineering at the Georgia Institute of Technology. He received
his B.S. in Computer Engineering from Clemson University and his M.S. in
Electrical and Computer Engineering from Georgia Institute of Technology.
He has been studying rootkits for several years, written numerous related
papers, and given many academic and research presentations. He is a member
of the Honeynet Research Alliance and his research interests include kernel
hacking, networking, and secruity.
IrishMASMS is an old school hardware & network guy, and has degrees in
Management of Information Systems, computer programming, networking
technology, micro-computer programming, and aviation/aerospace management.
Certainly not a bit-head by any means, but he will figure out how to write
some code if forced. After exploring the wonders of the early years with
TRS-80's, Mac Plus, and even some Unisys mainframes and a clustered DEC VAX,
he is currently employed by a Defense contractor in the information/network
security realm. During off time he helps with the local Linux User's Group
and other local IT organizations; also enjoys a few LAN parties, attending &
presenting at other Cons, his NES, and his cat. No one can confirm or deny
that he was a founding member of the 241_Crew, a locally based group of
misfits who explore technology and the local music & epicurean scene.
Dan Kaminsky is a security researcher focusing on applied mechanisms for
analyzing and understanding very large scale networks. He has been
working and speaking professionally in this field for a little more than
six years, first at Cisco where he developed mechanisms required to
secure network monitoring systems, and later at Avaya where he consulted
for their Enterprise Security Practice. Kaminsky has contributed to
several books, including "Stealing the Network: How To Own The Box" and
"Aggressive Network Self Defense", and is most well known for his talks
at the Black Hat Briefings and Defcon. Dan's released software
includes Scanrand, a very high speed network scanner, and the OzymanDNS
suite, which most recently demonstrated video transmission over the
Domain Name System. He also contributed a VPN mode to OpenSSH.
Jesse Krembs is the Head Defcon Speaker goon, and has been involved with
Defcon since 1998. He is co-founder of the Hacker Foundation and its current
president. He travels widely doing radio survey work & wireless installation
for Fortune 500 companies. He restores classic motorcycles and naps in his
Ben Laurie has worked for years on cryptography and security,
particularly in the open source world. Perhaps best known for
authoring Apache-SSL, the ancestor of almost all secure free
webservers, he is also a core team member of OpenSSL and a founding
director of the Apache Software Foundation. In his copious spare time,
he is Director of Security for The Bunker Secure Hosting. He has
published papers on subjects as diverse as knotted DNA and anonymous
money. His current obsessions are privacy and security.
Google Hacking for Penetration Testers DefCon 13 The Book
Johnny Long is a ?clean-living? family guy who just so happens to like
hacking stuff. Over the past two years, Johnny?s most visible focus has been
on this Google hacking ?thing? which has served as yet another diversion to
a serious (and bill-paying) job as a professional hacker and security
researcher for Computer Sciences Corporation. In his spare time, Johnny
enjoys making random pirate noises (?Yarrrrr!?), spending time with his wife
and kids, convincing others that acting like a kid is part of his job as a
parent, feigning artistic ability with programs like Bryce and Photoshop,
pushing all the pretty shiny buttons on them new-fangled Mac computers, and
making much-too-serious security types either look at him funny or start
laughing uncontrollably. Johnny has written or contributed to several books,
including ?Google Hacking for Penetration Testers? from Syngress Publishing,
which has secured rave reviews and has lots of pictures.
Raffy is a senior member of the research and development team at ArcSight,
the global leader in Enterprise Security Management (ESM). He initiated
the Content team, holding responsibility over all the content in
ArcSight's product - everything from correlation rules, categorizations
and vulnerability mappings to visualizations and dashboards.
For the past couple of years, his passion has been the visualization of
security events and log files (http://afterglow.sourceforge.net).
Dan Moniz is Security Engineer at Alexa Internet, an Amazon.com company
working to provide everyone with information about the Web. Prior to
joining Alexa, Dan worked as Staff Technologist for the Electronic
Frontier Foundation, and specialized in free speech, privacy, and
technology issues, including RFIDs, DirecTV, and Total Information
Awareness. Dan is a member of The Shmoo Group, and is usually working on
too many projects at once. Dan held previous research and security
positions with Cloudmark, OpenCola, and Viasec.
Annalee Newitz is EFF's Policy Analyst. She conducts research, gives
lectures, and writes policy recommendations and white papers. Although
she is a digital rights generalist, her special areas of interest are
expanding the public domain, free speech, and network regulation. She
was the recipient of a Knight Science Journalism Fellowship in 2002, and
writes a syndicated column called Techsploitation. She is also a
contributing editor at Wired magazine. In her off-hours, she edits an
indie magazine called Other.
Introduction to Lock picking and Physical Security DefCon 13
While paying the bills as a network engineer, Deviant Ollam's first and
strongest love has always been teaching. Employed periodically at schools in
the greater Philadelphia area, he is presently a student at the New Jersey
Institute of Technology in the hopes of tacking some actual letters to his
name and doing the professor gig full time. A fanatical supporter of First
Amendment rights who believes that the best way to increase security is to
publicly disclose vulnerabilities, Deviant has given lock pick demonstrations
at other technology & security gatherings, most recently ShmooCon, and
various schools, most recently the United States Military Academy at West
Kurt Opsahl is a Staff Attorney with the Electronic Frontier Foundation
focusing on civil liberties, free speech and privacy law. Before joining EFF
, Opsahl worked at Perkins Coie, where he represented technology clients
with respect to intellectual property, privacy, defamation, and other online
liability matters, including working on Kelly v. Arribasoft, MGM v. Grokster
and CoStar v. LoopNet. For his work responding to government subpoenas,
Opsahl is proud to have been called a "rabid dog" by the Department of
Justice. Prior to Perkins, Opsahl was a research fellow to Professor Pamela
Samuelson at the U.C. Berkeley School of Information Management & Systems.
Opsahl received his law degree from Boalt Hall, and undergraduate degree
from U.C. Santa Cruz. Opsahl co-authored "Electronic Media and Privacy Law
Bruce Potter is the founder of the Shmoo Group of security
professionals, a group dedicated to working with the community on
security, privacy, and crypto issues. His areas of expertise include
wireless security, large-scale network architectures, smartcards and
promotion of secure software engineering practices. Mr. Potter
coauthored the books "802.11 Security", published in 2003 by
O'Reilly, "Mac OS X Security" by New Riders in 2003 and "Mastering
FreeBSD and OpenBSD Security" by O'Reilly published in April 2005.
Mr. Potter was trained in computer science at the University of
Alaska, Fairbanks. Bruce Potter is a Senior Associate with Booz Allen
A fixture of the wardriving and WWWD community for years, RenderMan
is usually not to far away from any wardriving news, often causing
it himself. Speaking this year as part of the 'Ethics and Legality
of Wardriving panel. He's written several notable how-to's and
essays for the wardriving community, including the 'WRT54G kismet
drone how-to', and the 'Stumbler Ethic'. Creator of the 'Warpack'
mobile wardriving rig he can usually be found tightening his tin-
foil hat, chugging a brew or finding some new way to irradiate
himself. Just look for the guy yelling at people; 'I'm not a mad
scientist, I'm just very angry!'
Licensing Agreements 101: The Creative Commons License DefCon 13
Jim used to code C# and ASP.Net web applications for a living in
Seattle, but one day he decided he?d rather go to law school in New York
City instead, where he is currently working on his J.D. He has been
attending DefCon for the past 6 years. Before coming to talk at DefCon this
summer, Jim will be doing legal research at a small criminal defense firm.
Hacking a Terror Network
Russ Rogers (CISSP, CISM, IAM, IEM, HonScD), author of the popular
Hacking a Terror Network, co-author and technical editor on multiple
other books including the best selling Stealing the Network: How to Own
a Continent, and Editor in Chief of The Security Journal; is Co-Founder,
Chief Executive Officer, and Chief Technology Officer of Security
Horizon; a veteran owned small business based in Colorado Springs,
Colorado. Russ has been involved in information technology since 1980
and has spent the last 15 years working professionally as both an IT and
INFOSEC consultant. Russ has worked with the United States Air Force
(USAF), National Security Agency (NSA), and the Defense Information
Systems Agency (DISA). Mr. Rogers is a globally renowned security
expert, speaker, and author who has presented at conferences around the
world including Amsterdam, Tokyo, Singapore, Sao Paulo, and cities all
around the United States. Russ has also been involved with Defcon as a
goon since Defcon 7.
Mr. Rogers has an Honorary Doctorate of Science in Information
Technology from the University of Advancing Technology, a Masters Degree
in Computer Systems Management from the University of Maryland, a
Bachelor of Science in Computer Information Systems from the University
of Maryland, and an Associate Degree in Applied Communications
Technology from the Community College of the Air Force. He is a member
of both ISSA and ISACA and Co-Founded the Global Security Syndicate
(gssyndicate.org), the Security Tribe (securitytribe.com), and acts in
the role of Professor of Network Security for the University of
Advancing Technology (uat.edu).
Jason Schultz is a Staff Attorney specializing in intellectual property
and reverse engineering. He currently leads EFF's Patent Busting Project.
Prior to joining EFF, Schultz worked at the law firm of Fish & Richardson
P.C., where he spent most of his time invalidating software patents and
defending open source developers in law suits. While at F&R, he co-authored
an amicus brief on behalf of the Internet Archive, Prelinger Archives, and
Project Gutenberg in support of Eric Eldred's challenge to the Sonny Bono
Copyright Term Extension Act. Prior to F&R, Schultz served as a law clerk to
the Honorable D. Lowell Jensen and as a legal intern to the Honorable Ronald
M. Whyte, both in the Northern District of California federal court system.
During law school, Schultz served as Managing Editor of the Berkeley
Technology Law Journal and helped found the Samuelson Clinic, the first
legal clinic in the country to focus on high tech policy issues and the
public interest. Schultz also has undergraduate degrees in Public Policy
and Women's Studies from Duke University. Jason maintains a personal blog at
Wendy Seltzer is Special Projects Coordinator with the Electronic
Frontier Foundation, specializing in intellectual property and free speech
issues. As a Fellow with Harvard's Berkman Center for Internet & Society,
Wendy founded and leads the Chilling Effects Clearinghouse, helping Internet
users to understand their rights in response to cease-and-desist threats.
Prior to joining EFF, Wendy taught Internet Law as an Adjunct Professor at
St. John's University School of Law and practiced intellectual property and
technology litigation with Kramer Levin Naftalis & Frankel in New York.
Wendy speaks frequently on copyright, trademark, open source, and the public
interest online. She has an A.B. from Harvard College and J.D. from Harvard
Law School, and occasionally takes a break from legal code to program (Perl)
Elizabeth Stark is the main law student of freeculture.org. She went to Brown
University and is currently attending Harvard Law School, where she is involved
with the Berkman Center for Internet and Society on such issues as the digital
media project, internet filtering reports, and drafting an Internet and
technology law casebook. She is also an editor of the Harvard Journal of Law
Technology, a Teaching Assistant in Cyberlaw, and conducts research for
Professor Jonathan Zittrain. She is spending the summer as a legal intern at
the EFF, where she gets to think about such issues 24/7.
Tierra, has been manipulating bits since the 7th grade, and is currently
working on his Computer Science degree at the University of Utah. He has
been attending 2600 meetings for more than 3 years now in Salt Lake City,
and has been helping run the DefCon Scavenger Hunt since DefCon 10. While
working with the DC801 crew on projects such as Project Prometheus, he
spends his time mastering his PHP and SQL skills on various personal
projects such as TIMAP found on SourceForge.
Paul Vixie is the author of several RFCs and well known UNIX system programs, among them SENDS, proxynet, rtty and Vixie cron.
While he was employed by DEC, in 1988 he started working on BIND, of which he is the primary author and architect of the release 8.
After he left DEC, in 1994 he founded Internet Software Consortium (ISC) together with Rick Adams and Carl Malamud to support BIND and other software for the Internet. The activities of Internet Software Consortium were assumed by a new company, Internet Systems Consortium in 2004.
In 1995 he cofounded the Palo Alto Internet Exchange (PAIX), and after Metromedia Fiber Network (MFN) bought it in 1999 he served as the MFN Chief Technology Officer and later as the president of PAIX.
In 1998 he cofounded MAPS (Mail Abuse Prevention System), a California nonprofit company with the goal of stopping email abuse.
He also used to run his own consulting business, Vixie Enterprises.
Along with Frederick Avolio, he co-wrote the famous book Sendmail: Theory and Practice.
He is also known to hold the record for "most CERT advisories due to a single author". He attended George Washington High School in San Francisco, California.
chris riley grew up in west virginia, studied computer science at johns
hopkins university, and is now a first-year JD student at yale. he is
currently studying law and technology, with a current emphasis on
copyright law and the ever increasing control over information goods, in
order to defeat the evil demons of boredom and restlessnesscontinue to
pad his already full resume better understand the interactions between
developing law and technology.