-----BEGIN PGP SIGNED MESSAGE----- DEF CON III Convention Update #1.80 (06.20.95) August 4-6th 1995 @ the Tropicana in Las Vegas XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON III Convention Announcement XXXXXXxxxxxxXXXXXX X X DEF CON III Convention Announcement XXXXXxxxxxxxxXXXXXXX X DEF CON III Convention Announcement XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON III Convention Announcement XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON III Convention Announcement XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON III Convention Announcement XXXxxxxxxxxxxxxXXXXXXXX DEF CON III Convention Announcement XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON III Convention Announcement XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON III Convention Announcement XXXXXXxxxxxxXXXXXXXXX X DEF CON III Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON III Convention Announcement XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON III Convention Announcement This is an initial announcement and invitation to DEF CON III, a computer convention for people interested in various aspects of computer culture. The emphasis is on problems caused by rapid computerization of businesses and the private sector. Illegitimate computer access, fraud, privacy concerns, and encryption technology will be covered in two days of talks by respected industry professionals. Special talks by "hackers" will present conflicting perspectives and allow for mixed round table discussions. This combinations of both forces in computing today will offer to shed light on ideas that all too often given only a slanted presentation by the popular media. WHEN: August 4, 5, 6 - 1995 WHERE: Las Vegas, Nevada at the Tropicana Hotel Building on the success of DEF CON II, we try to provide information and speakers in a forum that can't be found at other conferences. People come to DEF CON for information and for making contacts. We strive to distinguish this convention from others in that respect. What's been said about the previous conventions can be found in the New York Times (July 25, 1994), Business Week (August 1994), Info World, Boardwatch (October 1994), The National Law Journal. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: The Tropicana has rooms reserved for the convention. Check-in is 3pm, check-out time is 12 noon. Remember there is an 8% sales tax in Vegas. Register yearly, only 100 rooms were blocked for sure. After that it is subject to availability. 65$ Single or Double room, Midweek (Monday - Thursday) 90$ Single or Double room, Weekend (Friday - Sunday) 350$ One-Bedroom Suite (Call for Availability) The Tropicana, 3801 Las Vegas Blvd. So., Las Vegas, Nevada, 89109 (702) 739-2581 or (800) 468-9494 or (702) 739-2448 (Fax) Held in three conference rooms at the Tropicana hotel in Las Vegas, DEF CON will be interesting and informative. There will be presentations by specialists in their fields, technical discussions, infamous and well known videos, mini-seminars on specific topics, a cu-see-me video conference set up on a t1 net connection, and many impromptu contacts to be made. The Tropicana is located right on the "Strip" with the other three corners of the street occupied by the MGM Grand (Largest hotel in the world), the Excalibur, and the Luxor. If you can afford it stay for a couple extra days and see the sights. There is plenty to do in town if you have never visited. Comdex does not count as a visit. COSTS The price of admission will be 30$ in advance or 40$ at the door. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Friday August 3rd Registration and getting to know people Main Convention Room South Pacific Ballrooms Time Event 10:00 Convention room opens, registration begins. : Informal demonstrations and getting acquainted through out the day. : : Network/video/voice bridge up : 15:00 BATTLE TECH At Virtual World (Buy tickets in advance or at the con) : Two hours of total combat! 1/2 Battle Tech, 1/2 Red Planet. : 18:00 SJG's "Hacker" game with the "Hacker II" expansion. The Mastah' : Haqah play off for the most elite hacker player. Get your group : together for the hard-core old-school back-stabbing hack attack : from hell! There can be only one! : 24:00 Hacker Jeopardy with Winn Schwartau starts, Round #1 : 02:00 Convention room closes up for the day. Saturday August 4th Convention begins 10:00 in South Pacific Ballrooms Time Event 10:00 Key note speech by () : Winn Schwartau - Tempest Videos / Year in Review : Robert Steele - TBA : Jim Settle - TBA : Bruce Schenier - Cryptography : Curtis Karnow - Legal : Lewis De Payne - How to hack more professionally 15:00 Lunch/Dinner Break Begins : 17:00 Evening Sessions Start at 17:00 : Theora and Crew - TBA : CPSR - Round Table : EFF - Legal Implications : Peter Frank - TBA : Chris Hall - Spy Stuff 21:00 Evening Sessions End at 21:00 : : 24:00 Hacker Jeopardy with Winn, Round #2, and Final Jeopardy Round. : " 02:00 Convention room closes up. Sunday August 5th Time Event 10:00 Oscar Meyer - How to Hack, or, Toilet Training to Maturity : Roscoe - How to hack more professionally : Len Rose - TBA : Peter Skelly - TBA : Stepehn Cobb - "Why Hacking Sucks" : Parmaster - General history of the underground 14:00 Lunch Break Starts at 14:00 : 15:30 Evening Sessions Start at 15:30 : Koresh - TBA : Susan Thunder - Psychological Subversion of Trusted Systems : Tagger - Mag Stripe Readers/Writers : Dead Addict - TBA 18:00 The Convention Ends, Final give aways, awards, and goodbye! ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: SPEAKERS This is a partial list of speakers for this year. More are being invited or waiting to make plans. As this list changes further announcements will be made. This should give you a flavor or what to expect, though. Two of the Speakers, Susan Thunder and Roscoe both are written about in the book "Cyberpunks." I suggest you go buy it and read it if you can, it will give you a better perspective about what they are all about. [> Bruce Schneier, Author of "Applied Cryptography." TOPIC: Will speak on issues surrounding cryptography, digital authentication, digital cash, and will answer questions from the audience. [> Winn Schwartau, Author of "Information Warfare" and "Terminal Compromise" is a consultant to government and the private sector regarding enterprise and national security concerns. TOPICS: "Information Warfare, the year in review" (Comedic) and "Tempest Attack Videos." [> Len Rose AKA Terminus. After the legal fiasco Len faced years ago (as partially chronicled in "The Hacker Crackdown.") this will be his first chance to speak of his experiences without the threat of having his parole revoked. TOPIC: TBA [> Lewis De Payne, aka "Roscoe" TOPIC: Ultra Hacking - Beyond Computers: How to make your hacking more successful and productive while minimizing risk. Learn how to adopt a business-like strategy, planning your goals, focusing your strategy and keeping you out of trouble! [> Curtis Karnow, former federal prosecutor and attorney focusing on intellectual property litigation and computer law. TOPIC: Agents in the telecommunications context, and "smart" software that we 'trust' to do the Right Thing. The specific issue is legal liability and responsibility for the actions of intelligent agents, and then spinning off to chat about the liability for artificial intelligence generally. [> Robert D. Steele, President of OPEN SOURCE SOLUTIONS, Inc. A former Spy, Experienced Bureaucrat, Radical Visionary. Tofflers call him the "rival store" to CIA. Keynote Speaker at HOPE, Workshop at Hac-Tic '93. TOPIC: TBA [> The Electronic Frontier Foundation. TOPIC: The EFF will cover current legal threats privacy and computer information networks. [> Stephen Cobb. TOPIC: "The Party's Over: Why Hacking Sucks." Stepehen intends to play "devil's advocate" and suggest that "hacking should not be tolerated in any shape or form as it serves no useful purpose and is a menace to society." [> Jim Settle, ex-FBI computer crime division department head. TOPIC: TBA [> Oscan Meyer. TOPIC: How to Hack - Toilet Training to Maturity. [> Peter Skelly. TOPIC: SMS and wide area networking. [> Tagger. TOPIC: Magnetic stripe card reader-writers and the "Mod-700." [> Dead Addict. "Too tired for slack." TOPIC: TBA. [> Theora. TOPIC: "Don't you hate it when that happens?" [> Karen Coyle, CPSR, and a pannel of friends. TOPIC: TBA. [> Peter Franck, National Lawyers Guild. TOPIC: TBA. [> Parmaster, ex-MOD member, General history of the underground. [> Glenn Campbell, Area 51 and "Dreamland" authority. TOPIC: Q & A, overview of Governmental activities and stuff. [> Attidute Adjuster. TOPIC: "Extremely technical machine language discussion on Polymorphic computer viruses, with a side note on cryptography uses." [> Susan "Thunder" of "Cyberpunks" fame. TOPIC: Social Engeneering and Psychological Subversion of Trusted System. [> Pete "To much coffee man" Shipley, unix stud. TOPIC: Security audits, how they are performed and what to look for. [> Koresh, unix hacker and conspiracy theorist supreme. TOPIC: TBA. Speakers will be talking Saturday and Sunday, and maybe Friday depending. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: TELEPHONE CONFERENCE BRIDGE (801-855-3326) For DEF CON III there will be a dial in conference set up. If you are overseas, or just can't make the convention this year, you can still get an idea of what is going on and participate. One part of the voice conference equipment will allow you to listen to the convention room microphone, another will allow you to ask questions during the Q&A sections of peoples speeches. A general conversation area will be up so you can chat with others at the convention, or just others dialed into the bridge. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: BOOTHS and EXHIBITS and SPONSORSHIP and GIVE-AWAYS There is table space available if you or your company is interested in showing off or selling your latest product. A separate room will have tables set up, and are available on a first come first served basis. There is also room available in the convention program for you or your company to advertise their latest and greatest. This is also first come, first served. If you or your company is interested in sponsoring a speaker you receive a table and an advertisement in the program. If you are interested in either table space or advertising or sponsoring a speaker please contact Phil at (206) 236-6802 and he will provide you with a package explaining the costs and options available. DEF CON is also looking for product to give away in the raffle. If your company wants to donate a few copies of their product to be given away we will be happy to promote it verbally before it is given away. Software, hardware, books, magazines, etc. would be examples. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: MORE DEF CON INFORMATION The World Wide Web Page is located at: http://www.defcon.org/ FTP Site: ftp.fc.net /pub/defcon Mailing lists: mail majordomo@fc.net with the following statement in the body of your message: "subscribe dc-announce" This will set you up on the mailing list and you will receive updated information, information on the other mailing lists offered, etc. I suggest joining the dc-stuff list just so you can talk and plan with other people going to the con to coordinate rides, sharing of rooms, etc. VOICE OR VOICE MAIL - Planning: 206-453-1006 VOICE OR VOICE MAIL - Advertising: 206-236-6802 FAX: 206-453-9567 E-Mail: dtangent@defcon.org Snail Mail: 2709 E. Madison #102, Seattle, WA, 98112 ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: INFORMATION ABOUT LAS VEGAS WWW PAGES about Las Vegas, Hotels, Things to do, etc. HTTP://www.infi.net:80/vegas/online/ HTTP://www.ocf.berkeley.edu/~iew/index.html HTTP://www.best.com/~rdc/roger/vegas.html HTTP://www.intermind.net/las.vegas.on-line/homepage.html ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Previous Convention Items DEF CON I Tapes (4) include the following speakers: Curtis Karnow: Legal Implications of failure in complex VR systems. Ray Kaplan: To Hack or not to Hack, that is not the question. Gail Thackeray: Search and seizure, the roll of "computer cops," and Q&A Dead Addict: The future of hacking. Dark Druid (Busted by Gail Thackeray): Getting raided sucks. Judi Clark of the CPSR: What you can do the become active in the community. Dan Farmer: Inherient security problems in networks,and a bit on SATAN. Dr. Mark Ludwig: Let virii live. DEF CON II Tapes (10) include the following speakers: Phillip Zimmermann : Keynote Speaker, PGP. Gail Thackeray : Response to Mr. Zimmermann and Privacy issues. Chris Hall : Electronic Surveillance. Curtis Karnow : Recombinant Culture, Crime in the Digital Network. Dr. Mark Ludwig : Virus Creation Awards and What to do when the Feds come. Judi Clark, Mara, Fen and Marianne in a Round Table Discussion. The Dark Knight : Hacking in the UK Sara Gordon, Mark Aldrich, Phil Zimmermann: Internet & PGP privacy concerns. Annaliza (Torquie) : The European Underground scene. Mark Lottor : Various cellular topics. Winn Schwartau : HERF guns, Van Eck, Information Warfare Peter Beruk : The role of the SPA, general Q&A. Padgett Peterson : Anti-Virus writing, Cleaning up other peoples messes. The Jackal : A basic radio overview with Q&A. Artimage : Underground spoof and give aways. Stephen Dunifer : Radio Free Berkeley and pirate media. Damien Thorn : Random Cell information from the late night tech talks. Stuff is for sale from DEF CON I and II in case you are interested. From the first year we have audio tapes (4 90 minute tapes) for $20 and the second year (10 90 minute tapes) for $30. Tee Shirts are still availabe from last year for $20, they are white and long sleeve. SHIPPING : Please include 3.00 for priority shipping. END ANNOUNCEMENT ------------------------------------------------------------ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCzAwUBL+bl7rGddDV5azd9AQHFmwTtG8gjjpxdy5SgbVlljfP3PK9UCVyGFP/s RmqThI6ku1X60RoeqAnJS77kUhFjRO7v1W9DC+ozcXIQtXuJM8tHIXsYnit/yttC YcRbXleiSaxF9nbxg5HBHwjdXXsGOSW4AxW6Oy4p/hcJDYLrikNlFBKiRXrhDt5f n6QGhZhSqCR3fqLHqC0LzVsYO6iwbMPYUYu5VZjhRlw6yC0Lkx4= =g0wH -----END PGP SIGNATURE-----