AOH :: IS1723.HTM



  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

Content-Transfer-Encoding: QUOTED-PRINTABLE

Forwarded from: "The Dark Tangent" 

(PGP signature will be munged from forwarding here!  - WK)

Hash: SHA1

xxxxxxxxxxxxxxxxxx xxx xx x xx  DEF CON 17, Las Vegas 2009
xxxxxxxXXXXxxxxxxxxxxxxx xx x x         July 31st - August 2nd
xxxxxxXXXXXXxxxxx x x x                 The Rivera Hotel and Casino
xxxxxXXXXXXXXxxxxx xx x x               Las Vegas, Neveada, USA
xxxxXXXXXXXXXXxxx x xxxxxxxx x 
xxxXXXXXXXXXXXXxxxxxxxxxx x
xxXXXXXXXXXXXXXXxxxxxx xx x             Call for Papers Call for Papers
xxxXXXXXXXXXXXXxxxxxxxx                 Call for Papers Call for Papers
xxxxXXXXXXXXXXxxxxxxxx x x xx   Call for Papers Call for Papers
xxxxxXXXXXXXXxxxxxxx xxx xx x   Call for Papers Call for Papers
xxxxxxXXXXXXxxxxxxx x x x               Call for Papers Call for Papers
xxxxxxxXXXXxxxxxxxxxxx xx x x   Call for Papers Call for Papers
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx x        Call for Papers Call for Papers.

Dark monks of techno-fu, it is that time of the year again! 
The DEFCON CFP is now open!

What: DEFCON 17 Call For Papers
When: The Call for Papers will close on May 15, 2009
How: Complete the Call for Papers Form and send to talks at defcon dot org

Don't know what DEFCON is? Go to and clue up! 

Papers and presentations are now being accepted for DEFCON 17, the 
conference your mother and ISC(2) warned you about. DEFCON will take 
place at the Riviera in Las Vegas, NV, USA, July 31 - August 2, 2009.

Two years ago we eliminated specific speaking tracks and we received a 
diverse selection of submissions. From hacking your car, your brain, and 
CIA sculptures to hacking the vote, Bluetooth, and DNS hacks. We will 
group presentations by subjects and come up with topic clusters of 
interest. It worked out so well in the past we are doing it again this 

What are we looking for then, if we don't have tracks? Were looking for 
the presentation that you've never seen before and have always wanted to 
see. We are looking for the presentation that the attendees wouldn't ask 
for, but blows their minds when they see it. We want strange demos of 
Personal GPS jammers, RFID zappers, and HERF madness. Got a MITM attack 
against cell phones? We want to see it.

Subjects that we have traditionally covered in the past, and will 
continue to accept include: Trojan development, worms, malware, 
intelligent agents, protocol exploits, application security, web 
security, database hacking, privacy issues, criminal law, civil law, 
international law/treaties, prosecution perspectives, 802.11X, 
bluetooth, cellular telephony protocols, privacy, identity theft, 
identity creation, fraud, social implications of technology, media/film 
presentations, firmware hacking, hardware hacking, embedded systems 
hacking, smartcard technologies, credit card and financial instrument 
technologies, surveillance, counter-surveillance, UFO's, peer2peer 
technologies, reputation systems, copyright infringement and 
anti-copyright infringement enforcement technologies, critical 
infrastructure issues, physical security, social engineering, academic 
security research, PDA and cell phone security, EMP/HERF weaponry, 
TEMPEST technologies, corporate espionage, IDS evasion.

What a mouth full! Well you can't say we didn't give you some ideas. 
This list is not intended to limit possible topics, merely to give 
examples of topics that have interested us in the past, and is in fact 
the same list we used last year..

Check out for 
past conference presentations to get a complete list of past topics that 
were accepted if you want to learn from the past.

We are looking for and give preference to: unique research, new tool 
releases, =C3=98-day attacks (with responsible disclosure), highly technical 
material, social commentaries, and ground breaking material of any kind. 
Want to screen a new hacking documentary or release research? Consider 

Speaking Formats:
Choose between 12 hundred seconds, 50 minutes, 110 minutes, 1/2 day 
Thursday or a break out format of a length you determine.

We are continuing the Twelve Hundred Second Spotlight, which is a 
shorter presentation (about twenty minutes) that doesn't warrant a full 
50 or 110 minute talk. The Twelve Hundred Second Spotlight is designed 
for those who don't have enough material for a full talk, but still have 
a valuable contribution to make. This is to ensure that great ideas that 
can be presented quickly don't fall through the cracks merely because 
they didn't justify a full length talk. Examples include research, 
announcements, group presentations, projects needing volunteers or 
testers, requests for comments, updates on previously given talks, quick 
demonstrations. You get the idea. Presenters will get a speaker badge 
which entitles them to free admittance to DEFCON, but we will be unable 
to pay an Honorarium.

Remember being attacked by Gran Master Ratt's Flame Crotch(tm)? Do you 
remember thick accented Germans trying to convince you to attack 
critical infrastructure? Do you remember extravagant vapor ware releases 
by a stage filled with posses? We do, and sans projectiles of raw meat 
we want to encourage such shenanigans again this year. We are calling on 
all "hacker groups" (you know who you are, and the FBI has a nifty file 
with your name on it) to present at DEFCON, to discuss what you're up 
to, what your mission is, to discuss any upcoming or past projects, and 
to discuss parties/conferences you are throwing. We do humbly request 
that all gang warfare be relegated to electronic attacks, and not fall 
over into meat space.

NEW this year is a 1/2 day set of tracks on Thursday, pre-con, to help 
orient newbies and provide 1/2 day training on different 'foundational' 
subjects such as networking, building custom Linux distros, a work shop 
on modding your PSP, the fundamentals of radio, things like that. These 
sessions will get you in the mood for the main conference and give you 
something to do if you showed up early Thursday. As such your 
submissions for the Thursday sessions should be entertaining and help 
attendees who are fairly new get their feet under themselves, or give 
more advances hacker types a half day of fun gutting their TiVo.

If you want to present a 1/2 day training or newbie talk just make sure 
you mark down you want to present on Thursday.

New for DEFCON 17:
We have ALL the speaking rooms this year, and because of this I want to 
announce a call for workshops, demos, and mini trainings. We have 
additional small rooms that will enable highly focused demonstrations or 
workshops. If you want to talk about building a passport cloner or a 
tutorial on developing Metasploit exploits this might be the format for 
you. You tell us how much time you need, and we try to accommodate you!

To submit a speech, complete the DEFCON 17 Call for Papers Form.

We are going to continue last year's goal of increasing the quality of 
the talks by screening people and topics. I realize you guys are 
speaking for basically free, but some talks are better than others. Some 
people put in a bit more effort than others. I want to reward the people 
who do the work by making sure there is room for them.

This year we will have two rounds of speaker acceptance. In the first 
round we will fill about half of the schedule before the submission 
deadline, and the remaining half afterwards. This is to encourage people 
to submit as early as possible and allows attendees to plan on the 
topics that interest them. If you see the schedule on-line start to 
fill, do not worry if you have not heard from us yet, as we are still in 
the process of selection.

Barring a disaster of monstrous proportions, speaker selection will be 
completed no later July 1. The sooner you submit the better chance you 
have of the reviewers to give your presentation the full consideration 
it warrants. If you wait until the last minute to submit, you have less 
of a chance of being selected.

After a completed CFP form is received, speakers will be contacted if 
there are any questions about their presentations. If your talk is 
accepted you can continue to modify and evolve it up until the last 
minute, but don't deviate from your accepted presentation. We will mail 
you with information on deadlines for when we need your presentation, to 
be burnt on the CDROM, as well as information for the printed program.

Speakers get in to the show free, get paid (AFTER they give a good 
presentation!), get a coolio badge, and people like you more. Heck, most 
people find it is a great way to meet people or find other people 
interested in their topics. Speakers can opt to forgo their payment and 
instead receive three human badges that they can give to their friends, 
sell to strangers, or hold onto as timeless mementoes. Receiving badges 
instead of checks has been a popular option for those insisting on 
maintaining their anonymity.

Please visit: for previous conference archives, information, 
and speeches. Updated announcements will be posted to news groups, 
security mailing lists and this web site. for 
a look at all the events and contests being planned for DEFCON 17. Join 
in on the action. to upload all your past 
DEFCON pictures. We store the pictures so you don't have to worry about 
web space. If you have an account on the forums, you have an account 
here. for news and announcements 
surrounding DEFCON.

CFP forms and questions should get mailed to: talks/at/

Version: PGP Desktop 9.9.1 (Build 287)
Charset: iso-8859-1


Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Best Selling Security Books & More! 


Site design & layout copyright © 1986-2015 CodeGods