Staff, Volunteers and Nifty People creativity
Transcription
Staff, Volunteers and Nifty People creativity
Staff, Volunteers and Nifty People Core staff Nate “Myself” Bezanson Brian “Bunsen” Bezanson Steven “Mr. Domino” Dee Tod “tod” Detre Mark “nuintari” Doner Nick “Squelch203” Duval Jeff “Jeff” Godin Jeff “Amishone” Goeke‐Smith Gina “kat” Hoang Brandon “KaosPunk” Knight David “DaveDaDJ” Lauer Steve “frysteev” Lazenby Nicolle “rogueclown” Neulist Eric “Relativity” Pinzur Jodie “Tyger” Schneider Paul “Froggy” Schneider Kris “Krnlpanik” Suter Stephen “Inspired Chaos” Whittam Jason “Beanalby” Viers Tina “Mikaiyla” Viers Justin “Skyspook” Walker Domo‐Kun Blockparty Organizers Jason “Sketchcow” Scott Christian “RadMaN” Wirth Volunteers and Nifty People Chris Clymer, Jim “Vitruvius” Eastman, anoria, , glacial23, jon devree, Lady Nikon, Lauren, lizard, Naomi Most, niteshad, Ken “IrKdub” West, p33r, purge, ray, Jessica Miller, purge, chan, bbqsauce, xarmor and the many, many others who provided assistance! 52 creativity community technology 3. 4. 5. 7. 9. 15. 20. 25. 26. 27. 28. 29. 47. 48. 49. 50. 51. 52. Table of contents Rules and Regulations Photo and Audio/Visual Recording Policy Workshops Performances Events and Games Blockparty Competition Rules Notacon Fun Pages Schedule for Workshops, Performances and Events Schedule: Friday, April 16th Schedule: Saturday, April 17th Schedule: Sunday, April 18th Presenter Information Sponsors Fun Page Solutions Shout‐Outs and Local Area Map Conference Space Map Location Directory Staff and Volunteers This program ©2010 FTS Conventures The official Notacon font is Tele‐Marines. The titles, headlines and body text are Calibri. Other fonts include Zero Threes. Final printing and binding done at Adkins Printing in Lakewood, Ohio. Please support your local businesses! 2 Location Directory Level Two Lobby: Palace West: Palace East: Stillman: Registration Vendors and Organizations Presentation Track 1 Blockparty Recycled Rainbow Presentation Track 2 Game Shows Blockparty Lounge Workshops Level Three State: Allen: Hippodrome: Hanna: Roxy: Embassy: Hackerspaces Hardware Hacking Video Games Tabletop Games Notacon Radio Workshops N7C Network Operations Locksport 51 Floor Plans and Maps Rules and Regulations Hello fellow Notacon and Blockparty participants! No one likes rules, but without them, this event is not possible. In the interest of making sure no one gets kicked out of the event, please observe the following rules including all hotel policies. For the love of all that is good and sacred, use some common sense. 1. Do not harm or destroy anything that is not yours, including that of the hotel, confer‐ ence organizers or other participants. 2. Ohio law states that It is illegal to smoke indoors. Don’t do it. Go outside. 3. Do not bring food, beverages or alcohol not purchased from the hotel into any of the ballrooms or public areas. If caught, you will be asked to leave and come back without it. 4. If you booked a room, please undo any interior décor changes you made prior to your check‐out. This includes “rearranging” the furniture. Be kind to the hotel cleaning staff and if you do make a mess, at least leave a tip. 5. Do not hack, crack, phreak, socially engineer or otherwise infiltrate your way into any network device, phone system, service, or access point owned by either the Hotel, the conference staff or conference participants unless explicitly granted permission by the owner. Many participants are not computer and network security experts and are not savvy in regards to the potential danger their computers may be in. If you have time, please consider offering these people assistance in understanding and defending against potential threats. 6. No one other than hotel staff and authorized Notacon staff members should be on the roof. Ever. 7. Do not set up your own public network services (such as DHCP, DNS, etc.) or otherwise provide an uplink to another outside network (unless these services are properly fire‐ walled off). 8. No fireworks, explosives or dangerous substances are allowed on the premises at any time. 9. Illicit drugs are not permitted at any time on the premises. 10. Weapons of any sort are not permitted in any event area. This includes firearms, knives, bludgeons, mace, tasers, cow prods, and key rings that are weapons. This rule also includes abominable body odor and bad breath. When in doubt, shower and brush those teeth. 11. “Tagging”, stickering and/or defacing property not yours is prohibited. 12. Please do not socially engineer the hotel staff or security. You may try to socially engi‐ neer the Notacon staff under the right circumstances. Chances are it won’t work though. We hope. IN GENERAL: DO NOT BREAK ANY LAWS. Some of our presentation content may discuss or demonstrate techniques that, theoretically, could be used to violate laws and conference rules. We kindly ask that you do not attempt any of them at Notacon. Please be well versed in regards to what the laws are concerning these activities. We will not take responsibility for your actions and/or stupidity. Anyone found violating the rules or causing trouble will be kicked out without refund. Like‐ wise, the hotel has policies in place that will deal with people causing problems. The Nota‐ con staff fully supports any decision the hotel makes in this regard. This is all common sense! Please report any problems, vandalism, thefts, etc. to a Notacon Security Agent immediately. 50 3 Important Notice About Your Stuff All conference attendees are responsible for securing and watching over all of their own be‐ longings. This includes, but is not limited to: theft, tampering, destruction of property or loss of any kind. Under no terms will FTS Conventures, Notacon organizers, Blockparty organiz‐ ers, or the venue take responsibility for any articles unless specifically agreed to in writing. All equipment and personal belongings brought into any conference area is done so AT YOUR OWN RISK. Photo and A/V Recording Policy 1. 2. 3. 4. 5. If you are member of the press or any news gathering and reporting organization, you should have already read the press policy on our website prior to the event. If you have not, please do so before proceeding. Contact the Notacon staff for more informa‐ tion. There will be at least one Notacon and/or Blockparty staff photographer/historian. They will follow the same rules as members of the press. No video or audio recording may be made of any speaker without express permission of the speaker. All presentations for which we have previously secured permission will be videotaped. Copies will be made available from Notacon for a nominal fee. Videos will also be freely available under a Creative Commons license online after the event. Attendees in “public" areas such as the hotel bar, NOC, game room, etc. may be photo‐ graphed and/or videotaped. However, please be professional and non‐intrusive. If someone asks you to stop taking pictures, please be courteous and do so. Note to at‐ tendees: This implies that if you do not wish to be photographed or possibly video‐ taped, do not hang around the public areas and be aware of who is pointing a lens at you. You have been warned! Likewise, be POLITE when asking people not to photo‐ graph or videotape you. Please ask artists and musicians if you may photograph or record their work prior to doing so. Some artists may be sensitive to having their work duplicated or depicted in a manner they have no control over. Notacon Shout‐Outs Grand Traverse FragFest Northern Michigan's Biggest Lan Party ‐ GTFF.US ‐ hacklab.to loves notacon ‐ Team FragFest is coming to rock out in the rock band tournament. www.gtff.us ‐ Special thanks to all of the anonymous sponsors of Notacon! Visit the hackerspace room and learn about Cleveland's Hackerspace! ‐ Hive13.org Cincinnati Hackerspace with giant robots! ‐ Help support Cleveland's Hackerspace! http://zine.makersalliance.org ‐ What do we want? Bawls! When do we want it back? Bawls!.. I mean... NOW! Local Area Map A Note to Smokers Got a hankering for the sweet satisfaction of a cigarette or other legal smokable? Worry not! The outside patio area on the third floor, adjacent to the conference areas, is open for smok‐ ers to use. Ohio law prohibits smoking indoors and near building entrances. Likewise, the Wyndham has a hotel‐wide no‐smoking policy in all of their hotel rooms and public areas. Thank you in advance for your consideration! 4 49 Fun Page Solutions Workshops Smart Phones are a Smart Choice for PenTesting Mick Douglas Friday 1PM Today's smart phones have enough processing power and the mobility to be on a pentester's short list of needful tools. This talk will show you what you need to do to join in on the fun! Bio: Mick is a white hat hacker who hates the term white hat. He is a member of the Paul‐ DotCom podcast. While he will join in pentests, his passion is network and system defense. Meditation for Hackers EASY HARD Sai Emrys Saturday 1PM ‐ 3PM At this workshop you'll learn and practice several classes of practical techniques for changing your mindstate both immediately and long‐term ‐ without any of the usual dogma, religious proselytization, or woo. Bonus: you might know about Xenu, but do you know about TR‐0 Bullbait and TR‐8 Tone 40 on Object? Understanding Scientology's actual internal techniques is critical to understanding why they act the way they do ‐ and to inoculating yourself against similar techniques. Bring comfy clothes and a willingness to shut your electronics off for two hours. Bio: Sai Emrys taught himself meditation in high school, and while at it, noticed how various traditions' techniques frequently shared common functionality and had idiosyncratic gaps. More recently, he's begun describing these techniques from a hacker's perspective ‐ con‐ centrating on what works why and discarding the religious dogma and woo that so often clouds more "traditional" approaches. An excerpt from an upcoming book, "Meditation for Hackers", was published in 2600 magazine, Summer '08. Proce55ed Synaesthesia for fun and profit Guybrush Friday 10AM ‐ 4PM Want to play with sound and light? Want to pick people up at parties with cool tech? Want to make tiny amounts of cash doing live visuals for your friends band? Don.t feel like spending months carving out C++ and HLSL code to do that? Using the OS agnostic Processing (processing.org) platform, this camp will get your hands dirty and your computer (Mac, *nix, or windows) dancing to the music. Guybrush will present short (20 minute) bursts of theory in between hands‐on open hacking sessions, aimed at making YOU proficient at creative, real ‐time graphics. Bring your laptop, a usb mic or mp3 player and audio cable, an input device . joystick, korg midi‐over‐usb, or just your keyboard. Essential are your favorite music and your sense of wonder. Materials for this workshop are available at http://apparentlythisispossible.com/processing/ 48 5 Bio: Madman. Genius. Visionary. Psychonaut. Guybrush has been shoveling triangles as fast as he can since he got his hands on an OpenGL Red book in 1999. Since 2003, he's been making demos with the Northern Dragons. In 2006, he released a WMP viz pack that has blown past 1 million downloads. In 2008 he presented an extremely hard to use HLSL‐based vis framework at Notacon/Blockparty. In 2009, he and North American demoscene co‐ruler blackpawn teamed up to deliver live visuals for the DataBEEZ west coast chiptunes tour. By day, Guybrush is a graphics hacker in the WPF GFX group at Microsoft. Sponsors Hacking the Xbox360 controller for WADS! GZPhreak Saturday 3 PM Have you ever wanted to use a mouse and keyboard on your favorite console games? I'll show you how I hacked an Xbox 360 controller to do just that! Bio: I have a bachelor's degree in computer science from Michigan Technological University. I work R&D for a major defense contractor and like to hack electronics for fun! Hey Amigurumi! A crochet tutorial Gina Hoang Saturday 5PM Amigurumi are knitted or crocheted stuffed toys. Since I am not a knitter, I will introduce you to the craft of crocheted amigurumi with a hands‐on workshop where you will learn the basics of constructing amigurumi and start on the construction of your very own Notacon doll. This workshop will be most useful to those who have at least basic crochet experience, but as long as you can make a bunch of slip knots and like to craft, I'm willing to try to teach you. Limited supplies will be provided for a fee (at cost), for up to 10 people. Alternatively, feel free to bring your own supplies. Bio: Gina is a self‐taught crocheter who has been working with fiber and fabric since she was in pre‐school. She taught herself to crochet in elementary school because her sister learned to knit, and she wanted to be "different." She then promptly forgot until medical school, when she taught a fellow medical student how to crochet to stay awake in lecture, and has been intermittently crocheting ever since. Be warned, as a self‐taught lefty, her way of crocheting may be a little quirky at times. Teaching about the future: leveraging technology Ralph Hyre Saturday 11AM What does the future hold? Should I be optimistic? Ralph will conduct a workshop/ brainstorming session to help design learning experiences for a "futures studies" curriculum for high school students. Bio: Ralph holds a bachelor's degree in cognitive science from MIT. Prior to college, Ralph was a student in an experimental high school "futurology" program in the late 1970s, at a public school in Southwest Ohio. 6 47 sional (CISSP) in America, Brad has a unique view of reality. He has seen how creative people can benefit from understanding Biomimicry. When he's not working as a computer security penetration tester or teaching security somewhere, he's spreading the word of Biomimicry to any who will listen. Brad has spoken to such diverse groups as Defcon, HIMSS, CSI and Interop. He finds combining dissimilar items to create entirely new entities exciting and expansive. What's a Linux?: Creating & teaching college courses at 24. Mark Stanislav Saturday 6PM Ever wondered how to get into university teaching or what it's like once you jump in? How about if you no older than any of your students? Mark will explore his experiences with teaching at Eastern Michigan University and ITT Technical Institute, going through everything from how to break into teaching, to what it's like to write curriculum, to how to deal with 27 students and 24 computers in your Linux labs. Mark will share not only his opinions and thoughts on the journey, but also give tips to make yours easier. irregardless noizehacking: manic minimalism and cautionary soundscapes 24 hours the girl Saturday 3PM We will perform the music that sometimes sounds like shoegaze or ambient, but does not always fit into just one type. We will do it using a lot of different instruments. some of them will be ones we made ourselves. Every once in a while we will stop making music to explain what we are doing, what we are using, where we got it/how we made it, etc. After the show we will share our toys with our new friends. Bio: 24 hours the girl is a band with two members. We make music that sometimes sounds like shoegaze or ambient, but does not always fit into just one type. We often use sounds that we record in everyday life and use computer programs and musical instruments to arrange and compose them into music. To perform this music, we use normal instruments like electric keyboards and also more unusual things like specially changed toys to make the sounds or control the machines. We want our shows to be interesting to look at so we use videos that are made by a computer. (Our friend Steve Mokris talked about this program at last year's Notacon.) We also like to decorate our instruments. Our songs sometimes have words but they are not like normal pop songs. The main ideas of the songs are about many different things. Some are about feeling helpless and others are about being angry. We want to make friends with other musicians. Bio: Mark Stanislav holds his Bachelor's in Networking and IT Administration and is currently pursuing his Master's in Network Security ‐‐ both from Eastern Michigan University. Mark is a Linux systems administrator for a popular digital promotions company just outside of Detroit by day, and an adjunct lecturer at EMU by night (literally). Mark teaches both the entry‐level and advanced Linux courses at EMU and created the curriculum for both from scratch. Mark's technology interests involve Linux, PHP‐based web development, informa‐ tion security, and Apple products. Mark also runs a security news web site called uncom‐ piled.com and last presented here at NOTACON 2005. Memetic Engineering Dan Zarrella Saturday 2PM How do memes spread online and offline? What can we learn from areas of academic study like urban legends, homeric poems, gossip, and rumors that can be used to engineer contagious ideas? This session will study the science, history and statistics of contagious ideas both online and off. Bio: Dan Zarrella is an award‐winning social, search, and viral marketing scientist and author of the O'Reilly media book "The Social Media Marketing Book". Dan has writ‐ ten extensively about the science of viral marketing, memetics and social communications on his own blog and for a variety of popular industry blogs, including Mash‐ able, CopyBlogger, ReadWriteWeb, Plagiarism Today, ProBlogger, Social Desire, CenterNetworks, Nowsourcing, and SEOScoop. He has been featured in The Twitter Book, Fast Company, The Financial Times, AdAge , NYPost, The Boston Globe, Forbes, Wired, The Wall Street Journal, Mashable and TechCrunch. He was recently awarded Shorty and Semmy awards for social media & viral marketing. 46 Performances CONLANG ‐ a Columbia University student film by Marta Masferrer and Baldvin Kári Presented by Sai Emrys Friday 5PM CONLANG, short for constructed language, is a universal story set in the unique world of conlanging. A comedy about secret crushes, extreme linguistics and the language of love, it tells the story of Carl, 26, an unemployed conlang enthusiast. Even though Carl has no trouble creating new languages, he has a hard time finding the words to express his feelings to Libby, his secret crush. One day, Carl has a chance of becoming president of the Constructed Language Society, a club of people joined by their passion for invented languages. But between battling misguided Esperantists and mastering Klingon, will he be able to share his true feelings with the girl he adores? For more information please visit: www.conlangthemovie.com Won Honorable Mention at the Boston Sci Fi Film Festival and is an Official Selection of the NYC Downtown Short Film Festival. Director: Marta Masferrer Writer/Producer: Baldvin Kari New Media Producer: Connor Kirsch 7 ence attendee, Yes Man Activist, Do It Yourself buff and Phone Loser. You can read more of his exploits at: www.jordanwhite.net Performance Project Ruori Friday 5PM Project ruori performs retro‐futuristic electronic music, making use of old‐fashioned sound synthesis techniques such as the viola, clarinet, the sound chips of the Nintendo Entertainment System and Commodore 64, and a variety of knives and other kitchen devices ‐‐‐ but relying on modern technology for interactive sequencing and interactive visuals using a suite of commodity and homebrew software. Topics which are commonly tangentially addressed include meaninglessness and absurdity, societal reconceptualization of rationalization, the iron cage, the iron curtain, and the glass ceiling. Bio: project ruori is a top‐secret fellowship manufacturing works apparently plagiarized from the communist rubric. We juxtapose concrete music and rock formations, self‐ referential madlibs, snippets from marketing class recitation, sonograms of top‐40 popsongs, and an indeterminate quantity of cordless office supplies to harass eavesdroppers with an overwhelming intellectual scientific proof. (Just like mother used to make.) But, more seriously, the group of people representing project ruori has been performing together around the Midwest and East Coast a few times per year since 1998, and has released a few albums and a peculiar sort of feature‐length film. Build Your Own Interactive Experience Homewreckery: Soft Circuits, HARD‐CORE! Eli Skipp Friday 1PM The integration of electronics into fibers arts and clothing is a revolutionary thing. Until recently clothing has been pretty static ‐‐ styles have changed, trends have continued to push the boundaries of those styles, but for the most part clothing just, you know, covers your nakedness and protects you from the elements. "NO MORE!" say the hackers, "Our clothing must do great things!" Heeding that cry, various people have taken to progressing clothing in endlessly innovative ways. Leah Buechley's Lilypads and associated components have made it simple to include microcontrollers in soft circuits. Conductive fabric has made it easy to create low‐ resistance projects, and conductive thread (with all of its drawbacks) has inspired people to think up new ways to make their clothing blink, beep, and be way more interesting. Bio: Eli Skipp is currently achieving a BFAW at SAIC, an artsy fartsy college in Chicago, IL. Aside from that she is a member and erstwhile director for Pumping Station: One, where she spends as much time as possible collaborating with electrical engineers to learn how to put her arts practices together with POWER. She has eight years of clothing design and sewing experience, including pattern‐making, embroidery, and customization, which has helped her build some cool blinky projects. She eats scrap metal and sawdust for breakfast to maintain a competitive edge, and sometimes teaches internet memes classes and waxes poetic about radiation trivia. Recycled Rainbow Friday Night Recycled Rainbow hosts a configurable environment, inviting Notacon participants to build, change and augment their surroundings as the event unfolds. To participate, simply send your music, sound, images and video to http://recycledrainbow.org/notacon from now until Notacon. Then attend on Friday night to see your content mixed with the other community contributed images and sound. Bio: For eight years Recycled Rainbow has been hacking audio art, space, community, language and culture. For the past three years, Recycled Rainbow has set on dismantling and reassembling the ideas of temporary community to reconfigure the concepts underlying community, space, culture and festivals. Every September for four days, Recycled Rainbow provides a temporary space for participants to engage, create, experience and reconfigure their surroundings, community and selves. If art is the technology of the soul, Recycled Rainbow is the garage workshop. http:// www.recycledrainbow.org Stealing from God! Brad (theNURSE) Smith Friday 1PM Ever get writer's/designer's/developer's block? Ever need a great idea but nothing seems to come? Well, this session shows you a technique that other great minds used to overcome their blocks. Simply steal an idea from God! Yes, great thinkers have stolen ideas for centuries, Da Vinci, Bell, Wright brothers and more, all borrowed ideas that changed the world. Wouldn't you like to learn how to get creativity from Nature? Maybe even change the World? You'll be introduced to the science of Biomimicry (Bio=life, Mimesis=Imitation). You'll understand how Biomimicry has changed the world, how you can use it to help improve your creative process and the 12 simple rules to applying Biomimicry to your problems. The small group experience on using Biomimicry to solve problems reinforces the entire process. Let theNurse lead you through this new science and help you remove that creative block. http:// www.endhack.com/biomimicry.html Bio: As the first Registered Nurse (RN) and Certified Information System Security Profes‐ 8 45 Independent Filmmaking ‐ Bringing Your Ideas from Paper to the Screen, and Everything in Between Emily Schooley Friday 7PM Do you have a burning passion to make something better than the latest Hollywood blockbuster? How about on a fraction of the budget? If so, you might have what it takes to immerse yourself in the world of independent film making. Whether you're ideally creating for love, money, or to be the next internet web‐series sensation, having a good handle on what needs to happen behind the scenes is essential for your success. A dynamic one‐hour presentation covering everything from pre to post‐ production, with plenty of opportunity for open discussion, will be followed by a workshop designed to jump‐start or refine your creative imaginings. Bio: Emily is an actor/writer/photographer/perfectionist, not necessarily in that order. She holds an Honors BA in Dramatic Arts from the University of Waterloo, and draws much of her knowledge from first‐hand experience on set. She has worked on a number of short and full‐length Canadian productions ‐ both in front of and behind the camera in varying roles ‐ including production managing (and writing, casting, producing, costuming, performing in, &c.) a series featuring a cast and crew of over 100 people. "Thinking Outside the Mushroom Kingdom": Homebrew VS Piracy in Video Games Sidepocket Friday Noon The hot subject in today's gamer media is the increasing threat of piracy. Companies losing millions of dollars each year has forced the industry to put a choke hold on anyone who does anything with their systems outside of the norm. What the industry is unaware of is the world of people who find exciting new ways to play with their devices. However with the "piracy scare" causing the industry to lump these DIY explorers with the malicious pirates, how can both users and the industry learn to evolve peacefully? This presentation will look into the past, present and future of both piracy and homebrew; detailing the parasitic relationship between the two as well as highlight the vast differences. A one‐hour presentation on this topic with live examples will be followed by a Half‐Hour round‐ table with attendees expressing their opinions on the issue. Bio: Some people have called Sidepocket a hacker but he prefers the term "Trafficker of Information". Sidepocket has been playing video games since he was in diapers and has been interacting with the Video Game Industry since he was twelve. Various hats that he wears are International Game Developers Association Member, Game Developers Confer‐ 44 Events and Games Opening Ceremonies Featuring Notacon & Blockparty crews Friday 9:30 AM‐ish The founders of Notacon and Blockparty kick off the weekend’s festivities and go over some of the highlighted events, presentations as well as covering some of the event ground rules and procedures. Temporary Hacker Space and Hardware Hacking Hosted by Makers’ Alliance Ongoing Members from many national and international hacker spaces combine their powers and talents to create a temporary hacker space within Notacon. From reverse engineering, to hardware hacking to demo design stop by and learn what hacker spaces are really all about and how you can get involved. Programming and events will be scheduled and posted throughout Notacon. So come on by to learn and create or simply to chill out. Lock Picking Village Presented by Cleveland Locksport Ongoing Lock picking is a safe and fun sport that can be shared by anyone. The Cleveland Locksport Group will be hosting a lock picking room where people can learn how to use lock picks. Several locks will be available to test your skills or learn new techniques. Contests will also occur during the weekend. This event is for demonstration and educational purposes only. FTS Conventures and Notacon do not condone breaking state or federal law. Lockpicking Contest ‐ The Defiant Box Challenge Hosted by Deviant Time TBA So, you think you're skilled at picking open locks? And you've mastered the art of picking out of handcuffs? Well, what do you say about a contest that pits you against both of those challenges simultaneously? We know what you're thinking... "The Gringo Warrior contest last year did that already!" But, there's a twist... In the tradition of the classic 1958 film /The Defiant Ones/ this contest is played by /paired/ teammates... who must tackle the challenge of a series of locks while they are shackled together. The handcuffs come off... but that's the last thing you remove. Can you coordinate your efforts smoothly? Can you reach for your own tools without disturbing your partner's movements? Can you escape in under five minutes without killing 9 each other? The contest will be running in the Lockpick Village area (time TBD) and may be limited to a dozen teams, so email Deviant Ollam to sign up now if you're interested! [email protected] Whose Slide is it Anyway? Hosted by rogueclown Friday 9 PM Picture yourself about to give a presentation in front of hundreds of people... lights shining in your eyes, microphones tuned to amplify your every utterance, video and audio recordings to prove that you in fact did just say that. Imagine that your audience is itching to heckle you or otherwise make your life difficult. Realize you have never before seen the slide show you are about to present on, nor know anything about the topic! Sound like your worst nightmare? NO! This is "Whose Slide is it Anyway?" Borrowed from the Chaos Computer Club’s "PowerPoint Karaoke", and loosely from the show of a similar name, where the points don't matter! Random personalities, presenters, and maybe even YOU (if you are brave enough), will take the stage and have 5 minutes to successfully present a random PowerPoint slide show on a randomly chosen topic. Audience members will vote via boos, hisses, claps, shouts and other utterances. Come for the laughs! Stay for the embarrassment! Game Room Hosted by Jason “Beanalby” Viers Ongoing Returning to Notacon 7 is the gaming room. From console games old and new to board games of all types, we hope the gaming lounge will provide a social gathering place where gamers of all stripes can come relax and play together. Board game demos will be occurring in this space, check back for more details, or visit the game room during the con to find a schedule. Designing the Future of Sex Eleanor Saitta Saturday 8PM Humans use tools, and the tools we use change us. This is true for everything we do, and we're rarely more inventive than where sex is concerned. To understand the future of sex, we need to think like designers, and look at the future of sexual technology. The most basic frontiers of sexual technology are relatively well‐trodden. An IP connected dildo is boring‐‐‐fun to use, and certainly not an exhausted category, but superficial and limited. Let's explore new territory, ask questions, and answer them with design fictions. Playing with the Built City Eleanor Saitta Friday 6PM Architecture and urban planning define the world we interact with. This has many deep and not always obvious effects ‐‐‐ everything from what we can do in public spaces to the kinds of families we can live with. The cities end up with rarely allow us the flexibility and humanity we want. Cities, buildings, infrastructure are heavily politicized systems with embodied power structures on many different levels. We can intervene, alter those structures, and create the spaces we need and want. Architecture is generally the domain of the rich and powerful, but it doesn't have to be ‐‐‐we can intervene and hack the city. In this talk, we'll explore modern urban power structures and look at different ways we as individuals can subvert the city. We'll move outside the design‐culture consumer conversation around architecture and urban futurism, and explore how to change our cities, one brick at a time. Bio: Eleanor Saitta is a designer, artist, hacker, and researcher working at the intersections between mediums ranging from interaction design and architecture to fashion, with an emphasis on the seamless integration of technology into lived experience and the humanity of objects and the built environment. Her work takes a variety of form, from sketches to abstract painting to functional objects, actual clothing, essays, and talks like this one. She lives mostly in New York. Game Workshops There are some awesome board games out there. You might have seen your friends playing them, but never took the time to learn them. Notacon game workshops highlight some of the best, with explanation of the rules and friendly games afterward to help people get the hang of it. Saturday, 12 PM Dominion Rule over your dominion! A deck building card game where the game itself is building your deck. Purchase treasures, victory cards, and kingdom cards as you play the game to build the most powerful deck. Dominion won the Purcase Spiel des Jahres in 2009 (Game of the Year). Saturday, 2 PM Robo Rally Guide your robot around a dangerous factory filled with conveyer belts, lasers, pits, and more. Lay out your program cards to instruct your robot, push your opponents into harm's 10 43 How to Finance a Supercomputer in Three Easy Step Christina "Fabulous" Pei Friday 2PM I want to discuss financial hacking for new and existing hacker spaces, and to attack the myths that have been built up against money and money management. Money is a tool, a means to an end. Just as a laser cutter enables you to cut accurate models to build, careful management of your finances enables you to do what you want, such as getting a supercomputer for your space. Topics I will cover include: organizing a sustainable hacker space in which membership adequately covers overhead expenses (rent, utilities, tools, maintenance), smart long‐term saving to fund cool projects, filing for 501(c)(3) status, fiscal sponsorship, and marketing/PR to raise funds. The presentation will end with a discussion on the future potential of hacker spaces, their role in revolutionizing public education, as well as the importance of creativity in science. Bio: I'm Christina "Fabulous" Pei. I'm a student turned creative turned financial analyst turned math teacher turned hacker non‐ profit organizer, and still going. I teach math in NYC public schools, I create art and fiction, and I travel the world meeting new people and finding new projects to change the world. Along the way, I did finance at BlackRock in NYC, worked with the math pirate of the Uni‐ versity of Chicago on what I can only call "educational hacking", and discovered Chicago's hacker space, Pumping Station: One. This has brought me to the intersection of these hacker spaces sprouting up all over the world, public education, and innovation. Hacking Your Car: Reverse Engineering Protocols, Legalities and the Right to Repair Act Tiffany Rad Friday Noon Car sales are declining and now service on your old car is what's keeping large car manufacturers afloat. When your car needs service, it's becoming difficult for non‐dealer car repair garages to compete with the computers used by licensed dealers. If you do the repair work yourself, it's likely that you will have to break encryption thus triggering a DMCA anti‐circumvention provision or you'll have to do laborious reverse engineering of the car's computer protocols. However, with the Right to Repair Act being currently debated and hotly contested by car manufacturer lobbyists, you might have a choice with aftermarket car computer diagnostic computers without having to take your car to a licensed dealer. This talk will analyze the intellectual property ownership of car computers, anti‐circumvention measures of the DMCA, how to circumvent or break the encryption legally and how the Right to Repair Act will change how you fix your car. Bio: Tiffany Strauchs Rad, MA, MBA, JD, is a lawyer, hacker, and college professor. She has presented privacy and technical research at Black Hat USA, DEFCON, Hackers on Planet Earth, Hacking at Random, and Pumpcon. She also likes cars and hacks them. 42 way, and be the first to touch all the checkpoint flags. Robo Rally and its expansions have won a total of four Origin Awards for outstanding work in the game industry. Rock Band Competition Hosted by Jason “Beanalby” Viers Saturday, 4pm Rock Band 1, Rock Band 2, and 128 downloaded tracks aren't going to play themselves. The Rock Band competition is back again this year! Same rules, bands play 1 song from the list announced at Notacon, awards are given out for the following categories: Highest Score: Simple enough, just get the highest combined score. Harder difficulties have more notes available, long streaks and combined Overdrives push scores into the stratosphere. ** Rockingest Band: Rockingest Band is in the true spirit of Rock Band ‐ having fun and rocking out! Windmills, freestyle vocals, and drumstick twirling are encouraged. The band that impresses the panel of Notacon judges the most will win this award, and crowd reaction will be considered. Show us your inner rock star! ** The band that wins Highest score will NOT be eligible for Rockingest Band, so come compete and have fun, even if you know you're not the best. Best Band Name: In addition, we'll be giving a small prize to the band with the name that amuses us the most, subject to the whims of the Notacon judges. All bands are eligible, including winners of the previous two prizes. Signup sheets will be available in the game room, and players MUST sign up by Saturday at 2pm. You can signup as a full 4‐person band, or as a subset/single person, and we'll do our best to do matchups, with no guarantees (it's best to talk to your fellow Notaconers before‐hand and get a group together). Boss Battle The 4‐headed superbeast known as Team Notacon returns to feast upon the souls of the contestants. The top scoring team will go out of the frying pan, inside the fire as Team Notacon challenges them to one more song. _Additional_ prizes will go to the team if they manage to best the beast! Team Notacon will announce the song at the competition, although hints may be given beforehand. TGIMBOEJ, The Great Internet Migratory Box Of Electronics Junk Saturday 6PM TGIMBOEJ is a progressive lending library of electronic components. This pay‐it‐forward style hardware sharing program, started by Evil Mad Scientist Laboratories, has been going strong for several years and this year NOTACON is going to contribute. The project is somewhere halfway between P2P zip‐archive sharing and a flea market. People, just like you, send and receive USPS flat‐rate boxes filled to the brim with electronic treasures. It arrives full of wonderful (and possibly useless) parts, but you will surely find some inspiration (and 11 components) to keep. THIS IS OUR CHALLENGE TO YOU AS A NOTACON PARTICIPANTS: look through your own piles of electronic junk, such as they are, and find mysterious components that clearly need to be donated to the box before it is passed on. Our goal is to send out over a dozen of these boxes so bring what you have. See http://tgimboej.org/Main_Page for more information specifically on the project. Notacon Trivia Night! Hosted by rogueclown Saturday 10PM Pub trivia nights are great, but haven't you always wished there were a few more questions about the kinds of interests that bring you to Notacon? Congratulations, you're getting your wish! Join your host rogueclown for a fun game of trivia about technology, art, and the hacker world. Teams of up to four people can participate, and the questions in each round will range from easy to head‐scratchingly difficult. Bio: nicolle neulist, otherwise known as rogueclown, is a trivia nut. For every bit of useful knowledge in her brain, there are several bits of randomness that she picked up along the way. This makes her a formidable opponent at Trivial Pursuit as well as at pub trivia, which she has been playing since she was old enough to get into a pub. Since June of 2009, she has been the co‐host of Monday night trivia at Chief O'Neill's, a bar right down the street from her hackerspace, Pumping Station: One. Her favorite nugget of trivia is the fact that Burger World in Beavis and Butt‐Head was named after Big Edna's Burger World in the Weird Al movie UHF. Anything but Ethernet Hosted by Myself Ongoing Too many kids, and a fair share of old farts, think the world runs on cat‐5. It just ain't so! From the first smoke‐signals and drumbeats of prehistory, to modern multi‐gigabit optical links, there's a lot more to communication than just Ethernet frames riding twisted pair. This contest aims to celebrate the long and varied history of communication. Scoring "Bidirectional", aka duplex, aka "real" networks, are those that provide enough bandwidth in both directions to accomplish useful tasks. They must be operational to qualify for judging, and should allow a user to send email, transfer a file, or otherwise do real networky things. Judging criteria are flexible, but speed is not an issue. The "Unidirectional", aka simplex, aka "toy" category is being added to allow homebrew hackers to enter without having to build two of everything. As with the duplex category, WWW.EAESALES.COM simplex entries should actually move data from 12 eyed, bushy tailed, and learning new things every day. She dedicates this talk to all of the fascinating, brilliant, and welcoming people that she has met since then who have helped her realize that the hacker community is home. She is often found at www.rogueclown.net. Flash Hackery Peter Nitsch Saturday 8PM Peter, a self‐professed code art addict, will chronicle his work and shed some light into Adobe's little know research project called 'Alchemy'. With the aid of a browser window, this session will explore the worlds of terminal communication, ASCII art, demoscene, cheese factories, and the iPhone. Bio: Peter has been heavily involved in Flash development for the past 10 years, doing work for top interactive agencies in Toronto. But it is his experimental code work with Action‐ Script that earned his blog the 2009 FITC Best Canadian Developer Website can‐opener. An obsession with retro‐computing and all things textmode gravitated Peter to playing with Alchemy where he has subsequently helped push the boundaries of visual programming and code art in Flash. Games, The Ultimate Meme Vector: or, The Young Polymath's Open Primer Alex Peake Saturday 5PM Would you like to learn everything your curiosity desires and play video games instead of day after day of school‐work‐eat‐tweet‐sleep‐repeat‐die? The ingredients to make this possible are now available off the shelf, and makers can start assembling the solutions humanity needs. Humans struggle with one manufacturing challenge above all others: The manufacturing of minds which we euphemistically call education. Even economically prosperous civilizations that outsource material manufacturing to low‐cost countries or matter compilers will still face the basic problem of educating their youth. Societies used to rely upon strict cultural norms which are no longer applicable or enforceable. Now children have the freedom to prioritize entertainment over education, so they do. Education needs more than a makeover, it needs a revolution. Memetics is the answer, and games are the vector. Swap imaginary pokemons with enriching memes so kids gotta catch em all and video games become a fortified chocolate breakfast cereal for human minds. In this presentation we'll show how memetic learning games work and demo an open platform for making user‐ generated learning games. Bio: Alex is a primerist and corsetier crafting memetic learning games to make education addictively fun and tactical corsets as a sort of cyberpunk girl scout cookie bake sale to kick start funding it. 41 Newbie Neurohacking Ne0nRa1n & Tottenkoph Saturday Noon Have a keen interest in the many flavours of neurohacking, but don't know where to get started? Discover the direction that is right for you and let our understanding and passionate advisers with a proven success record help guide you through the basics on your exciting path to becoming a neurophyte, in 60 minutes or less. Being a neurophyte can offer curious and adaptable individuals an opportunity to try a variety of different ethically complex issues to see where they fit best, all while continuing to build on the skill set that they already have. Move towards your own personal path of self‐discovery though DIY enhancement and let us help you find the satisfaction and confidence that comes from knowing that you are on your way to being the smartest person in the room. Bio: Ne0nRa1n was raised by a coven of nocturnal city attorneys in the then‐unspoiled wilder‐ ness of Northern Ontario, and has since drawn upon the survival skills learned during these early times to thrive in today's burgeoning culture of new technology. After spending her formative years living under the sea, she then made inroads to Cusco, before subsequently traveling to Lemuria, Skull Island, and briefly and most recently a base camp in Mare Va‐ porum on the Moon. She currently splits her time between summers in Moaning Moose, Montana and winters in a research laboratory of indeterminate location. Tottenkoph spends her days completing experiments in exchange for delicious cake, killing hordes of zombies in South Africa, battling terrorists in the streets of Las Vegas, and pro‐ tecting the planet from the Covenant. Hey, Don't Call That Guy A Noob: Toward a More Welcoming Hacker Community Nicolle "rogueclown" Neulist Friday 3PM The hacker community strives to develop and exchange cutting‐ edge ideas. A key component of achieving that goal is continuing to involve new people in the community, since they can add fresh perspectives from which to view any kind of hacking. However, either because of the perception of the hacker community as something secretive or because of nervousness about interacting with people who are supposedly more knowledgeable, it can be a daunting experience for someone new to get involved and stay involved in the community. This talk aims to make people in the hacker community aware of the concerns that people new to it face, and provide concrete steps for building a culture of making new people feel welcomed and valuable. Bio: Nicolle Neulist, otherwise known as rogueclown, is a found‐ ing member of Pumping Station: One, the hackerspace in Chicago. She is an attorney by training, although her heart is into playing with computers and computer networks, and that is where her career is headed as well. Not very long ago, in the spring of 2008, she was making her first tiny steps into the hacker community. Two years later, she's still bright 40 one end to the other, but accomplishing a useful task is not required. Each media type only counts once, though multiple types within a category count separately. More information is in the Notacon wiki. Special Event Ham Radio Station N7C Presented by KC2PIT and W8EDU Ongoing Notacon's ham radio special event station returns as N7C. See the Notacon wiki HamRadio page or visit the station on the third floor for more information or to get involved. The station will run the entire weekend of Notacon. Anyone interested in ham radio, licensed or not, is invited to participate. There will also be an amateur radio license exam beginning at 9:00 AM on Sunday. Walk‐ins are welcome. Notacon Radio Presented by Krnlpanik Ongoing The Notacon Radio project is back for another year. We hit the airwaves on Friday and we don't stop until the ball drops on Closing Ceremonies. This is a great chance to have some fun while you mingle and BS with your fellow Notaconners. We are looking for people who are interested in doing a live (or even pre‐ recorded) show. It can be art or tech themed, or just consist of random thoughts about life and the universe in general‐‐it's entirely up to you! The only caveat is: NO MUSIC. Our goal is 48+ hours of solid Notacon‐interest radio. Questions? Ideas? A burning desire to ramble for an hour about the elegance of the CPU scheduling algorithm for the MULTICS operating system? Please email the Notacon radio station manager at [email protected] and he will be happy to help. Also, check out the website: http://www.notaconradio.org/ Notacon Rant Session: Tell us how it went! Hosted by Froggy Sunday 11 AM‐ish How did your Notacon and Blockparty go? After a full weekend of learning, exploration and partying, relax and wrap up your experience by providing input directly to those who run the event! Without your feedback, it is difficult to find out what worked, what didn’t and what we could improve on for next year so that everyone can get more out of it! We encourage questions and suggestions. What event was the most fun? What presentation made you think the most? Which demo did you think really deserved top honors? Did you learn anything new this year? 13 This event wrap‐up will include a breakdown of Notacon costs and go over some of the numbers that make Notacon happen. Make your voice heard! There will also be written feedback forms available. Blockparty Awards Ceremony Hosted by RaDMan and Jason Scott Sunday Noon After many intense days of competition, including untold hours spent before Blockparty to compose and develop the various compo submissions, find out who is top dog. Come support the artists, musicians and programmers who put in so much hard work into their entries! Many awesome prizes will be awarded. Closing Ceremony & Awards Hosted by Froggy & the Notacon core team Sunday Noon thirty‐ish After four tireless days working the event, and 361 days of planning, Froggy will clutch the podium for dear life and will give a final farewell to give Notacon and Blockparty for 2010. If he is in the mood, he may hand out awards to the remaining Notacon attendees for whatever categories he comes up with at the last minute. Traveled the furthest to get here? Had the funniest hack of Notacon? You name it, he’ll likely think of it… if he’s still awake and sane. Prizes will be handed out at his discretion. Weaponizing Cultural Viruses: A Manual For Engaged Memetic Resistance On The Front Lines Of The Culture Wars Aaron Muszalski Saturday 1PM What does it mean to fight a culture war? How does culture propagate through a population? What is a meme? And why are some cultural memes more virulent than others? As the capitalist corporate monoculture further asserts its global hegemony, it is vital that individuals become more skillful in their resistance to it. In a hyper‐connected world, the most powerful vector of resistance is that of memetics, the core unit of cultural belief. A culture war is, fundamentally, a memetic war. Thus the modern revolutionary must learn to intentionally engineer memes that can not only survive in competition with those of the dominant culture, but thrive. Hackers, already adept at identifying and leveraging vulnerabilities in computer systems, are the ideal candidates to identify and exploit the memetic vulnerabilities of cultural systems. Audio / visual equipment, computers and accessories provided to Notacon courtesy of: http://www.rentech‐solutions.com/ 14 39 The Social‐Engineering Toolkit (SET) ‐ Putting cool back into SE David Kennedy Friday 8PM The Social‐Engineer Toolkit (SET) has become a standard when it comes to social‐engineering attacks and new and innovative ways in attacking the end‐user. This talk will cover SET and its capabilities as well as introduce some new features and a new release. SET combines multiple attack vectors into an easily drivable interface that allows the attacker to perform advanced social‐engineering attacks and compromise the intended host. Metasploit browser exploits, Custom‐built Java Applet attacks, E‐Mail Spear‐Phishing, and much more is all integrated into the toolkit. Don't miss this talk on how to hack the human mind and utilize one of the most powerful social‐engineer tools ever made. Bio: David Kennedy is a security ninja that likes to write code, break things, and develop exploits when he has spare time. Heavily involved with BackTrack and the Social‐Engineer Framework, David continues (and strives) to contribute to a variety of open‐source projects. David has had the privilege in speaking at some of the nations largest conferences including Defcon and Shmoocon. David is the creator of the Social‐Engineer Toolkit, Fast‐Track, has released modules/attacks for Metasploit, and has (responsibly) released a number of public exploits, including attacks that affect some of the largest software vendors in the world. Currently David is a Director and Regional Security for an international Fortune 1000 com‐ pany and is in charge of ensuring that security is maintained in over 60 countries. The Haiku of Security: Complexity through Simplicity Jeff "ghostnomad" Kirsch Friday 8PM You may ask yourself what Japanese poetry and information security have in common. What is more important is not how they are common, but how they can complement each other. Infosec professionals often find themselves struggling with describing complex technology to non‐technical people. Haiku takes a concept and coveys it in a manner that is short and sweet. As IT professionals we need to take the time to understand complex concepts so well we can explain them in the most simplistic manner that still educates. This talk will focus on developing communication skills in ways that we may not always think of, and provide you with some tools that will help you find simplicity in complexity. Bio: Jeff Kirsch is an IT auditor by day and ghostnomad, an infosec geek alter ego, every chance he can get. Always trying to learn new things drives him to find better ways to help others learn about technology. What started as a whimsical project to create Haiku about IT has opened up a new way to learn and research technology both old and new. You can find his daily IT Haiku at www.ghostnomad.com 38 Blockparty Competitions Read this part, it's different this year. For this, the third year of Blockparty, we took a number of looks back, listened to some excellent feedback and reviews, and considered what would be best for the competition. Demo Competitions are a very regimented thing, with a lot of tradition and rules that have been put together over decades. The fact we're tinkering with them means we're stepping in a different direction, and we welcome feedback about this. The goal, in the long run, is to realistically include all manner of machines, operating systems and projects, while trying to leave some of the judgment to the audience in voting. Subsequently, you will see a few big changes: Non‐Windows and Non‐PC competitions in the demo, and an additional "old school" competition. We're also combining what used to be the "streaming" and "old school" music competitions into a single "music" competition, and changing the rules for what "old school music" is. We think this allows people who do any‐ thing but "mainstream" demo coding and music making to be involved in the main competi‐ tions without being relegated to "wild". This will also introduce a level of complexity to the process, but we hope you'll work with us to overcome it. So, on with the rules. Competitions at Blockparty will be demo, oldschool demo, HiRez, textmode, music, oldschool music, photography, and wildcard. All compos will be governed by the general compo rules as well as rules specific to that compo. Our intention is to have a compo only if we have enough entries to justify a true competition, so a compo may be cancelled due to insufficient entries. A minimum of 4 entries make a competition ‐‐ or it's cancelled. All entries submitted to a compo will be published on internet file servers, unless a competi‐ tion is cancelled. Any prizes from cancelled competitions will be joined to other competitions at the discretion of the organizers. Conversely, competitions may be subdivided if there are too many entries. For instance, if there are a large number of demo entries, the compo may be split into a "64K and under" demo compo and a "over 64K" demo compo. Photography must be created by single attendees who also attend the party. Wildcard demos are typically animated short films, or short visual productions. The demos should involve the use of technology in some way. Additional surprise competitions might Undead Labs Cocaine Energy Drink devi‐ever 15 lights and shiny things. Leigh Honeywell is a Jane of many trades. She works at one of the big information security companies while finishing up a degree at the University of Toronto. By night (and some‐ times over lunch) she is a co‐founder and director of HackLab.TO, Toronto's hacker space. She also serves on the board of advisors of the SECtor security conference, is a Google Summer of Code mentor, as well as an avid cyclist, book nerd, and traveler. Tiffany Strauchs Rad, MA, MBA, JD, is a lawyer, hacker, and college professor. She has presented privacy and technical research at Black Hat USA, DEFCON, Hackers on Planet Earth, Hacking at Random, and Pumpcon. She also likes cars and hacks them. Jillian Loslo is a full‐time college student, part‐time everything else currently working on pulling the eject handle and going from mid‐western all‐American girl to globe‐trotting sophisticated executive in 6.1625 semesters. When she's not telling you how to make your kids awesome, she's clicking on random facebook crap and noodling on how to take over the world. happen at Blockparty as opportunity presents itself. If you have any questions about the rules or competitions, please contact the organizers and ask. General Compo Rules Deadline for all entries is 5:00 PM Saturday, April 18th, 2010. Only original, unreleased works may be submitted to a competition. At least one team member or creator of the work must be physically present at the com‐ petition in order to enter. In the case of productions created by a group, any member of the group may serve as a representative. All entries shall be submitted in the form of a ZIP file which contains the file(s) for the competition entry. The ZIP must contain a "README.TXT" containing: 1. The title of the entry 2. The name of the author/group submitting the entry Material governed by copyright (images, music, models, etc.) of a third party may not be included in any entry without a written release permitting the use of the materials in accordance with these rules. Submissions must be made electronically (CD‐ROM, floppy disk, etc.) before the deadline of a competition. Please mark clearly on the media the following information: title, au‐ thor, and group (if applicable). All entries will be made publicly available for unlimited download without fee on internet file servers and web sites. All Notacon attendees are eligible to vote. All competition entries will be qualified by a jury. Jury members will be selected by the Blockparty organizers. Juries reserve the right to disqualify any entry for failure to abide by these rules. A major‐ ity vote of the jury is required to disqualify an entry. Winning entries for each competition are selected by a popular vote point system. The three entries with the highest number of points will be awarded first, second and third place prizes, respectively, in a competition. Points are computed from the rankings on ballots of party guests. In the event of a tie in the number of points, the jury for that competition will break the tie by a majority vote of the jurors. Points are awarded by individual vote of guests and jurors. Each registered guest and juror will cast ballots for 1st, 2nd, 3rd and 4th place in each competition. Jurors may not preside over a competition they have entered. Staff and Management of Blockparty and Notacon may not accept prizes for any competi‐ tion; in the event a staff or management member wins a competition; their prize will shift down to the next winner in order of votes. The staff entrants will be recognized as having placed in the competition, however. The Blockparty organizers reserve the right to cancel any competition for any reason. These rules may be changed without notice, but will be time‐stamped and available at this website: http://www.demoparty.us/competitions.shtml. 16 Malicious PDF Analysis int eighty Friday 5PM This presentation covers the identification, extraction, and analysis of malicious code in PDF files. Your viewer has unpatched vulnerabilities that are being exploited (lol adobe, adobe lol). We will do a brief high‐ level overview followed by a demo with open source tools. Bring a laptop; tools and specimens will be provided. Bio: int eighty is the rapper in Dual Core. A treatise on optoelectronics in art and electronic design. Matt Joyce Saturday 7PM So last year I embarked upon an incredible journey into the world of display technology. From the post apocalyptic surplus stores of the rust belt, to the international nooks and crannies of E‐bay I sought down a large and diverse collection of display components. It began as an educational venture but ended up an obsession. In this presentation I would like to share with you the adventure, and what I learned from it. If you are interested in designing unique art pieces involving electronic displays, or if you are simply a curious engineer, stop by and enjoy the blinkenlights. Bio: Matt Joyce is an original member at NYC Resistor. Matt is also a co‐founder of Make:NYC. He's built some zany stuff in the past, in fact last year one of his projects made it onto the TSA blog twice. You may also remember him from helping to put together the hardware hacking room at Notacon last year. In his spare time Matt automates datacenters for a major financial institution. 37 Surviving the Zombie Apocalypse Tom Eston, Chris Clymer, Matthew Neely, The Confused Greenies Saturday 5PM Outbreaks of new virus such as H1N1 are a disturbing trend in recent medical history. However, the true zombie virus Solanum has caused more serious outbreaks throughout recorded history. In fact, international governments have recently covered up a "strain" of virus similar to H1N1 that was caused by Solanum. Recent reports have indicated that Solanum is being found in more geographic regions in the world then ever before. It's only a matter of time until the real zombie apocalypse is upon us. What will you do if a zombie outbreak takes over your community? How do you defend yourself and your loved ones? How can you properly combat the undead to ensure survival of yourself and the human race? This panel of experts will address these topics and more. In addition, a live zombie specimen captured in the wild will be used for medical analysis during the panel discussion. Bio: Weapons specialist Cpl. Tom Eston, USMC will discuss weapons, defense and attack strategies. Matthew Neely, PhD a world famous chemical physicist will discuss the Solanum virus, mutation and infection as well as recent research on a vaccine. Chris Clymer, MD a top orthopedic surgeon will discuss zombie characteristics such as movement, intelligence, strength and the zombie decomposition problem. Additional resources and support will be provided by the Confused Greenies: ‐ The Greatest, The Loudest, and The Most Pompous commedia dell'arte troupe at Case Western Reserve University. Bots and copper: Milling circuit boards Thomas Fritz Friday 4PM One of the basic technologies of modern gadgets, the printed circuit board, requires expensive equipment, dangerous chemicals, and volumous knowledge ‐ or does it? Milling PCBs is a great way to prototype, and can do surprisingly good quality. Areas covered will be design process, tools, workflow, and achievable results. Bio: Thomas is a lone hacker hermit and a jack‐of‐many. Oldschool Demo Compo The OS/machine must have been commercially sold as a home or business computer. Custom jobs are welcome in the wild competition. The OS should no longer be commercially sold. Please talk to the organizers if you're un‐ Hacking The Future: Weaponizing the Next Generation James Arlen, Leigh Honeywell, Tiffany Rad and Jillian Loslo Saturday 2PM Join this panel of experts who will discuss, debate, enlighten, and do battle on the topic of Hacker Parenting. From a multitude of viewpoints ‐ paternal, maternal, fictive aunt and victim ‐ the methodologies and techniques of applying the hacker mindset to parenting will be discussed. It is expected that the audience will participate as this topic is one on which everyone has an opinion. Maybe it's possible to do great work and develop a generation of people primed to hack the planet and take over. Bio: James Arlen, CISA, is a security consultant most recently engaged as the CISO of a mid‐ market publicly traded financial institution. He has been involved with implementing a practical level of information security in Fortune 500, TSE 100, and major public‐sector corporations for more than a decade. James has a recurring column on Liquidmatrix Secu‐ rity Digest. His areas of interest include organizational change, social engineering, blinky 36 Demo Compo If you need a different machine configuration, please contact the organizers. Maximum size is 16MB (16,777,216 bytes) uncompressed. Maximum run time is 10 minutes. The user must be able to exit the demo at any time when the escape key is pressed. No user input should be required beyond an optional initial configuration dialog. All demo entries must be self contained: Each demo must contain an executable file that launches the demo. Shall not depend upon any data outside of the submitted ZIP file ("data" does not include things like fonts, DLLs, etc., that are part of a standard OS install). Graphics must be generated real‐time, not a simple playback of an off‐line rendering. All entries will be judged on a machine not connected to any network! No entry shall modify any existing file on the disk and any temporary files created as a result of execution shall be deleted when the program ends. No entry shall write to the system registry. DOS demos must be able to run without any special modifications. sure of the status of your OS. If you need a different machine configuration, please contact the organizers. Maximum size is 16MB (16,777,216 bytes) uncompressed. Maximum run time is 10 minutes. The user must be able to exit the demo at any time when the escape key is pressed. No user input should be required beyond an optional initial configuration dialog. All demo entries must be self contained: Each demo must contain an executable file that launches the demo. Shall not depend upon any data outside of the submitted ZIP file ("data" does not include things like fonts, DLLs, etc., that are part of a standard OS install). Graphics must be generated real‐time, not a simple playback of an off‐line rendering. All entries will be judged on a machine not connected to any network! No entry shall modify any existing file on the disk and any temporary files created as a result of execution shall be deleted when the program ends. No entry shall write to the system registry. DOS demos must be able to run without any special modifications. Graphics (HiRez) Compo Maximum display resolution is 1024x768 (1024 pixels wide by 768 tall). Must be saved in the PNG, TIFF or JPEG format (PNG preferred). Entries may be hand‐drawn, rendered or raytraced. "Hand‐drawn" here means drawing the image in a paint program on the computer, not on traditional media and then scan‐ ning. Scanned elements are not allowed. 17 Specify the gamma of your image, preferably in the PNG file, for proper viewing. If you don't know what "gamma" is, then don't worry about it. At least three (3) intermediate "working images" must be supplied, depicting the progres‐ sive steps in creating the final work. The working images must be named "work" followed by a numerical suffix indicating the order of progression from least complete (lowest number) to most complete (highest number). For example; "work‐01.png", "work‐ 02.png" and "work‐03.png". Only one entry per artist may be entered in this category. Conlanging 101 Sai Emrys Friday 3PM Learn why people make languages (aka the art & craft of conlanging), what kinds of conlangs there are, with some notable examples, how one goes about making a language, and participate in creating a new language on the spot Bio: Sai Emrys twice created and taught a semester long class on conlanging at UC Berkeley, founded the nonprofit Language Crea‐ tion Society, ran three Language Creation Conferences, and is co‐ host of the interview series of the Language Creation Society Podcast. His personal conlanging interests are primarily in enge‐ langs, particularly in novel ways of using language, such as non‐ linear writing systems and tactile language. Textmode Compo Maximum size is 80x1000 (80 columns, 1,000 lines). Must be saved in ANSI, ASCII or XBIN format (XBIN preferred). Palette and font modification may be utilized in XBIN. Each image will be displayed on the screen for 30 seconds. ACiD View 6 for Windows will be used to display all entries. At least three (3) "working images" must be supplied, showing intermediate steps in cre‐ ating the final work. The working images must be named "work" followed by a numerical suffix indicating the order of progression from least complete (lowest number) to most complete (highest number). For example, "work1.ans", "work2.ans" and "work3.ans". Only one entry per artist may be entered in this category. Only one entry per artist may be entered in this category. Music Compo Minimum and maximum play times are 1 and 10 minutes long, respectively. For songs longer than 3 minutes, only the first 3 minutes will be played for the purposes of voting. For non‐tracked music, Ogg Vorbis format is preferred. All other songs will be judged based on how they sound in WinAmp 5 with no custom plugins. If you are unsure how your song will sound in WinAmp, consider mixing to OGG (preferred) or MP3 format for judging. Only one entry per musician may be entered in this category. Defense In‐Depth: Penetration starts with a Lack of System Hardening Steve Erdman Saturday 1PM Looking at the exploits and malware that have been discovered and unleashed over the last decade, we will dive into how individuals and companies could have been better prepared for the breaches that happened. We will go over how simple hardening techniques could have turned the tables for these companies. Also for normal end users, we will go into how to protect your own home system from outside threats. We will also go into showing how anti‐virus cannot always defend against attackers and how free software can be better for your system than some paid software. We'll show that every OS can be insecure; just depends on how much rights the end user has and how much they pay attention to what's going on. Bio: Through the years Steve has been a consultant and an employee for companies that range from a few hundred thousand a year in revenue to Fortune 100 Enterprises. Steve currently works as a Senior Security Consultant on the Profiling team at SecureState where he takes part in many client engagements. While at SecureState he has conducted many types of assessments including, Minimum Security Baselines, Firewall Ruleset Reviews, Digital Forensics, Incident Response, Internal and External Penetration Tests, Physical Penetration Assessments, Network Vulnerability Assessments, Web Application Security Assessments, and helped in building security programs for companies. These assessments have been conducted at companies ranging in revenue from one million dollars a year up to Fortune 100 companies. Oldschool Music Minimum and maximum play times are 1 and 10 minutes long, respectively. For songs longer than 3 minutes, only the first 3 minutes will be played for the purposes of voting. "Old School" Music in this context is music generated from commercial (non‐custom) hardware that is no longer manufactured. Examples might include game consoles, keyboards/samplers, toys. You must have this hardware available to play at the event, we can not supply the hard‐ ware. Recordings/mp3s can not be substituted. Only one entry per musician may be entered in this category. 18 35 NoSpex ‐‐ Giving Process Interaction a Visual Context Scott Dunlop Friday 10AM Hackers use abstract terms to describe the interaction between processes in a system. Terminologies like Flow, Actor, Connections and Messages give us a syntactic way to grapple with the exchange of information in systems of increasing complexity. But, when you need to understand a race condition at three in the morning, it becomes a challenge to follow the exchange of information between processes using the lowest common denominator ‐‐ the logfile. NoSpex is a framework for consolidating information from these logfiles and providing a visual context for analysis. The resulting window into your process interaction can be shifted in time, dilated, and uninteresting elements culled using a simple expressions. This presentation will include a visual demonstration of using NoSpex for tracing API calls in a simple application, and merging information from multiple HTTP servers to depict the flow of information through a complicated web application. Bio: Scott Dunlop is a Senior Security Consultant at IOActive, experienced in application assessment and consultation. At IOActive he performs penetration testing, identifies system vulnerabilities, and designs custom security solutions for clients in software development, telecommunications, financial services, and professional services. Previous public works include MOSREF, a secure remote execution framework for penetration testers, and Wasp Lisp, a compact, portable Lisp implementation with strong concurrency features. Photography Compo Maximum display resolution is 1024x768 (1024 pixels wide by 768 tall). Entries can be a larger size than this, but should include a 1028x768 version for display. Must be saved in the PNG, TIFF or JPEG format (PNG preferred). Entries must be taken using a digital or film camera as the source material. Specify the gamma of your image, preferably in the PNG file, for proper viewing. If you don't know what "gamma" is, then don't worry about it. If a model is used, a model release form must be presented to the organizers for an entry to be accepted. Only one entry per artist may be entered in this category. Wildcard Compo The Wildcard Compo is our open wild competition. Entries may be anything from a live performance, pre‐rendered animation, short film, interactive video game, console demo, et cetera. Submission must not run longer than 10 minutes. If you have any questions regarding connecting your device(s) to our projection and/or audio hardware, please contact us in advance. We will not be able to supply special adapters for your device(s). Blockparty Lounge The Blockparty Lounge is a temporary 'neighborhood' for the demoscene. Table space, power, and a geek‐friendly atmosphere are provided for the community, which normally finds itself spread far and wide. Demoscene participants and enthusiasts are invited to make the lounge their base for the weekend. A projector, 600 Watt sound system, and audience seating area facilitate demoscene related workshops and exhibitions. Check the schedule posted near the door for event times. The space was designed and decorated by long‐time demoscene supporter Inspired Chaos (I.C.). I.C. takes pride in his unique lighting displays made from inexpensive and recycled ma‐ terials which also keep electrical power demands to a minimum. He hopes you enjoy the lounge and wishes to thank Notacon and the Blockparty organizers for making it possible. 34 19 Notacon Fun Pages WORD SEARCH Alex Peake Batmud Bawls catfood Cocaine Daily WTF Demoscene Domokun Fark Fat man Froggy Gina Hoang int eighty Juniper Laser Lounge Marc Canter Matt Joyce Memetics Notacon radio nuintari Oldschool Palace Ping Podcast Radman Rentech Skills Speaker Stillman Streaming Tod Detre Tottenkoph Trivia Tyger Solution on page 48 Easy! Hard! Mine's Smaller Than Yours: Nanotechnology and Chemistry in a DIY Setting Sacha De'Angeli Friday 11AM In the past few decades, public opinion of chemistry has changed from a benign and fairly wholesome activity to an inherently suspicious and dangerous one. While chemical experimentation should be approached with a degree of caution, scientific history is filled with important discoveries made by at‐home tinkerers. This talk will explain how to create a functioning lab capable of exploring current research topics such as nanotechnology on a home tinkerer's budget, and how to use that equipment to make materials suitable for use in art and general hacking projects. Bio: Sacha has worked with chemistry as a technician, student, researcher, hobbyist, and entrepreneur for over 14 years. He is currently the president of Pumping Station: One, Chicago's premier hackerspace where he mostly herds cats and hackers. He also runs chemhacker.com where he discusses the intersection between sci‐ ence, art, opera, creativity, and chemistry. Computer Geeks Can Do Humanitarian Work, Too Gina Hoang & Tod Detre Friday 11AM We recently had the experience of doing humanitarian work in Haiti. The demand for a computer geek's skills was higher than either of us expected. We would like to raise awareness that you don't have to be a Doctor to help people in need. We would review our trip, what we did right, what we did wrong, etc. We would want to spark conversation on how others could make their own trip. Bio: Tod is a professional geek who is currently working at the University of Maine at Augusta. Gina is a medical resident at the Maine Dartmouth Family Medicine Residency. U R Doin it Wrong Info Disclosure over P2P Networks Mick Douglas Friday 10AM Brief recap on the P2P data leakage work the PaulDotCom crew has done in the past year. New tools and techniques will be released! Bio: Mick is a white hat hacker who hates the term white hat. He is a member of the Paul‐ DotCom podcast. While he will join in pentests, his passion is network and system defense. Sudoku solutions on page 48 20 33 the latest Oracle patch? How do you convince the CIO that you need funds and people to perform dedicated vulnerability scanning? How do you convince your users that they really shouldn't put that password on their monitor? We'll cover all this and more with a little shouting, a lot of scolding, and some live demonstrations. Anti‐forensics Easy Puzzle Bio: James Arlen is a contributor to Liquidmatrix.org Security Digest, a frequent ranter at secu‐ rity cons, and originator of the term "cyberdouchery." Chris Clymer is a frustrated security professional and co‐host of the Security Justice podcast. Mick Douglas is a P2P seal clubber and co‐host of PaulDotCom Security Weekly podcast. Brandon Knight is a security professional and Notacon organizer, which has nothing to do with this panel being accepted. Honest! Adrian Crenshaw Saturday 11AM This talk will intro the basics of Anti‐forensics, how people hide data and events on their computer for both legitimate and illegitimate reasons. We will cover data carving, disk wiping, encryption, steganography , timestamps, clearing logs and other ways people may attempt to cover their digital tracks. The subject matter should be of interest to many groups, it's "Not about just hiding your stash from the Fuzz.". Bio: Adrian Crenshaw has worked in the IT industry for the last twelve years. He runs the information security website Iron‐ geek.com, which specializes in videos and articles that illustrate how to use various pen‐testing and security tools. Hidden Trust relationships, an exploration Dead Addict Friday 7PM Some time ago I was asked to analyze a very simple dialog box ‐ "Do you trust this application?" I realized that I had no clear concept of what trust was, and I wasn't alone in my ignorance. This talk aims to discuss what trust is and then explore trust relationships that are often times undisclosed, implicate, and codified. I will discuss trust and PKI, online banking and social networking. While I may help the audience understand the impact of the implicate trust relationships, I don't intend on putting you at ease or giving you the tools to feel comfortable about the risks you take online. Bio: Dead Addict has been trusting family, friends, strangers, software, governments, corporations, and hackers at various degrees his entire life. He has worked at many multina‐ tional corporations in various sectors, has spoken at various hacker and security confer‐ ences. He has associated with criminals, hackers, artists, madmen, lawyers, journalists, military folks, criminal justice folks, but generally not politicians. He trusts that you will trust him accordingly. 32 Across 1. Radio amateur 4. Cropped up 9. That girl 12. Past 13. Control 14. A.T.M. need 15. 1010 16. Meter meter? 17. "Bridging the gap be‐ tween ___ and technology" 18. shackles 20. Command 22. Participate in 24. Wanting more 25. House toppers 26. A computer is this on a network 27. Extra 28. Vermin 29. Ain't right? 33. with "only" a type of memory 35. Fighter protection 36. Shout 39. Agreement 40. Sobs 41. These fit into your PC 42. Remove 43. Remove 45. Jump 48. Take advantage of 49. Continues 50. Notable time 51. Speed on a network 52. Candied 53. Mountain ___ Down 1. Cap 2. Gray, in a way 3. Screen 4. Grillers' protections 5. Like a pie, say 6. "ORLY?" critters 7. Visualize 8. Bugs 9. Card suit 10. You're ____ 11. With level, type of posi‐ tion 19. Gridiron official 21. Post‐career 22. Upper appendage 23. Also 24. Have 26. Possessed 28. Computer memory 30. Like some atoms at CERN 31. First syllable of this event 32. Attempt 34. Art stands 35. "You're under ___!" 36. Clean up 37. Potato chip, across the pond 38. Hitchhiker's need these 39. Try out 41. This surrounds your PC 44. Camera data format, perhaps 46. Western state (abbrv.) 47. Kitty's appendage 21 But Content is still King and the need for a monetization model essential ‐ so Marc will tell the tale of the multimedia revolution ‐ which began back in the '80's and was ground to a halt when the dial‐up web come into being. After 15 years of waiting, we're finally seeing multi‐ media come to Wikipedia. So now go count up how much work it's gonna take to update 3+M entries with video, animation, photos, interactive simulations and games, visualizations, maps, 3D environments ‐ you name it ‐ it's all an expression of knowledge and information. Not just text. Who's gonna pay for all this? Well you'll have to come to the presentation to find out! Hard Puzzle Bio: Marc has recently moved to NEO after 21 years in Silicon Valley/SF Bay area ‐ where he started MacroMind, which became Macromedia. Marc is an Oberlin graduate, pre‐TIMARA '80 and has been a software developer ever since. Software is the new rock and roll ‐ has been tattooed onto his cerebral cortex ever since. Why Your Software Project Sucks (and how to make it not suck) catfood Friday 3PM Most software projects suck. They're often ill‐defined, resource‐ deprived, badly managed, and very often not even necessary in the first place. Even the projects that eventually succeed do so with far too much stress and by wearing good people out. This painful and wasteful situation has got to stop. And this presentation will show you how. This presentation is for anyone who has wondered why SMART PEOPLE who WORK REALLY HARD still get stuck on Death March projects. And particularly for anyone who wants to break that cycle and work on cool projects that succeed! Across 1. Cultural virus 5. Metal fastener 9. Scotland Isle 13. Tanks 17. Baals 19. Turned on by 20. Seed coverings 22. International Civil Avia‐ tion Organization 23. "Thinking Outside the Mushroom Kingdom" speaker 22 25. North America's longest running demoparty 27. Deals 28. Vichyssoise vegetables 30. Anurous 31. Two‐player mathemati‐ cal game 32. Marine flier 33. Father 34. Perfect 37. Lash 40. Holds 44. Essen basin 45. Text processing lan‐ guage 47. ___ song 49. Brews teas 51. Foofaraw 52. Wear away 55. Early Apple 57. Caterpillar hairs 58. Choral work 61. Computer storage unit 63. Cooper on the road 65. Screw up 66. Bolster 68. Get ready, for short 69. Buying on the No‐ Bio: catfood has been hacking artlessly since implementing a FORTRAN preprocessor in the Lotus 1‐2‐3 macro language in 1988. Now, he helps software dev teams get projects done faster without burning out. This presentation is based on 22 years of making projects not suck. Social Engineering Security Into Your Business James Arlen, Chris Clymer, Mick Douglas, and Brandon Knight Saturday Noon Finding security vulnerabilities is easy. Getting them remediated is HARD. Many of the real problems in information security are not about technical prowess with packet dumps or disassemblers, they're about exercising the "soft skills" you discarded when entering IT. In this talk the four of us will show how social engineering can be applied not to break into systems, but to secure them. How do you convince your DBAs they really do need to apply 31 Bio: James Arlen, CISA, is a security consultant most recently engaged as the CISO of a mid‐ market publicly traded financial institution. He has been involved with implementing a practical level of information security in Fortune 500, TSE 100, and major public‐sector corporations for more than a decade. James has a recurring column on Liquidmatrix Secu‐ rity Digest. His areas of interest include organizational change, social engineering, blinky lights and shiny things. Hacking 73H 0r3g0n 7r41L for the Apple ][ Melissa Barron Friday 3PM Melissa will talk about her art mod of the Apple ][ game "The Oregon Trail" where she changed all of the text in the game to a blend of L337, chatspeak, and LOLcats grammar. Bio: Melissa is an Apple ][ hacker and enthusiast. "Do You Want To Play A Game?": Game Theory And Simulated Cyber War Angus Blitter Saturday 11AM Modern warfare is more about bandwidth than bombs. Powerful nations boast amazing technical capabilities. However, technological dependent nations develop critical infrastructure that is vulnerable to attack. For a modest investment a properly motivated and capable adversary can disrupt global networks impacting communications, banking, government and media services. Learn how simulated cyber war can educate and entertain. Bio: Angus is the founder of HackSecKlahn a group of like‐minded technologists who believe diversity is good for the species and hackers are a national resource. Old school, grey hat and previ‐ ously plump, Angus still likes to eat, drink and hack. "To hack is not to crack." (Whatever that means). He has a day job but he doesn't talk about it. Building A Digital City Marc Canter Saturday 4PM Creating Jobs by producing on‐line multimedia content and putting that content onto free shared servers with APIs is at the heart of the Digital City project. Marc will explain a new kind of software infrastructure, where dashboard interfaces utilize standardized 'containers' to facilitate distributed friending or access controls. This new software infrastructure provides an open platform for innovation and a 'Citizen Dashboard' frame‐ work ‐ which would be available as free open source. 30 tashop, perhaps 72. Salami choice 74. Fish 76. Pertaining to bees 77. Con in Nashville 80. Video compression standard 82. Small program 85. Assent 86. Use acid 87. Neighbor of Saudi Ara‐ bia 89. Intestines 90. Quick 93. Professional organiza‐ tion 95. Fable writer 97. Light source 98. Kind of cuisine 100. Woodworking groove 102. Linux GUI 103. Electrical letters 104. Aromatic herb 106. Those below 1024 are restricted 109. Agrees 111. Kind of film 113. Amazes 115. Paddle 116. Kind of synthesizer 120. Dress cut 121. Secret meetings 125. "SCADA and ICS for Security Experts" speaker 127. "Hey, Don't Call That Guy A Noob" speaker 129. Away from port 130. Amateur radio service org. 131. Plane blade 132. Biblical mount 133. Old mainframe com‐ pany 134. God of mischief 135. Back talk 136. Dermatologist's con‐ cern Down 1. Fail to see 2. Common menu bar word 3. Way 4. Mrs. Roosevelt 5. Fruit drink 6. It's just over a foot 7. Cattle 8. Strong 9. Punches 10. Modern address 11. Mob scenes 12. Verse consisting of stro‐ phes of 4 tetrametric lines 13. Medicine bottle 14. Land measure 15. Ink, familiarly 16. Some beans 18. Divvy up 21. Bagpipe sounds 24. Diffuse 26. Folds in fabric 29. Saw groove 34. Perspiration 35. 25‐Across competition 36. Notacon participant, perhaps? 38. "You've got mail" co. 39. ABC news program 41. Understand 42. "Flash Hackery" speaker 43. Sun processor architec‐ ture 44. Way off the highway 46. Small town 48. Customized chip 50. Dried up 53. Beyond affordable 54. Always 56. Pygmy buffalo 59. Fencing sword 60. Common cat food flavor 62. Thermosetting polymer 64. Archaic network routers 67. BASIC memory com‐ mand 70. Flakey mineral 71. Bring home the bacon 73. Against 75. Eye layer 77. Combustible pile 78. ___kit 79. As some teas 81. Cubicle fixture 83. Demoscene entrant units 84. Soft mineral 88. Falls asleep 91. Seat holders 92. Clubs 94. Old memory standard 96. Magical cactus 99. Woman who prefers younger men 101. Kind of tradition 103. Plastic 105. More than one 107. Silly persons 108. Missus South of the border 110. Drug agents 112. Phone provider 114. Utah lilies 116. Not fully shut 117. Shuttle organization 118. "You can say that again!" 119. Solder component of yore 120. BBS art standard 122. VAIO maker 123. "___ the night be‐ fore ..." 124. Piqued state 126. "OMG!" 128. Battery backup Solution on page 48 23 Presenter Information SCADA and ICS for Security Experts: How to avoid cyberdouchery James Arlen Saturday 7PM The traditional security industry has somehow decided that they are the white knights who are going to save everyone from the horror of insecure powergrids, pipelines, chemical plants, and cookie factories. Suddenly, every consultant is an expert and every product fixes SCADA. And because they don't know what the hell they're talking about ‐‐ 'fake it till ya make it' doesn't work ‐‐ they're making all of us look stupid. Attendees will gain a practical level of knowledge sufficient to keep them from appearing foolish should they choose to opine on any of the various real issues stemming from Industrial Control or SCADA systems. Attendees will also feel embarrassed for something they've said, empowered to call out charlatans, and much less worried about cyberhackers unleashing cyberattacks which cybercause cyberpipelines and cybermanufacturing plants to cybergonuts and cybertakeovertheplanet using cybercookiesofdeath. 24 29 Sunday, April 18th Palace Workshops Fri 10 A Stillman Guybrush Proce55ed Synaesthesia for fun and profit Fri 1 P State Mick Douglas Smart Phones are a Smart Choice for PenTesting 11 A Making of Notacon 2010 11.5A Notacon Rant Session: Tell us how it went! Fri 9 P Hanna Ralph Hyre Teaching about the future: leveraging technology Blockparty Awards Ceremony Sat 1 P Hanna Sai Emrys Meditation for Hackers 12.5P Events Wrap‐up and Awards 1 P Notacon Closing Ceremonies Sat 3 P State GZPhreak Hacking the Xbox360 controller for WADS! Sat 5 P Hanna Gina Hoang Hey Amigurumi! A crochet tutorial 2 P Forceful ejection from the premises and ungodly amounts of cleanup 12P Memetics Symposium Memes don't exist; tell your friends. Information evolves. Culture programs us. At this year's memetics symposium at Notacon, we're exploring those ideas. Because if advertising, education, and government can control our minds, then why can't we? Performances Fri 5 P East Project Ruori Fri 5 P Hanna Presented by Sam Emrys: CONLANG ‐ a Columbia University student film by Marta Masferrer and Baldvin Kári Fri 8 P Dual Core Fri 9 P Recycled Rainbow Sat 3 P East 24 hours the girl: irregardless noizehacking: manic minimalism and cautionary soundscapes Events 28 Fri 1 P Hanna Sidepocket: Thinking Outside the Mushroom Kingdom Round Table Fri Night FARK Party in the hotel lounge Sat 12 P Allen Dominion Learn and Play Sat 2 P Allen Robo Rally Learn and Play Sat 4 P Allen Rockband Competition Sat 6 PM TGIMBOEJ, The Great Internet Migratory Box Of Electronics Junk Sun 9 A Hanna W8EDU Amateur Radio License Exam Session 25 Friday, April 16th 9.7A 10A Palace West Opening Ceremonies Palace East 12P 1 P Aaron Muszalski Steve Erdman Weaponizing Cultural Viruses: A Manual Defense In‐Depth: Penetration Starts for Engaged memetic Resistance on the with a Lack of System Hardening Front Lines of the Culture Wars 2 P Dan Zarrella Memetic Engineering 3 P 24 hours the girl Melissa Barron Hacking 73H 0r3g0n 7r41L for the Apple ] Irregardless noizehacking: manic mini‐ [ (30 min) malism and cautionary soundscapes Nicolle "rogueclown" Neulist Hey, Don't Call That Guy A Noob: To‐ ward a More Welcoming Hacker Com‐ munity 4 P Marc Canter Building a Digital City BREAK 5 P Tom Eston, Chris Clymer, Matthew Alex Peake Games, the Ultimate Meme Vector: or, Neely, The Confused Greenies The Young Polymath’s Open Primer Surviving the Zombie Apocalypse 6 P Dan Zarrella Memetic Engineering Panel 7 P Matt Joyce James Arlen A treatise on optoelectronics in art and SCADA and ICS for Security Experts: How electronic design to avoid cyberdouchery 8 P Peter Nitsch Flash Hackery 12P 1 P Eli Skipp Homewreckery: Soft Circuits, HARDCORE 2 P Emily Schooley Christina "Fabulous" Pei Independent Filmmaking ‐ Bringing Your How to Finance a Supercomputer in Three Ideas from Paper to the Screen, and Easy Steps Everything in Between 4 P Thomas Fritz Bots and copper: Milling circuit boards 5 P int eighty Malicious PDF Analysis 7 P 8 P Eleanor Saitta Playing with the Built City Dead Addict Hidden Trust relationships, an exploration RR Setup 10P Recycled Rainbow 26 Brad Smith Stealing from God! Project Ruori Performance catfood Why Your Software Project Sucks (and how to make it not suck) Seth Chromick The Past, Present, and Future of Ad‐ vanced Attacks Jeff "ghostnomad" Kirsch David Kennedy The Social‐Engineering Toolkit (SET) ‐ Putting The Haiku of Security: Complexity cool back into SE through Simplicity 9 P Angus Blitter “Do You Want to Play a Game?”: Game Theory and Simulated Cyber War James Arlen, Chris Clymer, Mick Douglas and Brandon Knight Tottenkoph & Ne0nRa1n Social Engineering Security Into Your Busi‐ Newbie Neurohacking ness Sidepocket Tiffany Rad Thinking Outside the Mushroom King‐ Hacking Your Car: Reverse Engineering Proto‐ dom: Homebrew VS Piracy in Video cols, Legalities and the Right to Repair Act Games Palace East Adrian Crenshaw Anti‐forensics Tod Detre & Gina Hoang Sacha DeAngeli Mine's Smaller Than Yours: Nanotechnology Computer Geeks can do humanitarian and Chemistry in a DIY Setting work too 3 P Palace West 11A 11A 6 P Mick Douglas Scott Dunlop U R Doin it Wrong Info Disclosure over P2P NoSpex—Giving Process Interaction a Networks Visual Context Sai Emrys Conlanging 101 Saturday, April 17th 9 P 10P Whose Slide is it Anyway? 11P Blockparty Setup James Arlen, Leigh Honeywell, Tiffany Rad and Jillian Loslo Hacking the Future: Weaponizing the Next Generation BREAK Mark Stanislav What’s a Linux?: Creating & Teaching College Courses at 24 Eleanor Saitta Designing the Future of Sex Dual Core Notacon Trivia Night Blockparty 2010 & Demo Screenings 27