H2K - HOPE (Hackers on Planet Earth)
2000
Update
Introduction
Speakers and Panels
Music
Location
Travel
Registration
Volunteer
Logos
 

Speakers and Panels

Alphabetical Index
"Freedom Downtime"
Becoming the Media - How the Web Is Changing Everything
Being A Good Samaritan Online
Bypassing Modern IDS Products
Counterfeiting IDs and Identity Theft
Cracking the Hacker Myth: A Scientific Study to Find the Real Story Download MP3 Stream RealAudio
Cult of the Dead Cow Extravaganza
Cyber Civil Disobedience
DeCSS and the DMCA - Hackers vs. Corporate America Download MP3 Stream RealAudio
Ethics in Military and Civilian Software Development Download MP3 Stream RealAudio
Ethics in the Hacker/Phreaker Community
GSM and CDMA
The Hacker's Code Download MP3 Stream RealAudio
Hackers and The Media Download MP3 Stream RealAudio
Hackers Of Planet Earth Download MP3 Stream RealAudio
Hacking Consciousness: Back Cover Text
Hacktivism - Terrorism or A New Hope? Download MP3 Stream RealAudio
Hardware & Electronics Q&A Panel Download MP3 Stream RealAudio
Has Anyone Learned ANYTHING? Download MP3 Stream RealAudio
High School Horror Tales Download MP3 Stream RealAudio
How I Got My Own Area Code
Information on the Masses Download MP3 Stream RealAudio
Internet Radio Download MP3 Stream RealAudio
Internet Security Using Open Source Software
The Internet - The View From Overseas
Introduction to Computer Viruses Download MP3 Stream RealAudio
The Jon Johansen Story Download MP3 Stream RealAudio
Keynote: Jello Biafra Download MP3 Stream RealAudio
The King's Mob Open Source Mediamaking Panel Download MP3 Stream RealAudio
The Legal Panel Download MP3 Stream RealAudio
Lockpicking Download MP3 Stream RealAudio
Low Bandwidth Access to the Internet Download MP3 Stream RealAudio
Low Power FM (LPFM) Download MP3 Stream RealAudio
Mock Trial - The MPAA vs. 2600 Download MP3 Stream RealAudio
MTV - How Did It Happen? Download MP3 Stream RealAudio
Napster: A New Beginning or Beginning of the End? Download MP3 Stream RealAudio
Nootropics
Number System Conversion
The Old Timer Panel Download MP3 Stream RealAudio
Parents: Are They Your Enemies?
Pirate Radio 101 Download MP3 Stream RealAudio
RetroComputing Download MP3 Stream RealAudio
The Robotic Graffiti Writer Download MP3 Stream RealAudio
Secrets of the DNC/RNC
Security Through Gaming: The Cyberwar Game
Selling Out: The Pros and Cons of Working for The Man Download MP3 Stream RealAudio
Shortwave Radio - Precursor to the Net
Social Engineering Panel Download MP3 Stream RealAudio
Spy Stuff: Everything You Never Believed But Wanted to Ask About... Download MP3 Stream RealAudio
Telephone Systems of the World
The Web is a Harsh Mistress
Why Hacking NASA is a Stupid Idea


Why Hacking NASA is a Stupid Idea
Friday, 10 am
Paris Suite

For some reason, the National Aeronautics and Space Administration is a favorite hacker target. Hackers, like most people, are fascinated by space travel and, like most technically oriented people, would like to travel into space some day. Hacking NASA's computers is a stupid way to try to "impress" NASA, and only brings the wrath of federal agencies down upon them. If space is really your interest, hear some ideas on how to REALLY go about becoming an astronaut. Hosted by The Cheshire Catalyst, a resident of "The Space Coast" of Florida.


Selling Out: The Pros and Cons of Working for The Man
Friday, 10 am
Main Stage

There's lots of talk in the media about hackers who get straight jobs in the security industry. What does it cost a hacker to get a real job? What are the benefits? What about those nasty intellectual property agreements? Scott Blake runs the RAZOR security research team. He actively recruits and manages hackers for BindView, a publically traded software company. He's defended this to the executive management and the press. In this talk, you'll hear it straight about what you have to give up for the paycheck, as well as what you get to keep.


Secrets of the DNC/RNC
Friday, 11 am
Paris Suite

For the first time, a HOPE conference is taking place just prior to the two major national political conventions. As you can guess, the kinds of security precautions and methods of utilizing technology are subjects that are of great interest to hackers. Learn a thing or two about how the Secret Service plans to control things in Philadelphia and Los Angeles - and how they use and misuse technology. Yes, we've got the frequencies.


Ethics in Military and Civilian Software Development
Friday, 11 am
Main Stage

The quality with which systems are developed for either civilian or military purposes has systemic, infrastructure-wide consequences. What are the ethical considerations present in developing military and civilian software?

Hosted by Sam Nitzberg, Winn Schwartau, and Robert Steele


GSM and CDMA
Friday, 12 noon
Paris Suite

Curious about the next generation of mobile phone technology currently being developed and deployed around the world? These new systems promise higher capacity, megabit-per-second mobile Internet access, and a range of sophisticated services. How does it all work? What kind of mobile phone systems can we expect to see in the near future? A developer from the wireless industry explains what's hype and what's really going to happen with these emerging technologies. Learn about GSM, CDMA, 3G, GPRS and EDGE, WCDMA, cdma2000, wireless location technologies for mobile phones, and Bluetooth.

Hosted by Jason Hillyard


High School Horror Tales
Friday, 12 noon
Main Stage

We've all read the letters from high school kids who have their copies of 2600 seized by the principal or who get suspended or even expelled for using an unauthorized command on one of the classroom computers. Unfortunately, this seems to be the rule, not the exception. Hear from high school kids from around the world who have suffered at the hands of the technologically inept and be shocked at some of the incredible accusations that have been hurled at them. [We are planning to add as many people/stories to this panel as physically possible - contact us soon if you want to take part.]


Counterfeiting IDs and Identity Theft
Friday, 1 pm
Paris Suite

You may be surprised by some of the things Bootleg will tell you about how easy it is to steal someone's identity. Learn some of the techniques used as well as how the government routinely abuses our rights from someone who has experienced it firsthand. Also, the future of electronic crime and what will happen when genetic engineering and quantum theory become realities. Bootleg will also explain his DMV project and how the authorities have tried to shut it down.


MTV - How Did It Happen?
Friday, 1 pm
Main Stage

We all know about the travesty that MTV put out on its "True Life" series last year on the subject of hackers. Hear from an ex-employee of MTV who will reveal what was left out and why, as well as what was whispered in the hallways of Viacom. Hear from some of the other participants in the show as well.

Hosted by tommEE pickles and Weld Pond.


Hacking Consciousness: Back Cover Text
Friday, 2 pm
Paris Suite

What would be the "ultimate hack"? Breaking into the computers of the Pentagon? The CIA? The NSA? How about hacking into the human mind and reverse engineering consciousness itself!

In his new book, Chris McKinstry, a lifelong computer hacker, explores the origin and purpose of human consciousness from a hacker's reverse engineering perspective. Drawing on a wide range of disciplines from computer science and neurobiology to evolutionary psychology and statistics, McKinstry makes the case that consciousness and meaning evolved to help us survive in a socially complex world, and that the same process can be duplicated inside a computer. He discusses both the theory behind and specific implementation details of The MindPixel Digital Mind Modeling Project (http://www.MindPixel.com), an Internet based effort to construct and validate a high-resolution digital model of the average human mind from millions of Internet users worldwide. Through numerous hands on neural network simulations, McKinstry demonstrates how the MindPixel Model can be used as the "Ultimate Training Corpus" to train an artificial neural network into true artificial consciousness.


Hacktivism - Terrorism or A New Hope?
Friday, 2 pm
Main Stage

We've all heard the phrase but what does it mean? Is there such a thing as activism on the net and, if so, how does it work? Learn just how much organization there is - and how much disorganization. Panelists include Veggie from Cult of the Dead Cow, WTO demonstrator and activist Shapeshifter, and Bronc, who has a nation of more than a billion people calling for his head because of some Chinese web sites he... modified.


The Legal Panel
Friday, 3 pm
Main Stage

What is illegal these days? What isn't? Just how many of these crazy laws are being passed that make a great amount of what we do illegal and punishable by more prison time than many violent offenders? Just how bad is this going to get? Find out what country you should be trying to escape to and what new laws are "coming down the pike" with our panel of legal experts and pundits. This is not a panel for the squeamish.

Panelists: Martin Garbus, Ed Hernstadt, Robin Gross.


Internet Security Using Open Source Software
Friday, 3 pm
Paris Suite

Some practical advice on out-of-box Linux security via access control, setting up landmines, etc. Why the future of hacking lies with open source. An introduction to the world of OSS advocacy with regards to security tools and strong encryption.

Hosted by Justin Cheung and Don Marti


Cyber Civil Disobedience
Friday, 4 pm
Paris Suite

Discusses the roots of civil disobedience from the Boston Tea Party to Martin Luther King and how hackers are follow in these footsteps. Beginning with the ideal of hacking as a public service to improve security on the early Internet to more contemporary examples, hackers around the world have used their skills to promote social good. In Bosnia, East Timor, and even the United States hackers have put the best traditions of free speech to work online: to draw attention to human rights abuses, criticize oppressive laws, and fight injustice. This presentation documents the history of hacking to encourage social change and examines the question: "If hacking has proven a non-violent and effective form of civil disobedience, is it protected by the First Amendment?"

Hosted by Dan Orr.


DeCSS and the DMCA - Hackers vs. Corporate America
Friday, 4 pm
Main Stage

There has never been a case like this in the history of the hacker world. For the first time, thanks to the Digital Millennium Copyright Act, it's actually illegal to figure things out and tell people how technology works - if the powers that be decide to keep this knowledge secret. Since hackers throughout the world continue to decrypt, reverse engineer, figure out things, and spread whatever it is they discover to whoever is willing to listen, there is a battle brewing like none we've ever seen. 2600 is only the first of what will likely be many defendants as the corporate/governmental fist continues ever more desperately to try to control the dissemination of information. A look at what DeCSS is, what it's not, and how the DMCA is going to effect each and every one of us.

Hosted by Emmanuel Goldstein, Jon Johansen, Macki.


Becoming the Media - How the Web Is Changing Everything
Friday, 5 pm
Paris Suite

People like Matt Drudge are often held up as examples of how the web has changed the balance of access to the media. However, a much more substantial and organized independent media is beginning to take form. This workshop will explore the concept of an open newswire, allowing independent media organizations and individuals to distribute news reports to a mass audience. Elements of sites such as Slashdot, HNN, 2600, and indymedia.org will be discussed. If you want to get involved in these historical developments, this is a good start. Hosted by Macki and Space Rogue.


Cracking the Hacker Myth: A Scientific Study to Find the Real Story
Friday, 5 pm
Main Stage

In the past, many misunderstood groups in society have reaped the rewards of public backlash due to misinformation propagated by members of the media and authorities. Despite what society has learned from these past cases, history has repeated itself yet again. For at least the last decade, hacker myths have been concocted and propagated by acclaimed experts in the media and authorities in society. What are the undercurrents that are driving this behavior? The Laurentian University Hacker Research Team has been undertaking an independent study to create a balanced view of hackers. They believe that hackerdom is misunderstood and grossly misrepresented to the public. From their study, science may be able to dispel some of these myths and provide the public and organizations with a balanced view regarding hackers in society.


"Freedom Downtime"
Friday, 7 pm
Main Stage

Two years in the making, the 2600 documentary will finally be premiered at H2K on Friday evening, July 14. The film focuses on the hacker culture as well as the efforts to prevent a new major motion picture from defaming Kevin Mitnick during his time in prison. There are interviews with many from the hacker community as well as a cross country adventure as the "Free Kevin" movement kicks into high gear.


Security Through Gaming: The Cyberwar Game
Friday, 10 pm
Main Stage

Security is no game, that's for sure. But by using Gaming techniques, we can learn a whole lot about security and how we all, as a company and a country, might be effected.

The Cyberwar Game will put you directly in the middle of a cyber-disaster and you and your associates have to figure out what the best course of action is. As the scenario unfolds, things just get worse and worse. Think it's easy? Think again. It's fun but it's tough. There are no rightor wrong answers - just intriguing possibilities that many of us have never considered. Winn Schwartau will be our Maestro of Cyberwar, leading us through the interactive and compelling game.

Everyone gets to participate. You may get to role-play a specific person or job function in the Advisory Council. (No acting experience required!) Or you may be a member of a Special Interest Group which challenges the Council every way they turn. No matter how you play, you will have fun - while, the cyberworld around us collapses.

Don't miss this rare opportunity to take part in Cyberwar Gaming. (No you do NOT need to be a technical maven to participate; this is not a bits and bytes session.) There are no slides handed out for this session because that would give everything away! Be surprised.


Low Power FM (LPFM)
Saturday, 10 am
Paris Suite

Have you ever wanted to set up your own radio station? For the first time in 20 years, it's possible to apply to the FCC and be granted a low-power community radio station license. But before you can reach that euphoric goal of "radio by the people, for the people," there are lots of pitfalls and hurdles to cross, not to mention possible legislative problems with the whole process. This informative discussion will go into detail about the history of the LPFM scene along with a discussion about current legislation, loopholes, and possible impacts of Congressional rulings.

Hosted by Pete Tridish and Andrew Yoder.


The Old Timer Panel
Saturday, 10 am
Main Stage

Hard as it may be to believe, there are hackers who have been active for twice as long as many of the H2K attendees have been alive! Quite a bit has changed since the old days - the technology, the laws, the amount of interest (just look around you!) and there are some things that haven't changed at all. Hear some incredible stories from the past and learn a bit about the origins of the hacker culture.

Hosted by Cheshire Catalyst, Captain Crunch, and Bootleg.


Low Bandwidth Access to the Internet
Saturday, 11 am
Paris Suite

A continuation of Cheshire Catalyst's Beyond Hope discussion that will disparage flashy graphics and shockwaved sites in favor of informative text based information content that gives the user the INFORMATION they are looking for, not just glitz.


RetroComputing
Saturday, 11 am
Main Stage

This panel will discuss and explore "obsolete computers" such as TRS-80s and Atari 800s. It will be open to techno-geeks who know everything there is to know and newbies who wish to learn about these interesting systems from long ago. People are urged to bring their old computers (for the retro network table) and a mini-network of old computers will be created. The panel will also be a sort of swap meet for those looking for parts they cannot find in stores.

Hosted by Mr. Ohm, Sam Nitzberg, and THE NIGHTSTALKER


How I Got My Own Area Code
Saturday, 12 noon
Paris Suite

The Cheshire Catalyst has pulled off what HAS to be considered "The Ultimate Hack." He got his OWN area code! Cheshire will explain the process which all started with an upcoming area code split all the way to the first day of service for the new area code in Florida that covers the Countdown Capital of the World - 321. See exciting footage of Governor Jeb Bush placing the first official call into Area Code 321.


Keynote: Jello Biafra
Saturday, 12 noon
Main Stage

Former lead singer of the Dead Kennedys Jello Biafra may appear to have little to do with the world of hackers. But all one has to do is look at the many injustices we've faced over the years and the ominous overtones of what lies ahead - more laws, more crackdowns, more global controls with little or no oversight, and plenty more prisons. There is no better spokesperson for the ongoing fight of the individual vs. the system than Jello. What we in the hacker world are going through extends far beyond the world of computers - the issues of free speech that we're engaged in will have an effect on people everywhere for a very long time to come. By the same token, we must remain aware of what's going on in the rest of the world or we won't see what's coming. We guarantee - Jello WILL wake you up. This is also the first time ever that a presidential candidate has addressed a hacker convention.

Download an MP3 of this talk
Stream RealAudio of this talk


The Hacker's Code
Saturday, 1 pm
Paris Suite

This session will ask audience members to work together on a "Hacker's Code." Is it possible to have a shared code of ethics? Is it desirable? Will this help distinguish hackers from script kiddies from criminals? We will look at some possible examples, including the Hacker's Manifesto, Hippocratic Oath, The Three Laws of Robotics, and others.

Speaker: Greg Newby

Download an MP3 of this talk
Stream RealAudio of this talk
Download RealAudio of this talk


The King's Mob Open Source Mediamaking Panel
Saturday, 1 pm
Main Stage

NYC's Do-it-Yourself new media and movie studio, King's Mob Multimedia, will present a panel discussion on Open Source Mediamaking and how the DiY ethic can shatter major corporations' grasp on independent production and distribution. From DeCSS to the WTO protests, the world is learning that technological convergence means more than a TV that is also a microwave: technology gives us the means to converge people and cultures and to set information free. It's all about empowering voices that wouldn't otherwise be heard. The King's Mob's first release, THREAT, is a DiY movie about kids coming of age in a world of violence and intolerance, recognizing too late that the establishment pits us against one another across lines of race, gender, and privilege. The movie was a four year collaboration between over 200 kids from numerous cultures and lifestyles across five countries. It has since toured skateparks, hip hop clubs, and punk shops from LA to Berlin.


The Robotic Graffiti Writer
Saturday, 2 pm
Main Stage

The Institute for Applied Autonomy (IAA) is a politically motivated robotics collective which develops technologies to both counter existing military/police technologies as well as extend the autonomy of human activists.

The IAA has already completed and tested the Robotic Graffiti Writer (developed in part with funds from RTMark) as well as the propaganda distribution device, Little Brother. Current research includes a street worthy prototype of the GraffitiWriter as well as new innovations in technologies for surveillance of police actions/movements.


Ethics in the Hacker/Phreaker Community
Saturday, 2 pm
Paris Suite

Join us for a panel on hacking and phreaking ethics. Are hacking and phreaking skills a lost art? When is it fair to use your skills, and in what ways? Are hacking and phreaking outdated, now that computers are accessible to nearly everyone, and long distance phone service is inexpensive? What do "white hat" and "black hat" mean, anyway? Is it worth continuing to hack or phreak, even if it means a risk of prison? We'll explore these questions and others.

Hosted by The Prophet


Cult of the Dead Cow Extravaganza
Saturday, 3 pm
Main Stage

The hacker scene's favorite media whores bring you:

A PRESENTATION GUARANTEED TO GENERATE T-SHIRT SALES

You will:

SCRAMBLE to find a seat during the preceding session!

SNIFF as your pants become involuntarily clogged with feces in the heartstopping preshow minutes!

SHUDDER to the fiery propaganda spouted by Grandmaster Ratt!

SWOON when the Deth Vegetable breaks Sabrina Johnson's world gangbang record!

TASTE AND TOUCH your own damn self. We don't want you near us, fool.

The curious will be amused, the devout rewarded, and the fuckable ogled.

As an added bonus, we promise that everyone who attends the cDc presentation and coughs up $25 will receive an official cDc t-shirt. While supplies last. Purchase necessary. Limited time offer. See Veggie for details.

By the way, don't you go expecting another software release this year. We asked Santa and y'all are on the wrong list. Besides, the stuff currently under development is gonna take a while. And it's strictly secret, so don't ask. In fact, forget we even mentioned it.


Shortwave Radio - Precursor to the Net
Saturday, 3 pm
Paris Suite

Nearly a century before the Internet and before any of us were born, shortwave radio was the "information superhighway." Although plenty of interesting communications have moved over to the Internet, shortwave radio is still THE medium for literally millions (if not billions) of people. On shortwave radio, you can hear hundreds of different broadcast stations from around the globe (everything from huge government propaganda machines to tiny, unauthorized broadcasters), "spy numbers" stations, military communications, ship-to-shore radiotelephone calls, drug runners, press services, and clandestine stations operated by revolutionary groups who want to take over a particular country. Learn how to find the interesting stuff.

Hosted by Craig Harkins and Andrew Yoder.


Hardware & Electronics Q&A Panel
Saturday, 4 pm
Paris Suite

Do you have questions about basic electronics, embedded systems, secure hardware design, smart cards, hardware tokens, or wireless and radio technologies? Having a problem reverse engineering your latest flea market find? Are you sick and tired of hearing about software-only related security problems?

Not to worry!

Stop by the Hardware and Electronics Q&A Panel to explore a different form of hacking and interface directly with fellow electronics enthusiasts. The panel will be an open discussion and will attempt to field and answer any related questions. Three hardware hackers, Kingpin, Brian Oblivion, and Javaman, will be on hand. Special guests may appear.


Hackers and The Media
Saturday, 4 pm
Main Stage

Hear straight from the mouths of journalists why hackers seem to always get such bad media exposure. These guys may not be the enemy (then again they might be - you decide) but they will offer some valuable insight into how the media works and how we can make it work to our advantage. So far, MSNBC, ComputerWorld, and Boardwatch are represented.


Napster: A New Beginning or Beginning of the End?
Saturday, 5 pm
Main Stage

We've read the papers and seen the hysteria. Many of us have also been affected by the clogged bandwidth. So what will programs like Napster wind up doing to the Net, the music industry, artists, and the consumer culture? Hear from Professor Siva Vaidhyanathan of New York University, radio personality Lazlow, Jello Biafra, and people in the music business who are feeling the effects of Napster and the Net.


Nootropics
Saturday, 5 pm
Paris Suite

"Nootropics" are chemicals that enhance one's abilities such as memory retention and thought creation. A discussion by Akida and Alex Perez on how they work, side effects, the legalities of such drugs, and where to obtain them. Topics will also include cybernetic spirituality. What does this new age of technology mean for us as spiritual beings? Will the Internet lead to global consciousness or will it end up binding us in spiritual chains? An exploration of different theories. Samples allowable by law will be given out.


Mock Trial - The MPAA vs. 2600
Saturday, 7 pm
Main Stage

When we first scheduled this, our REAL trial wasn't supposed to happen until December. Then things changed and the trial was moved to the DAY AFTER H2K! Well, how could we resist? What better way to go into court Monday morning than to remember what the verdict of our TRUE peers had been the night before? The fun starts Saturday with a two hour courtroom drama in which both sides will be presented as factually as can be managed. "Lawyers" for each side will be selected as will a judge. Email us if you think you're qualified for this - we are only considering people with some legal background and knowledge for these positions. Expert witnesses will also be called to the stand and a jury will be selected who will render a verdict 24 hours later. Probably a lot more exciting and jovial than the real trial which H2K attendees are encouraged to stick around for.


Spy Stuff: Everything You Never Believed But Wanted to Ask About...
Saturday, 10 pm
Main Stage

Robert Steele, former clandestine case officer (spy) and author of "ON INTELLIGENCE: Spies and Secrecy in an Open World", has been described by Bruce Sterling as "about 100 times smarter and 10,000 times as dangerous as the best of the hackers...." Find out why in a free for all discussion about spy stuff, smart nations, dumb governments, and more.


Bypassing Modern IDS Products
Sunday, 10 am
Main Stage

A review of Network, Hostbased, and Honeypot IDS technologies. Techniques will be discussed which attempt to confuse IDS administrators and avoid detection or illicit response. A review of anti-IDS detection techniques (SNI's packet fragmentation, RFP's whisker, loadable kernel mods, etc.) will also be covered.

Hosted by Ron Gula.


The Internet - The View From Overseas
Sunday, 10 am
Paris Suite

Five or six people will be selected from H2K registrants coming from overseas. The discussion will address the following:
1. How "American centric" does the web appear from your country?
2. Whose "domain conventions" does your country follow?
3. Are there things you do in your country you think would be a good idea elsewhere?
4. How slowly do java-script and shockwave load across oceans?
5. How well does Babel Fish and other software translate web pages?

Moderated by Cheshire Catalyst.


Being A Good Samaritan Online
Sunday, 11 am
Paris Suite

The Data and Network Security Council, a UK not for profit campaign group, has been calling for improved online security/privacy protection and has conducted a campaign to privately notify hundreds of sites over weaknesses in key systems (both governmental and ecommerce), along with publicly outing selected sites to the media. Using examples from the last year, Jonathan Wignall will outline some of the responses the council has received, and highlight the differing views of security held in the commercial, governmental and military sectors. A guide on how you can safely warn sites, with obvious security holes, is included.


Telephone Systems of the World
Sunday, 11 am
Main Stage

A discussion of telephone systems from the earliest rotary dial to the modern digital systems. The many differences between Numbering Zone One and the rest of the world. Some of the serious mistakes made in the development of the modern network and likely future problems. Security of networks, scams, politics, and extreme disparities in quality of service and rates charged. Old and modern switching, signaling, and transmission technology. A live demonstration and explanation of the sounds of certain switches and how to identify them. With luck, we'll find some of the earliest equipment still in service and allow the audience to hear if technically possible. An attempt is being made to find recordings and pictures of old systems though these are extremely rare. We welcome any contributions of pictures and/or recordings.

Hosted by Billsf


Information on the Masses
Sunday, 12 noon
Main Stage

How much information is out there on every one of us? Who is able to access it? How much can money really buy? And just how much digging do you really have to do in order to find out the real secrets? An update to the Beyond Hope discussion by world renowned private eye Steve Rambam that will shock, enrage, frighten, and intrigue you.


Introduction to Computer Viruses
Sunday, 12 noon
Paris Suite

This talk covers how virus's work. Bootsector, multi-parti, file infectors, macro, Trojan, and fakes will all be approached in detail. There will be detailed discussions on VBS scripts and what's in the future regarding viruses.

Hosted by Robert J. Lupo


Parents: Are They Your Enemies?
Sunday, 1 pm
Main Stage

A panel of parents in the community discussing how they try to give guidance and set examples for the younger hackers. A look at what it's like from another perspective - did YOU ever wonder what it would be like to have a hacker as a kid? Didn't think so. Learn some of the trials and tribulations parents go through when their offspring wind up in the hacker elite and on the FBI's most wanted list. [Get your parent onto this panel and get free admission!]


Pirate Radio 101
Sunday, 1 pm
Paris Suite

A demonstration and presentation of a portable microradio station providing live, wireless audio transmissions throughout buildings and neighborhoods and around the world via the Internet. Although the revolution will not be televised, this panel discussion will inspire hackers to get involved in our fight against short-sighted, out-of-touch governmental regulatory agencies and the large, powerful corporate puppeteers who control them.

Hosted by Professor Klystron, Mr. E, Ken-Zo, and DJ Anne Animus.


The Jon Johansen Story
Sunday, 2 pm
Main Stage

On January 24, 16-year-old Jon Johansen and his father were both arrested by Norwegian authorities under pressure from the Motion Picture Association of America and the major film studios it represents. The authorities seized his computer, some disks, and a mobile phone. Jon, a member of Masters of Reverse Engineering, was believed to have been responsible for reverse engineering CSS (although this has never been definitively proven) and thus igniting the current controversy that has resulted in 2600 being sued in federal court for publishing the program on its web site. Hear from both Jon Johansen and his father as they tell the story of the raid and arrest which could result in three years in prison.


The Web is a Harsh Mistress
Sunday, 2pm
Paris Suite

Nations that exist in meatspace do so by the virtue of one thing: physical force. Nothing else keeps a nation's physical borders secure (and its populace obedient). On the net, however, the stakes are different. What keeps systems secure? Intelligence, ultimately. Good security systems. Rebellious members are eliminated as fast as their permissions can be changed. For once the pen (or the keyboard) is truly mightier than the sword. There is a "wild west" air about the net, where people do as they please with little fear of swift and merciless reprisal by the de jure rulers. It brings danger, but also an unprecedented freedom. But like the west of old, such freedom will become history without a clear, rational, sane "bill of rights". This talk will consider such a bill; its origins and applications in meatspace, common concerns, issues, and pitfalls, as well as how it can lead us to a true freedom on the net - and quite possibly, a "free luna" here on earth.

Hosted by Bryan Maloney


Number System Conversion
Sunday, 3 pm
Paris Suite

An in depth discussion of the binary, hexadecimal, octal, and decimal number systems and the use of easy-to-remember techniques to convert from one to another. Also, the basics ofbinary, octal and hexadecimal math.

Presented by Don Scott.


Social Engineering Panel
Sunday, 3 pm
Main Stage

Home of the first social engineering panel back in 1994, we continue the tradition this year with more tales of triumph and disaster plus some live telephone antics that should leave you in stitches or put us in cuffs. Panelists are still being rounded up for this one - if you think you're worthy, let us know why.


Internet Radio
Sunday, 4 pm
Paris Suite

While it's true that radio space on the dial is controlled by fewer and fewer people, broadcasting on the net is something that almost anyone can do. Hear from someone who actually does it - how to get started, how to do it right, and how you can make a difference

Hosted by Fearfree and Porkchop


Lockpicking
Sunday, 4 pm
Main Stage

Barry "The Key" is one of Europe's leading experts on locks. In his first presentation in the United States, he will talk about lockpick "sportgroups" that are very popular in Europe. He will also give a demonstration for basic and advanced lockpickers. If his suitcase is not too heavy he will bring some exotic European locks to show.


Hackers Of Planet Earth
Sunday, 5 pm
Main Stage

You thought hacking was an American thing? Think again. There are hackers in every nook and cranny of the globe, from Bosnia to Burundi, and a lot of them are coming to H2K to share information, technique, and adventures. This "meeting of the minds" is what the authorities fear the most. Come join the conspiracy and make friends around the globe.

Hosted by Rop from Holland, Andy from Germany, Cyberjunkie from England.


Has Anyone Learned ANYTHING?
Sunday, 5 pm
Paris Suite

While a select few may have learned how to cope with the issues inherent in the Information Age, the majority have not. A look at current security trends that explores exactly how far corporate America and the government have come in accepting/dealing with computer and information security. Are we any better off now? Have major incidents been an eye-opener to anyone? Are current laws and processes effective? Sadly, the report card is NOT GOOD. Hosted by Rick Forno.