Friday, December 19, 2014

DEF CON: The World's Largest Hacker Convention: Wikipedia

I was researching more about the hacking of Sony online and by accident I found out about DEF CON which appears to be the largest Hacking Convention in the world. So, since this is an interenational attendence, likely some knowledge of what is actually going on might be found from some of the international attendees? also, : 

The term DEF CON comes from the movie WarGames, referencing the U.S. Armed Forces defense readiness condition (DEFCON).

So, in some ways this movie likely inspired many of the attendees in different ways or they can all relate to this movie.

If you haven't seen this movie it is a classic of it's times. It is one of the first movies demonstrating some of the pitfalls of a phone accessed Internet way before the formal internet we use today came about with WWW. and all that. Also, most of what was demonstrated in this movie was fairly accurate. However, I think military firewalls might even then have prevented this kind of thing. But, it still makes a really great movie.

By the way the first documented use of HTTP (the hypertext markup language) was 1991 HTTP V0.9 (1991). The world wide web was first proposed in 1989. So, in some ways Wargames was a movie way ahead of the times.

  1. www.imdb.com/title/tt0086567   Cached
    WarGames . 114 min - Sci-Fi | Thriller - 3 June 1983 (USA) 7.1 . Your rating: ... Dangerous Games; What is your favorite movie featuring computer hacking?
     
    1. en.wikipedia.org/wiki/Hypertext_Transfer_Protocol   Cached
      The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data ...
      • IMAP Internet Message Access Protocol IMAP is a protocol for e-mail retrieval and storage developed by Mark ...
      • List of HTTP Header Fields The header fields are transmitted after the request or response line, which is the first line of a message.
      • Post (Http) In computing, POST is one of many request methods supported by the HTTP protocol used by the World Wide ...
      • Application Protocol An application layer is an abstraction layer that specifies the shared protocols and interface methods ...
    2. en.wikipedia.org/wiki/HTTP_2.0   Cached
      HTTP/2 (originally named HTTP 2.0) is the next planned version of the HTTP network protocol used by the World Wide Web. It is based on SPDY. HTTP/2 is being developed ...
       
      begin partial quote from:
       

      History

      The term hypertext was coined by Ted Nelson in 1965 in the Xanadu Project, which was in turn inspired by Vannevar Bush's vision (1930's) of the microfilm-based information retrieval and management "memex" system described in his essay As We May Think (1945). Tim Berners-Lee and his team are credited with inventing the original HTTP along with HTML and the associated technology for a web server and a text-based web browser. Berners-Lee first proposed the "WorldWideWeb" project in 1989 — now known as the World Wide Web. The first version of the protocol had only one method, namely GET, which would request a page from a server.[4] The response from the server was always an HTML page.[5]
      The first documented version of HTTP was HTTP V0.9 (1991). Dave Raggett led the HTTP Working Group (HTTP WG) in 1995 and wanted to expand the protocol with extended operations, extended negotiation, richer meta-information, tied with a security protocol which became more efficient by adding additional methods and header fields.[6][7] RFC 1945 officially introduced and recognized HTTP V1.0 in 1996.

      end quote.

      begin quote from wikipedia on DEF CON
     

 

DEF CON

From Wikipedia, the free encyclopedia
This article is about the computer security convention. For other uses, see Defcon (disambiguation).
A team participating in a CTF competition at DEFCON 17
A DEFCON 13 "human" badge
DEF CON (also written as DEFCON or Defcon) is one of the world's largest annual hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993.
Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be "cracked." The event consists of several tracks of speakers about computer- and cracking-related subjects, as well as social events and contests in everything from creating the longest Wi-Fi connection and cracking computer systems to who can most effectively cool a beer in the Nevada heat. Other contests include lockpicking, robotics-related contests (discontinued), art, slogan, coffee wars (not currently running), scavenger hunt and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests. It is a hacking competition where teams of crackers attempt to attack and defend computers and networks using certain software and network structures. CTF has been emulated at other cracking conferences as well as in academic and military contexts.
Conference founder Jeff Moss contends that the quality of submitted talks has diminished since DEF CON's inception because security researchers have found companies and government agencies to pay for the research, leaving the researchers less willing to unveil their zero-day vulnerability research "for free" at DEF CON.[1] Additionally, the conference has gone from one track to five and accepting speaker proposals for five times the research lowers the density of "elite" speeches.
Since DEF CON 11, fundraisers have been conducted for the Electronic Frontier Foundation. The first fundraiser was a dunk tank and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DefCon 18 (2010) hosted a new fundraiser called MohawkCon. In 2010, over 10,000 people attended DEF CON 18.
Federal law enforcement agents from the FBI, DoD, United States Postal Inspection Service, and other agencies regularly attend DEF CON.[2][3]
DEF CON was also portrayed in the The X-Files episode "Three of a Kind" featuring an appearance by The Lone Gunmen. DEF CON was portrayed as a United States government-sponsored convention instead of a civilian convention.

History

DEF CON was founded in 1992 by Jeff Moss as a farewell party for his friend and fellow cracker. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his cracker friends to go to Las Vegas with him and have the party with them instead. Cracker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 persons in attendance. The term DEF CON comes from the movie WarGames, referencing the U.S. Armed Forces defense readiness condition (DEFCON). In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEFCON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a telephone keypad, a reference to phone phreakers.[citation needed] DEF CON was planned to be a one-time event, a party for his friend, but he kept getting emails from people encouraging him to host again the next year. After a while, he was convinced to host the event again, and the attendance nearly doubled the second year.[4]
A semi-fictionalized account of DefCon II, "Cyber Christ Meets Lady Luck" written by Winn Schwartau demonstrates some of the early DefCon culture.[5]

Noteworthy incidents

2001

On July 16, 2001, Russian programmer Dmitry Sklyarov was arrested the day after DEF CON for writing software to decrypt Adobe's e-book format.

2005

On July 31, 2005, Cisco used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in the Cisco IOS used on routers.[6]

2007

In August 2007, Michelle Madigan, a reporter for Dateline NBC, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened.[7] A DEF CON source at NBC had tipped off organizers to Madigan's plans.[2]

2008

MIT students Zack Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston T subway.[8] However, the Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, claiming that the students violated the Computer Fraud and Abuse Act (CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares.[9][10]
The court issued a temporary restraining order prohibiting the students from disclosing the material for a period of ten days, despite the fact the material had already been disseminated to DefCon attendees at the start of the show.
In 2008's contest "Race to Zero," contestants submitted a version of given malware which was required to be undetectable by all of the antivirus engines in each round. The contest concept attracted much negative attention.[11][12]

2009

It was reported by WIRED[13] that an ATM kiosk was positioned in the conference center of the Riviera Hotel Casino capturing data from an unknown number of hackers attending the DefCon hacker conference .

2011

Security company HBGary Federal used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference.[14]

2012

The director of the National Security Agency, Keith B. Alexander, gave the keynote speech.[15] During the question and answers session, the first question for Alexander,[15] fielded by Jeff Moss,[16] was "Does the NSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense."[15]
On March 12, 2013, during a United States Senate Select Committee on Intelligence hearing, Senator Ron Wyden quoted the 2012 DEF CON keynote speech and asked Director of National Intelligence James Clapper if the U.S. conducted domestic surveillance; Clapper made statements saying that there was no intentional domestic surveillance.[15] In June 2013 NSA surveillance programs which collected data on US citizens, such as PRISM, had been exposed. Andy Greenberg of Forbes said that NSA officials, including Alexander, in the years 2012 and 2013 "publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable."[15]

2013

On July 11, 2013, Jeff Moss posted a statement,[17] located on the DEF CON blog, titled "Feds, We Need Some Time Apart." It stated that "I think it would be best for everyone involved if the feds call a ‘time-out’ and not attend DEF CON this year."[18] This was the first time in the organization's history that it had asked federal authorities not to attend.[17]
Actor Will Smith visited the convention to study the DEF CON culture for an upcoming movie role.[19]

List of venues and dates

  • DEF CON 1 was held at the Sands Hotel & Casino June 9–11, 1993.
  • DEF CON 2 was held at the Sahara Hotel and Casino July 22–24, 1994.
  • DEF CON 3 was held at the Tropicana Resort & Casino August 4–6, 1995.
  • DEF CON 4 was held at the Monte Carlo Resort and Casino July 26–28, 1996.
  • DEF CON 5 was held at the Aladdin Hotel & Casino July 11–13, 1997.
  • DEF CON 6 was held at the Plaza Hotel & Casino July 31 - August 2, 1998.
  • DEF CON 7 was held at the Alexis Park Resort July 9–11, 1999.
  • DEF CON 8 was held at the Alexis Park Resort July 28–30, 2000.
  • DEF CON 9 was held at the Alexis Park Resort July 13–15, 2001.
  • DEF CON 10 was held at the Alexis Park Resort August 2–4, 2002.
  • DEF CON 11 was held at the Alexis Park Resort August 1–3, 2003.
  • DEF CON 12 was held at the Alexis Park Resort July 30 - August 1, 2004.
  • DEF CON 13 was held at the Alexis Park Resort July 29–31, 2005.
  • DEF CON 14 was held at the Riviera Hotel & Casino August 4–6, 2006.
  • DEF CON 15 was held at the Riviera Hotel & Casino August 3–5, 2007.
  • DEF CON 16 was held at the Riviera Hotel & Casino August 8–10, 2008.
  • DEF CON 17 was held at the Riviera Hotel & Casino July 30 - August 2, 2009.
  • DEF CON 18 was held at the Riviera Hotel & Casino July 30 - August 1, 2010.
  • DEF CON 19 was held at the Rio Hotel & Casino August 4–7, 2011.
  • DEF CON 20 was held at the Rio Hotel & Casino July 26–29, 2012.
  • DEF CON 21 was held at the Rio Hotel & Casino August 1–4, 2013.
  • DEF CON 22 was held at the Rio Hotel & Casino August 7-10, 2014.
  • DEF CON 23 will be at both the Paris Las Vegas Casino and Bally's Las Vegas August 6-9, 2015.

See also

References

  1. HNS. "The Vulnerability Economy". Help Net Security. Retrieved 2008-08-27.
  2. Zetter, Kim (3 August 2007). "Dateline Mole Allegedly at DefCon with Hidden Camera -- Updated: Mole Caught on Tape". Wired Blog Network. Retrieved 2007-08-15. According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about Madigan’s plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to gather intelligence on the latest techniques of hackers.
  3. "DEFCON 15 FAQ's". Retrieved 9 Feb 2011. Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
  4. Jeff Moss (July 30, 2007). The Story of DEFCON. Retrieved 9 Feb 2011.
  5. Winn Schwartau. "Cyber Christ Meets Lady Luck" (PDF). Retrieved 9 Feb 2011.
  6. Lamos, Rob (31 July 2005). "Exploit writers team up to target Cisco routers". Security Focus. Retrieved 2004-07-31.
  7. Cassel, David (4 August 2007). "Transcript: Michelle Madigan's run from Defcon". Tech.Blorge.com. Retrieved 2007-08-15.
  8. Lundin, Leigh (2008-08-17). "Dangerous Ideas". MBTA v DefCon 16. Criminal Brief. Retrieved 2010-10-07.
  9. Jeschke, Rebecca (2008-08-09). "MIT Students Gagged by Federal Court Judge". Press Room. Las Vegas: EFF.
  10. Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology (United States District Court District of Massachusetts). Text
  11. "Race to Zero". Contest concept.
  12. McMillan, Robert (April 2008). "Security Vendors Slam Defcon Virus Contest". IDG News Service.
  13. Malicious ATM Catches Hackers | Threat Level | WIRED
  14. "Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON". Business Security. Retrieved 8/10/2011. Check date values in: |accessdate= (help)
  15. Greenberg, Andy. "Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)." Forbes. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted[...]"
  16. Wagenseil, Paul. "Hackers Don't Believe NSA Chief's Denial of Domestic Spying." (Archive) NBC News. August 1, 2012. Retrieved on June 13, 2013.
  17. Whitney, Lance. "Defcon to feds: 'We need some time apart'." CNET. July 11, 2013. Retrieved on July 12, 2013.
  18. Blue, Violet. "Feds 'not welcome' at DEF CON hacker conference." ZDNet. July 11, 2013. Retrieved on July 11, 2013.
  19. "Will Smith Makes Unexpected Appearance At Defcon Hacker Conference". Retrieved 2013-08-09.

Further reading

External links

Contests
Venues
Multimedia
This page was last modified on 27 August 2014 at 15:09.

end quote from:

  • DEF CON (category Hacker conventions)
    world's largest annual hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993. Many of the attendees at DEF CON
    17 KB (2,166 words) - 15:09, 27 August 2014
     
     
    Another interesting thing is that Darpa started linking all it's large computers in big cities and military bases around the country so all the major important information to keep the country running if a nuclear attack hit one or more cities and took them completely out along with this computer. So, they linked them all in a redundancy setting so each computer had all the information needed to maintain the government if we were attacked by Russia or another country with nukes.
     
    This redundancy equation eventually became the basis of today's servers around the world which is now how all or most computers on the world wide web that use versions of HTTP and TCPIP (Transfer Control protocol Internet Protocol) which is designed to interface a variety of languages used on computers throughout the world interfaced. So, TCPIP is sort of a universal translator for computers around the world.

    My first major in college was computer data processing in 1966 and while in college and after I worked in Business Data Processing on mostly IBM and Univac equipment when everything still was punch cards or accounting tapes converted to punch cards with optical scanners. So, I found this very interesting then. However, because RAM did not exist yet in an economically sound way, all memory was incredibly expensive and only the government and larger companies could afford large amounts of memory until microprocessor chips started to evolve during the 1970s which allowed things like APPLE 1 computer to be designed and built and then the first IBM home computer that was then cloned by various people around the world.

    MY first home computer was a 4K TRS-80 that I bought for 600 dollars in 1978. I didn't buy another one until 1987 when I bought an IBM Clone AT and an Epsom Printer for about $2500 to teach my kids MSDOS which preceded Windows and all the other windows versions throughout the years since.

No comments: