Category : Recently Uploaded Files
Archive   : DEFCON.ZIP
Filename : DEFCONPR.TXT

 
Output of file : DEFCONPR.TXT contained in archive : DEFCON.ZIP
From [email protected] Jun 25 21:26:24 1995
Date: Sun, 25 Jun 1995 14:20:04 -0700 (PDT)
From: "Christopher E. Stefan"
To: [email protected], [email protected], [email protected],
[email protected], [email protected]
Subject: Version 1.80 DEF CON III Pro Announcement (fwd)

---------- Forwarded message ----------
Date: Tue, 20 Jun 95 13:37:43 +0800
From: [email protected]
Subject: Version 1.80 DEF CON III Pro Announcement

-----BEGIN PGP SIGNED MESSAGE-----


DEF CON III Convention Update #1.80 (06.20.95)
August 4-6th 1995 @ the Tropicana in Las Vegas

XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON III Convention Announcement
XXXXXXxxxxxxXXXXXX X X DEF CON III Convention Announcement
XXXXXxxxxxxxxXXXXXXX X DEF CON III Convention Announcement
XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON III Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON III Convention Announcement
XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON III Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXX DEF CON III Convention Announcement
XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON III Convention Announcement
XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON III Convention Announcement
XXXXXXxxxxxxXXXXXXXXX X DEF CON III Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON III Convention Announcement
XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON III Convention Announcement

This is an initial announcement and invitation to DEF CON III, a
computer convention for people interested in various aspects of computer
culture. The emphasis is on problems caused by rapid computerization of
businesses and the private sector. Illegitimate computer access, fraud,
privacy concerns, and encryption technology will be covered in two days of
talks by respected industry professionals. Special talks by "hackers" will
present conflicting perspectives and allow for mixed round table discussions. This combinations
of both forces in computing today will offer to shed light on ideas that all
too often given only a slanted presentation by the popular media.

WHEN: August 4, 5, 6 - 1995
WHERE: Las Vegas, Nevada at the Tropicana Hotel

Building on the success of DEF CON II, we try to provide information
and speakers in a forum that can't be found at other conferences. People
come to DEF CON for information and for making contacts. We strive to
distinguish this convention from others in that respect.

What's been said about the previous conventions can be found in the New York
Times (July 25, 1994), Business Week (August 1994), Info World, Boardwatch
(October 1994), The National Law Journal.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

The Tropicana has rooms reserved for the convention. Check-in is 3pm,
check-out time is 12 noon. Remember there is an 8% sales tax in Vegas.
Register yearly, only 100 rooms were blocked for sure. After that it is
subject to availability.

65$ Single or Double room, Midweek (Monday - Thursday)
90$ Single or Double room, Weekend (Friday - Sunday)
350$ One-Bedroom Suite (Call for Availability)

The Tropicana, 3801 Las Vegas Blvd. So., Las Vegas, Nevada, 89109
(702) 739-2581 or (800) 468-9494 or (702) 739-2448 (Fax)

Held in three conference rooms at the Tropicana hotel in Las Vegas, DEF CON
will be interesting and informative. There will be presentations by
specialists in their fields, technical discussions, infamous and well known
videos, mini-seminars on specific topics, a cu-see-me video conference
set up on a t1 net connection, and many impromptu contacts to be made.

The Tropicana is located right on the "Strip" with the other three corners of
the street occupied by the MGM Grand (Largest hotel in the world), the
Excalibur, and the Luxor. If you can afford it stay for a couple extra days
and see the sights. There is plenty to do in town if you have never visited.
Comdex does not count as a visit.

COSTS

The price of admission will be 30$ in advance or 40$ at the door.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Friday August 3rd
Registration and getting to know people
Main Convention Room South Pacific Ballrooms

Time Event

10:00 Convention room opens, registration begins.
: Informal demonstrations and getting acquainted through out the day.
:
: Network/video/voice bridge up
:
15:00 BATTLE TECH At Virtual World (Buy tickets in advance or at the con)
: Two hours of total combat! 1/2 Battle Tech, 1/2 Red Planet.
:
18:00 SJG's "Hacker" game with the "Hacker II" expansion. The Mastah'
: Haqah play off for the most elite hacker player. Get your group
: together for the hard-core old-school back-stabbing hack attack
: from hell! There can be only one!
:
24:00 Hacker Jeopardy with Winn Schwartau starts, Round #1
:
02:00 Convention room closes up for the day.

Saturday August 4th
Convention begins 10:00 in South Pacific Ballrooms

Time Event

10:00 Key note speech by ()
: Winn Schwartau - Tempest Videos / Year in Review
: Robert Steele - TBA
: Jim Settle - TBA
: Bruce Schenier - Cryptography
: Curtis Karnow - Legal
: Lewis De Payne - How to hack more professionally
15:00 Lunch/Dinner Break Begins
:
17:00 Evening Sessions Start at 17:00
: Theora and Crew - TBA
: CPSR - Round Table
: EFF - Legal Implications
: Peter Frank - TBA
: Chris Hall - Spy Stuff
21:00 Evening Sessions End at 21:00
:
:
24:00 Hacker Jeopardy with Winn, Round #2, and Final Jeopardy Round.
: "
02:00 Convention room closes up.

Sunday August 5th

Time Event

10:00 Oscar Meyer - How to Hack, or, Toilet Training to Maturity
: Roscoe - How to hack more professionally
: Len Rose - TBA
: Peter Skelly - TBA
: Stepehn Cobb - "Why Hacking Sucks"
: Parmaster - General history of the underground
14:00 Lunch Break Starts at 14:00
:
15:30 Evening Sessions Start at 15:30
: Koresh - TBA
: Susan Thunder - Psychological Subversion of Trusted Systems
: Tagger - Mag Stripe Readers/Writers
: Dead Addict - TBA
18:00 The Convention Ends, Final give aways, awards, and goodbye!

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

SPEAKERS

This is a partial list of speakers for this year. More are being invited
or waiting to make plans. As this list changes further announcements will
be made. This should give you a flavor or what to expect, though.

Two of the Speakers, Susan Thunder and Roscoe both are written about in the
book "Cyberpunks." I suggest you go buy it and read it if you can, it will
give you a better perspective about what they are all about.

[> Bruce Schneier, Author of "Applied Cryptography." TOPIC: Will speak
on issues surrounding cryptography, digital authentication, digital cash,
and will answer questions from the audience.

[> Winn Schwartau, Author of "Information Warfare" and "Terminal Compromise"
is a consultant to government and the private sector regarding enterprise
and national security concerns. TOPICS: "Information Warfare, the year
in review" (Comedic) and "Tempest Attack Videos."

[> Len Rose AKA Terminus. After the legal fiasco Len faced years ago (as
partially chronicled in "The Hacker Crackdown.") this will be his first
chance to speak of his experiences without the threat of having his parole
revoked. TOPIC: TBA

[> Lewis De Payne, aka "Roscoe" TOPIC: Ultra Hacking - Beyond Computers:
How to make your hacking more successful and productive while minimizing
risk. Learn how to adopt a business-like strategy, planning your goals,
focusing your strategy and keeping you out of trouble!

[> Curtis Karnow, former federal prosecutor and attorney focusing on
intellectual property litigation and computer law. TOPIC: Agents in the
telecommunications context, and "smart" software that we 'trust' to do the
Right Thing. The specific issue is legal liability and responsibility for
the actions of intelligent agents, and then spinning off to chat about the
liability for artificial intelligence generally.

[> Robert D. Steele, President of OPEN SOURCE SOLUTIONS, Inc. A former Spy,
Experienced Bureaucrat, Radical Visionary. Tofflers call him the "rival
store" to CIA. Keynote Speaker at HOPE, Workshop at Hac-Tic '93.
TOPIC: TBA

[> The Electronic Frontier Foundation. TOPIC: The EFF will cover current
legal threats privacy and computer information networks.

[> Stephen Cobb. TOPIC: "The Party's Over: Why Hacking Sucks." Stepehen
intends to play "devil's advocate" and suggest that "hacking should not
be tolerated in any shape or form as it serves no useful purpose and is a
menace to society."

[> Jim Settle, ex-FBI computer crime division department head. TOPIC: TBA

[> Oscan Meyer. TOPIC: How to Hack - Toilet Training to Maturity.

[> Peter Skelly. TOPIC: SMS and wide area networking.

[> Tagger. TOPIC: Magnetic stripe card reader-writers and the "Mod-700."

[> Dead Addict. "Too tired for slack." TOPIC: TBA.

[> Theora. TOPIC: "Don't you hate it when that happens?"

[> Karen Coyle, CPSR, and a pannel of friends. TOPIC: TBA.

[> Peter Franck, National Lawyers Guild. TOPIC: TBA.

[> Parmaster, ex-MOD member, General history of the underground.

[> Glenn Campbell, Area 51 and "Dreamland" authority. TOPIC: Q & A, overview
of Governmental activities and stuff.

[> Attidute Adjuster. TOPIC: "Extremely technical machine language
discussion on Polymorphic computer viruses, with a side note on
cryptography uses."

[> Susan "Thunder" of "Cyberpunks" fame. TOPIC: Social Engeneering and
Psychological Subversion of Trusted System.

[> Pete "To much coffee man" Shipley, unix stud. TOPIC: Security audits,
how they are performed and what to look for.

[> Koresh, unix hacker and conspiracy theorist supreme. TOPIC: TBA.

Speakers will be talking Saturday and Sunday, and maybe Friday depending.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

TELEPHONE CONFERENCE BRIDGE (801-855-3326)

For DEF CON III there will be a dial in conference set up. If you are
overseas, or just can't make the convention this year, you can
still get an idea of what is going on and participate. One part of the voice
conference equipment will allow you to listen to the convention room
microphone, another will allow you to ask questions during the Q&A sections
of peoples speeches. A general conversation area will be up so you can chat
with others at the convention, or just others dialed into the bridge.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

BOOTHS and EXHIBITS and SPONSORSHIP and GIVE-AWAYS

There is table space available if you or your company is interested in
showing off or selling your latest product. A separate room will have
tables set up, and are available on a first come first served basis.

There is also room available in the convention program for you or your
company to advertise their latest and greatest. This is also first come,
first served.

If you or your company is interested in sponsoring a speaker you receive
a table and an advertisement in the program.

If you are interested in either table space or advertising or sponsoring a
speaker please contact Phil at (206) 236-6802 and he will provide you with
a package explaining the costs and options available.

DEF CON is also looking for product to give away in the raffle. If your
company wants to donate a few copies of their product to be given away we
will be happy to promote it verbally before it is given away. Software,
hardware, books, magazines, etc. would be examples.

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

MORE DEF CON INFORMATION

The World Wide Web Page is located at: http://www.defcon.org/

FTP Site: ftp.fc.net /pub/defcon

Mailing lists: mail [email protected] with the following statement in the body
of your message: "subscribe dc-announce" This will set you up on the mailing
list and you will receive updated information, information on the other
mailing lists offered, etc. I suggest joining the dc-stuff list just so you
can talk and plan with other people going to the con to coordinate rides,
sharing of rooms, etc.

VOICE OR VOICE MAIL - Planning: 206-453-1006
VOICE OR VOICE MAIL - Advertising: 206-236-6802

FAX: 206-453-9567

E-Mail: [email protected]

Snail Mail: 2709 E. Madison #102, Seattle, WA, 98112

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

INFORMATION ABOUT LAS VEGAS

WWW PAGES about Las Vegas, Hotels, Things to do, etc.

HTTP://www.infi.net:80/vegas/online/
HTTP://www.ocf.berkeley.edu/~iew/index.html
HTTP://www.best.com/~rdc/roger/vegas.html
HTTP://www.intermind.net/las.vegas.on-line/homepage.html

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Previous Convention Items

DEF CON I Tapes (4) include the following speakers:

Curtis Karnow: Legal Implications of failure in complex VR systems.
Ray Kaplan: To Hack or not to Hack, that is not the question.
Gail Thackeray: Search and seizure, the roll of "computer cops," and Q&A
Dead Addict: The future of hacking.
Dark Druid (Busted by Gail Thackeray): Getting raided sucks.
Judi Clark of the CPSR: What you can do the become active in the community.
Dan Farmer: Inherient security problems in networks,and a bit on SATAN.
Dr. Mark Ludwig: Let virii live.

DEF CON II Tapes (10) include the following speakers:

Phillip Zimmermann : Keynote Speaker, PGP.
Gail Thackeray : Response to Mr. Zimmermann and Privacy issues.
Chris Hall : Electronic Surveillance.
Curtis Karnow : Recombinant Culture, Crime in the Digital Network.
Dr. Mark Ludwig : Virus Creation Awards and What to do when the Feds come.
Judi Clark, Mara, Fen and Marianne in a Round Table Discussion.
The Dark Knight : Hacking in the UK
Sara Gordon, Mark Aldrich, Phil Zimmermann: Internet & PGP privacy concerns.
Annaliza (Torquie) : The European Underground scene.
Mark Lottor : Various cellular topics.
Winn Schwartau : HERF guns, Van Eck, Information Warfare
Peter Beruk : The role of the SPA, general Q&A.
Padgett Peterson : Anti-Virus writing, Cleaning up other peoples messes.
The Jackal : A basic radio overview with Q&A.
Artimage : Underground spoof and give aways.
Stephen Dunifer : Radio Free Berkeley and pirate media.
Damien Thorn : Random Cell information from the late night tech talks.

Stuff is for sale from DEF CON I and II in case you are interested. From the
first year we have audio tapes (4 90 minute tapes) for $20 and the second
year (10 90 minute tapes) for $30. Tee Shirts are still availabe from last
year for $20, they are white and long sleeve.

SHIPPING : Please include 3.00 for priority shipping.

END ANNOUNCEMENT ------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCzAwUBL+bl7rGddDV5azd9AQHFmwTtG8gjjpxdy5SgbVlljfP3PK9UCVyGFP/s
RmqThI6ku1X60RoeqAnJS77kUhFjRO7v1W9DC+ozcXIQtXuJM8tHIXsYnit/yttC
YcRbXleiSaxF9nbxg5HBHwjdXXsGOSW4AxW6Oy4p/hcJDYLrikNlFBKiRXrhDt5f
n6QGhZhSqCR3fqLHqC0LzVsYO6iwbMPYUYu5VZjhRlw6yC0Lkx4=
=g0wH
-----END PGP SIGNATURE-----



  3 Responses to “Category : Recently Uploaded Files
Archive   : DEFCON.ZIP
Filename : DEFCONPR.TXT

  1. Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!

  2. This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.

  3. But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: http://www.os2museum.com/wp/mtswslnk/