DEF CON One Five CfP in effect!
DEFCON 15 Call For Papers is now officially Open and will close on June 1=
5, 2007.=20
Don't know what DEFCON is? Go to https://www.defcon.org/ and clue up!=20
Papers and presentations are now being accepted for DEFCON 15, the confer=
ence your mother and ISC(2) warned you about. DEFCON will take place at t=
he Riviera in Las Vegas, NV, USA, August 3-5, 2007.=20
Last year, we eliminated speaking tracks, and we received a diverse selec=
tion of submissions. From hacking your car, your brain, and CIA sculpture=
s to hacking the vote, Bluetooth, and DNS hacks. We group presentations b=
y subject and come up with topic areas of interest. It worked out so well=
in the past we are doing it again.=20
What are we looking for then, if we don't have tracks? Were looking for t=
he presentation that you've never seen before and have always wanted to s=
ee. We are looking for the presentation that the attendees wouldn't ask f=
or, but blows their minds when they see it. We want strange demos of Pers=
onal GPS jammers, RFID zappers, and HERF madness. Got a MITM attack again=
st cell phones? We want to see it.=20
Subjects that we have traditionally covered in the past, and will continu=
e to accept include: Trojan development, worms, malware, intelligent agen=
ts, protocol exploits, application security, web security, database hacki=
ng, privacy issues, criminal law, civil law, international law/treaties, =
prosecution perspectives, 802.11X, bluetooth, cellular telephony protocol=
s, privacy, identity theft, identity creation, fraud, social implications=
of technology, media/film presentations, firmware hacking, hardware hack=
ing, embedded systems hacking, smartcard technologies, credit card and fi=
nancial instrument technologies, surveillance, counter-surveillance, UFO'=
s, peer2peer technologies, reputation systems, copyright infringement and=
anti-copyright infringement enforcement technologies, critical infrastru=
cture issues, physical security, social engineering, academic security re=
search, PDA and cell phone security, EMP/HERF weaponry, TEMPEST technolog=
ies, corporate espionage, IDS evasion.=20
What a mouth full! Well you can't say we didn't give you some ideas. This=
list is not intended to limit possible topics, merely to give examples o=
f topics that have interested us in the past, and is in fact the same lis=
t we used last year..=20
Check out https://www.defcon.org/html/defcon-14/dc-14-speakers.html for p=
ast conference presentations to get a complete list of past topics that w=
ere accepted if you want to learn from the past.=20
We are looking for and give preference to: unique research, new tool rele=
ases, =D8 day attacks (with responsible disclosure), highly technical mat=
erial, social commentaries, and ground breaking material of any kind. Wan=
t to screen a new hacking documentary or release research? Consider DEFCO=
N.=20
Speaking Formats:=20
Choose between 12 hundred seconds, 50 minutes, 110 minutes, or a break ou=
t format of a length you determine. We are continuing the Twelve Hundred =
Second Spotlight, which is a shorter presentation (about twenty minutes) =
that doesn't warrant a full 50 or 110 minute talk. The Twelve Hundred Sec=
ond Spotlight is designed for those who don't have enough material for a =
full talk, but still have a valuable contribution to make. This is to ens=
ure that great ideas that can be presented quickly don't fall through the=
cracks merely because they didn't justify a full length talk. Examples i=
nclude research, announcements, group presentations, projects needing vol=
unteers or testers, requests for comments, updates on previously given ta=
lks, quick demonstrations. You get the idea. Presenters will get a speake=
r badge which entitles them to free admittance to DEFCON, but we will be =
unable to pay an Honorarium.=20
Remember being attacked by flying meat? Do you remember thick accented Ge=
rmans trying to convince you to attack critical infrastructure? Do you re=
member extravagant vapor ware releases by a stage filled with posses? We =
do, and sans projectiles of raw meat we want to encourage such shenanigan=
s again this year. We are calling on all "hacker groups" (you know who yo=
u are, and the FBI has a nifty file with your name on it) to present at D=
EFCON, to discuss what you're up to, what your mission is, to discuss any=
upcoming or past projects, and to discuss parties/conferences you are th=
rowing. We do humbly request that all gang warfare be relegated to electr=
onic attacks, and not fall over into meat space.=20
New for DEFCON 15:=20
The second year being at the Riviera has allowed us to make some changes =
to the format from last year. We have more speaking rooms, and because of=
this I want to announce a call for workshops, demos, and mini trainings.=
We have additional small rooms that will enable highly focused demonstra=
tions or workshops. If you want to talk about building a passport cloner =
or a tutorial on developing Metasploit exploits this might be the format =
for you. You tell us how much time you need, and we try to accommodate yo=
u!=20
To submit a speech Complete the Call for Papers Form at: https://www.defc=
on.org/html/defcon-15/dc-15-cfp-form.html and send to talks at defcon dot=
org. You will receive a confirmation within 48 hours of submission.=20
We are going to continue last year's goal of increasing the quality of th=
e talks by screening people and topics. I realize you guys are speaking f=
or basically free, but some talks are better than others. Some people put=
in a bit more effort than others. I want to reward the people who do the=
work by making sure there is room for them.=20
This year we will have two rounds of speaker acceptance. In the first rou=
nd we will fill about half of the schedule before the submission deadline=
, and the remaining half afterwards. This is to encourage people to submi=
t as early as possible and allows attendees to plan on the topics that in=
terest them. If you see the schedule on-line start to fill, do not worry =
if you have not heard from us yet, as we are still in the process of sele=
ction.=20
Barring a disaster of monstrous proportions, speaker selection will be co=
mpleted no later July 1. The sooner you submit the better chance you have=
of the reviewers to give your presentation the full consideration it war=
rants. If you wait until the last minute to submit, you have less of a ch=
ance of being selected.=20
After a completed CFP form is received, speakers will be contacted if the=
re are any questions about their presentations. If your talk is accepted =
you can continue to modify and evolve it up until the last minute, but do=
n't deviate from your accepted presentation. We will mail you with inform=
ation on deadlines for when we need your presentation, to be burnt on the=
CDROM, as well as information for the printed program.=20
Speakers get in to the show free, get paid (AFTER they give a good presen=
tation!), get a coolio badge, and people like you more. Heck, most people=
find it is a great way to meet people or find other people interested in=
their topics. Speakers can opt to forgo their payment and instead receiv=
e three human badges that they can give to their friends, sell to strange=
rs, or hold onto as timeless mementoes. Receiving badges instead of check=
s has been a popular option for those insisting on maintaining their anon=
ymity.=20
Please visit:=20
https://www.defcon.org/ for previous conference archives, information, an=
d speeches. Updated announcements will be posted to news groups, security=
mailing lists and this web site.=20
https://forum.defcon.org/ for a look at all the events and contests being=
planned for DEFCON 15. Join in on the action.=20
https://pics.defcon.org/ to upload all your past DEFCON pictures. We stor=
e the pictures so you don't have to worry about web space. If you have an=
account on the forums, you have an account here.=20
https://www.defcon.org/defconrss.xml for news and announcements surroundi=
ng DEFCON.=20
CFP forms and questions should get mailed to: talks/at/defcon.org
Thanks!
The Dark Tangent