CURRENT
SPEAKER LINE-UP
Watch
for more listings as the number of speakers increases. If
you have a suggestion for someone you would like to see, or
would like to speak at Rubi Con this year please contact Jim
Tantalo at tantalo@rubi-con.org.
Richard
Thieme (www.thiemeworks.com) A
decade ago, he wrote "Computer Applications for
Spirituality: the Transformation of Religious Experience"
but was unable to find a publisher for several years
because, as one editor said, "Only three of you are
interested in this subject." His passion for exploring
the profound impact of computer technology on
institutions and organizations led him to establish
ThiemeWorks in 1993 to pursue a career of professional
speaking, consulting, and writing. Recent
clients include: Firstar Bank; Northwestern Mutual Life
Insurance Co.; Allstate Insurance; the FBI; DefCon IV and
DefCon V computer conventions; and the Black Hat
Briefings. Mr.
Thieme will be delivering the keynote address this year.
The topic: "Hacking and Cycles of Truths, Half-Truths and
Boldfaced Lies." We are always riding a two-edged blade
from the edges to the center of our lives. Out on the
edge, where creativity thrives, it isn't always easy to
distinguish cop from criminal, outlaw from citizen,
white-hat from black-hat hacker. Thieme
has lived for years on the edge and has practical
insights into what it takes to ride that blade. This talk
is about playing chess while the board disappears - the
art and craft of social engineering - and the strategems
of Sun Tzu in a digital world of multiple
mirrors. Tim
Crothers (www.evinci.com) Mr.
Crothers has authored many training materials on Internet
security (seven courses and books on security and
electronic commerce in the last year alone). He
is also a trainer and highly rated international speaker
on the subject of Internet security and e-commerce. He
has spoken on the subject at most of the major Internet
events to date including: Internet World, LA, Spring
1998; Internet World, NY, November 1998; and Comdex,
Chicago, Spring 1998. Mr.
Crothers will be doing two two-hour sessions. "Anatomy of
an Internet Attack: Quality Penetration Testing" will
provide in-depth analysis of a typical Internet attack
using illustrations from actual case studies. Topics
covered include how hackers discover, penetrate, and
control connected systems. It will provide information
needed to design and implement realistic penetration
testing of information security systems. "Components of a
Successful Internet Security Framework" will provide a
useful introduction to the main components of a
successful Internet security architecture including:
policy and procedures, network level security, operating
system level security, application level security, and
Internet level security. TDYC!
(www.tdyc.com) TDYC!
will be doing two sessions. "What it means to be a
hacker" will explain the philosophy and drive behind the
modern computer underground. Peter
Stephenson (www.ens.com) Michael
Ryan (www.ryantechnology.com) Mr.
Ryan will be doing a 60-minute session titled "Hacking
the AS/400, and what the results are." Without giving too
much ammunition to all the evil hackers, he will show how
security really works on an AS/400, and why it is such a
strong security system. The session will discuss common
tricks hackers use to break into AS/400 systems, and how
the system responds. Karl
Mozurkewich (mozu0219@kettering.edu) Jon
Erickson Mr.
Erickson will be giving a 60 minute session titled
"Cryptography and Quantum Computing." The basics of RSA
public-key encryption will be covered, as well as some
factoring methods that have been used in recent years to
try to break RSA, their algorithmic run-time and its
impact on security. (Simpler algorithms will be
explained, while only runtimes of sieve-based algorithms
like Number Field Sieve will be given. If time permits,
perhaps there will be a short discussion on Adi Shamir's
TWINKLE device and it's effect on sieve-based
algorithms). Next, the basics of Quantum Computing will
be explained, and tied into RSA encryption and its
ability to destroy RSA by explaining and demonstrating
Shor's quantum algorithm for factoring the product of two
primes. And to balance it out, Quantum Computing's
ability to bring about more secure cryptography will be
discussed in the phenomenon of Quantum Entanglement, and
its possible implications when used in conjunction with a
one-time pad. Nicholas
Farr (nickfarr@umich.edu) Dark
Cube (darkcube@m-net.arbornet.org) Mr.
Cube will also offer a 60-minute talk on basic telephony.
All you budding phreakers out there, or those who just
want to learn a little about how our phone system works,
should check this out. The
Phantom (www.shadowgovt.net)
A
"prominent American techno-philosopher" (LAN Magazine),
he is in demand as a speaker on the impact of technology
on individuals and organizations, organizational
effectiveness, and change management. His imaginative
explorations illuminate the landscape of the next
century. He helps people connect who they were with who
they are becoming. He also writes professionaly for
various major publications on the subject of technology
and the digital underground.
Chief
Security Engineer for Evinci Inc. He holds several
industry certifications including CNE, MCSE, MCT, and
CIW. He has over sixteen years of experience helping
medium and large companies design, test, audit, install,
configure, and manage networking, electronic commerce,
and security solutions. He has conducted security audits,
security training, and security consulting nationally and
internationally for companies such as: DEC, IBM, Lucent
Technologies, UPS, and Ameritech.
A
world renowned hacker group based in the U.S. Promoter of
such common hacker beliefs as ethical hacking
and the total distribution of information. TDYC! is made
up mostly of talented and resourceful computer
professionals and full-time hackers. They shed light onto
the world and beliefs of hackers, and what it means to be
called one. TDYC! members at Rubi Con 2000: Ivan E. Moore
II (AKA, Reverend Krusty), Political Bullsh*t, and
others.
An
international writer, consultant and lecturer on
large-scale computer networks and information projection.
Mr. Stephenson deals primarily with network planning,
implementation, technology and security. He has written
or co-authored 12 books and several hundred articles in
major national and international trade publications. Mr.
Stephenson has worked in high technology industries since
1965 and in computer communications since the early
1970s.
An
information systems professional with over 17 years
experience in IBM systems, concentrating on AS/400 and
System/3X systems. Mr. Ryan has developed and taught
college level courses in RPG programming and AS/400
operations and has conducted seminars covering a wide
range of AS/400, data communications and Internet topics.
Ryan is the co-author of three books and numerous trade
magazine articles. His latest book, TCP/IP on the
AS/400, is published by 29th Street Press.
Mr.
Mozurkewich will be doing a 60-minute session titled,
"Networking 101: A through introduction to the mechanics
of TCP/IP". He will cover competing networking protocols
such as IPX/SPX and NetBEUI, leading up to IP, and the
OSI model and the layer system. Also explored are common
UNIX tools such as whois, tracerout, and ping, their
functionality and how they actually work. Towards the end
of the session he will discuss some of the common
exploits and weaknesses of IP, such as ICMP, Smurf,
teardrop, and spoofing.
Jon
Erickson was genetically engineered in a secret
underground Japanese laboratory owned by Revlon, Inc.
Ever since PETA took legal action against Revlon for
testing on animals, Revlon lawyers discovered the law
didn't include vat grown human beings. Jon and the other
test subjects were kept in white plastic cages, where all
forms of experimental mascara, cologne, and lipstick were
tested on them. When they were bad, they were sprayed
with the hose. At age 18, Jon escaped his plastic prison
by seducing a female lab technician using a top secret
pheromone cologne being tested on him. He escaped to the
Shibuya district of Tokyo, where he competed on Japanese
game shows until he had enough money to fly to the United
States. There, he stared in a short-lived television
series on The WB, "The A-Team : Back in Action". He
played Kenji Soron, the kung-fu expert stereotype. The
series only ran its pilot and one other episode before it
was canceled. Mr. T just didn't seem to have the same
pull in the 90's as he did in the 80's. After the show's
cancellation, Jon went into a dizzying bender of drugs,
alcohol, and women. Several years later, he awoke crusted
in his own drool and vomit, on top of a pile of books in
the New Orleans public library. He still had an empty
bottle of vodka in one hand, he was wearing someone
else's pants, and the name 'Michelle' and a phone number
were written in magic market on his stomach. He stood up
and staggered out of the library as his senses returned
to him. To his surprise, he found a college diploma in
his back pocket and he seemed to know all sorts of things
about computers, artificial intelligence, cryptography,
number theory, Turing machines, algorithms, and
complexity theory. Also through some strange mix of
experimental cosmetics, Japanese game show induced
electrocution, and narcotic drugs, he found his IQ was
unusually high. So he decided to go easy on the drugs and
alcohol, joined Mensa, and took a job in Michigan. He
still hasn't called her yet.
Mr.
Farr will be doing a 60-minute talk on the advent of the
digital computer. It will mainly cover the early culture
of computing and its snowball effects to the present day.
He will argue that the primary reason for the advent of
the digital computer was failsafe control over all
aspects of calculation...though analog computers (circa
WWII) were far faster, less prone to breakdown, and
easier to troubleshoot and proof, the military sought
computing systems that were easier to control --making
"failsafe control" the dominant aspect of every major
development of digital computing systems ever since. His
talk will bridge the concept of failsafe control to the
failure of failsafe control in EVERY digital system to
the present day.
Mr.
Cube will be doing a 60-minute presentation on Linux.
Intended as a primer for newcomers to the operating
system, he will cover basics of installation and
operation. This is not an exhaustive exploration, only an
introduction.