Watch for more listings as the number of speakers increases. If you have a suggestion for someone you would like to see, or would like to speak at Rubi Con this year please contact Jim Tantalo at

Richard Thieme (

A "prominent American techno-philosopher" (LAN Magazine), he is in demand as a speaker on the impact of technology on individuals and organizations, organizational effectiveness, and change management. His imaginative explorations illuminate the landscape of the next century. He helps people connect who they were with who they are becoming. He also writes professionaly for various major publications on the subject of technology and the digital underground.

A decade ago, he wrote "Computer Applications for Spirituality: the Transformation of Religious Experience" but was unable to find a publisher for several years because, as one editor said, "Only three of you are interested in this subject." His passion for exploring the profound impact of computer technology on institutions and organizations led him to establish ThiemeWorks in 1993 to pursue a career of professional speaking, consulting, and writing.

Recent clients include: Firstar Bank; Northwestern Mutual Life Insurance Co.; Allstate Insurance; the FBI; DefCon IV and DefCon V computer conventions; and the Black Hat Briefings.

Mr. Thieme will be delivering the keynote address this year. The topic: "Hacking and Cycles of Truths, Half-Truths and Boldfaced Lies." We are always riding a two-edged blade from the edges to the center of our lives. Out on the edge, where creativity thrives, it isn't always easy to distinguish cop from criminal, outlaw from citizen, white-hat from black-hat hacker.

Thieme has lived for years on the edge and has practical insights into what it takes to ride that blade. This talk is about playing chess while the board disappears - the art and craft of social engineering - and the strategems of Sun Tzu in a digital world of multiple mirrors.


Tim Crothers (

Chief Security Engineer for Evinci Inc. He holds several industry certifications including CNE, MCSE, MCT, and CIW. He has over sixteen years of experience helping medium and large companies design, test, audit, install, configure, and manage networking, electronic commerce, and security solutions. He has conducted security audits, security training, and security consulting nationally and internationally for companies such as: DEC, IBM, Lucent Technologies, UPS, and Ameritech.

Mr. Crothers has authored many training materials on Internet security (seven courses and books on security and electronic commerce in the last year alone).

He is also a trainer and highly rated international speaker on the subject of Internet security and e-commerce. He has spoken on the subject at most of the major Internet events to date including: Internet World, LA, Spring 1998; Internet World, NY, November 1998; and Comdex, Chicago, Spring 1998.

Mr. Crothers will be doing two two-hour sessions. "Anatomy of an Internet Attack: Quality Penetration Testing" will provide in-depth analysis of a typical Internet attack using illustrations from actual case studies. Topics covered include how hackers discover, penetrate, and control connected systems. It will provide information needed to design and implement realistic penetration testing of information security systems. "Components of a Successful Internet Security Framework" will provide a useful introduction to the main components of a successful Internet security architecture including: policy and procedures, network level security, operating system level security, application level security, and Internet level security.


A world renowned hacker group based in the U.S. Promoter of such common hacker beliefs as “ethical hacking” and the total distribution of information. TDYC! is made up mostly of talented and resourceful computer professionals and full-time hackers. They shed light onto the world and beliefs of hackers, and what it means to be called one. TDYC! members at Rubi Con 2000: Ivan E. Moore II (AKA, Reverend Krusty), Political Bullsh*t, and others.

TDYC! will be doing two sessions. "What it means to be a hacker" will explain the philosophy and drive behind the modern computer underground.

Peter Stephenson (

An international writer, consultant and lecturer on large-scale computer networks and information projection. Mr. Stephenson deals primarily with network planning, implementation, technology and security. He has written or co-authored 12 books and several hundred articles in major national and international trade publications. Mr. Stephenson has worked in high technology industries since 1965 and in computer communications since the early 1970s.

Michael Ryan (

An information systems professional with over 17 years experience in IBM systems, concentrating on AS/400 and System/3X systems. Mr. Ryan has developed and taught college level courses in RPG programming and AS/400 operations and has conducted seminars covering a wide range of AS/400, data communications and Internet topics. Ryan is the co-author of three books and numerous trade magazine articles. His latest book, “TCP/IP on the AS/400,” is published by 29th Street Press.

Mr. Ryan will be doing a 60-minute session titled "Hacking the AS/400, and what the results are." Without giving too much ammunition to all the evil hackers, he will show how security really works on an AS/400, and why it is such a strong security system. The session will discuss common tricks hackers use to break into AS/400 systems, and how the system responds.

Karl Mozurkewich (

Mr. Mozurkewich will be doing a 60-minute session titled, "Networking 101: A through introduction to the mechanics of TCP/IP". He will cover competing networking protocols such as IPX/SPX and NetBEUI, leading up to IP, and the OSI model and the layer system. Also explored are common UNIX tools such as whois, tracerout, and ping, their functionality and how they actually work. Towards the end of the session he will discuss some of the common exploits and weaknesses of IP, such as ICMP, Smurf, teardrop, and spoofing.

Jon Erickson

Jon Erickson was genetically engineered in a secret underground Japanese laboratory owned by Revlon, Inc. Ever since PETA took legal action against Revlon for testing on animals, Revlon lawyers discovered the law didn't include vat grown human beings. Jon and the other test subjects were kept in white plastic cages, where all forms of experimental mascara, cologne, and lipstick were tested on them. When they were bad, they were sprayed with the hose. At age 18, Jon escaped his plastic prison by seducing a female lab technician using a top secret pheromone cologne being tested on him. He escaped to the Shibuya district of Tokyo, where he competed on Japanese game shows until he had enough money to fly to the United States. There, he stared in a short-lived television series on The WB, "The A-Team : Back in Action". He played Kenji Soron, the kung-fu expert stereotype. The series only ran its pilot and one other episode before it was canceled. Mr. T just didn't seem to have the same pull in the 90's as he did in the 80's. After the show's cancellation, Jon went into a dizzying bender of drugs, alcohol, and women. Several years later, he awoke crusted in his own drool and vomit, on top of a pile of books in the New Orleans public library. He still had an empty bottle of vodka in one hand, he was wearing someone else's pants, and the name 'Michelle' and a phone number were written in magic market on his stomach. He stood up and staggered out of the library as his senses returned to him. To his surprise, he found a college diploma in his back pocket and he seemed to know all sorts of things about computers, artificial intelligence, cryptography, number theory, Turing machines, algorithms, and complexity theory. Also through some strange mix of experimental cosmetics, Japanese game show induced electrocution, and narcotic drugs, he found his IQ was unusually high. So he decided to go easy on the drugs and alcohol, joined Mensa, and took a job in Michigan. He still hasn't called her yet.

Mr. Erickson will be giving a 60 minute session titled "Cryptography and Quantum Computing." The basics of RSA public-key encryption will be covered, as well as some factoring methods that have been used in recent years to try to break RSA, their algorithmic run-time and its impact on security. (Simpler algorithms will be explained, while only runtimes of sieve-based algorithms like Number Field Sieve will be given. If time permits, perhaps there will be a short discussion on Adi Shamir's TWINKLE device and it's effect on sieve-based algorithms). Next, the basics of Quantum Computing will be explained, and tied into RSA encryption and its ability to destroy RSA by explaining and demonstrating Shor's quantum algorithm for factoring the product of two primes. And to balance it out, Quantum Computing's ability to bring about more secure cryptography will be discussed in the phenomenon of Quantum Entanglement, and its possible implications when used in conjunction with a one-time pad.

Nicholas Farr (

Mr. Farr will be doing a 60-minute talk on the advent of the digital computer. It will mainly cover the early culture of computing and its snowball effects to the present day. He will argue that the primary reason for the advent of the digital computer was failsafe control over all aspects of calculation...though analog computers (circa WWII) were far faster, less prone to breakdown, and easier to troubleshoot and proof, the military sought computing systems that were easier to control --making "failsafe control" the dominant aspect of every major development of digital computing systems ever since. His talk will bridge the concept of failsafe control to the failure of failsafe control in EVERY digital system to the present day.

Dark Cube (

Mr. Cube will be doing a 60-minute presentation on Linux. Intended as a primer for newcomers to the operating system, he will cover basics of installation and operation. This is not an exhaustive exploration, only an introduction.

Mr. Cube will also offer a 60-minute talk on basic telephony. All you budding phreakers out there, or those who just want to learn a little about how our phone system works, should check this out.

The Phantom (