Massachusetts Bay Transportation Authority v. Anderson et al

Filing 20

EXHIBITS one thru eight re 2 MOTION for Temporary Restraining Order by Massachusetts Bay Transportation Authority. (Attachments: # 1 Exhibit Two, # 2 Exhibit Three, # 3 Exhibit Four, # 4 Exhibit Five, # 5 Exhibit Six, # 6 Exhibit Seven, # 7 Exhibit Eight)(Edge, Eugenia)

Download PDF
EXHIBIT 3 DEFCON 16 - Schedule Page 1 of 15 Schedule Speakers Venue Events/Contests Be Prepared FAQ Contact Schedule Skyboxes Place skybox requests with grifter[at]defcon[dot]org 206 © 1992-2008 DEF CON Communications, Inc. Main DEFCON Site | RSS 207 208 209 210 211/212 http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 2 of 15 Friday "Spiders are Fun" party 303 (Skytalks) HAM Radio Testing Hacker pimps Hardware Hacking Village i-hacked Available Wireless Village Lockpick Village Saturday Sunday Ninja Networks Available Pre-Con: Thursday, August 7 12:00 - 22:00 Registration - $120 USD CASH ONLY - Avoid the lines and get your badge early. Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store Vendor Area Setup: 11:00 - 18:00 The Unofficial Defcon 16 Toxic BBQ will be held for its fourth consecutive year. Details of the TBBQ's location can be found at http://www.toxicbbq.com. Sign on to the Defcon Forums and help plan this year's event. theSummit fundraiser for EFF/THF at the Top of the Riv 18:00 - ??? 21:00 - ??? Day One: Friday, August 8 08:00 22:00 Registration - $120 USD CASH ONLY - Avoid the lines and get your badge early. Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store. Vendor Area Hours: 10:00 - 19:00 http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 3 of 15 Track 1 Track 2 Track 3 Track 4 Track 5 Contest Area Events Chillout 101/102 10:00 10:50 Welcome by DT & Making the DEFCON 16 Badge with Joe "Kingpin" Grand Weasel Compliance: The Enterprise Vulnerablity Roadmap. Chema Alonso & Jose Parada Time-Based Blind SQL Injections Using Heavy Queries: A Practical Approach to MS SQL Server, MS Acess, Oracle, MySQL Databases and Marathon Tool. Brenno J.S.A de Winter Hacking Data Retention: Small Sister your Digital Privacy Self Defense. Ben Feinstein The Wide World of WAFs. oCTF till 22:00 Coffee Wars till 12:00 Race to Zero till 18:00 Buzzword Survivor till 22:00 Sat DEFCONBots practice during Contest Area hours GH3 Signup till 12:00 Badge Hacking Contest till 14:00 Sunday Mystery Challenge till 14:00 Sunday 11:00 Schuyler T Michael B k Ian Angell Di it l Joe Cicero H ki Panel: H ki i GH3 Free Pl Warballooning i D http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 4 of 15 11:20 How to make Deciphering friends & Captcha influence Lock Manufacturers. Kolisar Whitespace: A Different Approach to JavaScript Obfuscation. Security: A Risky Business E.S.P. the Name of Science. The Phreaking Callenge till 17:00 Mystery Challenge Wildcard Slot Competition Outdoor Area till 14:00 Clinton Wong Web Privacy & Flash Local Shared Objects. 11:3011:50 12:00 12:50 Mike Spindel Captchas: Are they really Hopeless? (Yes!) Mark Bristow ModScan: A SCADA MODBUS Network Scanner Roger Dingledine Security and anonymity vulnerabilities in Tor: past, present, and future Scavenger Hunt till 17:00 GH3 Med. Heat 1 Beverage Cooling Contraption Contest Chillout Area, DJs QueerCon Mixer @ 16:00 13:00 13:20 Marc Weber Tobias Open in 30 Seconds: Tom "Strace" Stracener & Robert Robert Ricks Jim O'Leary New Tool for Every Breath SQL Injection you Take. with DNS Greg Conti Could Googling Take Down GH3 Med. Heat 2 Mystery http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 5 of 15 Cracking One of the Most Secure Locks in America. 13:30 13:50 "RSnake" Hansen Xploiting Google Gadgets: Gmalware & Beyond Exfiltration. a President, Prime Minister, or an Average Citizen? Challenge begins at 1:05:70 till 14:00 Sunday Morgan MarquisBoire Fear, Uncertainty and the Digital Armageddon. Kurt Grutzmacher Nail the Coffin Shut,NTLM is Dead. Magnus Bråding Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol. Jan Newger Anti-RE Techniques in DRM Code GH3 Med. Heat 3 Mobile Hacker Spaces Demo in outdoor area till 16:00 14:00 14:50 Nathan Hamiel & Shawn Moyer Satan is on my friends list: Attacking Social Networks. 15:00 15:50 Eric Schmiedl Advanced Physical Attacks: Going Beyond Social Engineering and Dumpster Diving Or, Techniques of Industrial Wendel Guglielmetti Henrique Playing with Web Application Firewalls. Kevin Figueroa, Marco Figueroa, & Anthony L. Williams VLANs Layer 2 Attacks: Their Relevance Alex Stamos, David Thiel & Justine Osborne Living in the RIA. http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 6 of 15 Espionage and their Kryptonite. 16:00 16:50 David Maynor & Robert Graham Bringing Sexy Back: Breaking in with Style. Fyodor NMAPScanning the Internet. James Shewmaker StegoFS Blake Self & Durandal Free Anonymous Internet Using Modified Cable Modems. Travis Goodspeed Journey to the center of the HP28. 17:00 17:50 Matt Yoder Death Envelope: Medieval Solution to a 21st Century Problem. Ben Feinstein Snort Plug-in Development: Teaching an Old Pig New Tricks. D.J. Capelis Building a Real Session Layer. Vic Vandal Keeping Secret Secrets Secret & Sharing Secret Secrets Secretly. Panel: Meet the Feds 18:00 18:50 Fabian "Fabs" Yamaguchi & FX New Ideas for Old P ti Guy Martin Sniffing Cable Modems. John Fitzpatrick Virtually Hacking. Eric Smith & Dr. Shana Dardan. Medical Identity Theft. Closed for Ball Setup http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 7 of 15 Port Scanning Improved. 19:00 19:20 Nathan Evans De-TORiorate Anonymity 19:30 19:50 20:00 20:50 TCP/IP Drinking Game Forum Meet @ 20:30 in Q&A 5 (room 103) till 22:30 Black Ball till 3:00 Sat. 21:00 21:50 Movie Night With DT: Premiere of "Hackers Are People Too" Movie Night With DT: Appleseed: Ex Machina Hacker Jeopardy 22:00 22:50 Club QueerCon in Skybox 211 till ??? 23:00 23:50 http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 8 of 15 Day Two: Saturday, August 9 08:00 Registration - $120 USD CASH ONLY - Avoid the lines and get your badge early. Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth 22:00 Vendor Area Hours: 10:00 - 19:00 Track 1 Track 2 Track 3 Track 4 Track 5 Contest Area Events Chillout 101/102 10:00 David Weston & 10:50 Tiller Beauchamp RE:Trace: The Reverse Engineer's Unexpected Swiss Army Knife. Nelson Murilo & Luiz "effffn" Eduardo Beholder: New WiFi Monitor Tool. Don Blumenthal Working With Law Enforcement. Joe "kingpin" Grand & Zoz BSODomizer. G.Mark Hardy A Hacker Looks at 50. oCTF till 22:00 Øwn the Box in oCTF Area during oCTF Hours Skytalks in Skybox 206 till 18:00 11:00 Matt Weir & Suhir 11:50 Aggarwal Password Cracking on a Budget. Thomas d'Otreppe de Bouvette "Mister X" & Rick Farina "Zero_Chaos" Shifting the Focus of WiFi Security: Beyond Cracking your neighbor's Scott Moulton Forensics is ONLY for Private Investigators. Cameron Hotchkies Under the iHood. Ferdinand Schober Gaming- The Next Overlooked Security Hole. GH3 Free Play Gringo Warrior till 18:00 Warballooning Demo in Outdoor Area till 14:00 http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 9 of 15 WEP key. 12:00 FX Developments 12:50 in Cisco IOS Forensics. Matt "DCFLuX" Krick Flux on:EAS (Emergency Alert System) John "Jur1st" Benson. When Lawyers Attack! Dealing with the New Rules of Electronic Discovery. Jay Beale Owning the Users with Agent in the Middle. "Ne0nRa1n" & Joe "Kingpin" Grand Brain Games: Make your own Biofeedback Video Game. Scavenger Hunt till 18:00 GH3 Hard Heat 1 Chillout Area, DJs 13:00 Adam Bregenzer 13:50 Buying TimeWhat is your Data Worth? (A Generalized Solution to Distributed Brute Force Attacks.) Alexander Lash Taking Back your Cellphone. Luciano Bello & Maximiliano Bertacchini Predictable RNG in the Vulnerable Debian OpenSSL Package, the What and the How. Ian Clarke Hacking Desire. DEFCONBots GH3 Hard Heat 2 The Phreaking Callenge till 17:00 EEE PC Mod Workshop meetup till 15:00 http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 10 of 15 14:00 Panel: All your Sploits 14:50 (and Servers) are belong to us. Major Malfunction Feed my SAT Monkey. Panel: Ask the EFF: The Year in Digital Civil Liberties Panel SensePost Pushing the Camel through the eye of a needle. Lyn Tuning Your Brain. GH3 Expert Heat Mo b i l e Hacker Spaces Demo in outdoor area till 16:00 15:00 15:50 Zac Franken Is that a unique credential in your pocket or are you just pleased to see me? Mike Perry 365Day:Active https cookie hijacking. Panel: Commission on Cyber Security for the 44th Presidency Mati Aharoni BackTrack Foo- From bug to 0day. Phreakmonkey & mutantMandias Urban Exploration- A Hacker's View. GH3 Finals Med. GH3 Finals Hard @ 15:30 16:00 Michael Brooks 16:20 CSRF Bouncing. atlas VulnCatcher: Fun with Vtrace & Programmatic Debugging. Lee Kushner & Mike Murray Career Mythbusters: Separating Fact from Fiction in your Information Security Career. GH3 Finals Expert 16:30 16:50 MD Sohail Ahmad, JVR Murthy & Amit Vartak http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 11 of 15 Disorder in Wireless LANs. 17:00 Felix "FX" Lindner 17:20 Toying With Barcodes NYCMIKE The World of Pager Sniffing/ Interception: More Activity than one may suspect. Fouad Kiamilev & Ryan Hoover Demonstration of Hardware Trojans. Don Blumenthal What to do when your Data winds up where it shouldn't. David Byrne GrendelScan: A New Web Application Scanning Tool. Christopher Tarnovsky Introducing Momentary Faults Within Secure Smartcards/ Microcontrollers. 17:20 17:50 18:00 Paul F. Renda 18:50 The True Story of the Radioactive Boyscout: The first Nuclear Hacker & how his work relates to Homeland Scott Moulton Solid State Drives Destroy Forensic & Data Recovery Jobs: Animated! TBA Renderman How can I pwn thee? Let me count the ways. Closed for Ball Setup http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 12 of 15 Security's model of the dirty bomb. 19:00 Movie Night With DT: 19:50 25th Anniversary Showing of Wargames 20:00 Followed by a fireside chat 20:50 with David Scott Lewis, IT & green tech 21:00 entrepreneur, model for 21:50 David Lightman 22:00 Movie Night With DT: 22:50 Three Days of the 23:00 Condor ???? LeetSkills Talent Competition Hacker Jeopardy White Ball till 3:00 Sunday Day Three: Sunday, August 10 http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 13 of 15 08:00 12:00 Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth Vendor Area Hours: 10:00 - 15:00 Track 1 Track 2 Brian K. Edwards Markets for Malware: A Structural Economic Approach Track 3 Tony Howlett The death of Cash: The Loss of anonymity & other danger of the cash free society. Track 4 Christer Oberg, Claes Nyberg, & James Tusini Hacking Open VMS. Track 5 Stefan Frei, Thomas Duebendorfer, Gunter Ollman & Martin May Exploiting A HundredMillion Hosts Before Brunch JonM Ham for Hackers-Take back the Airwaves. Contest Area Events Room 10:00 10:20 Bruce Potter Malware Detection through Network Flow Analysis. 10:30 10:50 Ryan Trost Evade IDS/IPS Systems using Geospatial Threat Detection. Peter Berghammer The Emergence (and use) of Open Source Warfare. 11:00 11:50 Rick Hill War BallooningKismet Wireless "Eye in the Sky" Dan Kaminsky TBA Sandy Clark "Mouse" Climbing Everest: An Insider's Look at one state's Voting Systems. N.N.P. VoIPER:Smashing the VoIP Stack while you sleep. Nick Harbour Advanced Software Armoring and Polymorphic Kung Fu http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 14 of 15 12:00 12:20 Simon Howard Race-2-Zero Unpacked. Teo Sze Siong & Hirosh Joseph Let's Sink the Phishermen's Boat! Doug Farre Identification Card Security: Past, Present, Future. Jay Beale They're Hacking Our Clients! Introducing Free Client-side Intrustion Prevention. Valsmith & Colin Ames MetaPostExploitation 12:30 12:50 Renderman 10 Things that are Pissing me off. Thomas Wilhelm Mobile Hacker Space. Anthony Martinez & Thomas Bowen Toasterkit, a Modular NetBSD Rootkit. Zack Anderson, RJ Ryan & Alessandro Chiesa The Anatomy of a Subway Hack: Breaking Crypto RFID's & Magstripes of Ticketing Systems. Paul Craig Compromising Windows Based Internet Kiosks. Jonathan Brossard Bypassing preboot authentication passwords The Phreaking Callenge till 14:30 13:00 13:50 http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008 DEFCON 16 - Schedule Page 15 of 15 14:00 14:50 Panel: Internet Wars Michael Ligh & Greg Sinclair Malware RCE: Debuggers and Decryptor Development. Mike Renlund The Big Picture: Digital Cinema Technology & Security. Panel: Black vs. White: The complete life cycle of a real world breach. DAVIX Visualization Workshop Mobile Hacker Spaces Demo in outdoor area till 16:00 15:00 15:50 Jason Scott Making a Text Adventure Documentary. Igor Muttik Good Viruses. Evaluating the Risks. Taylor Banks & Carric. Pen-Testing is Dead, Long live the Pen Test. Tottenkoph, Rev & Philosopher Hijacking the Outdoor Digital Billboard Network. lclee_vx Comparison of File Infection on Windows & Linux. 16:00 16:50 Chris Eagle & Tim Vidas Next Generation Collaborative Reversing with IdaPro &CollabReate. 17:00 17:50 Awards Ceremonies hosted by Dark Tangent http://defcon.org/html/defcon-16/dc-16-schedule.html 8/8/2008

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?