Massachusetts Bay Transportation Authority v. Anderson et al
Filing
20
EXHIBITS one thru eight re 2 MOTION for Temporary Restraining Order by Massachusetts Bay Transportation Authority. (Attachments: # 1 Exhibit Two, # 2 Exhibit Three, # 3 Exhibit Four, # 4 Exhibit Five, # 5 Exhibit Six, # 6 Exhibit Seven, # 7 Exhibit Eight)(Edge, Eugenia)
EXHIBIT 3
DEFCON 16 - Schedule
Page 1 of 15
Schedule Speakers Venue Events/Contests Be Prepared FAQ Contact
Schedule
Skyboxes
Place skybox requests with grifter[at]defcon[dot]org 206
© 1992-2008 DEF CON Communications, Inc. Main DEFCON Site | RSS
207
208
209
210
211/212
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 2 of 15
Friday
"Spiders are Fun" party 303 (Skytalks) HAM Radio Testing
Hacker pimps
Hardware Hacking Village i-hacked Available
Wireless Village
Lockpick Village
Saturday Sunday
Ninja Networks Available
Pre-Con: Thursday, August 7
12:00 - 22:00 Registration - $120 USD CASH ONLY - Avoid the lines and get your badge early. Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store Vendor Area Setup: 11:00 - 18:00 The Unofficial Defcon 16 Toxic BBQ will be held for its fourth consecutive year. Details of the TBBQ's location can be found at http://www.toxicbbq.com. Sign on to the Defcon Forums and help plan this year's event. theSummit fundraiser for EFF/THF at the Top of the Riv
18:00 - ???
21:00 - ???
Day One: Friday, August 8
08:00 22:00 Registration - $120 USD CASH ONLY - Avoid the lines and get your badge early. Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store. Vendor Area Hours: 10:00 - 19:00
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 3 of 15
Track 1
Track 2
Track 3
Track 4
Track 5
Contest Area
Events
Chillout 101/102
10:00 10:50
Welcome by DT & Making the DEFCON 16 Badge with Joe "Kingpin" Grand
Weasel Compliance: The Enterprise Vulnerablity Roadmap.
Chema Alonso & Jose Parada Time-Based Blind SQL Injections Using Heavy Queries: A Practical Approach to MS SQL Server, MS Acess, Oracle, MySQL Databases and Marathon Tool.
Brenno J.S.A de Winter Hacking Data Retention: Small Sister your Digital Privacy Self Defense.
Ben Feinstein The Wide World of WAFs.
oCTF till 22:00 Coffee Wars till 12:00 Race to Zero till 18:00 Buzzword Survivor till 22:00 Sat DEFCONBots practice during Contest Area hours GH3 Signup till 12:00 Badge Hacking Contest till 14:00 Sunday Mystery Challenge till 14:00 Sunday
11:00
Schuyler T
Michael B k
Ian Angell Di it l
Joe Cicero H ki
Panel: H ki
i
GH3 Free Pl
Warballooning i D
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 4 of 15
11:20
How to make Deciphering friends & Captcha influence Lock Manufacturers. Kolisar Whitespace: A Different Approach to JavaScript Obfuscation.
Security: A Risky Business
E.S.P.
the Name of Science.
The Phreaking Callenge till 17:00 Mystery Challenge Wildcard Slot Competition
Outdoor Area till 14:00
Clinton Wong Web Privacy & Flash Local Shared Objects.
11:3011:50
12:00 12:50
Mike Spindel Captchas: Are they really Hopeless? (Yes!)
Mark Bristow ModScan: A SCADA MODBUS Network Scanner
Roger Dingledine Security and anonymity vulnerabilities in Tor: past, present, and future
Scavenger Hunt till 17:00 GH3 Med. Heat 1 Beverage Cooling Contraption Contest
Chillout Area, DJs QueerCon Mixer @ 16:00
13:00 13:20
Marc Weber Tobias Open in 30 Seconds:
Tom "Strace" Stracener & Robert
Robert Ricks Jim O'Leary New Tool for Every Breath SQL Injection you Take. with DNS
Greg Conti Could Googling Take Down
GH3 Med. Heat 2 Mystery
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 5 of 15
Cracking One of the Most Secure Locks in America.
13:30 13:50
"RSnake" Hansen Xploiting Google Gadgets: Gmalware & Beyond
Exfiltration.
a President, Prime Minister, or an Average Citizen?
Challenge begins at 1:05:70 till 14:00 Sunday
Morgan MarquisBoire Fear, Uncertainty and the Digital Armageddon. Kurt Grutzmacher Nail the Coffin Shut,NTLM is Dead. Magnus Bråding Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol. Jan Newger Anti-RE Techniques in DRM Code GH3 Med. Heat 3 Mobile Hacker Spaces Demo in outdoor area till 16:00
14:00 14:50
Nathan Hamiel & Shawn Moyer Satan is on my friends list: Attacking Social Networks.
15:00 15:50
Eric Schmiedl Advanced Physical Attacks: Going Beyond Social Engineering and Dumpster Diving Or, Techniques of Industrial
Wendel Guglielmetti Henrique Playing with Web Application Firewalls.
Kevin Figueroa, Marco Figueroa, & Anthony L. Williams VLANs Layer 2 Attacks: Their Relevance
Alex Stamos, David Thiel & Justine Osborne Living in the RIA.
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 6 of 15
Espionage
and their Kryptonite.
16:00 16:50
David Maynor & Robert Graham Bringing Sexy Back: Breaking in with Style.
Fyodor NMAPScanning the Internet.
James Shewmaker StegoFS
Blake Self & Durandal Free Anonymous Internet Using Modified Cable Modems.
Travis Goodspeed Journey to the center of the HP28.
17:00 17:50
Matt Yoder Death Envelope: Medieval Solution to a 21st Century Problem.
Ben Feinstein Snort Plug-in Development: Teaching an Old Pig New Tricks.
D.J. Capelis Building a Real Session Layer.
Vic Vandal Keeping Secret Secrets Secret & Sharing Secret Secrets Secretly.
Panel: Meet the Feds
18:00 18:50
Fabian "Fabs" Yamaguchi & FX New Ideas for Old P ti
Guy Martin Sniffing Cable Modems.
John Fitzpatrick Virtually Hacking.
Eric Smith & Dr. Shana Dardan. Medical Identity Theft.
Closed for Ball Setup
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 7 of 15
Port Scanning Improved.
19:00 19:20
Nathan Evans De-TORiorate Anonymity
19:30 19:50 20:00 20:50 TCP/IP Drinking Game Forum Meet @ 20:30 in Q&A 5 (room 103) till 22:30 Black Ball till 3:00 Sat.
21:00 21:50
Movie Night With DT: Premiere of "Hackers Are People Too" Movie Night With DT: Appleseed: Ex Machina
Hacker Jeopardy
22:00 22:50
Club QueerCon in Skybox 211 till ???
23:00 23:50
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 8 of 15
Day Two: Saturday, August 9
08:00 Registration - $120 USD CASH ONLY - Avoid the lines and get your badge early. Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth 22:00 Vendor Area Hours: 10:00 - 19:00 Track 1 Track 2 Track 3 Track 4 Track 5 Contest Area Events Chillout 101/102
10:00 David Weston & 10:50 Tiller Beauchamp RE:Trace: The Reverse Engineer's Unexpected Swiss Army Knife.
Nelson Murilo & Luiz "effffn" Eduardo Beholder: New WiFi Monitor Tool.
Don Blumenthal Working With Law Enforcement.
Joe "kingpin" Grand & Zoz BSODomizer.
G.Mark Hardy A Hacker Looks at 50.
oCTF till 22:00 Øwn the Box in oCTF Area during oCTF Hours
Skytalks in Skybox 206 till 18:00
11:00 Matt Weir & Suhir 11:50 Aggarwal Password Cracking on a Budget.
Thomas d'Otreppe de Bouvette "Mister X" & Rick Farina "Zero_Chaos" Shifting the Focus of WiFi Security: Beyond Cracking your neighbor's
Scott Moulton Forensics is ONLY for Private Investigators.
Cameron Hotchkies Under the iHood.
Ferdinand Schober Gaming- The Next Overlooked Security Hole.
GH3 Free Play Gringo Warrior till 18:00
Warballooning Demo in Outdoor Area till 14:00
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 9 of 15
WEP key.
12:00 FX Developments 12:50 in Cisco IOS Forensics.
Matt "DCFLuX" Krick Flux on:EAS (Emergency Alert System)
John "Jur1st" Benson. When Lawyers Attack! Dealing with the New Rules of Electronic Discovery.
Jay Beale Owning the Users with Agent in the Middle.
"Ne0nRa1n" & Joe "Kingpin" Grand Brain Games: Make your own Biofeedback Video Game.
Scavenger Hunt till 18:00 GH3 Hard Heat 1
Chillout Area, DJs
13:00 Adam Bregenzer 13:50 Buying TimeWhat is your Data Worth? (A Generalized Solution to Distributed Brute Force Attacks.)
Alexander Lash Taking Back your Cellphone.
Luciano Bello & Maximiliano Bertacchini Predictable RNG in the Vulnerable Debian OpenSSL Package, the What and the How.
Ian Clarke Hacking Desire.
DEFCONBots GH3 Hard Heat 2 The Phreaking Callenge till 17:00 EEE PC Mod Workshop meetup till 15:00
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 10 of 15
14:00 Panel: All your Sploits 14:50 (and Servers) are belong to us.
Major Malfunction Feed my SAT Monkey.
Panel: Ask the EFF: The Year in Digital Civil Liberties Panel
SensePost Pushing the Camel through the eye of a needle.
Lyn Tuning Your Brain.
GH3 Expert Heat
Mo b i l e Hacker Spaces Demo in outdoor area till 16:00
15:00 15:50
Zac Franken Is that a unique credential in your pocket or are you just pleased to see me? Mike Perry 365Day:Active https cookie hijacking. Panel: Commission on Cyber Security for the 44th Presidency
Mati Aharoni BackTrack Foo- From bug to 0day.
Phreakmonkey & mutantMandias Urban Exploration- A Hacker's View.
GH3 Finals Med. GH3 Finals Hard @ 15:30
16:00 Michael Brooks 16:20 CSRF Bouncing.
atlas VulnCatcher: Fun with Vtrace & Programmatic Debugging.
Lee Kushner & Mike Murray Career Mythbusters: Separating Fact from Fiction in your Information Security Career.
GH3 Finals Expert
16:30 16:50
MD Sohail Ahmad, JVR Murthy & Amit Vartak
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 11 of 15
Disorder in Wireless LANs.
17:00 Felix "FX" Lindner 17:20 Toying With Barcodes
NYCMIKE The World of Pager Sniffing/ Interception: More Activity than one may suspect. Fouad Kiamilev & Ryan Hoover Demonstration of Hardware Trojans.
Don Blumenthal What to do when your Data winds up where it shouldn't.
David Byrne GrendelScan: A New Web Application Scanning Tool.
Christopher Tarnovsky Introducing Momentary Faults Within Secure Smartcards/ Microcontrollers.
17:20 17:50
18:00 Paul F. Renda 18:50 The True Story of the Radioactive Boyscout: The first Nuclear Hacker & how his work relates to Homeland
Scott Moulton Solid State Drives Destroy Forensic & Data Recovery Jobs: Animated!
TBA
Renderman How can I pwn thee? Let me count the ways.
Closed for Ball Setup
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 12 of 15
Security's model of the dirty bomb.
19:00 Movie Night With DT: 19:50 25th Anniversary Showing of Wargames 20:00 Followed by a fireside chat 20:50 with David Scott Lewis, IT & green tech 21:00 entrepreneur, model for 21:50 David Lightman 22:00 Movie Night With DT: 22:50 Three Days of the 23:00 Condor ????
LeetSkills Talent Competition
Hacker Jeopardy
White Ball till 3:00 Sunday
Day Three: Sunday, August 10
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 13 of 15
08:00 12:00
Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth Vendor Area Hours: 10:00 - 15:00 Track 1 Track 2 Brian K. Edwards Markets for Malware: A Structural Economic Approach Track 3 Tony Howlett The death of Cash: The Loss of anonymity & other danger of the cash free society. Track 4 Christer Oberg, Claes Nyberg, & James Tusini Hacking Open VMS. Track 5 Stefan Frei, Thomas Duebendorfer, Gunter Ollman & Martin May Exploiting A HundredMillion Hosts Before Brunch JonM Ham for Hackers-Take back the Airwaves. Contest Area Events Room
10:00 10:20
Bruce Potter Malware Detection through Network Flow Analysis.
10:30 10:50
Ryan Trost Evade IDS/IPS Systems using Geospatial Threat Detection.
Peter Berghammer The Emergence (and use) of Open Source Warfare.
11:00 11:50
Rick Hill War BallooningKismet Wireless "Eye in the Sky"
Dan Kaminsky TBA
Sandy Clark "Mouse" Climbing Everest: An Insider's Look at one state's Voting Systems.
N.N.P. VoIPER:Smashing the VoIP Stack while you sleep.
Nick Harbour Advanced Software Armoring and Polymorphic Kung Fu
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 14 of 15
12:00 12:20
Simon Howard Race-2-Zero Unpacked.
Teo Sze Siong & Hirosh Joseph Let's Sink the Phishermen's Boat!
Doug Farre Identification Card Security: Past, Present, Future.
Jay Beale They're Hacking Our Clients! Introducing Free Client-side Intrustion Prevention.
Valsmith & Colin Ames MetaPostExploitation
12:30 12:50
Renderman 10 Things that are Pissing me off. Thomas Wilhelm Mobile Hacker Space. Anthony Martinez & Thomas Bowen Toasterkit, a Modular NetBSD Rootkit. Zack Anderson, RJ Ryan & Alessandro Chiesa The Anatomy of a Subway Hack: Breaking Crypto RFID's & Magstripes of Ticketing Systems. Paul Craig Compromising Windows Based Internet Kiosks. Jonathan Brossard Bypassing preboot authentication passwords The Phreaking Callenge till 14:30
13:00 13:50
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
DEFCON 16 - Schedule
Page 15 of 15
14:00 14:50
Panel: Internet Wars
Michael Ligh & Greg Sinclair Malware RCE: Debuggers and Decryptor Development.
Mike Renlund The Big Picture: Digital Cinema Technology & Security.
Panel: Black vs. White: The complete life cycle of a real world breach.
DAVIX Visualization Workshop
Mobile Hacker Spaces Demo in outdoor area till 16:00
15:00 15:50
Jason Scott Making a Text Adventure Documentary.
Igor Muttik Good Viruses. Evaluating the Risks.
Taylor Banks & Carric. Pen-Testing is Dead, Long live the Pen Test. Tottenkoph, Rev & Philosopher Hijacking the Outdoor Digital Billboard Network. lclee_vx Comparison of File Infection on Windows & Linux.
16:00 16:50
Chris Eagle & Tim Vidas Next Generation Collaborative Reversing with IdaPro &CollabReate.
17:00 17:50
Awards Ceremonies hosted by Dark Tangent
http://defcon.org/html/defcon-16/dc-16-schedule.html
8/8/2008
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?