She specializes in free speech and privacy litigation, particularly regarding the impact of new technologies on First and Fourth Amendment rights. She is lead counsel in the ACLU's challenge to the government's suspicionless searches of laptops at the international border, and is litigating a series of cases challenging the government's claim it can track the location of people's cell phones without a warrant. He completed his Ph.
In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice, and recorded phone company executives bragging about their surveillance practices.
Kade is currently working on a long term project to document and challenge the militarization and federalization of state and local law enforcement, focusing on the procurement and deployment of advanced surveillance and weapons systems, towards the end of bringing local police back under local control. She built and maintains the dedicated privacy website www. For example, he was counsel in the ACLU's recent Supreme Court challenge to the NSA's warrantless wiretapping program; he is currently challenging the NSA's collection of all Americans' telephony metadata; and he is suing for release of the government's secret interpretation of Section of the Patriot Act.
Nicole graduated magna cum laude from Amherst College, studied comparative civil rights history at the University of Cape Town, South Africa, and earned her J. Get the latest information about how the law is racing to catch up with technological change from staffers at the Electronic Frontier Foundation, the nation's premiere digital civil liberties group fighting for freedom and privacy in the computer age.
- The Flight of the Hercules;
- Information Links?
- #2577 EDNA VINTAGE KNITTING PATTERN?
- the edge exploiting ipv6 for mankind and profit Manual.
- Chasing Cars.
- Contact Wipro.
This session will include updates on current EFF issues such as surveillance online and fighting efforts to use intellectual property claims to shut down free speech and halt innovation, discussion of our technology project to protect privacy and speech online, updates on cases and legislation affecting security research, and much more.
Half the session will be given over to question-and-answer, so it's your chance to ask EFF questions about the law and technology issues that are important to you. Kurt Opsahl kurtopsahl eff is a Senior Staff Attorney with the Electronic Frontier Foundation focusing on civil liberties, free speech and privacy law. Opsahl has counseled numerous computer security researchers on their rights to conduct and discuss research.
Before joining EFF, Opsahl worked at Perkins Coie, where he represented technology clients with respect to intellectual property, privacy, defamation, and other online liability matters, including working on Kelly v. Arribasoft, MGM v. Grokster and CoStar v. Opsahl received his law degree from Boalt Hall, and undergraduate degree from U. Santa Cruz. Superior Court appeal, which established the reporter's privilege for online journalists. Now in private practice, Marcia was previously a senior staff attorney at the Electronic Frontier Foundation, where she focuses on computer crime and security, electronic privacy, free expression, and other digital civil liberties issues.
Dan Auerbach is a Staff Technologist who is passionate about defending civil liberties and encouraging government transparency. Coming to EFF with a background in mathematical logic and automated reasoning, as well as years of engineering experience at Google, Dan now works on EFF's various technical projects and helps lawyers, activists, and the public understand important technologies that might threaten the privacy or security of users. Eva Galperin is EFF's Global Policy Analyst, and has been instrumental in highlighting government malware designed to spy upon activists around the world.
She comes to EFF from the US-China Policy Institute, where she researched Chinese energy policy, helped to organize conferences, and attempted to make use of her rudimentary Mandarin skills. His issues include user privacy, civil liberties, EULAs, and "cybersecurity" online security. When not reading legal or legislative documents, Mark can be found reading non-legal and legislative documents, exploring the Bay Area, and riding his bike. The intersection of his concentration with advancing technologies and the law was prevalent throughout his education, and Mark's excited to apply these passions to EFF.
You know you can't stay away! More FAIL than you can shake a stick at. Come hear some of the loudest mouths in the industry talk about the epic security failures of the last year. So much fail, you'll need waffles to make it through. Nothing is sacred not even each other.
- S comme Sophie (French Edition).
- Christmas Balls Crochet Chair Back Set Pattern.
- Fiends Gold?
- PERSPECTIVE: Future of the Internet Depends on Global Adoption of IPv6.
- The ACLU Presents: NSA Surveillance and More!
- Dealing with Loss : Through the Eyes of a Child.
- Custardly Wart: Pirate (third class) (History of Warts);
- Dinosaurs: Dinosaurs for Kids, a Text and Picture Book: Ages 6-8/Kindergarten-2nd grade and Ages 9-12/3rd grade-6th grade (Animals).
- Danny O’Brien’s Oblomovka!
- International Conference on Computer Networks and Communication Technologies!
- Enlightenment The Road Home.
David Mortman mortman. Before enStratus, he ran operations and security for C3. Mortman sits on a variety of advisory boards including Qualys. Rich Mogull rmogull is a recovering Gartner analyst who is embarrassed at corporate events because he actually enjoys using technology and can even pop a shell in a pinch. In previous Fail panels he has broken robots, hacked WiFi, impersonated a money mule, and launched rockets. Maynor is responsible for day-to-day technical decisions of Errata Security and also employs a strong background in reverse engineering and exploit development to produce Hacker Eye View reports.
Before ISS, Maynor spent 3 years at Georgia Institute of Technology GaTech , with the last two years as a part of the information security group as an application developer to help make the sheer size and magnitude of security incidents on campus manageable. Before that Maynor contracted with a variety of different companies in a widespread of industries ranging from digital TV development to protection of top 25 websites to security consulting and penetration testing to online banking and ISPs. James Arlen myrcurial is a senior consultant at Leviathan Security Group providing security consulting services to the utility and financial verticals.
James is also a contributing analyst with Securosis and has a recurring column on Liquidmatrix Security Digest. Best described as: "Infosec geek, hacker, social activist, author, speaker, and parent. He's been in cybersec since before people started using the term "cybersec," starting as a child learning from his grandfather, who was a code breaker in WWII. More Bios to Come Soon. Microcontrollers and embedded systems come in many shapes, sizes and flavors.
Engineers and designers tend to have their favorites, but how do they decide what part to work with? If you're just getting started with electronics and are trying to navigate the sea of available microcontrollers, microprocessors, and modules, this panel is for you. Joe Grand joegrand is an electrical engineer and hardware hacker. He runs Grand Idea Studio www.
The winners of the 12222 SC Awards Honored in the U.S.
Back in the day when he was known as Kingpin, he was a member of the infamous hacker group L0pht Heavy Industries. Mark 'Smitty' Smith SmittyHalibut is a network engineer and system administrator by day, relentless maker by night. And by the weekend. Electronics and computers have been a hobby of his since childhood with his first In-1 and a TRS at the age of 6. And by lunch hour.
Good-Bye IPv4, Hello IPv6
Microcontrollers have been a part of his repertoire since the in the mid 90s. He is currently spending most of his Maker energies in the analog domain on Audiophile Electronics. And by coffee break. In fact, it's safe to say he's always involved in some project or other. LosT 1o57 With a background in mathematics and robotics LosT spends his free time between calculating how to take over the world and building the robots to accomplish it. Deciding to teach others how to create robot overlords, he created the Hardware Hacking Village for the DEF CON community with Russ in an effort to get more people involved with hardware.
Fearing competition LosT devised the Mystery Challenge to confuse and confound those who would rise up against him- eventually becoming the creator of the badges to that same end. RenderMan ihackedwhat is a white hat by trade, blackhat by fashion. He spends his days fixing stuff that other people break and evenings finding new ways to break stuff once people fix it. A frequent speaker at conferences around the world, he tries to make the world a better place by educating people about security and the hacker ethic and stuffing random electronics into stuffed toys to make them creepier than ever imagined.
FirmWarez FirmWarez is an embedded systems engineer with twenty years experience developing microcontroller based devices ranging from toys to military hardware. Having gone the MBA route to collect such titles as 'Director of Engineering' and 'VP of Engineering', he still stays directly active in designing and building electronics for fun and profit. Currently involved in a couple of start-ups as well as freelance jobs, he works from an obfuscated lab in a barn somewhere deep in flyover country.
Venture capital investments have reached the highest level since the dot-com days.
Almost seven billion dollars was invested last quarter alone. While clean-tech deals hit a new low, security deals increased the most. Security is the new black. How should we spend the next billion? Meet the VCs and strategize on the future! Deepak Jeevankumar , partner at General Catalyst, focuses on investments in cloud computing, big data, data center infrastructure and clean energy.
At Sun, he was involved in designing a few top 10 supercomputers in the industry and led the high performance computing architecture practice in the Asia-Pacific region. Deepak is a graduate of the National University of Singapore, earning a B. John M. Jack actively consults startups and is a board partner at Andreessen Horowitz. Most recently, JJ was the CEO of Fortify Software, which was acquired by Hewlett-Packard in and was the market leader in protecting enterprises from the threats posed by security flaws in business-critical software applications.
Lean back and settle in for a stimulating evening of debate on Washington's most complex cybersecurity policy issues. Join US Government insiders for an exclusive discussion session on domestic surveillance law, foreign computer criminals, law enforcement and criminal penalties, power grid regulation, user identity and privacy, and more.
The debate rages in DC DC is the Alpha to the closing ceremonies' Omega. It's the place to go to learn about the many facets of Con and to begin your Defconian Adventure.
CSDL | IEEE Computer Society
You don't need a badge to see the Talks, though some of the content may make it an R Rated movie. One of those 3 0 3 peoples and also rolls deep with Security Tribe. Loves good vodka, smart girls, explosives, and big black. Has the ability to tell a man to go to hell so that he looks forward to the trip.
Professionally, Lock has over 25 years of experience in the technology field.
He's had jobs ranging from tech writer, mainframe operator, product engineer, product marketing manager, and is currently Sr Director in charge of the Global IT Group for Sony PlayStation Worldwide Studios. Roamer shitroamersays is the Senior Goon in charge of the Vendor Area.
Roamer is one of the guitarists in the Goon Band, Recognize.