The Next Hope - Friday, July 16
10:00
Catalyst
GPS - It's Not the Satellites That Know Where You Are
Klein
IPv6 Playground: New Hope Update
11:00
Jackson
Locational Privacy and Wholesale Surveillance via Photo Services
Steele
The State of Global Intelligence
Foote
Light, Color, and Perception
12:00
Hart, Newby
Content of the Future
Dragorn, Haines
Wireless Security: Killing Livers, Making Enemies
Schearer
SHODAN for Penetration Testers
13:00
Kaminsky
Keynote Address
14:00
Love, Scott
Digital: A Love Story
Holt
Examining Costs, Benefits, and Economics in Malware and Carding Markets
15:00
Greko, Rothschild
Botnet Resistant Coding: Protecting Your Users from Script Kiddies
Grenzfurthner
Arse Elektronika: Sex, Tech, and the Future of Screw-It-Yourself
McNabb
Electronic Take Back
16:00
Paley
Sita Sings the Blues: A Free Culture Success Story
TProphet
Own Your Phone
Potter
Cooking for Geeks
17:00
Keigher
"Brilliants Exploits" - A Look at the Vancouver 2010 Olympics
Muentz
Keeping Your Job While Being a Hacker
Avdashchenko
Design of a Wireless EMG
18:00
Aestetix, Altman, cpfr, Echo, Goodspeed, McKon
The OpenAMD Project
Appelbaum, Schoen
Tor and Internet Censorship
Tannir
Lisp, The Oldest Language of the Future
19:00
Ottenheimer
Easy Hacks on Telephone Entry Systems
Fey, Wels
Extreme Lockpicking
Saitta
Buying Privacy in Digitized Cities
20:00
Andrews, Meier, West
Towards Open Libraries and Schools
Foote
Build Robots and See the World
Gillmor, Rollins
Monkeysphere: Fixing Authentication on the Net
21:00
Mariano, Miller, Swimm
Introduction to the Chip Scene: Low Bit Music and Visuals
Altman, Bonner, Farr, Grenzfurthner, Hametner, Heid, Joyce, Maw, McKon, Psytek, Warner
Hackerspaces Forever: A Panel Presented by Hackerspaces.org
Leghorn
Risk Analysis for Dummies
22:00
Alarcon
Electronic Waste: What's Here and What's Next
Figueroa
Detecting and Defending Your Network from Malware Using Nepenthes
23:00
Cardenas, G., Mehrmand, O'Horo, Pan
Interaction with Sensors, Receivers, Haptics, and Augmented Reality
Scott
"Get Lamp" - Screening and Discussion
Renda
Injecting Electromagnetic Pulses into Digital Devices
The Next Hope - Saturday, July 17
10:00
Cass
T+40: The Three Greatest Hacks of Apollo
Fried, Torrone
How to Run an Open Source Hardware Company
Catalyst
False Domain Name Billing and Other Scams
11:00
Schoen
Behind the Padlock: HTTPS Ubiquitous and Fragile
Marpet
Video Surveillance, Society, and Your Face
Piskor
Hacking Out a Graphic Novel
12:00
Degnan, Koblentz
Vintage Computing
Lazlow
Grand Theft Lazlow - How Hacking is Both the Death and Future of Traditional and Interactive Publishing, Journalism, and the Media
Livingston
For Its Own Sake and to Build Something Better: A Primer on Neuroscience, Bat Echolocation, and Hacker Bio-inspiration
13:00
Assange
Keynote Address
14:00
Brennan
A Red Team Exercise
Brown, Tobin
No Free Lunch: Privacy Risks and Issues in Online Gaming
15:00
V
Geo-Tagging: Opting-In to Total Surveillance
Altman
How to Bring Your Project from Idea to Reality: Make a Living Doing What You Love
Heid
Modern CrimeWare Tools and Techniques: An Analysis of Underground Resources
16:00
Santos
Memory Fun 101 - Memory Training for Everyone
Avener, Tridish
Snatch Those Waves: Prometheus Radio and the Fight for Popular Communications
McCarney
Surf’s Up! Exploring Cross Site Request Forgery (CSRF) through Social Network Exploitation
17:00
Shah
Smartphone Ownage: The State of Mobile Botnets and Rootkits
Rambam
Privacy is Dead - Get Over It
Yampolskiy
Much Ado About Randomness
18:00
Nicholson
Free Software: Why We Need a Big Tent
Jackson
Why You Should Be an Amateur
19:00
Grenzfurthner
Reach Out And Touch Face: A Rant About Failing
Hong
Hackers for Human Rights
20:00
Neulist
Hey, Don't Call That Guy A Noob: Toward a More Welcoming Hacker Community
Lapsley, Ravnitzky
Rummaging in the Government's Attic: Lessons Learned from More Than 1,000 Freedom of Information Act Requests
Drosdick
The Telephone Pioneers of America
21:00
Rodgers
Circuitbending
Goldstein
Social Engineering
22:00
Firefly, Frequency, Gonzo
2600 Meetings: Yesterday, Today, and Tomorrow
Goodspeed
Building and Breaking the Next HOPE Badge
Beave, JFalcon
PSTN-based Cartography
23:00
Ortiz
Hacking Our Biochemistry: Pharmacy and the Hacker Perspective
Brunton, Coleman
Net Wars Over Free Speech, Freedom, and Secrecy or How to Understand the Hacker and Lulz Battle Against the Church of Scientology
Neely
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us
23:59
Steele
Spy Improv on Steroids - Steele Uncensored - Anything Goes
Saturday Night Hacker Cinema
The Next Hope - Sunday, July 18
09:30
Cicero, Muentz, Schoen
The Need for a Computer Crime Innocence Project
10:00
Lewart
Hacking Your GPS
Mudsplatter, Trick
Hacking Terrorist Networks Logically and Emotionally
11:00
Huntington
Hacking for an Audience: Technology Backstage at Live Shows
Anderson
From Indymedia to Demand Media: Participation, Surveillance, and the Transformation of Journalism
Crowley
Lock Bypass without Lockpicks
12:00
Blaze, Cheswick, Clark
Simpsons Already Did It - Where Do You Think the Name "Trojan" Came From Anyway?
Lapsley
Cats and Mice: The Phone Company, the FBI, and the Phone Phreaks
Pei
Burning and Building Bridges: A Primer to Hacking the Education System
13:00
Silbermintz
American Bombe: How the U.S. Shattered the Enigma Code
Mooney, Rad
The DMCA and ACTA vs. Academic and Professional Research: How Misuse of This Intellectual Property Legislation Chills Research, Disclosure, and Innovation
Toubiana
TrackMeNot: Injecting Reasonable Doubt in Everyone’s Queries
14:00
Kemp
Into the Black: DPRK Exploration
Informants: Villains or Heroes?
Vasile
The Freedom Box: How to Reclaim Privacy on the Web
15:00
Harvey
CV Dazzle: Face Deception
Pennasilico
Bakeca.it DDoS - How Evil Forces Have Been Defeated
15:30
Gweeds
Hacking the Food Genome
16:00
Elena, Smokey, Williams
Hackers without Borders: Disaster Relief and Technology
Arlen
The Black Suit Plan Isn't Working - Now What?
17:00
Pogue
Sniper Forensics - Changing the Landscape of Modern Forensics and Incident Response
The HOPE Network
18:00
Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.