Feeds

Hackers' convention rolls into Vegas

7 July 1999

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

It was five years ago today... Although we're not quite certain what happens when you take a load of hackers and stick 'em in the middle of a 24/7 gambling mecca for a bit of a jolly, here's Tim Richardson's analysis of the DEF CON jamboree of 1999:

Hackers' convention rolls into Vegas

By Tim Richardson
Published Wednesday 7th July 1999 10:29 GMT

A spangly oasis in the middle of the Nevada desert is to host a massive jamboree for hackers at the weekend. It will be the seventh year on the trot that the "annual computer underground party" for hackers will have been staged, and Las Vegas is gearing up for one heck of a party.

"We are not trying to teach you to learn how to hack in a weekend, but what we are trying to do is create an environment where you can hang out with people from all different backgrounds," trills the DEF CON publicity. "All of them are interested in the same thing, computer security." So the gamblers of Las Vegas are going to rub shoulders with another bunch of chancers - how quaint.

But could this annual get-together be the reason behind the spate of high-profile Web attacks that have received so much publicity over the last six weeks or so? Only last weekend the official site for the state of Hawaii was trashed when vandals reportedly sprayed "violate-the-state" all over its cyberwalls.

Network Solutions was also recently targeted along with other top drawer sites including the US Army, the department of agriculture and the FBI. Could it be that all these high profile hacks have been done merely to give the hackers and crackers at DEF CON something to brag about during the conference? After all, it is a reunion of sorts and at such tedious events nothing is more fun than playing one-upmanship with your peers.

You can just hear the overblown conversations now as the delegates at one of the DEF CON soirees juggle a glass of wine and a plate of canapés while trying to nibble on a flaky vol-au-vent. "You trashed the National Oceanic and Atmospheric Agency - cool. But I turned over the FBI man, it was a breeze..."


Those of you who fancy sharing a few vol-au-vents with the hacking community should note that DEF CON 12 will be held between 30 July 30 and 1 August 2004 at the Alexis Park, yes - you've guessed it, Las Vegas.

We assume that while it will be business as usual for men dressed in Elvis jumpsuits and tired Sharon Stone lookalikes hitting the roulette wheels, the canapé-fuelled DEF CON chit-chat may have moved along a little: "Sure, like, you wardrove the local hardware store and pocketed some cool credit card numbers. But I've been VoIP spoofing on the CIA's network man, it was a breeze." ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.