A few updates for those of our readers who don’t tune in to the Twitter…
In addition to the talk I gave at Notacon 6 — From a Black Hat to a Black Suit: The Econopocalypse Now Edition, working with my awesome research partner Tiffany Rad has proven to be awesome – our talk “Your Mind: Legal Status, Rights and Securing Yourself” has been accepted to a number of leading security conferences.
You can catch us at:
- Blackhat USA Briefings – July 29-30 – Las Vegas, NV, USA
- DEFCON 17 – July 31-Aug 2 – Las Vegas, NV, USA
- HAR 2009 (Hacking At Random) – August 13-16 – Vierhouten, Netherlands
- SecTor 2009 – October 5-7 – Toronto, ON, Canada
The talk is going to be fast paced and will generally cause mind-warping of audience members.
As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device‚ as transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore “subpoena proof” server platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself.
In other security conference news, I’m working with Nikita on a DEFCON Contest – the 10,000¢ Hacker Pyramid — You can read all about it and keep up with updates on the official game page or by following @HackerPyramid on the Twitter.
If you’d like access to video or slides of my previous talks, please drop a line to me and I’ll see what I can do.
It’s a busy year this year, but I’m enjoying the ride!
(article image from foreverdigital’s CC Flickr stream)