July 28th - 30th, 2017
Located at Caesars Palace, 3570 Las Vegas Boulevard South, Las Vegas, Nevada 89109
See defcon.org for general conference information.
Abstract:
The talk will focus on biohacking as not just an ethically grey zone but instead present the idea that biohacking is not just something we would like to see, but is something we must do if we are ever going to be capable of living up to the morals we espouse.
Abstract:
By looking at key experiments and trials done by the military we can learn about psychoactive chemicals and protocols that work, and don’t work, on humans. From biological enhancement to chemical deterrents, there is a wealth of information that grassroot scientists and body augmenters can use for their research and experiments.
Abstract:
Robin's expertise showcases the future of medical technology, and how the convergence of accelerating tech will enable patients to be the key decision maker, executor, driver and ultimately the one responsible on the healthcare team. Patient empowerment and engagement through technological advancements including wearable technology, sensors, point-of-care diagnostics, 3D Printing, Tissue Engineering, Power of the Crowd, data, networks, artificial intelligence and robotics. These are some of the accelerating technologies set to fundamentally change healthcare and allow the patient to be in control of their own health.
Abstract:
This presentation is about a creative approach to intrusion tests, as the popular saying would say: "–The dog is man's best friend" (he makes you feel good and secure). Let's explore the vulnerability of layer eight, the human being, subject to error and the social engineering techniques; This is an innovative method, with art and style, will be simpler than it sounds; The dog will be used as an attack tool, which will carry a mobile phone hidden along with its pectoral collar.
The attack vectors are triggered automatically without any human interaction. This may include geographically close attacks, such as fake Wi-Fi access points, cellular base stations or local user attacks on a network, we can exploit DNS hijacking, packet injection, Evil-Twin, rogue router or ISP, and many other variants.
Furthermore, the target will connect to your rogue wifi access point and the rules are enabled with the DHCP configurations to allow fake AP to allocate IP address to the clients and forward traffic to a fake/malicious web-site; Then, the information can be stored easily as well the injection of malicious file to remotely control the victim.
And it's done. You can drop your hacker dog in a park and expect him to hack people for you, quietly, that's perfect!
Abstract:
The ultimate form of information storage: DNA.
Dumb question: Can we store Bitcoin addresses in DNA?
Participate in several challenges demystifying the idea of storing Bitcoins inside of DNA. The first who discovers the solution to each challenge wins the satoshi stored in the actual DNA code.
Abstract:
Over past decade, electronic medical records (EMR's) and networked medical devices have become a healthcare norm. However, vendors and consumers alike have not paid sufficient attention to the security implications of EMR's and networked medical devices. In this talk, I will cover my experience [ethical] hacking and social engineering my way into healthcare networks. I will highlight security issues with healthcare networks and share real life stories.
Abstract:
Through sharing experiences learned first hand and through work on the Dangerous Minds Podcast, c00p3r will be introducing you to implantable technology, explaining the basic products that are available on the market now, from where, as well as provide a show and tell experience of what it is like to become one of the augmentives. Come to learn, and stay to laugh and become a part of this new world of cyborgs.
Abstract:
Everything you know about your environment mediated by your senses. Likely, you can see in a range of colors, hear a car horn honking, and feel the roughness of sandpaper, but light exists in bands too narrow or wide to be processed by your eyes, some sounds are too high or low to be recognized by your ears, and magnetic fields pulse around you all day. Most of us hardly notice. Dr. Paul Bach-y-Rita’s research in the 60’s eventually lead to The BrainPort which lets a user see through an electrode grid on your tongue, but sensory augmentation has stayed mostly within the realm of the medical field until recently. Now there are magnets in fingertips all over the place, Neil Harbisson can hear in colors in a wider range than you can see and companies like NeoSensory and Cyborg Nest are building even more devices that let you sense more or differently. We’ll talk through the basics of how your senses work in conjunction with your brain, about many of the great projects that help have helped individuals augment their senses, and why a vibrating North-sensing device mounted to your chest is different than a compass.
Abstract:
The software as a service (SaaS) model is same model that we are using for our health...Unbelievable: We are treating symptoms and not curing diseases...
Abstract:
Determining effectiveness and fit of chemical compounds for human medical and health is a time-consuming and expensive process. One method for reducing time and expense is the use of computational chemistry to model compound-receptor binding, which helps rule out unpromising or suboptimal compounds. This presentation explores the fundamentals of computational chemistry for various applications and open-source programs available for use. Ab initio molecular modeling, molecular docking, and bioinformatics programs are discussed.
Abstract:
Teleradiology is an $8 billion dollar a year industry and we are going to disrupt it. Medical records are critical infrastructure, and with an increasing emphasis on real-time interpretations of medical imagery to improve healthcare outcomes in emergency situations, it is imperative the systems that enable medical collaboration are secure and reliable. Here we present an Ethereum-based application that allows anyone who needs help interpreting an image to reach out to a radiologist anywhere in the world, securely, privately, without a third party intermediary, and for a lower price than existing teleradiology firms.
Abstract:
Over the next ten years, blockchain and distributed ledger technologies will fundamentally change the delivery of care around the globe. The blockchain provides a technical framework where trust is moved from central controlling intermediaries to the open source protocol, freeing data and assets from the control of traditional corporate interests. The great hope is that this evolution will result in the empowerment of consumers, communities, and markets centered on sustainable wellness and environments of health. The coming years represent a unique opportunity to make sure blockchain-based global health initiatives are structured in a way that re-constructs our broken system in a way that improves the lives of individuals and the communities in which they live.
Abstract:
Everything is impossible until it isn't.
Every undertaking, defined by the hard limitations at the edges of our possible achievement.
Lossless electrical conductivity, human travel beyond the sound 'barrier', running a four-minute mile...each, seen as some unassailable foe until, one-by-one, these milestones were not just approached and then attained, but very often surpassed. With time, these limits transition from the superlative, to the standard, and what once was thought of as impossible, now becomes the benchmark of superior performance.
The world of cognition enhancing drugs is no different.
For nearly as long as such structures have been differentiated, the cells of the brain and nervous system have been acknowledged to behave very differently than most of the others in the body.
Unlike the perpetual turn over that the rest of the body enjoys, there are only a few restricted areas in the brain and CNS of adult humans where new nerve cells are being regularly created. What you are born with, is what you have to work with.
Or is it?
Reliably producing productive structural, as opposed to solely chemical changes to the brain has long been seen as the 'Holy Grail' of Nootropics research..I am here today to discuss why the term "Four-minute mile" may be a bit more appropriate.
From the explosions of growth created in early childhood and in some illnesses, to the seemingly paradoxical benefits seen with the removal of malfunctioning structures, we are going to examine the sometimes baffling relationship between cognition and the physical structure of the brain, and how maybe, just maybe, there might be something you can do about it.
Abstract:
During the past decade, a confluence of scientific breakthroughs in neuroimaging, biotechnology, cybernetics, sensor technology and data analytics have created a new tool in the self-improvement arsenal. Today, for the first time in history, we can “rewire” the human brain in highly targeted ways that dramatically enhance cognition, perception, creative ability, learning speeds and health. During this session, building largely on work from DARPA, we will explore emerging technologies you can use today to dramatically enhance your brain and your cognitive abilities. We will also take a look into the future of neurotech – and how it is going to fundamentally disrupt what it means to be human.
Abstract:
In this demonstration, readily available and inexpensive (about $100 total cost) equipment will be used to relay conscious motor activity from one human subject to another. Specifically, transcutaneous electrodes and a bio-amplifier will be used to produce an electromyogram (EMG) signal from the lower arm of the controlling subject. This signal will be digitized and processed using an embedded microcontroller evaluation board (an Arduino UNO could also be used) which in turn will activate a relay to apply transcutaneous electrical nerve stimulation to the ulnar nerve of the controlled subject. Motions of the controlled subject’s fingers will involuntarily replicate those of the controlling subject.
Abstract:
Are you interested in experimenting with tDCS but don't want to pay a high price for commercial devices? Are you a maker and tinkerer at heart? If so, then this workshop is for you. Join us as we walk you through the process of DIYing your very own tDCS device. Donations for kits appreciated ($10 or whatever you like)
Abstract:
What is cognitive memory? How can you “implant” a password into it? Is this truly secure? Curiosity around these questions prompted exploration of the research and concepts surrounding the idea of making the authentication process more secure by implanting passwords into an individual’s memory. The result? The idea is that you are not able to reveal your credentials under duress but you are still able to authenticate to a system. This talk will cover the stages of memory pertaining to encoding, storage and retrieval; the limitations of human memory; and the concept of serial interception sequence learning training. Current research and experimentation will be reviewed as well as the potential for forensic hypnosis to be used to “hack” this approach.
Abstract:
Recent advances in genome editing have quickly turned ideas thought restricted to science fiction into reality such as custom synthetic organisms and designer babies. These technologies rely on the fidelity of the genetic code, which translates nucleotides into proteins. The underlying mechanism of translation is well understood where triplets of nucleotides, known as codons, are recognized by transfer RNAs with complementally nucleotide triplets. These transfer RNAs carry one of twenty amino acids which are then added to the growing protein chain by the ribosome. However, relatively little work has examined how a transfer RNA that recognizes a certain codon always carries the correct amino acid. The rules that determine which amino acid a transfer RNA carries have been termed the second genetic code. I have developed a computational method based on information theory that can elucidate the second genetic code from genomic sequences. Interestingly, the second genetic code is highly variable between organisms unlike the genetic code which is relatively static. I will present how my method cracks the second genetic code and how the variability of the second genetic code can be exploited to develop new treatments to combat bacterial infections and parasites, create targeted bio-controls to combat invasive species, and expand the genetic code to incorporate exotic amino acids.
Abstract:
Over the past decade, the ways we pursue human improvement have become increasingly invasive. We’ve so far been fortunate, but it’s likely if not inevitable that a death will occur due to biohacking. This presentation discusses the many precautions being taken by biohackers to make our procedures and projects as safe as possible.
Abstract:
Why can't microscopes diagnose disease? What if they could? For the past four years our team from NYU Tandon School of Engineering has been building an IoT system capable of turning a standard microscope into a digital imaging tool. And the goal is to connect every laboratory in the world into a global network.
We call our device the Auto Diagnostic Assistant, or ADA, in honor of Ada Lovelace, who likely died from undiagnosed cervical cancer. We think the biohacking village will enjoy learning about ADA because it is an extremely low cost microscope accessory capable of accomplishing the same tasks that were previously only able to be accomplished with whole slide imaging devices. Perfect for biohackers looking to save, share, study and analyse images of specimens from their microscope.
Our team is comprised of hardware engineers, software devs and machine learning computer scientists and our mission is to make diagnosis faster and easier. We have validated the accuracy of our mWSIs (mobile Whole Slide Images) with a pre-clinical study and presented our research as a poster at USCAP (United States and Canada Anatomical Pathology Conference). Additionally we published our original methods for creation of digital slides in the British Medical Journal (though the secret sauce has changed since then.)
The hardware prototype of ADA won an award for best hardware led social innovation from the ASME in 2015. Currently, we are launching our beta trial in India with the support of the US Department of State and the Indian Department of Science and Technology. We are actively looking for beta testers in the US as well and would be happy to provide one unit for free to a visitor or member of the biohacking village.
Abstract:
In an era of rapidly evolving technological advances, the ethical and regulatory frameworks are always playing catch up. Biohacking may have consequences that much more serious than traditional technologies. It is critical that as a community we discuss and try and address the ethical implications of biohacking. A wide range of topics will be discussed by the panel and the audience including: What are the ethical implications of the hacker mindset, the ability to experiment outside of traditional research settings with their safeguards, the use of methodologies developed by non benign parties, the unforeseen consequences of new discoveries, and should we build for billionaires or the billions?
Abstract:
Meow will be presenting on the capabilities for biological weapons that are currently able to be produced in home or community bio labs. He will explore the role that emerging technologies play in drastically reducing the technological and cost barriers to creating these constructs, and suggest ways that legislation and regulation may be employed to ensure maximum freedoms and innovation coupled with effective monitoring. Make sure to get your vaccinations before attending please.
Abstract:
Among ‘Internet of Things’ security research, there is one branch that no one has wanted to touch, until now: The Internet of Dongs. Internet connected sex toys in all shapes, sizes and capabilities are available on the market with many more being developed. Like many IoT devices, IoD devices suffer a great many security and privacy vulnerabilities. These issues are all the more important when you consider the private and intimate nature of these devices. To research this, the Internet of Dongs project was founded (https://internetofdon.gs).
This talk will explore this under researched branch of IoT and the security and privacy threats that exist. It will also cover the IoD projects efforts to bring information security best practices to the adult toy industry.
Abstract:
For this panel, two of the hosts of “Dangerous Minds Podcast” will be joined by one of the Hosts of “Two Cyborgs and a Microphone” and Sciaticnerd from "Security Endeavours" will be recording a normal episode with a mystery guest and or guests to celebrate the 100th episode of DMP, and our first live recording. Join us for the learning, stay for the laughs, without editing out our goofs, and turn the tables on everyone and ask your own questions as well. To which we can all learn together. It’s going to be a little bit fun, a little bit of learning, and a lot of laughs as always. Come out and join us, and bring your own spark! And perhaps go away with more.
Abstract:
What talk? Its going to be a theatrical song and interpretive dance related to the 5 w's and how to fix our bio economy. You get it, I know you do.
Abstract:
In recent months it seems like not a week passes where you do not encounter a headline that states that a healthcare organization has been held for ransom or in some other way involved in a breach. Healthcare has been a sector that has routinely been described as being lax with the implementation and enforcement of information security controls and the challenges faced by healthcare organizations are growing as attackers begin to look past EHR and PACS systems and target the medical devices within them. That older but still very functional computerized medical supply cabinet which was installed to improve the efficiency of operations can now be seen as a liability in that its aging unpatched control node may contain hundreds of unpatched vulnerabilities. Vulnerabilities that in the case of malware like Medjack can be used to compromise the device and use it as a staging ground for attacks against other hospital systems. In some cases, however, the risk goes beyond just a breach vector and can directly impact human life. What if that infusion pump’s dosage was illegitimately changed or the pacemaker programming made malicious? What if Brickerbot took out a surgical robot or a heart monitor at a critical time? These issues could readily give a whole new meaning to the term Denial of Service and cannot be ignored. While the FDA recently issued some guidance for the manufacturers of such devices, the secure deployment of such devices is also critical for security as all of the security features in the world are useless if no one terms them on or configures them improperly. This presentation will discuss the OWASP Secure Medical Device Deployment Standard and requisite methods that can be used to securely deploy medical devices in order to help to prevent their compromise as well as mitigate the damage that can occur if a successful compromise were to occur.
Abstract:
In recent years, direct-to-consumer genetic testing services have given people the freedom to cheaply test their DNA. We have entered a new era where our own biological source code can be explored, allowing hackers to reverse-engineer the most complex machines in the universe: the human body. This data tells us about our ancestral origins, what makes us unique, and how our health may be influenced by our genetic predispositions.
These developments are exiting, but this new frontier is clouded by concerns about safety, privacy, and ethics. Recent developments in governmental regulation bring into question our rights as individuals to freely have our genes tested. We as hackers must unite to ensure that the human source code remains open source.
How do we embrace this technology to promote individual freedoms, accelerate research, and ultimately save lives without this information falling into wrong or abusive hands? How do we as hackers hack ourselves in a safe responsible way, and what can we expect to happen regarding government regulation? We will discuss these issues, and share our experiences as geneticists in studying our own code to better understand our health. We will also tell you about an open source science experiment we're running that will allow anyone to freely participate in genomic research for the betterment of human health and longevity.
Abstract:
Biotech companies have historically been started by professors from prestigious institutions with millions of dollars of investment funding. Today, with the lowering cost of research and increasing amount of resources driven by Moore's law, robotics, software and efficiencies in bioproduction, anyone with an insight can start a biotech company for a fraction of the cost, be they PhD or biohacker.
At IndieBio, the world's largest biotech accelerator started just under 3 years ago, we've funded and help founders build 70 companies that redefine speed and innovation for biology. We have trained graduate students and first-time founders into entrepreneurs and have expanded biotechnology beyond therapeutics and medical devices. We see biology as the next big technology platform with applications in food, regenerative medicine, consumer products, neurotech, and bio-IT interfacing. Come hear about the big problems our companies are solving with biology as technology!
Abstract:
Very often amputees, prosthetists, manufacturers and particularly the general public are all excited to hear about the latest developments in prosthetic components such as feet, ankles, knees and hands. And while these components have improved significantly over the last decade there is one area that has essentially been overlooked. And it’s an area that is arguably the most critical in terms of an individual’s comfort, control, proprioception, and overall health. I am of course talking about the prosthetic socket, or interface. The socket is universal to all upper & lower limb prosthetic systems and without it, prosthetic systems simply would not exist. Today nearly all prosthetic wearers are in sockets that provide limited biomechanical control and therefore outcomes are sub-par at best. Common wearer complaints include poor socket fit, inability for it to stay on or to be worn for long periods of time, excessive heat, skin irritations, poor performance among others.
This presentation will highlight the biomechanical differences of traditional sockets that merely encapsulate a residual limb to that of the High-Fidelity™ (HiFi) Interface that uses skeletal capture and control principles that result in increased comfort, increased performance, a trend toward gait symmetry, as well as improved range of motion, energy efficiency and overall user success. Perhaps the most interesting development resulting from osseostabilization is enhanced connectivity and proprioception. By mimicking the motions of the skeleton it is believed we are in effect “fooling” the brain into believing the lost arm or leg is back, a key component in the process of becoming whole again.
Abstract:
In the past few years, software has started to “eat” healthcare in a new way. Historically, software was predominately a productivity enhancement for healthcare, but now software is emerging as a medical device. Many companies are releasing their own versions of digital medicines. Cognitive behavioral therapy (CBT) apps are coming to market that improve sleep well without pills or potions. Companies like Akili Interactive are building clinically-validated cognitive therapeutics, assessments, and diagnostics that look and feel like high-quality video games for pediatric ADHD. But how do we know any of these products work? Clinical trials and research are adapting to support the rise of digital medicine and more research is moving out of the lab and intro the home. We'll look at the new models that are supporting this trend, including a dive into Ethereum, a blockchain technology that can decentralize clinical trials, provide an economic incentive to join the trials, and endow participants with stronger rights and security for their data. We’ll share what the future could hold for at home research, digital medicine, and blockchains.
Abstract:
An estimated 30 million Americans and 300 million people worldwide suffer from genetic disease, and 15% of American couples are affected by infertility. Current assisted reproductive technology is used to prevent genetic disease and assist with conception. Human capabilities are rapidly advancing past the present application of these technologies, providing exciting possibilities for selecting and enhancing characteristics of our offspring in the brave new world of 21 st century medicine.
This discussion will outline current reproductive science in the US and abroad, and discuss the bioethical, legal, and medical consequences of a future where babies can be designed to specification.
Abstract:
In a world filled with danger emanating from all sorts of digital channels, having a proxy (or two) that you create, control, manage and direct is not just useful, but a requirement. Instead of worrying about an ineffectual government or an incomprehensible privacy policy, it’s possible that fake identities are a way to take ownership of the problem. Fake identities in the hands of the individual, are the way to swing the pendulum of privacy back to the people. The presentation will present our progress at building tools for people to implement fake identities to use offline and online. At the time of writing this abstract our users have 2 million active fake identities and the number is growing daily. These identities are used for dating, shopping, selling, social media, political statements and for numerous other uses.
Abstract:
PACS (picture archiving and communication system) is used in health care to store, retrieval, manage, distribute and present medical images. Such images are classified as PII as they are confidential patient data, usually x-rays along with a physician's patient notes. This talk will illustrate vulnerabilities in a PACS system. Note: potential surprises.
One of the huge criticisms of Security research is the lack of process and adherence to traditional research methods. Quite often our "research" is just tearing apart systems and exposing their vulnerabilities. While this is useful, there is a better way. This talk will walk through the process of how I used the scientific method to conduct the research that led to my 2011 insulin pump findings. By changing just a couple steps in our research, I think that we can bring more outside credibility to our hard, and important work.
“Genomics saved my life.” – Jen
“My father can rot in hell.” - Darren
How is personalized medicine important? Should I get a genomic test? Is the Illuminati collecting my data? What can I learn from genetic testing? What are the risks? How do I choose a test? Will my doctor hate me if I get a genetic test?
These questions won’t be answered in thirty minutes, but we offer grist for the discussion mill.
We will present two personal stories on how genomics can have a real effect on your medical treatment, your understanding of who you are, and how you live your life.
We will engage the audience in a discussion of modern technological advances along with their ethical implications. We live in an era where the very implanted hardware that keeps you alive can be evidence in the court of law. Neuroscience is now a tool used by marketing firms. Following this discussion on medical ethics we will continue with a show and tell of some recent cases where medical devices were used as evidence against the patients. We discuss some of the medical devices that have been tested by us in the past year and the vulnerabilities that were discovered.
This session will give you some basic tips for avoiding violating the law, and some preventive tips for avoiding potential legal traps if you are a biohacker. Biohacking, in this session, includes body devices, genetic engineering, synthetic biology and laboratory practices. The session will begin with some examples of why you need to know about law for biohackers and discuss legal cases useful for biohackers. The second part of the session will be a workshop-style applying these rules for biohackers.
The DEF CON Biohacking Village is a multi-day biotechnology conference focused on breakthrough DIY, grinder, transhumanist, medical technology, and information security along with its related communities in the open source ecosystem. There have been multiple instances of DIYBio overcoming conventional science. We want to celebrate the biohacker movement with a compendium of talks, demonstrations, and a medical device hackathon.
The 2017 BioHacking Village theme is Medical Industry Disrupt. The Medical Industry is one of the last to be touched by technology. We have placed doctors and the study of medicine on an alter for years; the time of ivory towers, pedestals, and information isolation has come to an end. Biohackers are working on projects that have traditionally been kept in the labs of the medical institutions. We are moving science forward by working on DIY projects that matter and use citizen science to solve the economic problems that are caused by privatizing medicine and the resources for research.
Our goal is to extend beyond the scope of mission driven technology. This event and the community behind it place a strong emphasis on diversity, inclusiveness, education, collaboration, and contribution. The BioHacking Village is also focused on helping developers learn the skills and other factors associated with successful careers in biotechnology and software development. The event aims to provide opportunities to interact with like-minded scientists and developers, to learn from one another, as well as help each other see opportunities that may be available.
We welcome anyone interested in do-it-yourself biology. Biohackers reject the idea that all medical, biological, and genetic advancements must come from a large institutions, university, or corporation. We reject the idea that modifications to biology must only be in response to disease or dysfunction. We reject the natural order given to us by evolution… or perhaps we have evolved to the point where we can take evolution into our own hands. We dare to ask the questions: How can we use technology to enhance our raw abilities, specific skills, overall health, or well-being? How can we usher in an age where we not only fix what’s broken, but we make ourselves, and our world, better?
Watch for our tweets @DC_BHV for important updates before, during, and after DEF CON... and for many neat biohacking & bioengineering retweets.
If you have any questions and for media inquires, please email us at info@dcbhv.org. For general discussion, we have a space on the DEF CON forums.