Hacking Culture and the Hunger for Knowledge

“The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State”

January 4, 2015

This speech was given at Def Con 22 in Las Vegas in August 2014, the 19th year I spoke at Def Con. A graphic represntations of speakers at Def Con over the year showed that I had spoken there more than anyone else, which means the company of a LOT of greater people.   Video […]

Read the full article →

Closing Keynote for HITB Kuala Lumpur Oct 2014 – “the future of hacking”

October 20, 2014

One might (or might not) notice that the first part of the title of the closing keynote for the final HITB Kuala Lumpur last week is the same as my first keynote for Def Con in 1996. I was asked to scan the future and see what blips appeared on radar and this limited overview […]

Read the full article →

The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State

May 5, 2014

My topic for Def Con 22 in August. The 19th year at Def Con, beginning with Def Con 4 in 1996. The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State Over a decade ago, a friend at the National Security Agency told Richard Thieme that […]

Read the full article →

Hacker Generations

February 5, 2009

By Richard Thieme This article was published simultaneously in the program for Def Con 11 (August 2003), on the hactivismo and Linux World (Australia) web sites, and in the Dutch information security magazine Informatiebeveiliging which is published by Genootschap voor Informatiebeveiligers, an infosec association based in the Netherlands. First, the meaning of hacker. The word […]

Read the full article →

Zero Day: Roswell

February 2, 2006

[Published originally in Porcupine as a “literary” story, subsequently reprinted in Zahir, a lovely science fiction magazine edited by Sheryl Tempchin.  It has been critiqued, too, as an “essay.” So there you have it – life in the 21st century. I received a telephone call from a former intelligence analyst for one of the agencies […]

Read the full article →

Gibby the Sit-down King

June 1, 2005

[This was published in the Timber Creek Review in 2005. I’m glad it was. Like “The Geometry of Near,” it’s a geek story, and the people on whom the character Gibby McDivitt was based comes clearly and with a chuckle to mind. The story links to “They Call Him Mister Tubby” in Imaginary Gardens (May […]

Read the full article →

ShmooCon 1.0 a Big Success – a review for Syngress

February 11, 2005

ShmooCon 1.0 a Big Success by Richard Thieme (rthieme@thiemeworks.com), author of Richard Thieme’s Islands in the Clickstream The first ShmooCon worked. Sponsored by the Shmoo Group, known to hackers and security professionals from presentations at Def Con, Toor Con, and other security forums,  ShmooCon was held at the Wardman Park Marriott Hotel in Washington DC […]

Read the full article →

The Geometry of Near

July 15, 2004

It’s nobody’s fault. Honest. It’s just how it is. The future came earlier than expected. They kicked it around for years but never knew what they had. By the time they realized what it was, it was already broken. Broken open, I should say. Even then, looking at the pieces of the egg and wondering […]

Read the full article →

Real Hacking Rules

October 4, 2002

Real Hacking Rules! Or, Before the word is totally useless, what is the essence of hacking? published October 4, 2002 in O’Reilly Media On the tenth anniversary of Def Con, the annual Las Vegas meeting of computer hackers, security professionals, and others, I reflected on how the con – and hacking – had changed since […]

Read the full article →

Hacking Chinatown

July 12, 2002

Hacking Chinatown By Richard Thieme “Forget it, Jake. It’s Chinatown.” Those are the last words of the movie “Chinatown,” just before the police lieutenant shouts orders to the crowd to clear the streets so the body of an innocent woman, murdered by the Los Angeles police, can be removed. “Chinatown,” with Jack Nicholson as Jake […]

Read the full article →