University of Wisconsin –
University Research Park
Wisconsin Medical College
Cardinal Stritch University
Mount Mary College
Wisconsin Lutheran College
Purdue University – CERIAS
Technology, Literacy and Culture Distinguished Speakers Series of the University of Texas
Nathan B. Stubblefield Distinguished Lecturer in Telecommunications Systems Management at Murray State University, Murray KY
University of Calgary, Calgary Alberta – “Design Matters” Lecture Series
Illinois Institute of Technology
Loyola University – Chicago
Milwaukee Area Technical College
Gateway Technical College – Racine
Chippewa Valley Technical College
Waukesha County Technical College
University of Chicago Club – Milwaukee
Phi Beta Kappa – Milwaukee Chapter
Closing Keynote for Hack in the Box, Kuala Lumpur 2011
Calling a person a “conspiracy theorist” is an easy way to dismiss what used to be called “an investigative journalist” as if they are fringe, wacko, loopy or insane. But the deeper we go into the sources of “frame management” by oligarchic networks, meta-national-structures of political and economic power, patterns of activity behind some assassinations, covert operations since 1947, and the intentional destruction of some careers, the more we venture into the darkness which comes to permeate our understanding, saturate our perspective with canny insight, and erode childlike faith and naiveté.
This talk suggests ways of exploring some interesting topics and discusses why it takes what it takes to begin to have a clue, that is, a clue about the reality of our media-centric lives. Thieme returns to his roots, in a way, when he said in a keynote for Def Con 4 many years ago (for 300 attendees!) that hacking was practice for life in the twenty-first century. It is, and that century is well under way, and the methodologies of hacking are indeed essential for having a clue. So reverse engineering applies not only to physical structures but to cognitive and virtual artifacts as well. Paranoia is appropriate, things are much worse than they seem, and while we can never win at the end, we can have fun playing the game of life as contrarians and insight specialists.
As Jane Wagner said, “I am getting more and more cynical all the time and I still can’t keep up.”
Some speakers give the same speech to every audience. Thieme doesn’t. He has been privileged to grow each year with the evolution of the Def Con and Black Hat computer security conferences. Each Thieme speech is intended for a specific context and event. Audio and video streams of Def Con and Black Hat speeches can be found at these links.
Archives of Def Con Speeches, including:
- “1992 … 2002 … 2012 … Hacking: The Next Ten Years” (Def Con 10 – 2002)
- “Hacking a Trans-planetary Net” (Def Con 9 2001)
- “Social Engineering at Def Con: Games Hackers Play” (Def Con 8 – 2000)
- “The More Things Change, the More They Don’t: Soft Destruction and the Ancient Wisdom of Hacking” (Def Con 6 – 1999)
- “The Symbiotic Relationship between Computer Networks and Humans – A Rising Spiral of Mutual Transformation” (Def Con 4 – 1996)
Archives of speeches for the Black Hat Briefings USA
- Hacker Court – Black Hat USA 2002 – Thieme role plays an aggrieved business owner whose network has been vandalized by the wicked hacker Jericho
- “Defending the Information Web” – Black Hat USA 2001 – How space war is recontextualizing air war and ground war and how space war is information warfare in its purest form.
- “The Strategies of Sun Tzu and Multiple Levels of Deception” – Black Hat USA 2000 – The levers of power are in the hands of those who understand how to navigate nested levels of simulated reality.
- “Convergence – Every Man and Woman a Spy” – Black Hat USA 1998 – How technology is empowering people to have the tools and opportunities that previously were sanctioned by the state for intelligence agents only.
“A Passion for Hacking and Living on the Edge”
“The Strategies of Sun Tzu and Multiple Levels of Deception: How to Play Chess While the Board is Disappearing”
A complete speech for Black Hat Briefings 2000