Facilitators: Difference between revisions

From HOPE Wiki
No edit summary
Line 146: Line 146:
| 6:00pm
| 6:00pm
|Intelligence Analysis 101
|Intelligence Analysis 101
|''your name here''
|''John C. Checco''
|-
|-
| 6:00pm
| 6:00pm
Line 211: Line 211:
| 1:00pm
| 1:00pm
|Go the Wrong Way
|Go the Wrong Way
|''your name here''
|''John C. Checco''
|-
|-
| 1:00pm
| 1:00pm

Revision as of 21:37, 22 July 2020

We need volunteers to facilitate for talks, workshops, and for Hackers Got Talent

We need one volunteer facilitator for every workshop and talk, as well as the two Hackers Got Talent events.
If you can facilitate for any of the presentations, please add your name in the table.
If editing wiki pages isn't your thing, then please email <volunteers@hope.net> and let us know which workshop, talk or HGT event you would like to facilitate for.


Workshops

Start time End time Workshop Title volunteer facilitator's name
       ************ DAY 1 ************
9:00am 1:00pm Incident Response and the ATT&CK Matrix your name here
1:00pm 4:00pm The HoneyDB Honeypot Workshop your name here
4:00pm 5:00pm Four Steps to FOIA Mastery (1) Gil Elliot
5:00pm 6:00pm How to Develop a Map Based UI Using Javascript your name here
6:00pm 7:00pm Inventory Management Playground (1) your name here
7:00pm 8:30pm Surveillance Capitalism, Predictive Analysis, and You (1) your name here
8:30pm 9:30pm NO WORKSHOP
9:30pm 11:30pm Using the ACTFOIA Methodology to Promote Transparency Around the World your name here
       ************ DAY 2 ************
9:00am 10:30am Evolve Beyond Grade-Based Education and Support Virtual Learning Communities With a Spreadsheet your name here
10:30am 12:00pm Mating Online (with Mate Tea) (1) your name here
12:00pm 4:00pm Securing Web Apps your name here
4:00pm 6:00pm How to Get Published in 2600 (Or Anything Else) your name here
6:00pm 11:00pm Hands-On With Wi-Fi Hacking on the ESP8266 your name here
       ************ DAY 3 ************
9:00am 1:00pm Introduction to Attack Techniques your name here
1:00pm 2:00pm How We Made a Queer "City-Walk" Film During a Pandemic your name here
2:00pm 3:00pm Robots, Science, and Artistic Revolutionary Practices your name here
3:00pm 4:00pm Let's Build a New Hackerspaces.org! A Discussion and Workgroup (1) your name here
4:00pm 6:00pm Building a Home Lab and Introduction to Web Application Hacking your name here
6:00pm 11:00pm Create Your Own Wi-Fi Connected Open Source USB Rubber Ducky your name here
       ************ DAY 4 ************
9:00am 3:00pm OSINT Primer your name here
3:00pm 4:00pm Let's Build a New Hackerspaces.org! A Discussion and Workgroup (2) your name here
4:00pm 5:00pm Effective Meeting Design and Facilitation: Yes, Even Hackers Need to Run Meetings your name here
5:00pm 6:00pm Intelligence Analysis 101 John C. Checco
6:00pm 11:00pm Design Your Own Digispark USB Attack Tool your name here
       ************ DAY 5 ************
9:00am 1:00pm COBOL CTF your name here
1:00pm 2:30pm Build Your GOVERNANCE.md File With CommunityRule your name here
2:30pm 4:30pm Launch Your Own Website Phishing Attacks your name here
4:30pm 5:30pm How to Motivate Hackers and Fight COVID-19 With Botnets your name here
5:30pm 6:30pm Four Steps to FOIA Mastery (2) your name here
6:30pm 7:30pm A Newsroom of Two: Your Computer and You your name here
7:30pm 8:30pm Create Your Portable CentOS Homelab in About an Hour your name here
8:30pm 11:30pm Teaching an Arduino to Think your name here
11:30pm 12:30am Hackers in a Post Roe v. Wade World (workshop) your name here
       ************ DAY 6 ************
9:00am 1:00pm Go the Wrong Way John C. Checco
1:00pm 2:00pm How to Start Contributing Open Source: Examples From the Apache Software Foundation your name here
2:00pm 3:30pm Introduction to Modular Synthesis Using VCV Rack your name here
3:30pm 5:30pm D-I-Yerba Mate Soda - How to Brew Mate Soda at Home your name here
5:30pm 7:00pm MADDES Secret Lair your name here
7:00pm 8:30pm Hidden in Plain Text: An Introduction to PGP/GPG Encryption (1) your name here
8:30pm 10:00pm How to Prove and Assess Quality Learning (With \*DAS) (1) your name here
10:00pm 11:00pm Build an Easy Ventilator your name here
       ************ DAY 7 ************
9:00am 12:00pm Artistic PCB Design for Terrified Beginners your name here
12:00pm 2:00pm Hands-On Introduction to Apache Beam your name here
2:00pm 3:00pm Python + Telnet = Muhahahha!!! your name here
5:00pm 6:30pm Surveillance Capitalism, Predictive Analysis, and You (2) your name here
6:30pm 8:30pm Password Superpowers: How to Crack Hashes and Stump Hackers your name here
8:30pm 10:00pm How to Prove and Assess Quality Learning (With \*DAS) (2) your name here
10:00pm 11:00pm DIY Fabric Mask with Laser Cutting your name here
       ************ DAY 8 ************
9:00am 10:30am A Brief Introduction to GNU Screen: How to Make the Command Line Work for You your name here
10:30am 2:00pm Arduino for Total Newbies your name here
2:00pm 4:30pm ArduTouch Music Synthesizer your name here
4:30pm 6:00pm Hidden in Plain Text: An Introduction to PGP/GPG Encryption (2) your name here
6:00pm 7:00pm Inventory Management Playground (2) your name here
7:00pm 8:30pm Custom Electronics + Activism in K-12 Education by MakeFashion Edu your name here
8:30pm 10:00pm Weaving The Future your name here
10:00pm 11:00pm Glow in the (Edible) Dyes (2) your name here
       ************ DAY 9 ************
9:00am 10:30am Mating Online (with Mate Tea) (2) your name here
10:30am 12:00pm Free Speech Zero Day: Fascists Are Abusing It, Corporations Exploit It - How Do We Take It Back? your name here
12:00pm 1:30pm Machine Learning for Anyone your name here
1:30pm 3:30pm World Wide Wars: Introduction to Exploiting Web Applications your name here

Hackers Got Talent

Start time End time Title volunteer facilitator's name
       ************ NIGHT 1 ************
10:00pm 11:59pm Hackers Got Talent -- Night 1 your name here
       ************ NIGHT 8 ************
10:00pm 11:59pm Hackers Got Talent -- Night 8 your name here

Talks

Talk Title volunteer facilitator's name
       DAY 1
Hacking a Human Mind in Conversation: Penetrating the Conscious Minds Critical Factor to Elicit a Desired Response your name here
Defend Your Own System Through Binary Recompilation your name here
Hacktivism Rides Again your name here
75,000 FOIA Requests Can't Be Wrong: Lessons From a Decade of Transparency Spelunking your name here
Quantum Encryption your name here
Keynote: Cory Doctorow your name here
Boot Genie: Hacking and Cheating at Boot Sector Games your name here
Advanced Wi-Fi Hacking With $5 Microcontrollers your name here
Hacking Society, Hacking Humanity your name here
Portal to Tesla's Wardenclyffe Lab your name here
Free as in Dirt: In Pursuit of Truly Open Source Physical Objects your name here
       DAY 2
A Death Blow to the Web of Trust your name here
Hunting Bugs in Your Sleep - How to Fuzz (Almost) Anything With AFL/AFL++ your name here
Power to the People: Effective Advocacy for Privacy and Security your name here
Fight Back Against Stalkers Online: Tips for Everyone your name here
Meet the EFA: A Discussion on Grassroots Organizing for Digital Privacy, Security, Free Expression, Creativity, and Access to Knowledge your name here
Keynote: Yeshimabeit Milner your name here
Librarians and Crisis Response: The Case of COVID-19 Maker Response your name here
How Your Mobile Phone Is Tracking You - and How to Fight Back your name here
The Election System - Can We Fix It? Yes, We Can! your name here
Anatomy of an Accidental Honeypot your name here
One Ring to Surveil Them All: Hacking Amazon Ring to Map Neighborhood Surveillance your name here
People Are Not Equal to Bots - or How Researchers Delegitimize Social Movements your name here
Back Seat Webdriving via Browser Automation your name here
Sex Work as Artistic Practice: A Discussion on Creativity, Digital Freedom and Mutual Aid in the Age of COVID your name here
A New Techno-Communication Style (and Meta Media) your name here
       DAY 3
DHS BioWatch: A Failure of Oversight and Accountability your name here
Solarpunk, Cyberpunk and Popculture: Technological Narratives tl;dr your name here
Censorship Is No Longer Interpreted as Damage (And What We Can Do About It) your name here
Hacking a Foreign Lawsuit: Project Gutenbergs Experience, and What It Means for You your name here
Keynote: Jaron Lanier your name here
Reform or Expire? The Battle to Reauthorize FISA Programs your name here
OSINT of Facilities by Physical Reconnaissance your name here
How to Hack Your Way in a Comedy Show your name here
Hacking Enigma: The Real Story of the "Imitation Game" and Alan Turing your name here
Weaknesses in Security Testing your name here
A History of Social Engineering: From Mass to Interpersonal to Masspersonal your name here
Empathy, Equity, and Sex/Tech at the Margins your name here
Let's Have a Board Level Talk (i.e., Hardware Interface Boards) your name here
       DAY 4
Hacking ISO Shipping Container Corner - Mobilizing a TEU in a Way You Never Imagined your name here
On Computational Law: Why the History of Computing Could Be the Future of Law your name here
HomeBot is Alive! Building a Wi-Fi-enabled, Cloud-based, Tweeting, and SMS-ing Arduino Water Leak Detector - A Basic DIY Project Story your name here
iWar and Information Warfare, the Next Phase of Internet Motility: Manipulation Inherent to the Internet's DNA your name here
The Hackbase Revolution your name here
Keynote: Richard Thieme your name here
Hacking Web Servers to Make Them More Secure and Faster Using Open Standards your name here
Beyond End-to-End your name here
On Doing Good Enough your name here
Hackers and the Arms Race for Privacy your name here
Launching the Cyrillic IDN TLD as the first Internationalized Domain Name in the World your name here
Mobile First Digital Identities and Your Privacy your name here
Hacking Fake News: How Hackers Can Help Fact Checkers your name here
How Much Food Coloring Can Your Robot Handle? An Intro to Poisoning Machine Learning Systems your name here
The Battle for Our Emotions... Control the Narrative, Control the People your name here
       DAY 5
DIY Learning COVID-19 your name here
Hacking Cancer: A Personal Odyssey With Death" your name here
Makerspaces Hacking the Space Industry by Enabling Effective Cross-Industry Collaboration and Enhancing the Space Workforce Development your name here
Ring's Wrongs: Surveillance Capitalism, Law Enforcement Contracts, and User Tracking your name here
Saving Hacking From the Zaibatsus: A Memoir your name here
Keynote: Idalin Bobé your name here
We Need to Talk About Amazon: An Introduction to Capitalism your name here
Inside Job: Exploiting Alarm Systems and the People Who Monitor Them your name here
Brain Backups: What's My Brain Got to Do With Me? your name here
Bildschirmtext your name here
Be Kind to the N00bz: Effective Knowledge and Resource Sharing your name here
ProjectMF 2.0 with NPSTN your name here
How Asian Makers Unite During COVID-19 (Practices From Japan, Malaysia, and China) your name here
Hackers in a Post Roe v. Wade World your name here
SE for Introverts: A Proposed Handbook your name here
       DAY 6
The Pocket Organ: An Open Source Musical Instrument your name here
20 Years of Scary Technology: City Tech's "Gravesend Inn" your name here
How to Turn Your Hacking Skills Into a Career your name here
Trust, but Verify: Maintaining Democracy In Spite of ?????????????? ????????? your name here
Irregulators v FCC: The Trillion Dollar Broadband and Accounting Scandal your name here
Keynote: Tiffany Rad your name here
When Cops Get Hacked: Lessons (Un)Learned from a Decade of Law Enforcement Breaches your name here
QubesOS for Organizational Security Auditing your name here
Fakes Aren't Funny -- or Are They? your name here
Introduction to Locksmithing your name here
Introducing *DAS: A Framework for Certifying Hacker Knowledge your name here
Source Code to the Human Mind - The Science Behind Social Engineering your name here
Queering Tech your name here
Hackers and the Gnostic Tradition your name here
Ask A Sex Geek: Hacking + Human Sexuality your name here
       DAY 7
Polygraph "Tests" and How to Beat Them your name here
A Hacker's Toolkit for Global Travel (Or, How to Travel Anywhere on Airline Miles) your name here
Securing a Remote Workforce in the Face of COVID-19 and Planning for the Future your name here
Who Has Your Face? The Fight Against U.S. Government Agencies' Use of Face Recognition your name here
Clearview AI: The Shady Company Tracking Your Face Online your name here
Keynote: Flavio Aggio your name here
From Cyber Stalking to Spyware - What Do We Know About Stalkerware in Intimate Partner Violence Situations? your name here
2020 Elections: What to Expect your name here
Hybrid Attacks - Becoming the Stainless Steel Rat your name here
Pricing and Mapping the Underground Economy: An Analysis of Contracts on the Biggest Online Hacking Forum your name here
Sex, Big Data, and User Autonomy your name here
Pick Better Fights With Your Boss your name here
The Wonderful World of Cocktail Robotics your name here
No One Can Predict the Future your name here
Intro to Game Hacking on the NES your name here
       DAY 8
Weeding Data Space your name here
Secure or Get Compromised: Unveiling the Web Security in IoT Devices your name here
Updates on I-star Organizations From the Bullshit Police your name here
Ask the EFF: The Year in Digital Civil Liberties your name here
Keynote: Libby Liu your name here
Signalbots: Secrets Distribution and Social Graph Protection for Activists your name here
Principles of Digital Autonomy your name here
The SecureDrop Journalist Workstation: Handling Anonymous Submissions With Qubes OS your name here
Fake Faces your name here
Resistance to NSA-Level Global Adversaries With the Nym MixNet your name here
A Decepticon and Autobot Walk Into a Bar: A *New* Python Tool for Enhanced OPSEC your name here
Cybersecurity and Clown your name here
       DAY 9
Stop Botting My Baby: How to Protect Your New Streaming Platform from Malicious Automation your name here
#RFC 1984 - or Why You Should Start Worrying About Encryption Backdoors and Mass Data Collection your name here
PolySense: Reverse Engineering Flex Sensors, and Destroying Your Kitchen With Chemistry for Electrical Functionalization of Everyday Objects your name here
The Privacy of 100+ Million Children, Families, and Young Adults Is Unprotected your name here
Inside the Fight for the Right to Repair: How Tractor Hacking Was Legalized your name here
Keynote: Cindy Cohn your name here
Zbay, Fighting FAANG, and the Quest for a Peer-To-Peer Messaging App That "Just Works" your name here
Experiences in Sharing Digital Security Workshops in an Autonomous and Open Hackerspace in Mexico your name here