Slide Show: The Sights Of Black Hat
A photo recap of a week of research, crowds and parties at Black Hat USA 2013
August 7, 2013
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=700&auto=webp&quality=80&disable=upscale)
With a record-setting attendance of over 7,500, Black Hat USA crowds thronged the halls at Caesar's Palace between the sessions, keynotes, and sponsor hall festivities. Next year the show will expand into bigger digs at Mandalay Bay.
For thorough coverage of the keynotes and research at the show, check out Dark Reading's special Black Hat coverage page.
Photo Credit: Black Hat USA 2013
"It's not true that we are collecting everything," General Keith Alexander, NSA director, told the audience during his highly anticipated keynote at the show. His talk was one of the first detailed presentations he'd given the community since the Snowden affair heaped criticism on the agency for what some call the unconstitutional operation of the PRISM program.
Photo Credit: Black Hat USA 2013
Another year of Arsenal demos kept audiences rapt. Here, Michael Ossmann, a wireless researcher from Great Scott Gadgets, showed off his HackRF project, which is developing an open source hardware design for a low-cost Software Defined Radio transceiver platform. The idea is to use one piece of equipment to implement any kind of wireless technology.
Photo Credit: Black Hat USA 2013
Former network engineer and current JD candidate at Santa Clara Law Christie Dudley stepped up for a turbo talk about the current regulatory legal environment around data collection practices by cell phone providers.
Photo Credit: Black Hat USA 2013
Researchers with Bishop Fox, Stephen Smith and Drew Porter, talk about how they managed to outmaneuver one of the most common office and home security system keypads by building a rogue cellular base station to intercept communications with physical security monitoring companies.
Photo Credit: Black Hat USA 2013
Well known for his insulin pump hack presented at Black Hat a few years back, Jay Radcliffe of Inguardians came back this year to discuss the intricacies of how researchers must work with the FDA to document and submit bugs in medical devices in order to make a difference, and spur manufacturers to make meaningful changes.
Photo Credit: Black Hat USA 2013
The Pwnie Awards judges panel hams it up before dispensing their awards for security accomplishments and noteworthy FAILs. Some of the highlights included an award for most innovative research to Mateusz "j00ru" Jurczyk, Gynvael Coldwind for their work developing Bochspawn, a lifetime achievement award for Barnaby Jack, and an award for epic 0wnage jointly presented to Edward Snowden and the NSA.
Photo Credit: Black Hat USA 2013
Brian Muirhead, chief engineer for NASA JPL, related his experiences in landing multiple exploratory rovers on Mars to the practice of managing risks. In innately risky ventures, he said it is important to understand what an organization's risk paradigm is because it will drive the business' processes and systems.
Photo Credit: Black Hat USA 2013
Sporting a t-shirt to promote his peepdf tool, researcher Jose Miguel Esparza of Fox-IT dove in-depth into techniques used by cybercriminals to maliciously modify PDFs and obfuscate the code to bypass security measures.
Photo Credit: Black Hat USA 2013
Kevin McNamee of Kindsight Security Labs offered a live demo of how his techniques for building an Android SpyPhone service could be used to track and "0wn" an Android device via a Web-based command and control server.
Photo Credit: Black Hat USA 2013
Kevin McNamee of Kindsight Security Labs offered a live demo of how his techniques for building an Android SpyPhone service could be used to track and "0wn" an Android device via a Web-based command and control server.
Photo Credit: Black Hat USA 2013
Kevin McNamee of Kindsight Security Labs offered a live demo of how his techniques for building an Android SpyPhone service could be used to track and "0wn" an Android device via a Web-based command and control server.
Photo Credit: Black Hat USA 2013
Read more about:
Black Hat NewsAbout the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024