2600 Meeting & Lab B Hangout!

Next Friday is the first of the month. That’s this Friday. It’s 2600 time! Meeting will be at the usual place the Game Lounge at 178 Main Street in Burlington Vermont from 5-8. It’s on the third floor, so just keep going up. There will be signs to point the way.

Afterwards we will probably head over to Laboratory B our new hacker space just  1.5 blocks away for further hijinks! We’ve made a lot of improvements since we moved in 2 weeks ago!

5-8 is prime dinner time, Pizza can be grabbed from downstairs
It’s also free bus ride day too!

Laboratory B ReLaunch!

It's an empty room...but it's our empty room!

We’re back! Lab B is back in physical space! At the Hood Plant in downtown Burlington. The new bunker of research and education is roughly ~550 Sq ft of tech adventure time!

We’re planning and plotting a ton of great things to kick off our new space! What you might ask?!

Classes: Learn to solider! Assemble some electronics kits! Code up some software!
Showings: We’re going to be doing two types of awesome showings!  One being documentaries of the nerdy type and two being ReCons..al the fun of a hacker con with out the travel and expense!
Open Nights: Wondering what this is all about..well come to one of our open nights in which hack stuff! woot!

We still have to do some cleanup and of course move in! Stay Tuned!


I come for the 2600, I stay for the Lab B

That’s right, tomorrow is the is the first Friday of the month. That means Borders Books & Music in Burlington will be hosting our 2600 meeting from 5 -8pm . After that I’m sure some us will be heading over to Laboratory B in the North End to hack the night away.

If you interested in what happened at Shmoocon last weekend, the state IPV4 address space in the world or other nerdy tech hacker stuff, maybe you should come on down!

After Action from 12/28/10

What did I do you last night at the hacker space:

  • Built the contact mic (pictured)
  • Fired up & logged into the Cisco 2600 router, figured out that the IOS it’s running isn’t new enough to support VLANS. Need to sort that out.
  • Figure out that the ALFA I got from china is busted. (SAD puppy)
  • Got GPS/Kismet working on the toughbook.
  • Took out the trash

Not bad for a couple of hours at the space.

Information Security News: Call for Papers: Cyber Security in International Relations

Information Security News: Call for Papers: Cyber Security in International Relations.

Forwarded from: Brent Kesler <bdkesler (at) nps.edu>

Call for Papers: Cyber Security in International Relations
Submissions due: February 1, 2011

Strategic Insights, an online journal published by the Center on 
Contemporary Conflict at the Naval Postgraduate School, is seeking 
scholarly papers on the role that cyber security and information and 
communications technology (ICT) play in international relations and the 
strategic thinking of state and nonstate actors. This issue of SI seeks 
to inform policy makers and military operators of lessons drawn from 
real-world experience with computer and IT issues.

We seek assessment and analysis based on real-world events, not 
speculation regarding potential threats and perceived vulnerabilities. 
Papers that test or develop political theories and concepts are 
encouraged. We hold a broad definition of cyber security, and encourage 
submissions on a range of ICT topics related to threats to national 
security and individual liberties, responses to such threats from states 
and non-state actors, and emerging issues offering an over-the-horizon 
view of cyber security.

However, all submissions should be empirically based; we do not intend 
to publish work purely devoted to editorial opinion, threat 
anticipation, or policy advocacy. Submissions therefore should attempt 
to map capabilities based on available sources or game out real-world 
implications based on empirical data; any "digital Pearl Harbor" 
scenarios should attempt to measure the extent of the damage--tangible, 
social, or political--that could occur.

Sample Topics:

* Use of cyber attacks to influence government behavior (e.g., 2007 
  Estonia attacks)

* Cyber attacks as a force multiplier in conventional conflicts (e.g., 
  2008 Georgia attacks)

* Internet as a critical resource for political and social movements 
  (e.g., the Green Movement in Iran, electioneering in Moldova, Red 
  Shirt Movement in Thailand)

* Governments' efforts to contain popular movements that organize via IT 
  (e.g., shutting down or containing flash mobs, Chinese monitoring of 
  the Dalai Lama, software filtering and surveillance technologies)

* The role of information technology strategies in the US and other 
  states' foreign policy (e.g., US State Department intervention to 
  prevent Twitter shut-down during protests following the 2009 Iranian 

* Regional cyber-conflicts (e.g., North and South Korea, India and 
  Pakistan, Israelis and Palestinians)

* Espionage and secrecy in a networked world (e.g., China and Google, 

* Information technologies, civil liberties and privacy (e.g., RIM 
  Blackberry and Chinese, Indian and US efforts at surveillance;  
  Wikileaks; the Safe Harbor dispute)

* Strategic implications of cyber attacks against critical 

* Innovative cyber attacks (e.g., Stuxnet and the Iranian nuclear 

* International cooperation to manage cyber-security and IT issues 
  (e.g., Internet governance, WSIS, ICANN, WIPO)

Submission Details: Submissions should be addressed to SI Editor Brent 
Kesler and sent in MS Word compatible format to ccc (at) nps.edu. They 
should range from 10 to 20 pages, double spaced, or 3,000 to 6,000 
words. For more information on submission guidelines, please consult:


Time to put on the big thinking hat!