The Need for a Computer Crime Innocence Project
Hacking Your GPS
Hacking Terrorist Networks Logically and Emotionally
Hacking for an Audience: Technology Backstage at Live Shows
From Indymedia to Demand Media: Participation, Surveillance, and the Transformation of Journalism
Lock Bypass without Lockpicks
Simpsons Already Did It - Where Do You Think the Name "Trojan" Came From Anyway?
Cats and Mice: The Phone Company, the FBI, and the Phone Phreaks
Burning and Building Bridges: A Primer to Hacking the Education System
American Bombe: How the U.S. Shattered the Enigma Code
The DMCA and ACTA vs. Academic and Professional Research: How Misuse of This Intellectual Property Legislation Chills Research, Disclosure, and Innovation
TrackMeNot: Injecting Reasonable Doubt in Everyone’s Queries
Into the Black: DPRK Exploration
Informants: Villains or Heroes?
The Freedom Box: How to Reclaim Privacy on the Web
CV Dazzle: Face Deception
Bakeca.it DDoS - How Evil Forces Have Been Defeated
Hacking the Food Genome
Hackers without Borders: Disaster Relief and Technology
The Black Suit Plan Isn't Working - Now What?
Sniper Forensics - Changing the Landscape of Modern Forensics and Incident Response
The HOPE Network
Closing Ceremonies