DEF CON (also written as DEFCON, Defcon, or DC) is a
hacker convention held annually in
Las Vegas
Las Vegas, colloquially referred to as Vegas, is the most populous city in the U.S. state of Nevada and the county seat of Clark County. The Las Vegas Valley metropolitan area is the largest within the greater Mojave Desert, and second-l ...
,
Nevada
Nevada ( ; ) is a landlocked state in the Western United States. It borders Oregon to the northwest, Idaho to the northeast, California to the west, Arizona to the southeast, and Utah to the east. Nevada is the seventh-most extensive, th ...
. The first DEF CON took place in June 1993 and today many attendees at DEF CON include
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
professionals,
journalist
A journalist is a person who gathers information in the form of text, audio or pictures, processes it into a newsworthy form and disseminates it to the public. This is called journalism.
Roles
Journalists can work in broadcast, print, advertis ...
s, lawyers, federal government employees, security researchers, students, and
hackers with a general interest in
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
,
computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking
wargames). Contests held during the event are extremely varied and can range from creating the longest
Wi-Fi
Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
connection to finding the most effective way to cool a beer in the
Nevada
Nevada ( ; ) is a landlocked state in the Western United States. It borders Oregon to the northwest, Idaho to the northeast, California to the west, Arizona to the southeast, and Utah to the east. Nevada is the seventh-most extensive, th ...
heat.
Other contests, past and present, include
lockpicking,
robotics-related contests, art, slogan, coffee wars,
scavenger hunt
A scavenger hunt is a game in which the organizers prepare a list defining specific items that need to be found, which the participants seek to gather or complete all items on the list, usually without purchasing them. Usually participants work i ...
, and
Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as
red team
A red team is a group that simulates an adversary, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work fo ...
exercises).
Federal law enforcement agents from the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
,
DoD,
United States Postal Inspection Service
The United States Postal Inspection Service (USPIS), or the Postal Inspectors, is the Federal law enforcement in the United States, federal law enforcement arm of the United States Postal Service. It supports and protects the U.S. Postal Servic ...
,
DHS (via
CISA) and other agencies regularly attend DEF CON.
Some have considered DEF CON to be the "world's largest" hacker conference given its attendee size and the number of other conferences modeling themselves after it.
History
DEF CON was founded in 1993, by then 18-year-old
Jeff Moss as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a
FidoNet
__
/ \
/, oo \
(_, /_)
_`@/_ \ _
, , \ \\
, (*) , \ ))
______ , __U__, / \//
/ FI ...
protocol based hacking network from
Canada
Canada is a country in North America. Its Provinces and territories of Canada, ten provinces and three territories extend from the Atlantic Ocean to the Pacific Ocean and northward into the Arctic Ocean, making it the world's List of coun ...
. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.
The term DEF CON comes from the movie ''
WarGames'', referencing the
U.S. Armed Forces defense readiness condition (DEF CON). In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a
telephone keypad, a reference to
phreakers. The official name of the conference includes a space in-between DEF and CON.
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success. In 2019, an estimated 30,000 people attended DEF CON 27.
For DEF CON's 20th Anniversary, a film was commissioned entitled ''DEF CON: The Documentary''. The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.
In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to
COVID-19
Coronavirus disease 2019 (COVID-19) is a contagious disease caused by the coronavirus SARS-CoV-2. In January 2020, the disease spread worldwide, resulting in the COVID-19 pandemic.
The symptoms of COVID‑19 can vary but often include fever ...
.
In 2020, due to safety concerns over
COVID-19
Coronavirus disease 2019 (COVID-19) is a contagious disease caused by the coronavirus SARS-CoV-2. In January 2020, the disease spread worldwide, resulting in the COVID-19 pandemic.
The symptoms of COVID‑19 can vary but often include fever ...
the DEF CON 28 in-person Las Vegas event was cancelled and replaced with DEF CON Safe Mode, a virtual event planned for the same August 6–9 dates as DC 28.
In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via
Twitch and
Discord
Discord is an instant messaging and Voice over IP, VoIP social platform which allows communication through Voice over IP, voice calls, Videotelephony, video calls, text messaging, and digital media, media. Communication can be private or take ...
). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas.
Components
Handles
Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder
Jeff Moss' handle of "
Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the conference and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.
Badges

A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (
PCB), with
LEDs, or sometimes being a non-electronic badge such as a
vinyl record
A phonograph record (also known as a gramophone record, especially in British English) or a vinyl record (for later varieties only) is an analog signal, analog sound Recording medium, storage medium in the form of a flat disc with an inscribed, ...
. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the
Konami Code
The Konami Code (, ''Konami Komando'', "Konami command"), also commonly referred to as the Contra Code and sometimes the 30 Lives Code, is a cheat code that appears in many Konami video games, as well as some non-Konami games.
The code has al ...
in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.
Villages
Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include Aerospace Village, Car Hacking Village, IoT Village, Recon,
Biohacking,
lockpicking,
ham radio
Amateur radio, also known as ham radio, is the use of the radio frequency spectrum for purposes of non-commercial exchange of messages, wireless experimentation, self-training, private recreation, radiosport, contesting, and emergency communi ...
, and the well known
Social Engineering and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.
Internal Conferences
DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
* Queercon, a meetup of
LGBTQ
LGBTQ people are individuals who are lesbian, Gay men, gay, bisexual, transgender, queer, or questioning (sexuality and gender), questioning. Many variants of the initialism are used; LGBTQIA+ people incorporates intersex, Asexuality, asexual, ...
community.
* Linecon, any long line has the potential to turn into a con.
* QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.
Workshops
Workshops are dedicated classes on various topics related to
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking
IoT devices, playing with
RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
, fuzzing and attacking smart devices.
Fundraising
Since DEF CON 11, fundraisers have been conducted for the
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
(EFF). The first fundraiser was a
dunk tank
A dunk tank, also known as a dunking booth or dunking machine, is a common feature at Canadian and American fairs, fundraisers, and celebrations. It involves at least two participants, one of whom sits on a collapsible bench above a human-sized ...
and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
Contests
Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker Jeopardy, Scavenger Hunt, Capture the Packet, Crash and Compile, and Hackfortress to name a few.
Black Badge
The Black Badge is the highest award DEF CON gives to contest winners of certain events.
Capture the flag (CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.
In April 2017, a DEF CON Black Badge was featured in an exhibit in the
Smithsonian Institution
The Smithsonian Institution ( ), or simply the Smithsonian, is a group of museums, Education center, education and Research institute, research centers, created by the Federal government of the United States, U.S. government "for the increase a ...
's
National Museum of American History
The National Museum of American History: Kenneth E. Behring Center is a historical museum in Washington, D.C. It collects, preserves, and displays the heritage of the United States in the areas of social, political, cultural, scientific, and m ...
entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System, the winner of the
DARPA
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
2016 Cyber Grand Challenge at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
Capture the flag
The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year. It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.
Capture the Flag History
In 1996, the first DEF CON CTF was organized, with a couple of
servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.
In 2002, the company
Immunix took part in the game under the moniker "immunex", to benchmark the security of their Linux-based operating system, with modifications including
StackGuard,
FormatGuard,
OpenWall's
non-executable stack, SubDomain (the ancestor of
AppArmor), ... Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised. It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard.
In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.
In 2008, the Sk3wl of Root team took advantage of a
bug in the game (
privilege dropping and
forking were inverted), allowing them to have such a massive lead that they spent most of the CTF playing
Guitar Hero
''Guitar Hero'' is a series of rhythm games first released in 2005, in which players use a guitar-shaped game controller to simulate playing primarily lead guitar, lead, bass guitar, bass, and rhythm guitar across numerous songs. Players match ...
.
In 2009, it was announced that "Diutinus Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was the organizer.
"Hacking the top hacker contest seemed like a fun way to introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the DEF CON 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.
In 2011, the team "lollerskaters dropping from roflcopters" used a
0day in
FreeBSD
FreeBSD is a free-software Unix-like operating system descended from the Berkeley Software Distribution (BSD). The first version was released in 1993 developed from 386BSD, one of the first fully functional and free Unix clones on affordable ...
(namely CVE-2011-4062) to escape
jails
A prison, also known as a jail, gaol, penitentiary, detention center, correction center, correctional facility, or remand center, is a facility where people are imprisoned under the authority of the state, usually as punishment for various cri ...
, causing havoc in the game's infrastructure.
In 2016, the 15th edition of the CTF was done in partnership with the
DARPA
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
, as part of its
Cyber Grand Challenge program, where teams wrote autonomous systems to play the game without any human interaction.
In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a
middle-endian with 9 bits bytes
CPU. With its specifications released only 24 hours before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.
Groups
DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the
2600 meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online. DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek permission to make a logo that includes the official DEF CON logo with approval.
Notable incidents
Following are a list of high-profile issues which have garnered significant media attention.
Entertainment references
* DEF CON was also portrayed in ''
The X-Files
''The X-Files'' is an American science fiction on television, science fiction drama (film and television), drama television series created by Chris Carter (screenwriter), Chris Carter. The original series aired from September 10, 1993, to Ma ...
'' episode "
Three of a Kind" featuring an appearance by
The Lone Gunmen. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention.
* A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by
Winn Schwartau, demonstrates some of the early DEF CON culture.
*A trip to DEF CON for a hacker showdown figures into the plot of ''
The Signal''. Director
William Eubank
William Eubank (born November 15, 1982) is an American film director, screenwriter and cinematographer. On his first feature film, ''Love (2011 film), Love'', released in 2011, in addition to directorial and director of photography duties, Eubank ...
came to Las Vegas and screened the film at DEF CON Movie Night.
* A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of ''
Jason Bourne'', the fifth film of the
''Bourne'' film series. The primary antagonist of the film, a fictionalized
CIA director, played by
Tommy Lee Jones
Tommy Lee Jones (born September 15, 1946) is an American actor. He has received List of awards and nominations received by Tommy Lee Jones, various accolades including an Academy Award, a Golden Globe Award, a Primetime Emmy Award and two Scre ...
, is a
keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker,
NSA director Keith B. Alexander.
* In the ''
Mr. Robot
''Mr. Robot'' is an American drama thriller television series created by Sam Esmail for USA Network. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker with social anxiety disorder, clinical depression, and dissoci ...
'' Season 3 opener "
eps3.0_power-saver-mode.h" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations.
* Documentarian
Werner Herzog
Werner Herzog (; né Stipetić; born 5 September 1942) is a German filmmaker, actor, opera director, and author. Regarded as a pioneer of New German Cinema, his films often feature ambitious protagonists with impossible dreams, people with unusu ...
included DEF CON in his 2016 film ''
Lo and Behold, Reveries of the Connected World'', a film described as a "playful yet chilling examination of our rapidly interconnecting online lives".
Venues, dates, and attendance
Each conference venue and date has been extracted from the DEF CON archives for easy reference.
See also
*
Black Hat Briefings
Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together ...
*
Chaos Communication Congress
The Chaos Communication Congress is an annual hacker conference organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues related to security, cryptography, privacy and ...
(C3)
*
Electronic voting
Electronic voting is voting that uses electronic means to either aid or handle casting and counting ballots including voting time.
Depending on the particular implementation, e-voting may use standalone '' electronic voting machines'' (also ...
*
Hack-Tic, a quadrennial European convention
*
Hackers on Planet Earth
The Hackers on Planet Earth (HOPE) Computer security conference, conference series is a hacker convention sponsored by the security hacker magazine ''2600: The Hacker Quarterly'' that until 2020 was typically held at Hotel Pennsylvania, in Ma ...
(HOPE)
*
Security BSides, a community supported conference with locations across the globe
*
Summercon, the first American hacker conference, organized by members of
Phrack
''Phrack'' is an e-zine written by and for Hacker (computer security), hackers, first published November 17, 1985. It had a wide circulation which included both hackers and computer security professionals.
Originally covering subjects related to ...
*
ToorCon, a yearly hacker conference held in
San Diego
San Diego ( , ) is a city on the Pacific coast of Southern California, adjacent to the Mexico–United States border. With a population of over 1.4 million, it is the List of United States cities by population, eighth-most populous city in t ...
,
California
California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
since 1999
References
Further reading
* "
DEF CON's Moss: Undercover Reporter Damages 'Neutral Zone'." ''
Information Week
''InformationWeek'' is a digital magazine which conducts corresponding face-to-face events, virtual events, and research. It is headquartered in San Francisco, California
California () is a U.S. state, state in the Western United State ...
''. August 6, 2007.
*
* Mills, Elinor.
NSA director finally greets DEF CON hackers" ''
CNET''. July 27, 2012.
* Newman, Lily Hay
To Fix Voting Machines, Hackers Tear Them Apart WIRED
Wired may refer to:
Arts, entertainment, and media Music
* ''Wired'' (Jeff Beck album), 1976
* ''Wired'' (Hugh Cornwell album), 1993
* ''Wired'' (Mallory Knox album), 2017
* "Wired", a song by Prism from their album '' Beat Street''
* "Wired ...
August 1, 2017.
External links
DEF CON
* {{official website, https://www.defcon.org
Official FAQDEF CON GroupsDEF CON v3 Tor .onion addresses
Multimedia
DEF CON: The Documentary
DEF CON: The Documentaryon
IMDb
IMDb, historically known as the Internet Movie Database, is an online database of information related to films, television series, podcasts, home videos, video games, and streaming content online – including cast, production crew and biograp ...
A first ever look inside the DEF CON NOC (2008)The Story of DEF CON – video interview with Jeff Moss, a.k.a. Dark Tangent, the founder of DEF CON
Las Vegas Valley conventions and trade shows
Annual events in Nevada
Hacker conventions
Recurring events established in 1993
1993 establishments in Nevada