BIOHACKERS AT

July 28th - 30th, 2017
Located at Caesars Palace, 3570 Las Vegas Boulevard South, Las Vegas, Nevada 89109

See defcon.org for general conference information.

Speaker Schedule

Friday

10:00 : WELCOME TO BHV!

Speaker: Staff

10:05 : Biohacking: The Moral Imperative to Build a Better You

Speaker: Tim Cannon

About Tim:
Tim Cannon is an American software developer, entrepreneur, and biohacker based in Pittsburgh, Pennsylvania. He is best known as the co-founder and Chief Information Officer of Grindhouse Wetware, a biotechnology startup company that creates technology to augment human capabilities.

Cannon has spoken at conferences around the world on the topics of human enhancement, futurism, and citizen science, including at TEDx Rosslyn, FITUR, the University of Maryland, the World Business Dialogue, the Medical Entrepreneur Startup Hospital, and others. He has been published in Wired and featured in television shows such as National Geographic Channel’s Taboo and "The Big Picture with Kal Penn". Tim has been featured on podcasts including Ryan O'Shea's Future Grind and Roderick Russell's Remarkably Human.

Abstract:
The talk will focus on biohacking as not just an ethically grey zone but instead present the idea that biohacking is not just something we would like to see, but is something we must do if we are ever going to be capable of living up to the morals we espouse.


11:00 : Psychoactive Chemicals in Combat

Speaker: Amanda Plimpton/Evan Anderson

Amanda Plimpton/Evan Anderson:
Collaborators Amanda Plimpton and Evan Anderson are active in the body augmenting community and excited to see the current growth in the citizen science. Small groups and individuals who chose to pursue lines of inquiry and conduct ethical, methodical experiments are the key to the next series of breakthroughs that we will see across many sectors. Citizen scientists are people driven to investigate, experiment and seek answers. Whether they channel their passionate interests into a start-up business or stay in the nonprofit sector, they will continue to make important contributions in their fields. Our goal as speakers here is more modest, we are bringing forward research as a starting point for ourselves and our audience. Human experimentation has a long (and dark) history and today is fraught with ethical dilemmas and tensions. By looking at it through the lens of military experiments with a focus on psychoactive drugs we hope to add a small amount of research to the open source science body of work and to highlight the need for sound, ethically sourced data. Hopefully we will provoke thoughtful discussions around modern human experiments.

Abstract:
By looking at key experiments and trials done by the military we can learn about psychoactive chemicals and protocols that work, and don’t work, on humans. From biological enhancement to chemical deterrents, there is a wealth of information that grassroot scientists and body augmenters can use for their research and experiments.


10:30 : The Patient as CEO

Speaker: Robin Farmanfarmaian

About Robin:
Robin Farmanfarmaian is a Professional Speaker, Author, Entrepreneur, and Angel Investor, specializing in companies with the potential to impact >100M patients. Currently Robin is an Investor and VP at Invicta Medical, a medical technology company focusing on sleep apnea; VP at Actavalon, curing cancer by repairing p53; and Strategic Relations at MindMaze, VR for stroke and brain injury rehab. Her best selling book, “The Patient as CEO”, can be found on Amazon.

Abstract:
Robin's expertise showcases the future of medical technology, and how the convergence of accelerating tech will enable patients to be the key decision maker, executor, driver and ultimately the one responsible on the healthcare team. Patient empowerment and engagement through technological advancements including wearable technology, sensors, point-of-care diagnostics, 3D Printing, Tissue Engineering, Power of the Crowd, data, networks, artificial intelligence and robotics. These are some of the accelerating technologies set to fundamentally change healthcare and allow the patient to be in control of their own health.


11:30 : My dog is a hacker and will steal your data!

Speaker: Rafael Fontes Souza


About Rafael:
Rafael Fontes Souza aka b4ckd00r is a Senior Information Security Consultant at CIPHER. He is a core member of Cipher Intelligence Labs - the advanced security team focused on penetration testing, application security and computer forensics for premier clients. He started studying at age 13 and since then has disclosed security vulnerabilities and has received recognition and awards from major companies such as Apple, Microsoft, ESET, HP and others. Being done hundreds of successful penetration tests for various organizations, including government, banking, commercial sectors, as well the payment card industry.

Abstract:
This presentation is about a creative approach to intrusion tests, as the popular saying would say: "–The dog is man's best friend" (he makes you feel good and secure). Let's explore the vulnerability of layer eight, the human being, subject to error and the social engineering techniques; This is an innovative method, with art and style, will be simpler than it sounds; The dog will be used as an attack tool, which will carry a mobile phone hidden along with its pectoral collar.
The attack vectors are triggered automatically without any human interaction. This may include geographically close attacks, such as fake Wi-Fi access points, cellular base stations or local user attacks on a network, we can exploit DNS hijacking, packet injection, Evil-Twin, rogue router or ISP, and many other variants. Furthermore, the target will connect to your rogue wifi access point and the rules are enabled with the DHCP configurations to allow fake AP to allocate IP address to the clients and forward traffic to a fake/malicious web-site; Then, the information can be stored easily as well the injection of malicious file to remotely control the victim.
And it's done. You can drop your hacker dog in a park and expect him to hack people for you, quietly, that's perfect!


12:00 : The Bitcoin DNA Challenge

Speaker: Keoni Gandall

About Keoni:
Keoni Gandall- 18 year old biohacker, frequents DIYbio forums under alias "Koeng". Worked at UCI for 4 years in directed evolution lab. Likes DNA, BSD, and freedom.

Abstract:
The ultimate form of information storage: DNA.
Dumb question: Can we store Bitcoin addresses in DNA?

Participate in several challenges demystifying the idea of storing Bitcoins inside of DNA. The first who discovers the solution to each challenge wins the satoshi stored in the actual DNA code.


13:00 : Tales from a healthcare hacker

Speaker: Kevin Sacco

About Kevin
Kevin is healthcare threat hunter and has been conducting ethical hacking since the time when wardialing and sitting in hot vans all day with a bazooka (not Joe's gum) to do wardriving was in vogue. He has over 16 years experience in IT security and compliance ranging from active duty service in the US military, Big 4 consulting, compliance management at a large tech company and more recently healthcare-focused consulting - where has led and conducted more than 50 hacking engagements in the past 3 years. Kevin is the coauthor of a whitepaper on "Hacking Healthcare" and has assisted the Office of Civil Rights on a study to advise and guide the government on hacking in healthcare. In his spare time - Kevin is trained and enjoys experimenting with and working with people in various forms of cutting edge psychology and diet and nutrition approaches to maximize human potential.

Abstract:
Over past decade, electronic medical records (EMR's) and networked medical devices have become a healthcare norm. However, vendors and consumers alike have not paid sufficient attention to the security implications of EMR's and networked medical devices. In this talk, I will cover my experience [ethical] hacking and social engineering my way into healthcare networks. I will highlight security issues with healthcare networks and share real life stories.


13:30 : Implants: Show and Tell

Speaker: c00p3r

About c00p3r:
c00p3r is the founder of dangerousminds.io a biohacking. grinding, implantable tech, and network security podcast that started in late sept 2016 , a sysadmin that lives open source solutions by trade, and also pr director and member of the board of directors for prophase biostudios located in austin texas.

Abstract:
Through sharing experiences learned first hand and through work on the Dangerous Minds Podcast, c00p3r will be introducing you to implantable technology, explaining the basic products that are available on the market now, from where, as well as provide a show and tell experience of what it is like to become one of the augmentives. Come to learn, and stay to laugh and become a part of this new world of cyborgs.


14:00 : Sensory Augmentation 101

Speaker: Trevor Goodman

About Trevor Goodman:
Trevor Goodman is a bodyhacker and the Event Director for BDYHAX, the BodyHacking Convention. They are working to grow the bodyhacking and biohacking industries and communities in the US, Canada and Europe. Trevor is also the Event Director for InfoSec Southwest in Austin, TX and Director of Rogue Signal.

Abstract:
Everything you know about your environment mediated by your senses. Likely, you can see in a range of colors, hear a car horn honking, and feel the roughness of sandpaper, but light exists in bands too narrow or wide to be processed by your eyes, some sounds are too high or low to be recognized by your ears, and magnetic fields pulse around you all day. Most of us hardly notice. Dr. Paul Bach-y-Rita’s research in the 60’s eventually lead to The BrainPort which lets a user see through an electrode grid on your tongue, but sensory augmentation has stayed mostly within the realm of the medical field until recently. Now there are magnets in fingertips all over the place, Neil Harbisson can hear in colors in a wider range than you can see and companies like NeoSensory and Cyborg Nest are building even more devices that let you sense more or differently. We’ll talk through the basics of how your senses work in conjunction with your brain, about many of the great projects that help have helped individuals augment their senses, and why a vibrating North-sensing device mounted to your chest is different than a compass.


14:30 : Health as a service...

Speakers: Julian Dana

About Julian:
Julian is a Security Consultant with more than 20 years of experience. He has experience in hands-on security testing and also teaching different technical security trainings. Julian, as a frustrated doctor, was always passionate and curious about the human body.

Abstract:
The software as a service (SaaS) model is same model that we are using for our health...Unbelievable: We are treating symptoms and not curing diseases...


15:00 : Computational Chemistry on a Budget

Speakers: Mr. Br!ml3y

About Mr. Br!ml3y:
Mr_Br!ml3y is a DefCon Biohacking Village regular who is currently working on a PhD. from a research university in the Midwest. He also works in public sector network security to keep the lights on. His current research focuses on developing 3D computer models for contaminent transport in groundwater, with special emphasis on ionic contaminants (alkali metals and earths, halides). He has been exploring computational chemistry and nanochemistry to help with model development and bioinformatics as a side interest.

Abstract:
Determining effectiveness and fit of chemical compounds for human medical and health is a time-consuming and expensive process. One method for reducing time and expense is the use of computational chemistry to model compound-receptor binding, which helps rule out unpromising or suboptimal compounds. This presentation explores the fundamentals of computational chemistry for various applications and open-source programs available for use. Ab initio molecular modeling, molecular docking, and bioinformatics programs are discussed.


15:30 : Trigraph: An Ethereum-based Teleradiology Application

Speakers: Ryan Schmoll and Peter Hefley

About Ryan and Peter:
Ryan and Peter can each say that they were the world’s third largest nuclear power at some point in their life. They enjoy short walks along beaches lined with broken glass and broken dreams. They share experience keeping the world safe through “deterrence” and watching DirecTV for extended periods of time, well below ground, in America’s heartland. Subsequently, Peter pursued a life in penetration testing while Ryan made poor life decisions and is (still) studying to be a physician. With their blended experience in security, medicine, and an altruism that can only be gained by holding millions of lives at risk in support of vague and ever changing national security objectives, this duo is seeking to create a collaborative medical experience for patients and physicians that shatters the current paradigm.

Abstract:
Teleradiology is an $8 billion dollar a year industry and we are going to disrupt it. Medical records are critical infrastructure, and with an increasing emphasis on real-time interpretations of medical imagery to improve healthcare outcomes in emergency situations, it is imperative the systems that enable medical collaboration are secure and reliable. Here we present an Ethereum-based application that allows anyone who needs help interpreting an image to reach out to a radiologist anywhere in the world, securely, privately, without a third party intermediary, and for a lower price than existing teleradiology firms.


16:00 : Blockchain's Role in the Disruption of the Medical Industry

Speakers: John Bass

About John:
John Bass is the Founder and CEO of Hashed Health, a healthcare technology innovation company focused on accelerating the realization of blockchain and distributed ledger technologies. John has over 20 years of experience in healthcare technology with expertise in collaborative platforms, patient engagement, systems integration, supply chain, clinical performance and value-based payments.
Prior to Hashed Health, John was CEO at InVivoLink, a surgical patient registry and care management start-up, acquired by HCA in 2015. John’s experience also includes healthcare B2B startup empactHealth.com which was acquired by Medibuy / Global Healthcare Exchange. John is a native of Nashville and has a Chemistry degree from the University of North Carolina, Chapel Hill.

Abstract:
Over the next ten years, blockchain and distributed ledger technologies will fundamentally change the delivery of care around the globe. The blockchain provides a technical framework where trust is moved from central controlling intermediaries to the open source protocol, freeing data and assets from the control of traditional corporate interests. The great hope is that this evolution will result in the empowerment of consumers, communities, and markets centered on sustainable wellness and environments of health. The coming years represent a unique opportunity to make sure blockchain-based global health initiatives are structured in a way that re-constructs our broken system in a way that improves the lives of individuals and the communities in which they live.


16:30 : Neurogenic Peptides: Smart Drugs 4-Minute Mile

Speakers: Gingerbread

About Gingerbread:
Long-time Security malcontent Gingerbread, having been eliminated early on in this years "Pop-and-Lock Potluck", (the nations *premier* overweight break dancing competition) has returned to DEF CON with even more of his half-baked theories, bro-science, and questionable supply chain advice for your enjoyment. Early adopter of the "Not for human consumption" defense, Gingerbread has spent years conducting extensive research in the areas of cognition enhancing drugs and lifestyle regimens and in the process has become a walking encyclopedia of things NOT to do.

Abstract:
Everything is impossible until it isn't.

Every undertaking, defined by the hard limitations at the edges of our possible achievement.

Lossless electrical conductivity, human travel beyond the sound 'barrier', running a four-minute mile...each, seen as some unassailable foe until, one-by-one, these milestones were not just approached and then attained, but very often surpassed. With time, these limits transition from the superlative, to the standard, and what once was thought of as impossible, now becomes the benchmark of superior performance.

The world of cognition enhancing drugs is no different.

For nearly as long as such structures have been differentiated, the cells of the brain and nervous system have been acknowledged to behave very differently than most of the others in the body.

Unlike the perpetual turn over that the rest of the body enjoys, there are only a few restricted areas in the brain and CNS of adult humans where new nerve cells are being regularly created. What you are born with, is what you have to work with.

Or is it?

Reliably producing productive structural, as opposed to solely chemical changes to the brain has long been seen as the 'Holy Grail' of Nootropics research..I am here today to discuss why the term "Four-minute mile" may be a bit more appropriate.

From the explosions of growth created in early childhood and in some illnesses, to the seemingly paradoxical benefits seen with the removal of malfunctioning structures, we are going to examine the sometimes baffling relationship between cognition and the physical structure of the brain, and how maybe, just maybe, there might be something you can do about it.


17:00 : Creating Human 2.0: Three Case Studies from the Edges of Brain Rewiring Science

Speakers: David Bach

About David:
David Bach, MD
Founder and President, Platypus Institute
A Harvard-trained scientist, physician, and serial entrepreneur, Dr. Bach is the Founder and President of the Platypus Institute, an applied neuroscience research organization whose mission is to translate cutting-edge neuroscience discoveries into practical tools and programs that radically enhance the human experience. As an entrepreneur, Dr. Bach founded and built three healthcare technology companies, each of which became a $100M enterprise. He has also been a management consultant, a venture capitalist, a competitive martial artist and a professional cellist. He is also an avid biohacker.

Abstract:
During the past decade, a confluence of scientific breakthroughs in neuroimaging, biotechnology, cybernetics, sensor technology and data analytics have created a new tool in the self-improvement arsenal. Today, for the first time in history, we can “rewire” the human brain in highly targeted ways that dramatically enhance cognition, perception, creative ability, learning speeds and health. During this session, building largely on work from DARPA, we will explore emerging technologies you can use today to dramatically enhance your brain and your cognitive abilities. We will also take a look into the future of neurotech – and how it is going to fundamentally disrupt what it means to be human.


17:30 : Human-Human Interface

Speakers: Charles Tritt

About Charles:
Dr. Charles Tritt is a has been a professor of biomedical engineering for over 25 years. His academic credentials include a Ph.D. in chemical engineering and an M.S. in biomedical engineering. His teaching has ranged from introductory cell biology and genetics to biomedical mechatronics. Over the past several years, he has become interested in exploring the potential of hobbyist grade equipment as a vehicle to low cost and accessible medical devices and the corresponding ethical and legal implications.

Abstract:
In this demonstration, readily available and inexpensive (about $100 total cost) equipment will be used to relay conscious motor activity from one human subject to another. Specifically, transcutaneous electrodes and a bio-amplifier will be used to produce an electromyogram (EMG) signal from the lower arm of the controlling subject. This signal will be digitized and processed using an embedded microcontroller evaluation board (an Arduino UNO could also be used) which in turn will activate a relay to apply transcutaneous electrical nerve stimulation to the ulnar nerve of the controlled subject. Motions of the controlled subject’s fingers will involuntarily replicate those of the controlling subject.


18:00 : tDCS workshop

Speakers: Darren and Jen

About Darren and Jen:
Jennifer has been an information security professional for the past 20 years and is currently a Security Intelligence Analyst. Her experience includes reverse engineering malware, penetration testing, vulnerability analysis, and incident response. Jennifer studied biology and psychology and focused her studies on neurology. Her passion for brain science, coupled with computer science, has been a driving factor in her interest in the technological singularity and human/machine integration. In her free time she runs a robotics club for kids and is learning to play the ukulele. She is an avid fan of the Detroit Tigers, William Shakespeare, and the oxford comma. Darren Lawless is a security analyst with 13+ years of plugging dykes and playing sentry. He currently leads the threat monitoring team for a large security services organization. His interest in all things *bio* has blossomed and intensified over the last couple years resulting in forays, experimentation, and investigation into nootropics, biofeedback, and augmentation, implantation, brain stimulation, and a sundry wet-tech bad-assedness. Still a squire in the realm, he maintains the ability to ask real world questions like, "Why (why not) do this? What are the risks? Should we care?"

Abstract:
Are you interested in experimenting with tDCS but don't want to pay a high price for commercial devices? Are you a maker and tinkerer at heart? If so, then this workshop is for you. Join us as we walk you through the process of DIYing your very own tDCS device. Donations for kits appreciated ($10 or whatever you like)


19:00 : Implant Stations

Pokers: c00p3r, cur50r, NinaAlli

Saturday

10:00 : WELCOME TO BHV! Day 2

Speaker: Staff

10:05 : Total Recall: Implanting Passwords in Cognitive Memory

Speaker: Tess Schrodinger

About Tess:
Tess is a security engineer and researcher with over twenty years of experience in security and counterintelligence. When not researching and speaking on Insider Threat, Quantum Computing, Security Awareness, and Cryptography, she participates in triathlons and protects the world from stampeding herds of devops unicorns.

Abstract:
What is cognitive memory? How can you “implant” a password into it? Is this truly secure? Curiosity around these questions prompted exploration of the research and concepts surrounding the idea of making the authentication process more secure by implanting passwords into an individual’s memory. The result? The idea is that you are not able to reveal your credentials under duress but you are still able to authenticate to a system. This talk will cover the stages of memory pertaining to encoding, storage and retrieval; the limitations of human memory; and the concept of serial interception sequence learning training. Current research and experimentation will be reviewed as well as the potential for forensic hypnosis to be used to “hack” this approach.


10:30 : Hacking the Second Genetic Code using Information Theory

Speakers: Travis Lawrence

About Travis:
Travis Lawrence is currently a PhD candidate in Quantitative and Systems Biology at University of California, Merced. He developed an interest in both biodiversity and computers early in life. During college, he stumbled into the field of evolutionary biology which allowed him to pursue his interests in computer programming and biodiversity. The questions that are of the most interest to him are at the interface of evolutionary biology, genomics and bioinformatics.


Abstract:
Recent advances in genome editing have quickly turned ideas thought restricted to science fiction into reality such as custom synthetic organisms and designer babies. These technologies rely on the fidelity of the genetic code, which translates nucleotides into proteins. The underlying mechanism of translation is well understood where triplets of nucleotides, known as codons, are recognized by transfer RNAs with complementally nucleotide triplets. These transfer RNAs carry one of twenty amino acids which are then added to the growing protein chain by the ribosome. However, relatively little work has examined how a transfer RNA that recognizes a certain codon always carries the correct amino acid. The rules that determine which amino acid a transfer RNA carries have been termed the second genetic code. I have developed a computational method based on information theory that can elucidate the second genetic code from genomic sequences. Interestingly, the second genetic code is highly variable between organisms unlike the genetic code which is relatively static. I will present how my method cracks the second genetic code and how the variability of the second genetic code can be exploited to develop new treatments to combat bacterial infections and parasites, create targeted bio-controls to combat invasive species, and expand the genetic code to incorporate exotic amino acids.


11:00 : Biohackers Die

Speaker: Jeffrey Tibbetts

About Jeffrey:
Jeffrey Tibbetts is a Biohacker, blogger, body mod artist and nurse out of Southern California. He’s been a collaborator on projects ranging from insufflatable peptides that extend REM sleep to non-Newtonian armor implants. He placed 3rd in the Biohack Village Oxytocin Poker Tournament and performed an implant on transhumanist presidential candidate Zoltan Istvan. Jeff hosts the annual event, “Grindfest” in Tehachapi California which New York Times states is for “the real transhumanists.” He shares his lab space with two fantastic cats, Chango and Grumpus, as well as two merely acceptable cats, Binky and Mildew.


Abstract:
Over the past decade, the ways we pursue human improvement have become increasingly invasive. We’ve so far been fortunate, but it’s likely if not inevitable that a death will occur due to biohacking. This presentation discusses the many precautions being taken by biohackers to make our procedures and projects as safe as possible.


11:30 : Microscopes are Stupid

Speaker: Louis Auguste

About Louis:
Lou Auguste is an entrepreneur in residence at the NYU Tandon incubator, Future Labs. He is passionate about microscopes, global health and creating jobs. His company Alexapath is at the forefront of AI based diagnostics and have collected awards from the ASME, Qualcomm, Singularity U, the Indian government, the British government and the US government.

Abstract:
Why can't microscopes diagnose disease? What if they could? For the past four years our team from NYU Tandon School of Engineering has been building an IoT system capable of turning a standard microscope into a digital imaging tool. And the goal is to connect every laboratory in the world into a global network.

We call our device the Auto Diagnostic Assistant, or ADA, in honor of Ada Lovelace, who likely died from undiagnosed cervical cancer. We think the biohacking village will enjoy learning about ADA because it is an extremely low cost microscope accessory capable of accomplishing the same tasks that were previously only able to be accomplished with whole slide imaging devices. Perfect for biohackers looking to save, share, study and analyse images of specimens from their microscope.

Our team is comprised of hardware engineers, software devs and machine learning computer scientists and our mission is to make diagnosis faster and easier. We have validated the accuracy of our mWSIs (mobile Whole Slide Images) with a pre-clinical study and presented our research as a poster at USCAP (United States and Canada Anatomical Pathology Conference). Additionally we published our original methods for creation of digital slides in the British Medical Journal (though the secret sauce has changed since then.)

The hardware prototype of ADA won an award for best hardware led social innovation from the ASME in 2015. Currently, we are launching our beta trial in India with the support of the US Department of State and the Indian Department of Science and Technology. We are actively looking for beta testers in the US as well and would be happy to provide one unit for free to a visitor or member of the biohacking village.


12:00 : The Ethical Implications of BioHacking

Moderator: AK


About The Panel:
Moderator Amir Kalali, MD Amir was one of the original small group of DEFCON attendees that thought the introduction of Biology to DEFCON would be a great idea. Once this small group had penetrated the locked meeting room assigned to them, it was clear that a diverse group of DEFCON attendees had backgrounds and interest in the both biology and technology. Amir believes that this century will be remembered as the century that biology and technology merged to enhance humankind. Amir has a background in medicine, neuroscience, product development and thinks of himself as a translator between the worlds of biology and technology. He is keenly interested in the ethical issues that are raised by biohacking that need to be discussed and addressed.

Amy Kruse, PHD Chief Scientific Officer Platypus Institute In 2005, as the Program Manager for DARPA’s performance-focused neuroscience research program, Amy effectively created the field that the Platypus Institute focuses on. As a starting point, she named the field, coining the two most commonly used names for their research: “Applied Neuroscience,” and “Accelerated Learning.” She also conducted the seminal research - a series of studies where she definitely demonstrated that, with biofeedback and brainwave analysis, one could dramatically (and rapidly) enhance military sniper’s performance. Since that time, in a variety of capacities, Amy’s extensive research has addressed a broad range of foundational questions including: how human performance is affected by different natural conditions like sleep deprivation and stress; how elite performance can be enhanced with the use of electrical brain stimulation; and how video gaming technology can be leveraged to accelerate learning speeds. Most recently, prior to joining The Platypus Institute, Amy served as the Vice President and Chief Technology Officer for Cubic Global Defense. Amy has an interest of the ethical implications of her work and other methods of biohacking.

Amber Case studies the interaction between humans and computers and how our relationship with information is changing the way cultures think, act, and understand their worlds. Case is currently a fellow at Harvard University’s Berkman Klein Center for Internet and Society and a visiting researcher at the MIT Center for Civic Media. Case is the author of Calm Technology, Design for the Next Generation of Devices. She was the co-founder and former CEO of Geoloqi, a location-based software company acquired by Esri in 2012. In 2008, Case founded CyborgCamp, an unconference on the future of humans and computers. Case lives in Cambridge, Massachusetts and Portland, Oregon. You can follow her on Twitter @caseorganic and learn more at caseorganic.com.

David Ishee is a self taught biohacker from Mississippi who originally got into Biohacking as as extension of his dog breeding program. He's been breeding working dogs for most of his life and feels strongly that genetic engineering and advanced biotechnology are needed to fix the genetic problems facing most populations of domestically bred animals. He's been working to prove that the technology to create genetically modified animals has advanced to the point that it's now within the reach of dog breeders with minimal additional equipment and cost. His immediate goals are to demonstrate this by creating a litter of genetically modified dogs in his shed/lab of mostly hacked together equipment, then to create an information center for other animal breeders to get education, instructions and tools for using these techniques themselves.

Abstract:
In an era of rapidly evolving technological advances, the ethical and regulatory frameworks are always playing catch up. Biohacking may have consequences that much more serious than traditional technologies. It is critical that as a community we discuss and try and address the ethical implications of biohacking. A wide range of topics will be discussed by the panel and the audience including: What are the ethical implications of the hacker mindset, the ability to experiment outside of traditional research settings with their safeguards, the use of methodologies developed by non benign parties, the unforeseen consequences of new discoveries, and should we build for billionaires or the billions?


13:00 : DIYBioweapons and Regulation

Speaker: Meow Ludo Meow Meow

About Meow Ludo Meow Meow:
Meow-Ludo is the founder of biohacking in Australia, and works full time running BioFoundry. He is a full-time hacker, part-time federal political candidate, and is interested in interdisciplinary projects.He is interested in the ability of biohackers to create bioweapons and the regulations that aim to control them.

Abstract:
Meow will be presenting on the capabilities for biological weapons that are currently able to be produced in home or community bio labs. He will explore the role that emerging technologies play in drastically reducing the technological and cost barriers to creating these constructs, and suggest ways that legislation and regulation may be employed to ensure maximum freedoms and innovation coupled with effective monitoring. Make sure to get your vaccinations before attending please.


13:30 : IoT of Dongs

Speaker: RenderMan


About RenderMan:
Canadian born and raised. He hacks banks during the day and other random things at night (currently sex toys). His interests are very diverse and people seem to like to hear about his work as much as he enjoys sharing it. This has allowed him to speak at conferences and events all over the world and even change it a few times.
Often near infosec news or causing it himself, he can be found on twitter at @ihackedwhat and @internetofdongs

Abstract:
Among ‘Internet of Things’ security research, there is one branch that no one has wanted to touch, until now: The Internet of Dongs. Internet connected sex toys in all shapes, sizes and capabilities are available on the market with many more being developed. Like many IoT devices, IoD devices suffer a great many security and privacy vulnerabilities. These issues are all the more important when you consider the private and intimate nature of these devices. To research this, the Internet of Dongs project was founded (https://internetofdon.gs).
This talk will explore this under researched branch of IoT and the security and privacy threats that exist. It will also cover the IoD projects efforts to bring information security best practices to the adult toy industry.


14:00 : Dangerous Minds Podcast: Live at DCBHV celebrating 100th episode

Speaker: Awesome Folks from Various BioHacking Podcasts

Moderators:
Moderators: c00p3r and cur50r from Dangerous Minds Podcast; McStuff from 2 Cyborgs and a Microphone; Sciaticnerd from Security Endeavours.

Abstract:
For this panel, two of the hosts of “Dangerous Minds Podcast” will be joined by one of the Hosts of “Two Cyborgs and a Microphone” and Sciaticnerd from "Security Endeavours" will be recording a normal episode with a mystery guest and or guests to celebrate the 100th episode of DMP, and our first live recording. Join us for the learning, stay for the laughs, without editing out our goofs, and turn the tables on everyone and ask your own questions as well. To which we can all learn together. It’s going to be a little bit fun, a little bit of learning, and a lot of laughs as always. Come out and join us, and bring your own spark! And perhaps go away with more.


15:00 : Biotechnology Needs a Security Patch...Badly

Speaker: Ed You


About Ed:
Covert FBI super squirrel, loves working with legos, haikus, and playing handball with cement spheres. Ask him about his time in Panama-Spanish is his third language fluency, followed by sarcasm.

Abstract:
What talk? Its going to be a theatrical song and interpretive dance related to the 5 w's and how to fix our bio economy. You get it, I know you do.


15:30 : Standardizing the Secure Deployment of Medical Devices

Speaker: Chris Frenz

About Chris Frenz:
Christopher Frenz is an expert on healthcare security and privacy. He the author of the books "Visual Basic and Visual Basic .NET for Scientists and Engineers" and "Pro Perl Parsing," as well as the author of numerous articles on security related topics. He is an active member in the security community and the project lead for the OWASP Anti-Ransomware Guide and OWASP Secure Medical Device Deployment Standard projects. Frenz holds many industry standard certifications, including CISSP, HCISPP, CISM, CISA, CIPP/US, CIPM, CIPT, and CCSK.

Abstract:
In recent months it seems like not a week passes where you do not encounter a headline that states that a healthcare organization has been held for ransom or in some other way involved in a breach. Healthcare has been a sector that has routinely been described as being lax with the implementation and enforcement of information security controls and the challenges faced by healthcare organizations are growing as attackers begin to look past EHR and PACS systems and target the medical devices within them. That older but still very functional computerized medical supply cabinet which was installed to improve the efficiency of operations can now be seen as a liability in that its aging unpatched control node may contain hundreds of unpatched vulnerabilities. Vulnerabilities that in the case of malware like Medjack can be used to compromise the device and use it as a staging ground for attacks against other hospital systems. In some cases, however, the risk goes beyond just a breach vector and can directly impact human life. What if that infusion pump’s dosage was illegitimately changed or the pacemaker programming made malicious? What if Brickerbot took out a surgical robot or a heart monitor at a critical time? These issues could readily give a whole new meaning to the term Denial of Service and cannot be ignored. While the FDA recently issued some guidance for the manufacturers of such devices, the secure deployment of such devices is also critical for security as all of the security features in the world are useless if no one terms them on or configures them improperly. This presentation will discuss the OWASP Secure Medical Device Deployment Standard and requisite methods that can be used to securely deploy medical devices in order to help to prevent their compromise as well as mitigate the damage that can occur if a successful compromise were to occur.


16:00 : Reversing Your Own Source Code

Speaker: Cosmo Mielke

About Cosmo Mielke:
Cosmo has a background in astronomy, but he switched to the medical field to study the metabolic syndrome that plagued him his whole life. At the Mayo Clinic he studied the molecular and genetic basis of obesity and diabetes. Currently he is working on a nonprofit citizen science movement to fight the war on obesity with crowdsourced health data. He beleives that everyone should have the right to study their own genetic "source code" without restrictions.

For his dayjob, Cosmo got super inspired by Ghost In The Shell and decided he wanted to learn how to scan his own brain, so he got a job at UCSF as one of their top data scientists in the neurology department. He scans brains for a living. Fun story.

Abstract:
In recent years, direct-to-consumer genetic testing services have given people the freedom to cheaply test their DNA. We have entered a new era where our own biological source code can be explored, allowing hackers to reverse-engineer the most complex machines in the universe: the human body. This data tells us about our ancestral origins, what makes us unique, and how our health may be influenced by our genetic predispositions.

These developments are exiting, but this new frontier is clouded by concerns about safety, privacy, and ethics. Recent developments in governmental regulation bring into question our rights as individuals to freely have our genes tested. We as hackers must unite to ensure that the human source code remains open source.

How do we embrace this technology to promote individual freedoms, accelerate research, and ultimately save lives without this information falling into wrong or abusive hands? How do we as hackers hack ourselves in a safe responsible way, and what can we expect to happen regarding government regulation? We will discuss these issues, and share our experiences as geneticists in studying our own code to better understand our health. We will also tell you about an open source science experiment we're running that will allow anyone to freely participate in genomic research for the betterment of human health and longevity.


17:00 : The Brave New World of Bio-Entrepreneurship

Speaker: Jun Axup

About Jun Axup:
Jun Axup is the Science Director at IndieBio. She has a PhD in chemical biology and worked in various startups in immuno-oncology, lab automation robotics, CRISPR, and precision medicine. Jun is passionate about using the intersection of biology, technology, and design to increasing human healthspan.

Abstract:
Biotech companies have historically been started by professors from prestigious institutions with millions of dollars of investment funding. Today, with the lowering cost of research and increasing amount of resources driven by Moore's law, robotics, software and efficiencies in bioproduction, anyone with an insight can start a biotech company for a fraction of the cost, be they PhD or biohacker.

At IndieBio, the world's largest biotech accelerator started just under 3 years ago, we've funded and help founders build 70 companies that redefine speed and innovation for biology. We have trained graduate students and first-time founders into entrepreneurs and have expanded biotechnology beyond therapeutics and medical devices. We see biology as the next big technology platform with applications in food, regenerative medicine, consumer products, neurotech, and bio-IT interfacing. Come hear about the big problems our companies are solving with biology as technology!


17:30 : The collision of prosthetics, robotics and the human interface

Speaker: Randall Alley

About Randall Alley:
Randall Alley is CEO and Chief Prosthetist for biodesigns inc., a Southern California prosthetic facility and R&D center specializing in upper and lower limb interface (socket) systems for patients for all ages and activity levels.

Our biomechanically focused, proprietary interface designs result in improved outcomes, greater patient acceptance and are backed by evidence-based clinical support. In conjunction with his practice, Alley has worked with DEKA Research and Development as their prosthetic interface design consultant for the Defense Advanced Research Projects Agency’s (DARPA) “Revolutionizing Prosthetics Project” chartered to develop the next generation of military upper limb prosthesis (a.k.a. the “Luke Arm”). Randy is currently the Principle Investigator on biodesigns’ own DARPA/SBIR Phase II contract.

Abstract:
Very often amputees, prosthetists, manufacturers and particularly the general public are all excited to hear about the latest developments in prosthetic components such as feet, ankles, knees and hands. And while these components have improved significantly over the last decade there is one area that has essentially been overlooked. And it’s an area that is arguably the most critical in terms of an individual’s comfort, control, proprioception, and overall health. I am of course talking about the prosthetic socket, or interface. The socket is universal to all upper & lower limb prosthetic systems and without it, prosthetic systems simply would not exist. Today nearly all prosthetic wearers are in sockets that provide limited biomechanical control and therefore outcomes are sub-par at best. Common wearer complaints include poor socket fit, inability for it to stay on or to be worn for long periods of time, excessive heat, skin irritations, poor performance among others.

This presentation will highlight the biomechanical differences of traditional sockets that merely encapsulate a residual limb to that of the High-Fidelity™ (HiFi) Interface that uses skeletal capture and control principles that result in increased comfort, increased performance, a trend toward gait symmetry, as well as improved range of motion, energy efficiency and overall user success. Perhaps the most interesting development resulting from osseostabilization is enhanced connectivity and proprioception. By mimicking the motions of the skeleton it is believed we are in effect “fooling” the brain into believing the lost arm or leg is back, a key component in the process of becoming whole again.


18:00 : The Rise of Digital Medicine: At-home digital clinical research

Speaker: Andrea Coravos
@andreacoravos


About Andrea Coravos:
Andrea Coravos is the co-founder of Elektra Labs, a digital health platform democratizing clinical trials by supporting remote, at-home research. Andrea is a software engineer focused on digital medicine and neurotechnologies, a digital rights advocate, and a writer for NeuroTechX.

Abstract:
In the past few years, software has started to “eat” healthcare in a new way. Historically, software was predominately a productivity enhancement for healthcare, but now software is emerging as a medical device. Many companies are releasing their own versions of digital medicines. Cognitive behavioral therapy (CBT) apps are coming to market that improve sleep well without pills or potions. Companies like Akili Interactive are building clinically-validated cognitive therapeutics, assessments, and diagnostics that look and feel like high-quality video games for pediatric ADHD. But how do we know any of these products work? Clinical trials and research are adapting to support the rise of digital medicine and more research is moving out of the lab and intro the home. We'll look at the new models that are supporting this trend, including a dive into Ethereum, a blockchain technology that can decentralize clinical trials, provide an economic incentive to join the trials, and endow participants with stronger rights and security for their data. We’ll share what the future could hold for at home research, digital medicine, and blockchains.


18:30 : Designer Babies

Speaker: Christian and Erin
@cdameffMDDr

About Christian and Erin:
Christian "quaddi" Dameff MD MS
Christian (quaddi) Dameff is an emergency medicine physician, former open capture the flag champion, prior DEF CON speaker, and researcher. Published works include topics such as therapeutic hypothermia after cardiac arrest, novel drug targets for myocardial infarction patients, and other Emergency Medicine related works with an emphasis on CPR optimization. Security research topics including hacking critical healthcare infrastructure and medical devices. This is his thirteenth DEF CON.

Erin Hefley is a resident physician in her final year of training with the Phoenix Integrated Residency in Obstetrics & Gynecology. She has a background in public health and women's health, and obtained a Master of Public Health degree from the University of Northern Colorado prior to attending medical school at the University of Arizona - Phoenix. This is her 6th Defcon attendance over the past decade, and she is thrilled to have witnessed the development and expansion of the Biohacking Village. Her current interests include reproductive health technology, women's health policy, running, and vampire erotica

Abstract:
An estimated 30 million Americans and 300 million people worldwide suffer from genetic disease, and 15% of American couples are affected by infertility. Current assisted reproductive technology is used to prevent genetic disease and assist with conception. Human capabilities are rapidly advancing past the present application of these technologies, providing exciting possibilities for selecting and enhancing characteristics of our offspring in the brave new world of 21 st century medicine.
This discussion will outline current reproductive science in the US and abroad, and discuss the bioethical, legal, and medical consequences of a future where babies can be designed to specification.


19:00 : Lightning Talks: 10 min each

Pokers: c00p3r, cur50r, NinaAlli

Sunday

11:00 : WELCOME TO THE LAST DAY OF BHV!

Speaker: Staff

11:05 : The Future is Fake Identities

Speaker: Paul Ashley

About Paul Ashley:
Paul Ashley is Chief Technology Officer at Anonyome Labs, a startup company focused on identity obfuscation through building of fake identities. The company brings technology to every day users that allow them to interact online and offline in safety, privacy and control. Paul’s responsibilities at Anonyome Labs includes application architecture, development, emerging technologies, curating the patent portfolio, and technical partnerships.

Abstract:
In a world filled with danger emanating from all sorts of digital channels, having a proxy (or two) that you create, control, manage and direct is not just useful, but a requirement. Instead of worrying about an ineffectual government or an incomprehensible privacy policy, it’s possible that fake identities are a way to take ownership of the problem. Fake identities in the hands of the individual, are the way to swing the pendulum of privacy back to the people. The presentation will present our progress at building tools for people to implement fake identities to use offline and online. At the time of writing this abstract our users have 2 million active fake identities and the number is growing daily. These identities are used for dating, shopping, selling, social media, political statements and for numerous other uses.


11:30 : Might as well name it Parmigiana, American, Cheddar, and Swiss

Speaker: Ken Belva

About Ken Belva:
Kenneth F. Belva has had a distinguished career in cyber security for almost 20 years. His many roles have included managing a financial services cyber security program audited by the State and Fed, finding 0-days in major software, getting a US Patent on automated XSS exploitation techniques, as well as frequently speaking at many cyber security groups in NYC. He can be found on LinkedIn and on twitter at @infosecmaverick

Abstract:
PACS (picture archiving and communication system) is used in health care to store, retrieval, manage, distribute and present medical images. Such images are classified as PII as they are confidential patient data, usually x-rays along with a physician's patient notes. This talk will illustrate vulnerabilities in a PACS system. Note: potential surprises.


12:00 : How to use the Scientific Method in Security Research

Speaker: Jay Radcliffe

About Jay:
Jay Radcliffe has been working in the computer security field for over 20 years. Coming from the managed security services industry, Jay has used just about every security device made over the last decade. Recently, Jay presented ground-breaking research on security vulnerabilities in medical devices, and was featured on national television as an expert on medical device vulnerability. Jay also has experience with hardware hacking and radio technology. Jay holds a Master's degree in Information Security Engineering from SANS Technology Institute, as well as a Bachelor's degree in Criminal Justice/Pre-Law from Wayne State University. SC Magazine named him one of the Top Influential IT Security Thinkers in 2013.

One of the huge criticisms of Security research is the lack of process and adherence to traditional research methods. Quite often our "research" is just tearing apart systems and exposing their vulnerabilities. While this is useful, there is a better way. This talk will walk through the process of how I used the scientific method to conduct the research that led to my 2011 insulin pump findings. By changing just a couple steps in our research, I think that we can bring more outside credibility to our hard, and important work.


13:00 : How your doctor might be trying to kill you and how personal genomics can save your life

Speaker: dlaw and razzies

About Jennifer Szkatulski:
Jennifer has been an information security professional for the past 20 years and is currently a Security Intelligence Analyst. Her experience includes reverse engineering malware, penetration testing, vulnerability analysis, and incident response. Jennifer studied biology and psychology and focused her studies on neurology. Her passion for brain science, coupled with computer science, has been a driving factor in her interest in the technological singularity and human/machine integration. In her free time she runs a robotics club for kids and is learning to play the ukulele. She is an avid fan of the Detroit Tigers, William Shakespeare, and the oxford comma.

About Darren Lawless:
Darren Lawless is a security analyst with 14+ years of plugging dykes and playing sentry. He currently leads the threat monitoring team for a large security services organization. His interest in all things *bio* has blossomed and intensified over the last couple years resulting in forays, experimentation, and investigation into nootropics, biofeedback, and augmentation, implantation, brain stimulation, and a sundry wet-tech bad-assedness.

“Genomics saved my life.” – Jen
“My father can rot in hell.” - Darren

How is personalized medicine important? Should I get a genomic test? Is the Illuminati collecting my data? What can I learn from genetic testing? What are the risks? How do I choose a test? Will my doctor hate me if I get a genetic test?
These questions won’t be answered in thirty minutes, but we offer grist for the discussion mill.
We will present two personal stories on how genomics can have a real effect on your medical treatment, your understanding of who you are, and how you live your life.


13:30 : Neuro Ethics

Speaker: Dr. Stanislav Naydin and Vlad Gostomelsky

About Dr. Dr. Stanislav Naydin:
Dr. Stanislav Naydin is in residency to for neurology with a background in pharmaceutical sciences. He is heavily focused on procedure based medicine. He has been involved in a multitude of advanced surgeries and interventions. Prior to transitioning to the medical field Stanislav was an industrial robotics designer and programmer in the glass industry.

About Vlad Gostomelsky:
Vlad Gostomelsky is a driven security researcher with a passion for securing technology that makes civilized life possible. He is particularly focused on satellite systems security, SCADA systems supporting the critical infrastructure and wireless networks. He specializes in the intersection of physical and network security.

We will engage the audience in a discussion of modern technological advances along with their ethical implications. We live in an era where the very implanted hardware that keeps you alive can be evidence in the court of law. Neuroscience is now a tool used by marketing firms. Following this discussion on medical ethics we will continue with a show and tell of some recent cases where medical devices were used as evidence against the patients. We discuss some of the medical devices that have been tested by us in the past year and the vulnerabilities that were discovered.


14:00 : Biohacking Street Law

Speaker: Victoria Sutton

About Victoria:
Victoria Sutton, MPA, PhD, JD
Paul Whitfield Horn Professor
Associate Dean for Research and Faculty Development
Director, Center for Biodefense, Law and Public Policy
Director, Science, Engineering and Technology Law Concentration Program
Director, Dual Degree Programs in Science, Engineering and Technology
Founding Editor, Journal for Biosecurity, Biosafety and Biodefense Law


This session will give you some basic tips for avoiding violating the law, and some preventive tips for avoiding potential legal traps if you are a biohacker. Biohacking, in this session, includes body devices, genetic engineering, synthetic biology and laboratory practices. The session will begin with some examples of why you need to know about law for biohackers and discuss legal cases useful for biohackers. The second part of the session will be a workshop-style applying these rules for biohackers.







Call for Papers 2017

The DEF CON Biohacking Village is a multi-day biotechnology conference focused on breakthrough DIY, grinder, transhumanist, medical technology, and information security along with its related communities in the open source ecosystem. There have been multiple instances of DIYBio overcoming conventional science. We want to celebrate the biohacker movement with a compendium of talks, demonstrations, and a medical device hackathon.

The 2017 BioHacking Village theme is Medical Industry Disrupt. The Medical Industry is one of the last to be touched by technology. We have placed doctors and the study of medicine on an alter for years; the time of ivory towers, pedestals, and information isolation has come to an end. Biohackers are working on projects that have traditionally been kept in the labs of the medical institutions. We are moving science forward by working on DIY projects that matter and use citizen science to solve the economic problems that are caused by privatizing medicine and the resources for research.

Our goal is to extend beyond the scope of mission driven technology. This event and the community behind it place a strong emphasis on diversity, inclusiveness, education, collaboration, and contribution. The BioHacking Village is also focused on helping developers learn the skills and other factors associated with successful careers in biotechnology and software development. The event aims to provide opportunities to interact with like-minded scientists and developers, to learn from one another, as well as help each other see opportunities that may be available.

We welcome anyone interested in do-it-yourself biology. Biohackers reject the idea that all medical, biological, and genetic advancements must come from a large institutions, university, or corporation. We reject the idea that modifications to biology must only be in response to disease or dysfunction. We reject the natural order given to us by evolution… or perhaps we have evolved to the point where we can take evolution into our own hands. We dare to ask the questions: How can we use technology to enhance our raw abilities, specific skills, overall health, or well-being? How can we usher in an age where we not only fix what’s broken, but we make ourselves, and our world, better?


Important Dates


CFP Submission Form




Instruction for Authors

Like all hackers, we are looking to subvert the dominant paradigm...of life itself. Your talk should excite, elucidate, enlighten, and engage participants in the technical, mechanical, procedural, and human side of biohacking.

We are seeking three kinds of submissions: talks, demos, and labs.

Talks are the standard non-interactive presentation style, generally with slides, where one or several people enlighten, educate, and inspire the audience on an interesting topic or project.

Demos also stick to the presentation, one-to-many format, but the presenter uses most of the time to display a working technology, in real time, and may involve some level of audience interactivity.

Labs are purely hands on for the participants, who can wander in and DIY their way into biohacking. There is very little instruction, and when there is, it is one-on-one. Examples in other villages include the lock trees in the Lockpicking Village, and the tamper-evident kits in the Tamper Evident Village. Submitters are expected to provide their own materials.

In your submission, please indicate which you are applying for, but don’t worry too much if you aren’t sure. Take your best guess, and if we like your topic, we can easily change the submission type for you.

We require: A title, an abstract, outline, and presenter bio(s). If you have additional materials, such as an early draft of your slides or presentation text, please feel free to attach.

Time slots: Talk times can either be 30 minutes or 60 minutes with a demonstration. Please select your preference on the form. We reserve the right to pick a different time slot for you.

AV: Please let us know if you have AV or technical requirements besides the standard projector and mic.

Multiple Submissions: You are allowed to separately submit as many papers as you like.

Your submission will be held to the following standards:

  • Scientific rigor – Was the project conducted in accordance with the scientific method, and were any hypotheses properly investigated? Are less-scientific aspects of the topic acknowledged as such? If you’re not making any scientific claims, does your technology actually work? Or, if it was a failure, is it acknowledged as such with a detailed and interesting description of lessons-learned?
  • Significance – Is your project significant to the biohacking and scientific community? Does it add value, for either scientific, technological, ethical, cultural, or artistic purposes?
  • Originality – Is your project an original work, or at least sufficiently different from the work it builds on? (Exceptions can be made, especially for introductory & educational 101 talks.)
  • Coolness – Extra points will be given for the “cool” factor. We want to be wowed. We want our jaws to drop in wonder. We want to be blown away with the inspiring possibility that you have made reality. Amaze us.
  • Other helpful hints for paper submission can be found here.
  • No Spam Zone: No sales-focused talks or demos. Product demos or brief mention of products may be appropriate if the audience walks away with a deeper understanding of the actual technology or science involved. The focus needs to be on knowledge and skills, not on promoting a specific for-fee product. Spammers will be immediately rejected!







Topics


  • • Biotechnology
  • • BioArt
  • • DNA
  • • Bioinformatics
  • • CRISPR
  • • Human Sexuality
  • • Grinders
  • • Citizen-Scientists & DIY Research
  • • Culture
  • • 3D Printing
  • • Biomedical
  • • Engineering
  • • Implants
  • • Coatings
  • • Magnets
  • • Robotics
  • • Augmentation
  • • Neurotech
  • • InfoSec
  • • BioTech
  • • BioSecurity
  • • BioTerrorism
  • • iGEM
  • • Public Health
  • • Health Hacking
  • • Bio Law
  • • Bioethics
  • • Design
  • • BioBricks
  • • Synthetics
  • • Healthcare
  • • Food & Diet & Nutrition Hacks
  • • Mind Hacks
  • • Tissue Engineering (medical & non-medical)
  • • Biochemical Synthesis
  • • Biohacking 101
  • • Biosafety
  • • Neuro-Informatics
  • • Nootropics
  • • Aging and Life Extension
  • • Transhumanism
  • • Epigenetics
  • • Archeology
  • • Biophilic Architecture






Sponsors


The BHV celebrates global health ingenuity arising from maker communities from the dynamic perspective of emerging biology, technology, and human-enhancement. In one year, we have more than doubled our talks and tripled the number of attendees. The BioHacking Village has grown from a small half village of 11 talks and demos to a full village with 28 non-stop talks and demonstrations with standing room only and entrance lines that exceeded capacity.

Whether your interest lies in security, technology, engineering, science, humanities, design, or fabrication, donors to the BioHacking Village can be assured they are reaching an audience of unapologetically enthusiastic innovators.

For Sponsorship information, please contact: info@dcbhv.org




Contact



Watch for our tweets @DC_BHV for important updates before, during, and after DEF CON... and for many neat biohacking & bioengineering retweets.

If you have any questions and for media inquires, please email us at info@dcbhv.org. For general discussion, we have a space on the DEF CON forums.