Let’s back up a little bit. DEFCON is a stellar computer security conference, attended by famous computer security experts, shadowy government “spooks,” creative hackers of all sorts, and the journalists who write about them. I first attended DEFCON in 1995 as a gawky 17-year-old. DEFCON 3 was just a few hundred computer security experts wearing black leather jackets and milling around in a ballroomat the Tropicana Hotel in Las Vegas.
That weekend I learned about Kevin Mitnick getting hunted down by the FBI, war-dialing for modems, and the existence of the Internet. I met a guy with long red hair named Dan Farmer who had written a program called something like EVIL, or SATAN, I wasn’t sure which.
I was so inspired by the fascinating, brilliant, frequently leather-clad people I met at DEFCON 3 that I became a computer programmer. I still have my first DEFCON badge, a cheesy purple and white laminated number with only my first name – at age 17, I wasn’t about to to give my full name to a conference full of hackers!
Fast forward 17 years to DEFCON 20. Every time I read about something cool happening at DEFCON, I wanted to jump on the next flight to Las Vegas. But I didn’t, because of my own bad experiences at DEFCON, and those of people like KC, a journalist and student in San Francisco who wrote about attending DEFCON 19:
Nothing could have prepared me for the onslaught of bad behavior I experienced. Like the man who drunkenly tried to lick my shoulder tattoo. Like the man who grabbed my hips while I was waiting for a drink at the EFF party. Like the man who tried to get me to show him my tits so he could punch a hole in a card that, when filled, would net him a favor from one of the official security staff.
Or the experience of one of my friends, who prefers to remain anonymous. At a recent DEFCON, while leaning over to get her drink at the bar, someone slid his hand up all the way between her legs and grabbed her crotch. When she turned around, the perpetrator had already disappeared into the crowd.
My own stories from DEFCON seem tame compared to what these women went through, but I couldn’t take the constant barrage of sexual insults and walked out halfway through DEFCON 16, swearing not to return if I was going to be harassed like that again.
Unfortunately, DEFCON isn’t unusual among hacker conferences. Similar stories about Black Hat, HOPE, CCC, and others are also common. Sexual harassment at other computer conferences often appears unintentional, but at hacker conferences it’s often clear that the perp is doing it on purpose, and enjoying the hell out of it. As a woman, it’s hard to justify attending a hacker conference when I can go to an academic computer conference and get treated like a human being most of the time.
Why harassment matters
At this point, some of you are thinking, “Well, if DEFCON is so bad for women, women just shouldn’t go. Who cares?”
As KC puts it, “Defcon is also many wonderful things. It is a fantastic environment to learn, network, and connect with friends old and new.” There’s a reason that I attended DEFCON five times before I quit. DEFCON and other hacker conferences are popular for all the reasons that conferences exist at all: learning new things, meeting people in your field, improving your reputation, finding jobs, and making new friends.
Twitter, Zynga, and the NSA are only a few of the companies and government agencies that consider DEFCON prime recruiting ground for experts in all sorts of areas: network security, operating systems, robotics, surveillance, electrical engineering, intrusion detection, and anything that communicates via electromagnetic waves. When companies recruit at DEFCON, and women aren’t at DEFCON, both the companies and the women miss out.
But how do you become qualified for a computer security job in the first place? Computer security isn’t very well documented, or taught in any depth in most universities. After my first DEFCON, I knew to sign up for the DEFCON mailing list, read the 2600 magazine, and check out a copy of the UNIX Systems Administration Handbook from the computer center library. When I got a computer account at my university, I logged into the UNIX workstations instead of the Windows machines because I knew UNIX was what hackers used. I poked around UNIX until I found files I couldn’t read and commands I couldn’t run, and then I started reading manuals to understand why. I eventually became a worldwide UNIX file systems expert – all because I went to this obscure little conference in Las Vegas in 1995.
For those women who work or want to work in a computer security related field, conferences like DEFCON are the best chance to meet influential people in the field. Take Bruce Schneier, a professional speaker and the author of “Applied Cryptography” (known outside computer security for coining the term “security theater” to describe TSA security measures). I met Schneier at DEFCON 6, when I made a joke that he reused in his talk a few minutes later. The DEFCON speaker list is a who’s who of modern digital glitterati – and in a strange twist of fate, now includes the Director of the NSA.
Giving the right talk at DEFCON can make your entire career and net you dozens of offers for jobs, contracts, and book deals. DEFCON is good for hands-on learning too: For example, every year teams of security experts compete in contests like “Capture the Flag” to show off their skills and learn from each other.
Finally, everyone at DEFCON benefits from more women attending. Women “hackers” – in the creative technologist sense – are everywhere, and many of them are brilliant, interesting, and just plain good company (think Limor Fried, Jeri Ellsworth, and Angela Byron). Companies recruiting for talent get access to the full range of qualified applicants, not just the ones who can put up with a brogrammer atmosphere. We get more and better talks on a wider range of subjects. Conversations are more fun. Conferences and everyone at them loses when amazing women don’t attend.
When you say, “Women shouldn’t go to DEFCON if they don’t like it,” you are saying that women shouldn’t have all of the opportunities that come with attending DEFCON: jobs, education, networking, book contracts, speaking opportunities – or else should be willing to undergo sexual harassment and assault to get access to them. Is that really what you believe?
Is change coming to hacker conferences?
I know Im not alone in being frustrated with the climate at Defcon. Last year at Deepsec in Vienna, I met a fantastically intelligent woman developer who flat out refused to attend Defcon because of interactions like those listed above. I can think of countless other women I know in the tech industry who are regular Defcon participants and speakers who are just as fed up with this crap as me. I wonder why weve all been so polite about such an unhealthy atmosphere.
KC stopped being polite, and started doing something about the sexist atmosphere at DEFCON: she created the Red/Yellow Card Project. She got the idea from a joke a rugby-obsessed friend made after she complained about sexism at DEFCON, suggesting that she hand out red and yellow penalty cards to people making sexist comments. She designed and printed the cards and distributed them at this year’s DEFCON, with mixed reception. Some people vehemently objected, but others loved it. DEFCON founder Jeff Moss offered to pay for the printing costs of the cards.
How the Ada Initiative is changing conferences
The cards are a hilarious way to raise awareness of the problem of brutal sexual harassment at DEFCON and similar conferences. Unfortunately, it will take more than raising awareness to make hacker conferences safe for women. That’s one reason why I quit my cushy computer programmer job and co-founded the Ada Initiative, a non-profit supporting women in open technology and culture. Our scope includes open source software, open hardware, and open data – all of which are major parts of hacker conferences like DEFCON.
The Ada Initiative’s first project: an example written policy that bans harassment at conferences, sexual or otherwise, of people of all genders. Organizers for literally hundreds of conferences have adopted some form of this policy, including open source software conferences from Linux to Python to Git, the world’s largest Wikipedia conference, Wikimania, and a plethora of others including gaming cons, open video conferences, science fiction conventions, and even skeptic/atheist meetups.
The policies aren’t just empty words; several conferences have enforced their policies successfully. Many conference organizers have told us that they had record women’s attendance after they adopted a policy aimed at reducing harassment (and often higher overall attendance as well). One conference organizer said that the first year they worked hard to invite 30% women, everyone enjoyed the conference so much more that they’ve done it every year since. When women feel welcome at a conference, everyone enjoys the conference more.
A call to action and a challenge
We’re waiting to hear about the first hacker conference to adopt a specific, enforceable, well-planned policy protecting women from harassment – and then we’re going to promote the hell out of it. Will it be HOPE? CCC? DEFCON? Whichever hacker conference is first will get dozens or hundreds of new attendees, women and everyone else, too. If you want this to be your conference, and you want help designing and implementing a policy, email us at firstname.lastname@example.org.
Updated to add on August 6, 2012: BruCON, a computer security conference in Belgium, is the first conference to meet our challenge! BruCON 2012 will be in Ghent, Belgium, on September 24-25, 2012. See their policy here and keep an eye out for related posts on our blogs. We will continue to update the list of computer security and hacker conferences with specific, enforceable policies preventing harassment on the Geek Feminism wiki.
If you’re not a conference organizer, you can help too! We’ve created a list of actions to take to support policies preventing harassment at conferences, all field-tested for effectiveness. To name just a few, you can publicly request a policy by blogging or tweeting, organize a community petition asking for a policy, and when speaking, make your appearance contingent on a policy.
Finally, if you like the work that the Ada Initiative is doing, you can support us by joining our announcement mailing list or donating to support our work for women in open technology and culture (we’re a tax-exempt non-profit charitable organization supported by donations).
 The precise meaning of the word “hacker” has been the subject of furious debate for at least 30 years. Suffice to say that in this post it does not mean exclusively “person who breaks into computers” and it includes people who experiment with computers and hardware for curiosity’s sake.
 Kiwicon is a hacker conference that has a (hilarious) Code of Conduct:
Kiwicon attempts to be a relatively informal conference where all members of the hacking community can come together over one weekend. Individuals intent on sprinkling fetid douchenuggets over the ice-cream sundae of anyone else’s enjoyment may incur penalties, reprisals or sanctions at the discretion of the Crue. In other words, the Crue reserve the right to kick you out, own your boxen and publicly shame you if you’re being an idiot.
However, our (rather extensive) experience with harassment at conferences is that policies don’t work unless they are specific about what isn’t allowed, for many reasons. Often the people doing the harassing believe that their behavior is acceptable at that conference, so unacceptable behavior has to be spelled out or people will keep doing it. Plus, specifically listing unacceptable behavior is often enough to stop it from occurring at all. People who are nervous about attending the conference can’t tell what the organizers consider harassing behavior and don’t know whether the organizers will back them up. Finally, it’s simply inconsiderate to tell your attendees that they can get kicked out of a conference if they behave badly – and then not give them some idea of what you consider bad behavior. See the example policy guide for more details.