Schedule
Ready for CounterSpy? Here's an overview of the programming planned each day. Physical programs will be available when you arrive.
Start with a high level understanding of all scheduled events and then take some time to read the descriptions for each event below.
Having trouble finding the venue, parking, or an accessible entrance? Check out the Logistics page.
Calendar
Download Schedule.icsDescriptions
Friday May 1 - Talks
Arrival & Welcome
SunroomOpening Comments
Movement Infrastructure Research Network This event will be recorded & available live. Sunroom(De)constructing Atlanta's Surveillance Architecture Southerners Against Surveillance Systems & Infrastructure This event will be recorded & available live. Sunroom
Atlanta was selected as one of the host cities of the 2026 World Cup, an event we can expect to reorganize and reshape the city in ways that reinforce the interests of Atlanta's elite. In this talk, SASSI will explore how the 1996 Olympics—among other events—was used to reshape the city's surveillance architecture in service of local and federal information-sharing priorities. By grounding contemporary struggles against displacement, detention, and data centers in the history of carceral information sharing, SASSI invites discussion on alternative information infrastructures and the future of abolition organizing in Atlanta and across the South.
Resisting financial surveillance with private electronic cash Dr. Jennifer Helsby - Freedom of the Press Foundation This event will be recorded & available live. Sunroom
This session will review how governments and third parties surveil and censor virtually all financial transactions and offer a technical assessment of the tools available today built for private electronic cash.
Saturday May 2 - Talks/Workshops
Arrival & Breakfast
SunroomExperiments in Movement Technology, a reportback
Movement Infrastructure Research Network This event will be recorded & available live. SunroomDistributed Scanner Infrastructure and Rapid Response Loops Tom Nomad This event will not be recorded. The Black Box
In this workshop, we will discuss distributed scanner infrastructure, and their interaction with rapid response networks.
AI Computer Vision and Signals Intelligence Benn Jordan This event will be recorded & available live. Sunroom
Surveillance cameras are used not just to record us, but to analyze us and generate data about our activities. Radio signals are full of information that can be used to track and identify people. See first hand how these technologies work by interacting with real AI surveillance cameras and with Intercept, a platform for analyzing radio signals.
The MN Rebel Loon story Meredith & Alex This event will not be recorded. The Black Box
In this talk, two Minneapolis residents will share their experiences and observations in the Twin Cities and how neighbors came out en masse to help neighbors at-risk from ICE during Operation Metro Surge.
Lunch
SunroomFrom Israel with Love? altk3y This event will not be recorded. The Black Box
This session will offer a deep dive on mobile forensics devices, what kind of personal data they expose, and how to think about security and protection.
Rapid Response Tech - The Role of Tech Infrastructure in the Twin Cities Anti-ICE Resistance Eyes This event will be recorded & available live. Sunroom
This session will provide a comprehensive discussion of the response to 'Operation Metro Surge' in the Twin Cities, where networks of local organizers, hackers, and technologists built out extensive technical capacity for widespread resistance to the ICE occupation, including systems for secure and coordinated rapid response communication, systems for tracking abductees through the highly opaque immigration system, and sophisticated monitoring systems for tracking ICE personnel, drones, and vehicles.
Sunday May 3 - Breakouts, Discussions, and Workshops
Arrival & Breakfast
SunroomHacker Village Hacker Village
The Hacker Village will feature a number of events available throughout the day:
Lockpicking Village
Physical security is a key part of overall safety. This workshop introduces how common locking mechanisms work and where they can fail.
Participants will learn basic concepts of lock design, security weaknesses, and best practices for protecting spaces. Hands-on activities will focus on locksport techniques in a controlled, educational setting.
Sticker Swap
Bring your hacker, activist, or just plain fun stickers to share and trade.
This will be a casual spot to swap stickers, meet people, and share anything that you’ve been working on. Expect a mix of projects, art, and random finds.
Drop in anytime.
NetKoth CTF
NetKoth (netkoth.org) is an interactive capture-the-flag event where participants explore network and infrastructure security in a controlled, educational environment.
Players will learn about common software vulnerabilities and how they can be identified and addressed. Both beginner-friendly and advanced scenarios will be available for play throughout the day.
All activities take place on an isolated network designed for learning.
OUI SPY/Flock You Soldering Workshop
Flock-You detects Flock Safety surveillance cameras, Raven gunshot detectors, and related monitoring hardware using BLE-only heuristics. It runs a WiFi access point with a live web dashboard on your phone, tags detections with GPS from your phone's browser, and exports everything as JSON, CSV, or KML for Google Earth.
No WiFi sniffing — the radio is dedicated to serving the dashboard AP while BLE scans
Practical De-Anonymization Ringm4ster This event will be recorded & available live. The Black Box
This talk will dig into the web of metadata that exists on an individual across the Internet, walking through seven vectors of online identity compromises and discussing how to orient towards protection.
Troika Consulting Borris and Natasha This event will not be recorded. The Blue Box
In this workshop, we'll be teaching the Troika Consulting “liberating structure” in a holistic security practice. Expect to learn a framework of active listening performed with a few friends that can be applied to threat modeling and digital security incident response.
Stopping Pegasus & Stalkerware: Practical Tools to Secure Organizers Phones Jonathan Stribling-Uss & Jorge Louis - Constitutional Communications This event will be recorded & available live. Sunroom
This training will provide tools to empower organizers to secure their devices from malware and spyware. We’ll outline the problem posed to progressive organizations by malware and then demonstrate free and open source tools to scan phones using static detection methods that are both privacy-preserving and time effective. We’ll also be demo-ing the use of Mobile Verification Toolkit (MVT) (by Amnesty International), as well as accessible hardening methods used to minimize malware attacks.
Wardriving Demo Ringm4ster This event will be recorded & available live. The Black Box
A demonstration of tools and methods for understanding the RF spectrum, how to interpret RF signals, and how to detect hidden surveillance devices.
Doxing and the politics (and panics) of online safety Jami This event will be recorded & available live. Sunroom
As online doxxing becomes widespread, and increasingly concerning for activists with a public profile, states are rapidly codifying 'anti-doxxing' laws that conflate disclosure with criminality. This workshop examines the history of doxxing, the social and cultural implications of the practice, and is intended to provoke deeper reflection on how we understand safety, conflict, and security today.
'Not a computer person'? No problem! Working with people who are intimidated by technology Elliot This event will not be recorded. The Blue Box
Whether it's trying to get your org off of Google Drive or trying to convince a friend to use Signal, it's hard to convince people to step into the unknown with you. This talk is focused on the interpersonal part of adopting secure technology in your groups, especially when you can't rely on technical arguments.
Lunch
SunroomTechnology and Repression: An analysis of the Sam and Dario Destruction of Evidence Cases Fire Ant Movement Defense This event will not be recorded. The Blue Box
This workshop will address two recent cases where law enforcement is attempting to criminalize ordinary digital hygiene, and their widespread implications for anyone who cares about privacy, free speech, and assembly.
How to piss off your FBI agent by having way too many friends Chuck This event will be recorded & available live. Sunroom
This session will review the 20+ layers of digital tracking the FBI uses, and how the process of data collation, validation, analysis, and reporting happens. This will then be paired with an interactive clinic that will walk through threat-modeling and mitigation, and why and how to have good security culture.
Why we must fight Palantir: Anonymous communication with NymVPN Harry Halpin - Nym Technologies This event will be recorded & available live. Sunroom
This session will interrogate how technologists can create new forms of technology at theservice of social movements. We’ll be analyzing Palintir’s “manifesto” and outlining the new anonymous communication network Nym. This session will include a demonstration of how Nym works in practice using the NymVPN app, which attendees will receive free access to.
Llámenos Hotline - More secure hubs for your spokes Rhonda Rhodedendron This event will be recorded & available live. The Black Box
This session will demonstrate and discuss the Llámenos Hotline, an encrypted platform that allows communities to rapidly deploy communication hubs across traditional, cloud and even signal channels, protecting the privacy of volunteers and callers as best as possible.
Making Connections, Next Steps Sunroom
We are here to do more than learn from each other, we are building networks of effective resistance to social control. We will conclude the conference by mapping the skills, capacities, and projects each of us brings here. If you have an effort you need help with or a skill you've been looking to put to use, you'll have a chance to share it with the whole conference. Get connected!