Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 06 Issue 51

  

Computer underground Digest Thu June 9, 1994 Volume 6 : Issue 51
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Copy Dittoer: Etaoian Shrdlu

CONTENTS, #6.51 (June 9, 1994)

File 1--Response to "Ghost in the Modem" (CuD 6.50)
File 2--Email security user survey (fwd)
File 3--HACKERS ON PLANET EARTH: The First U.S. Hacker Congress
File 4--Video Game Rating Act of 1994
File 5--Senator Kennedy e-mail/www release (fwd)
File 6--Pugwash Sci-Tech Conference, JHU: Pub Events and Elec list

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493

UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Wed, 8 Jun 1994 14:53:52 -0600
From: Bryce <wilcoxb@NAG.CS.COLORADO.EDU>
Subject: File 1--Response to "Ghost in the Modem" (CuD 6.50)

In CuD 6.50 I read an article entitled "Ghost in the Modem (Loka Alert
1:6 Wash. Post)"
. In this article, authors Richard Sclove and
Jeffrey Scheuer deliver several warnings about the possible effects of
the developement of the Information Superhighway and conclude by
suggesting three restrictions that, they assert, should be placed on
information service developement.

While I find myself in more or less complete disagreement with the
authors, I am not going to argue about the thesis of their article
today. Instead, I would like to draw attention to a statement made
earlier in the article which I believe indicates an underlying false
assumption.

The statement is: "And the risk of inequity in contriving and
distributing electronic services [...] is clear."


This statement seems to assume that access to information technology
should be equally distributed among individuals. The reason that I
find this assumption disturbing enough to write about is because I
often see variations on such a theme echoed in Computer underground
Digest, but I rarely if ever see a contradictory opinion stated.

I would like to take this opportunity to state that I
believe egalitarianism, in regard to information technology
as elsewhere, is an irrational, immoral, and dangerous
ideal.

As a denizen of cyberspace and a long-time reader of CuD, I would
like others to know that I will not assist anyone in his or her
attempt to enact policies which, I believe, would be vastly
destructive to the cyber-society, and the real society which I
inhabit.
I am sure that many of my fellow Net citizens have similar ideals
and ideologies, but I would not know it from reading CuD!

commentary and criticism is welcome

------------------------------

Date: Tue, 7 Jun 1994 21:24:36 -0400 (EDT)
From: Stanton McCandlish <mech@EFF.ORG>
Subject: File 2--Email security user survey (fwd)

Subject--Email security user survey
Date--Fri, 03 Jun 1994 13:22:32 -0700
From--John Gilmore <gnu@cygnus.com>

Let's give Dana some data about PGP users. Please spread...

John

------ Forwarded Message

Subject--Request for info from Dana C. Ellingen
Date--Fri, 03 Jun 94 09:33:50 -0400
From--Mark S Feldman <feldman@tis.com>

-----BEGIN PRIVACY-ENHANCED MESSAGE-----
Content-Domain: RFC822
Originator-ID-Asymmetric: MFMxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJNRDE
kMCIGA1UEChMbVHJ1c3RlZCBJbmZvcm1hdGlvbiBTeXN0ZW1zMREwDwYDVQQLEwh
HbGVud29vZA==,06
MIC-Info: RSA-MD5,RSA,UrO04KAws35IxkK3iROrfIsWLHc5CXq84Wu9fyJBEAc
4rwYiHlmfKYrc6j2FtIxqts+MT/KT4/De/Qr79Bdg4OW33TZ8umY4QqYmVJlWGvf
5y7686g8+EyTEyku15Pi8

Dana C. Ellingen <ellingen@netcom.com> is preparing a special issue of
the Ferris E-Mail Analyzer on security in electronic mail, and would
like to get your input. If any of you would like to respond to him,
send him email or get in touch with him as follows:

Dana C. Ellingen Electronic Commerce Consultant
415.726.9712 (telephone); 415.726.3093 (FAX); ellingen@netcom.com
410 Laurel Ave., Half Moon Bay, CA 94019-1674

Following are his questions.

Mark



Note that all answers will be "not for attribution," and will be
melded into the overall issue.

Vendors, I would like the names of several happy users of your
product, even if they have just chosen it and it is not yet installed.
I am interested in why they chose to make this move now rather than
later, as well as how happy they may be with your product.

Questions for Email Security users, for Ferris E-Mail Analyzer:

A - What form of security does your firm use for electronic mail and
messaging?

B - Given the state of turmoil in the industry, why did you choose to be
an "early adopter," and to put security into your forms and
messaging applications? Why now?

C - What problems have you had, having added security?

D - What compromises have you had to make to add security?

E - Product support: Do you currently use (or are you considering) a
commercial product for secure EM? Which one? Why?
Are you happy with the support you are getting?

F - Interoperability: Do you currently or do you want to exchange
secure EM with people outside of your organization? How do you
deal with the interoperability problem?

G - International: Do you have overseas offices, or do you exchange
secure EM with persons outside of the US? Are you concerned about
having to cut back on your security to do this?

H - Certificates: Do you issue certificates to your users?

I - Certificates: If someone else issues certificates, how do
establish trust with that organization?

J - Certificates: How do you verify the authenticity of a
digital signature on a document that you receive?

K - Policy: Does your firm have a written policy on electronic
mail? Can your firm read its employees' EM?

L - Escrowed keys: Do you keep copies of the private keys of the
individuals in your firm? Do you think that you should, or that
you have the right to do so?

M - Integration: How important is it that you have a product that is
fully integrated with your existing mail system?

N - What did I leave out? What else do you want to discuss?

------------------------------

Date: Sun, 5 Jun 1994 00:45:55 -0700
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
Subject: File 3--HACKERS ON PLANET EARTH: The First U.S. Hacker Congress

HACKERS ON PLANET EARTH: The First U.S. Hacker Congress

Yes, it's finally happening. A hacker party unlike anything ever seen
before in this country. Come help us celebrate ten years of existence
and meet some really interesting and unusual people in the process.
We've rented out the entire top floor of a midtown New York hotel,
consisting of several gigantic ballrooms. The conference will run
around the clock all weekend long.

SPEAKERS AND SEMINARS: Will there be famous people and celebrity
hackers? Of course, but the real stars of this convention will be
the hundreds of hackers and technologically inclined people journeying
from around the globe to share information and get new ideas.
That is the real reason to show up. Seminars include:
social engineering, cellular phone cloning, cable TV security,
stealth technology and surveillance, lockpicking, boxing of all sorts,
legal issues, credit cards, encryption, the history of 2600,
password sniffing, viruses, scanner tricks, and many more in the
planning stages. Meet people from the Chaos Computer Club, Hack-Tic,
Phrack, and all sorts of other k-rad groups.

THE NETWORK: Bring a computer with you and you can tie into the huge
Ethernet we'll be running around the clock. Show off your system and
explore someone else's (with their permission, of course). We will
have a reliable link to the Internet in addition. Finally, everyone
attending will get an account on our hope.net machine. We encourage
you to try and hack root. We will be giving away some valuable prizes
to the successful penetrators, including the keys to a 1994 Corvette.
(We have no idea where the car is, but the keys are a real
conversation piece.) Remember, this is only what is currently planned.
Every week, something new is being added so don't be surprised to find
even more hacker toys on display. We will have guarded storage areas
if you don't want to leave your equipment unattended.

VIDEOS: We will have a brand new film on hackers called
"Unauthorized Access", a documentary that tells the story from
our side and captures the hacker world from Hamburg to Los Angeles
and virtually everywhere in between. In addition, we'll have
numerous foreign and domestic hacker bits, documentaries,
news stories, amateur videos, and security propaganda. There
has been a lot of footage captured over the years - this will
be a great opportunity to see it all. We will also have one
hell of an audio collection, including prank calls that put
The Jerky Boys to shame, voice mail hacks, and even confessions
by federal informants! It's not too late to contribute material!

WHERE/WHEN: It all happens Saturday, August 13th and Sunday,
August 14th at the Hotel Pennsylvania in New York City
(Seventh Avenue, between 32nd and 33rd Streets, right across
the street from Penn Station). If you intend to be part of
the network, you can start setting up Friday night.
The conference officially begins at noon on Saturday and will
run well into Sunday night.

ACCOMMODATIONS: New York City has numerous cheap places to stay.
Check the update sites below for more details as they come in.
If you decide to stay in the hotel, there is a special discounted
rate if you mention the HOPE Conference. $99 is their base rate
(four can fit in one of these rooms, especially if sleeping bags
are involved), significantly larger rooms are only about $10 more.
Mini-suites are great for between six and ten people - total cost
for HOPE people is $160. If you work with others, you can easily
get a room in the hotel for between $16 and $50.
The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000
(neat, huh?). Rooms must be registered by 7/23/94 to get the
special rate.

TRAVEL: There are many cheap ways to get to New York City in August
but you may want to start looking now, especially if you're coming
from overseas. Travel agencies will help you for free. Also look in
various magazines like Time Out, the Village Voice, local alternative
weeklies, and travel sections of newspapers. Buses, trains, and
carpools are great alternatives to domestic flights. Keep in touch
with the update sites for more information as it comes in.

WANTED: Uncommon people, good music (CD's or cassettes), creative
technology. To leave us information or to volunteer to help out,
call us at (516) 751-2600 or send us email on the Internet at:
2600@hope.net.

VOICE BBS: (516) 473-2626

INTERNET:
info@hope.net - for the latest conference information
travel@hope.net - cheap fares and advisories
tech@hope.net - technical questions and suggestions
speakers@hope.net - for anyone interested in speaking at the
conference
vol@hope.net - for people who want to volunteer

USENET NEWSGROUPS:
alt.2600 - general hacker discussion
alt.2600.hope.announce - the latest announcements
alt.2600.hope.d - discussion on the conference
alt.2600.hope.tech - technical setup discussion

REGISTRATION: Admission to the conference is $20 for the entire weekend
if you preregister, $25 at the door, regardless of whether you stay for
two days or five minutes. To preregister, fill out this form, enclose $20,
and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953.
Preregistration must be postmarked by 7/31/94. This information is only
for the purposes of preregistration and will be kept confidential. Once
you arrive, you can select any name or handle you want for your badge.

NAME: ______________________________________________________________

ADDRESS: ___________________________________________________________

CITY, STATE, ZIP, COUNTRY: __________________________________________

PHONE (optional): ________________ email (optional): _______________

IMPORTANT: If you're interested in participating in other ways or
volunteering assistance, please give details on the reverse side.
So we can have a better idea of how big the network will be, please
let us know what, if any, computer equipment you plan on bringing and
whether or not you'll need an Ethernet card. Use the space on the back
and attach additional sheets if necessary.

------------------------------

Date: Wed, 8 Jun 1994 10:31:00 -0500 (CDT)
From: David Smith <bladex@BGA.COM>
Subject: File 4--Video Game Rating Act of 1994

What I don't like about this approach is that Congress is acting as the
labeling agent. This violates the industry commission precedent set with
movies, comic books, and music.

The big video companies (Sega/Nintendo/etc) have counter-offered to
create their own commission that would charge $500 per title to rate.

-- David

---------- Forwarded message ----------
From--lpurple@netcom.com (Lance Purple)
Date--8 Jun 1994 08:34:14 -0500

Here is a summary of the actual bill that Representative Lantos wants.
The rating system will be voluntary after all (at least until 1996),
so I retract the imminent-death-of-all-shareware prediction.

lpurple@netcom.com
=========================================================

<from Edna Mitchel in Lantos' office:>

**** 103rd Cong. Status Profile for H.R. 3785 ****
BRIEF TITLE....... Video Game Rating Act of 1994
SPONSOR........... Lantos
DATE INTRODUCED... February 3, 1994
HOUSE COMMITTEE... Energy and Commerce
Judiciary
OFFICIAL TITLE.... A bill to provide for the establishment of the
Interactive Entertainment Rating Comission, and for
other purposes.
CO-SPONSORS....... 16 CURRENT COSPONSORS
Feb 3, 94 Referred to House committee on Energy and Commerce.
Mar 4, 94 Referred to subcommittee on Comerce, Consumer Protection and
Competitiveness.
Feb 3, 94 Referred to House Committee on the Judiciary.
May 24, 94 Referred to Subcommittee on Ecconomic and Commercial
Law.
COS CO-SPONSORS....... 16 CURRENT COSPONSORS
Feb 8, 94 Glickman.
Mar 16, 94 Maloney, Morella, Shays, Smith (NJ)
Mar 23, 94 Johnson (SD), Lloyd.
Apr 18, 94 Bereuter, Frost, Hughes, E.B.Johnson, Orton, Parker,
Taylor (MS).
May 12, 94 Gejdenson, Hinchey.
BD BILL DIGEST...... Feb 3, 94. Video Game Rating Act of 1994 -
Establishes the Interactive Entertainment Rating Commission to: (1)
coordinate with the video game industry in the development of a
voluntary standard for providing information to purchasers and
users concerning the contents of video games; (2) evaluate whether
any standards proposed are adequate to warn purchasers and users of the
violent or sexually explicit content of such games; and (3)
report to the President and Congress regarding the adequacy of
the industry's response.
Provides Commission funding through December 31, 1996.
Terminates the Comission on the earlier of such date or 90 days after
submission of its report.
Provides an antitrust exemption for any actions taken by the
video game industry in developing such guidelines.

------------------------------

Date: Mon, 6 Jun 1994 19:02:50 -0400 (EDT)
From: Stanton McCandlish <mech@EFF.ORG>
Subject: File 5--Senator Kennedy e-mail/www release (fwd)

From--Chris_Casey@kennedy.senate.gov
Subject--Senator Kennedy e-mail/www release

___________________________________________________________________
from the office of
Senator Edward M. Kennedy
___________________________________________________________________

FOR IMMEDIATE RELEASE
June 2, 1994

CONTACT:Pam Hughes
202/224-2633
pam_hughes@kennedy.senate.gov


Senator Kennedy Announces New Electronic Services
For Improving Constituent Access Via The Internet


Senator Edward M. Kennedy has announced two new services to
enhance electronic access to his office. Constituents can now
contact the Senator directly via electronic mail, and can locate
the Senator's press releases and statements as well as explore
other Massachusetts and Government resources in an easy-to-use
point and click interface using the World Wide Web, a protocol
developed by the European Center for Particle Physics (CERN)
which links information across the Internet.


Electronic Mail

Senator Kennedy's Internet e-mail address is:

senator@kennedy.senate.gov

Electronic mail received by the Senator will receive an
electronic acknowledgment automatically. An individual reply
will be sent via postal mail when a postal address has been
included.


World Wide Web

Using popular Internet browsing software such as Mosaic
(developed by the National Center for Supercomputing
Applications), the public can locate information about Senator
Kennedy, as well as links to other Massachusetts and Government
Web servers at the following URL:

http://www.ai.mit.edu/projects/iiip/Kennedy/homepage.html

Current links point to information from the Senator's office and
the Labor and Human Resources Committee which he chairs. Other
links point to other electronic resources including the House of
Representatives, the Library of Congress, other Federal
Government Web servers and Massachusetts information.

Technical assistance with the development and maintenance of the
Kennedy homepage on the World Wide Web has been provided as a
public service by the Intelligent Information Infrastructure
Project, at the Artificial Intelligence Laboratory,
Massachusetts Institute of Technology.

Senator Kennedy has been on the leading edge of developing
electronic access to a Congressional office, and has been making
his press releases and statements available on computer bulletin
boards in Massachusetts and the Internet for over a year. The
information below details the various means for locating these
resources.

_______________________________________________
Senator Kennedy On-line

Computer Bulletin Boards:
The following computer bulletin boards carry the "Sen. Kennedy
Releases"
conference and the "Press Release Comments" sub-
conference. These boards each use the FirstClass BBS software,
and can be accessed with standard telecommunications software,
or in their graphical interface via Macintosh or Windows client
software available for downloading on-line.

North Shore Mac 508/921-4716 User ID and Password: visitor
Conspiracy 508/478-1714
Quantum 508/443-4644
BCS Mac 617/864-3375
BMUG Boston 617/721-5840
Fire on the Hill 617/629-9739
Reflections 617/593-7228

On the Internet:

Anonymous FTP
ftp ftp.ai.mit.edu , login: anonymous, cd incoming/Kennedy
ftp ftp.senate.gov , login: anonymous, cd member/ma/kennedy

Gopher
gopher gopher.senate.gov

World Wide Web
http://www.ai.mit.edu/projects/iiip/Kennedy/homepage.html

Usenet
Releases can be found in the following USENET news groups:
ne.politics and talk.politics.misc

Electronic Mail:
Electronic mail to Senator Kennedy can be addressed to:

senator@kennedy.senate.gov

An electronic acknowledgment will confirm receipt of your
message. Constituents who have included a postal address in
their message will receive a reply via U.S. Mail.



______________________________________________ ! ________________________
Chris Casey | |
chris_casey@kennedy.senate.gov /''''\
/______\
202/224-3570 |@@@@@@@@|
||0||0||0|
Office of Senator Kennedy _____/\________ " " " " "_______/\_____
Washington, DC 20510 {|| || || || || ____/\_____|| || || || ||}

------------------------------

Date: Thu, 9 Jun 1994 03:11:48 -0400 (EDT)
From: jporten@SAS.UPENN.EDU(Jeffrey A. Porten)
Subject: File 6--Pugwash Sci-Tech Conference, JHU: Pub Events and Elec list

Student Pugwash USA Eighth International Conference

Science and Technology for the 21st Century:
Meeting the Needs of the Global Community

Johns Hopkins University, Baltimore, MD
June 12 - 18, 1994

An exceptional international forum will take place at
Johns Hopkins University in Baltimore, Maryland from
June 12-18, uniting 100 student leaders from around
the world to explore critical global and technological
challenges and to design viable alternatives for their
resolution. These students, representing over 25
countries, have been selected as participants of
Student Pugwash USA's Eighth International
Conference, *Science and Technology for the 21st
Century: Meeting the Needs of the Global Community*.

The International Conference will explore critical
issues at the juncture of technology and world
affairs, addressing the inter-relationships among
issues and their impact on the global community.
The event represents a unique opportunity for
young people and concerned citizens to engage in
serious discourse with experts from the fields of
international security, environment, health care,
information technology, genetics and community
development.

Working groups at the conference are:
* Resource Stewardship for Environmental Sustainability
* Preventative Diplomacy and Conflict Resolution for a
Secure Future
* Overcoming Barriers to Health Care Education and
Delivery
* Meeting Societal Needs Through Communications and
Information Technologies
* Designing the Future--From Corporations to Communities
* The Social Costs and Medical Benefits of Human Genetic
Information

There are two ways you can get involved. Our plenary
sessions and High Technology Forum are open to the public,
and we invite everyone who is interested to attend.

We will also be running an electronic mail listserver during
the conference, to which we will distribute transcripts
from the plenaries, summaries of the working group reports,
and messages from student participants. Responses from
the Internet community will be circulated at the conference!

*************************************************************
To subscribe to the electronic conference, send e-mail to
majordomo@blaze.cs.jhu.edu with the body "
subscribe pugwash".
*************************************************************


THE FOLLOWING EVENTS ARE OPEN TO THE PUBLIC! Please send
e-mail to jporten@mail.sas.upenn.edu if you need directions
to Mudd Hall at Johns Hopkins or the Maryland Science Center.

Monday, June 13

7:00 pm - 9:00 pm Keynote Plenary - Envisioning the Future: Towards
Mudd Hall Auditorium a Global Community in the 21st Century

Nicholas Steneck (Introductions) - Chair, Student
Pugwash USA Board of Directors

Adele Simmons - President, The John D. and
Catherine T. MacArthur Foundation

Timothy Wirth - Under Secretary for Global
Affairs, U.S. Department of State


Tuesday, June 14

2:00 pm - 4:00 pm Exchanging Technologies Between Cultures and
Mudd Hall Auditorium Countries: The Good, The Bad and the Ugly

Taft Broome (Moderator) - Professor of
Engineering, Howard University

Gerard Bodeker - Coordinator, Global Initiative
for Traditional Systems of Health

Armstrong Wiggins - Executive Director, Indian Law
Resource Center

Susan Harjao - Executive Director, Morning Star
Foundation


7:00 pm - 9:15 pm Science and Human Rights
Mudd Hall Auditorium
Rosemary Chalk (Moderator) - Study Director,
National Academy of Sciences

Carol Corillon - Director, Committee on Human
Rights, National Academy of Sciences

Clyde Snow, M.D. - Oklahoma Medical Examiner
Office


Wednesday, June 15

7:00 pm - 8:00 pm High Technology Forum
Maryland Science
Center
This interactive forum will feature a series of
displays and presentations featuring high and
alternative technologies. Exhibits include:
geographic information systems, computer-aided
design, global positioning systems, virtual
reality, and CD-ROM technologies, among others.


8:00 pm - 9:00 pm Innovations and Innovators: Technology and Social
Maryland Science Responsibility
Center
Ken Phillips (Moderator) - Vice President for
Telecommunications Policy, Citicorp

Sheldon Segal - Distinguished Scientist,
Population Council (Co-Developer of Norplant)

Theodore Taylor - Nuclear Scientist, Los Alamos
National Laboratory (1949 - 56)


9:00 pm - 10:00 pm Reception for Conference Participants and Public
Maryland Science and Continuation of High Technology Forum
Center


Thursday, June 16

2:00 pm - 4:00 pm The Future of U.N. Peacekeeping: Prospects for a
Mudd Hall Auditorium Volunteer Force

Anne Cahn (Moderator) - Senior MacArthur Scholar,
University of Maryland

William Maynes - Editor, Foreign Policy

George Rathjens - Professor of Political Science,
Massachusetts Institute of Technology

Anne Richard - International Affairs Fellow,
Council on Foreign Relations

UN Representative to be announced


Friday, June 17

7:00 pm - 9:15 pm Closing Plenary - Creating Solutions and
Mudd Hall Auditorium Initiating Change: Young People and the Global
Community

Jeffrey Leifer (Moderator) - President, Leifer
Capital and Founder, Student Pugwash USA

Alicia Ely Yamin - Founder of human rights
advocacy program in Mexico

David Fleming - Founder, Students' Support Council
for Africa

Brian Trelstad - Founder, Center for Environmental
Citizenship

Chai Ling - Commander in Chief, Tienanmen Square
Democracy Movement (tentative)


Student Pugwash USA, a national, educational, non-
profit organization, is dedicated to building a
commitment among young people to solve critical
global problems through the responsible use of
science and technology. Student Pugwash USA
draws its name from Pugwash, Nova Scotia, where in
1957 several of the world's leading scientists
gathered at the behest of Albert Einstein and
Bertrand Russell to address pressing issues at the
forefront of technology and global security.
Following this tradition, Student Pugwash USA
began coordinating educational programs for
graduate and undergraduate students in 1979,
beginning with an International Conference on
technology and ethical responsibility held at the
University of California at San Diego.

Student Pugwash USA programs also include a
student-initiated Chapter Program, extending to
over 175 university, college and high school
campuses nation-wide, and a "
New Careers"
Program, linking students to career opportunities
and mentors in the areas of technology and social
change. Additionally, Student Pugwash USA
International Conferences have led to the formation
of Student/Young Pugwash organizations in 18
countries around the world.


Student Pugwash USA
1638 R Street NW, Suite 32
Washington, DC 20009
(202) 328-6555
uspugwash@igc.org

During the conference, our phone number is (410) 518-6401.
Send e-mail to jporten@mail.sas.upenn.edu.

------------------------------

End of Computer Underground Digest #6.51
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT