home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Thu June 9, 1994 Volume 6 : Issue 51
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Dittoer: Etaoian Shrdlu
-
- CONTENTS, #6.51 (June 9, 1994)
-
- File 1--Response to "Ghost in the Modem" (CuD 6.50)
- File 2--Email security user survey (fwd)
- File 3--HACKERS ON PLANET EARTH: The First U.S. Hacker Congress
- File 4--Video Game Rating Act of 1994
- File 5--Senator Kennedy e-mail/www release (fwd)
- File 6--Pugwash Sci-Tech Conference, JHU: Pub Events and Elec list
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
-
- UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: Wed, 8 Jun 1994 14:53:52 -0600
- From: Bryce <wilcoxb@NAG.CS.COLORADO.EDU>
- Subject: File 1--Response to "Ghost in the Modem" (CuD 6.50)
-
- In CuD 6.50 I read an article entitled "Ghost in the Modem (Loka Alert
- 1:6 Wash. Post)". In this article, authors Richard Sclove and
- Jeffrey Scheuer deliver several warnings about the possible effects of
- the developement of the Information Superhighway and conclude by
- suggesting three restrictions that, they assert, should be placed on
- information service developement.
-
- While I find myself in more or less complete disagreement with the
- authors, I am not going to argue about the thesis of their article
- today. Instead, I would like to draw attention to a statement made
- earlier in the article which I believe indicates an underlying false
- assumption.
-
- The statement is: "And the risk of inequity in contriving and
- distributing electronic services [...] is clear."
-
- This statement seems to assume that access to information technology
- should be equally distributed among individuals. The reason that I
- find this assumption disturbing enough to write about is because I
- often see variations on such a theme echoed in Computer underground
- Digest, but I rarely if ever see a contradictory opinion stated.
-
- I would like to take this opportunity to state that I
- believe egalitarianism, in regard to information technology
- as elsewhere, is an irrational, immoral, and dangerous
- ideal.
-
- As a denizen of cyberspace and a long-time reader of CuD, I would
- like others to know that I will not assist anyone in his or her
- attempt to enact policies which, I believe, would be vastly
- destructive to the cyber-society, and the real society which I
- inhabit.
- I am sure that many of my fellow Net citizens have similar ideals
- and ideologies, but I would not know it from reading CuD!
-
- commentary and criticism is welcome
-
- ------------------------------
-
- Date: Tue, 7 Jun 1994 21:24:36 -0400 (EDT)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 2--Email security user survey (fwd)
-
- Subject--Email security user survey
- Date--Fri, 03 Jun 1994 13:22:32 -0700
- From--John Gilmore <gnu@cygnus.com>
-
- Let's give Dana some data about PGP users. Please spread...
-
- John
-
- ------ Forwarded Message
-
- Subject--Request for info from Dana C. Ellingen
- Date--Fri, 03 Jun 94 09:33:50 -0400
- From--Mark S Feldman <feldman@tis.com>
-
- -----BEGIN PRIVACY-ENHANCED MESSAGE-----
- Content-Domain: RFC822
- Originator-ID-Asymmetric: MFMxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJNRDE
- kMCIGA1UEChMbVHJ1c3RlZCBJbmZvcm1hdGlvbiBTeXN0ZW1zMREwDwYDVQQLEwh
- HbGVud29vZA==,06
- MIC-Info: RSA-MD5,RSA,UrO04KAws35IxkK3iROrfIsWLHc5CXq84Wu9fyJBEAc
- 4rwYiHlmfKYrc6j2FtIxqts+MT/KT4/De/Qr79Bdg4OW33TZ8umY4QqYmVJlWGvf
- 5y7686g8+EyTEyku15Pi8
-
- Dana C. Ellingen <ellingen@netcom.com> is preparing a special issue of
- the Ferris E-Mail Analyzer on security in electronic mail, and would
- like to get your input. If any of you would like to respond to him,
- send him email or get in touch with him as follows:
-
- Dana C. Ellingen Electronic Commerce Consultant
- 415.726.9712 (telephone); 415.726.3093 (FAX); ellingen@netcom.com
- 410 Laurel Ave., Half Moon Bay, CA 94019-1674
-
- Following are his questions.
-
- Mark
-
-
-
- Note that all answers will be "not for attribution," and will be
- melded into the overall issue.
-
- Vendors, I would like the names of several happy users of your
- product, even if they have just chosen it and it is not yet installed.
- I am interested in why they chose to make this move now rather than
- later, as well as how happy they may be with your product.
-
- Questions for Email Security users, for Ferris E-Mail Analyzer:
-
- A - What form of security does your firm use for electronic mail and
- messaging?
-
- B - Given the state of turmoil in the industry, why did you choose to be
- an "early adopter," and to put security into your forms and
- messaging applications? Why now?
-
- C - What problems have you had, having added security?
-
- D - What compromises have you had to make to add security?
-
- E - Product support: Do you currently use (or are you considering) a
- commercial product for secure EM? Which one? Why?
- Are you happy with the support you are getting?
-
- F - Interoperability: Do you currently or do you want to exchange
- secure EM with people outside of your organization? How do you
- deal with the interoperability problem?
-
- G - International: Do you have overseas offices, or do you exchange
- secure EM with persons outside of the US? Are you concerned about
- having to cut back on your security to do this?
-
- H - Certificates: Do you issue certificates to your users?
-
- I - Certificates: If someone else issues certificates, how do
- establish trust with that organization?
-
- J - Certificates: How do you verify the authenticity of a
- digital signature on a document that you receive?
-
- K - Policy: Does your firm have a written policy on electronic
- mail? Can your firm read its employees' EM?
-
- L - Escrowed keys: Do you keep copies of the private keys of the
- individuals in your firm? Do you think that you should, or that
- you have the right to do so?
-
- M - Integration: How important is it that you have a product that is
- fully integrated with your existing mail system?
-
- N - What did I leave out? What else do you want to discuss?
-
- ------------------------------
-
- Date: Sun, 5 Jun 1994 00:45:55 -0700
- From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
- Subject: File 3--HACKERS ON PLANET EARTH: The First U.S. Hacker Congress
-
- HACKERS ON PLANET EARTH: The First U.S. Hacker Congress
-
- Yes, it's finally happening. A hacker party unlike anything ever seen
- before in this country. Come help us celebrate ten years of existence
- and meet some really interesting and unusual people in the process.
- We've rented out the entire top floor of a midtown New York hotel,
- consisting of several gigantic ballrooms. The conference will run
- around the clock all weekend long.
-
- SPEAKERS AND SEMINARS: Will there be famous people and celebrity
- hackers? Of course, but the real stars of this convention will be
- the hundreds of hackers and technologically inclined people journeying
- from around the globe to share information and get new ideas.
- That is the real reason to show up. Seminars include:
- social engineering, cellular phone cloning, cable TV security,
- stealth technology and surveillance, lockpicking, boxing of all sorts,
- legal issues, credit cards, encryption, the history of 2600,
- password sniffing, viruses, scanner tricks, and many more in the
- planning stages. Meet people from the Chaos Computer Club, Hack-Tic,
- Phrack, and all sorts of other k-rad groups.
-
- THE NETWORK: Bring a computer with you and you can tie into the huge
- Ethernet we'll be running around the clock. Show off your system and
- explore someone else's (with their permission, of course). We will
- have a reliable link to the Internet in addition. Finally, everyone
- attending will get an account on our hope.net machine. We encourage
- you to try and hack root. We will be giving away some valuable prizes
- to the successful penetrators, including the keys to a 1994 Corvette.
- (We have no idea where the car is, but the keys are a real
- conversation piece.) Remember, this is only what is currently planned.
- Every week, something new is being added so don't be surprised to find
- even more hacker toys on display. We will have guarded storage areas
- if you don't want to leave your equipment unattended.
-
- VIDEOS: We will have a brand new film on hackers called
- "Unauthorized Access", a documentary that tells the story from
- our side and captures the hacker world from Hamburg to Los Angeles
- and virtually everywhere in between. In addition, we'll have
- numerous foreign and domestic hacker bits, documentaries,
- news stories, amateur videos, and security propaganda. There
- has been a lot of footage captured over the years - this will
- be a great opportunity to see it all. We will also have one
- hell of an audio collection, including prank calls that put
- The Jerky Boys to shame, voice mail hacks, and even confessions
- by federal informants! It's not too late to contribute material!
-
- WHERE/WHEN: It all happens Saturday, August 13th and Sunday,
- August 14th at the Hotel Pennsylvania in New York City
- (Seventh Avenue, between 32nd and 33rd Streets, right across
- the street from Penn Station). If you intend to be part of
- the network, you can start setting up Friday night.
- The conference officially begins at noon on Saturday and will
- run well into Sunday night.
-
- ACCOMMODATIONS: New York City has numerous cheap places to stay.
- Check the update sites below for more details as they come in.
- If you decide to stay in the hotel, there is a special discounted
- rate if you mention the HOPE Conference. $99 is their base rate
- (four can fit in one of these rooms, especially if sleeping bags
- are involved), significantly larger rooms are only about $10 more.
- Mini-suites are great for between six and ten people - total cost
- for HOPE people is $160. If you work with others, you can easily
- get a room in the hotel for between $16 and $50.
- The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000
- (neat, huh?). Rooms must be registered by 7/23/94 to get the
- special rate.
-
- TRAVEL: There are many cheap ways to get to New York City in August
- but you may want to start looking now, especially if you're coming
- from overseas. Travel agencies will help you for free. Also look in
- various magazines like Time Out, the Village Voice, local alternative
- weeklies, and travel sections of newspapers. Buses, trains, and
- carpools are great alternatives to domestic flights. Keep in touch
- with the update sites for more information as it comes in.
-
- WANTED: Uncommon people, good music (CD's or cassettes), creative
- technology. To leave us information or to volunteer to help out,
- call us at (516) 751-2600 or send us email on the Internet at:
- 2600@hope.net.
-
- VOICE BBS: (516) 473-2626
-
- INTERNET:
- info@hope.net - for the latest conference information
- travel@hope.net - cheap fares and advisories
- tech@hope.net - technical questions and suggestions
- speakers@hope.net - for anyone interested in speaking at the
- conference
- vol@hope.net - for people who want to volunteer
-
- USENET NEWSGROUPS:
- alt.2600 - general hacker discussion
- alt.2600.hope.announce - the latest announcements
- alt.2600.hope.d - discussion on the conference
- alt.2600.hope.tech - technical setup discussion
-
- REGISTRATION: Admission to the conference is $20 for the entire weekend
- if you preregister, $25 at the door, regardless of whether you stay for
- two days or five minutes. To preregister, fill out this form, enclose $20,
- and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953.
- Preregistration must be postmarked by 7/31/94. This information is only
- for the purposes of preregistration and will be kept confidential. Once
- you arrive, you can select any name or handle you want for your badge.
-
- NAME: ______________________________________________________________
-
- ADDRESS: ___________________________________________________________
-
- CITY, STATE, ZIP, COUNTRY: __________________________________________
-
- PHONE (optional): ________________ email (optional): _______________
-
- IMPORTANT: If you're interested in participating in other ways or
- volunteering assistance, please give details on the reverse side.
- So we can have a better idea of how big the network will be, please
- let us know what, if any, computer equipment you plan on bringing and
- whether or not you'll need an Ethernet card. Use the space on the back
- and attach additional sheets if necessary.
-
- ------------------------------
-
- Date: Wed, 8 Jun 1994 10:31:00 -0500 (CDT)
- From: David Smith <bladex@BGA.COM>
- Subject: File 4--Video Game Rating Act of 1994
-
- What I don't like about this approach is that Congress is acting as the
- labeling agent. This violates the industry commission precedent set with
- movies, comic books, and music.
-
- The big video companies (Sega/Nintendo/etc) have counter-offered to
- create their own commission that would charge $500 per title to rate.
-
- -- David
-
- ---------- Forwarded message ----------
- From--lpurple@netcom.com (Lance Purple)
- Date--8 Jun 1994 08:34:14 -0500
-
- Here is a summary of the actual bill that Representative Lantos wants.
- The rating system will be voluntary after all (at least until 1996),
- so I retract the imminent-death-of-all-shareware prediction.
-
- lpurple@netcom.com
- =========================================================
-
- <from Edna Mitchel in Lantos' office:>
-
- **** 103rd Cong. Status Profile for H.R. 3785 ****
- BRIEF TITLE....... Video Game Rating Act of 1994
- SPONSOR........... Lantos
- DATE INTRODUCED... February 3, 1994
- HOUSE COMMITTEE... Energy and Commerce
- Judiciary
- OFFICIAL TITLE.... A bill to provide for the establishment of the
- Interactive Entertainment Rating Comission, and for
- other purposes.
- CO-SPONSORS....... 16 CURRENT COSPONSORS
- Feb 3, 94 Referred to House committee on Energy and Commerce.
- Mar 4, 94 Referred to subcommittee on Comerce, Consumer Protection and
- Competitiveness.
- Feb 3, 94 Referred to House Committee on the Judiciary.
- May 24, 94 Referred to Subcommittee on Ecconomic and Commercial
- Law.
- COS CO-SPONSORS....... 16 CURRENT COSPONSORS
- Feb 8, 94 Glickman.
- Mar 16, 94 Maloney, Morella, Shays, Smith (NJ)
- Mar 23, 94 Johnson (SD), Lloyd.
- Apr 18, 94 Bereuter, Frost, Hughes, E.B.Johnson, Orton, Parker,
- Taylor (MS).
- May 12, 94 Gejdenson, Hinchey.
- BD BILL DIGEST...... Feb 3, 94. Video Game Rating Act of 1994 -
- Establishes the Interactive Entertainment Rating Commission to: (1)
- coordinate with the video game industry in the development of a
- voluntary standard for providing information to purchasers and
- users concerning the contents of video games; (2) evaluate whether
- any standards proposed are adequate to warn purchasers and users of the
- violent or sexually explicit content of such games; and (3)
- report to the President and Congress regarding the adequacy of
- the industry's response.
- Provides Commission funding through December 31, 1996.
- Terminates the Comission on the earlier of such date or 90 days after
- submission of its report.
- Provides an antitrust exemption for any actions taken by the
- video game industry in developing such guidelines.
-
- ------------------------------
-
- Date: Mon, 6 Jun 1994 19:02:50 -0400 (EDT)
- From: Stanton McCandlish <mech@EFF.ORG>
- Subject: File 5--Senator Kennedy e-mail/www release (fwd)
-
- From--Chris_Casey@kennedy.senate.gov
- Subject--Senator Kennedy e-mail/www release
-
- ___________________________________________________________________
- from the office of
- Senator Edward M. Kennedy
- ___________________________________________________________________
-
- FOR IMMEDIATE RELEASE
- June 2, 1994
-
- CONTACT:Pam Hughes
- 202/224-2633
- pam_hughes@kennedy.senate.gov
-
-
- Senator Kennedy Announces New Electronic Services
- For Improving Constituent Access Via The Internet
-
-
- Senator Edward M. Kennedy has announced two new services to
- enhance electronic access to his office. Constituents can now
- contact the Senator directly via electronic mail, and can locate
- the Senator's press releases and statements as well as explore
- other Massachusetts and Government resources in an easy-to-use
- point and click interface using the World Wide Web, a protocol
- developed by the European Center for Particle Physics (CERN)
- which links information across the Internet.
-
-
- Electronic Mail
-
- Senator Kennedy's Internet e-mail address is:
-
- senator@kennedy.senate.gov
-
- Electronic mail received by the Senator will receive an
- electronic acknowledgment automatically. An individual reply
- will be sent via postal mail when a postal address has been
- included.
-
-
- World Wide Web
-
- Using popular Internet browsing software such as Mosaic
- (developed by the National Center for Supercomputing
- Applications), the public can locate information about Senator
- Kennedy, as well as links to other Massachusetts and Government
- Web servers at the following URL:
-
- http://www.ai.mit.edu/projects/iiip/Kennedy/homepage.html
-
- Current links point to information from the Senator's office and
- the Labor and Human Resources Committee which he chairs. Other
- links point to other electronic resources including the House of
- Representatives, the Library of Congress, other Federal
- Government Web servers and Massachusetts information.
-
- Technical assistance with the development and maintenance of the
- Kennedy homepage on the World Wide Web has been provided as a
- public service by the Intelligent Information Infrastructure
- Project, at the Artificial Intelligence Laboratory,
- Massachusetts Institute of Technology.
-
- Senator Kennedy has been on the leading edge of developing
- electronic access to a Congressional office, and has been making
- his press releases and statements available on computer bulletin
- boards in Massachusetts and the Internet for over a year. The
- information below details the various means for locating these
- resources.
-
- _______________________________________________
- Senator Kennedy On-line
-
- Computer Bulletin Boards:
- The following computer bulletin boards carry the "Sen. Kennedy
- Releases" conference and the "Press Release Comments" sub-
- conference. These boards each use the FirstClass BBS software,
- and can be accessed with standard telecommunications software,
- or in their graphical interface via Macintosh or Windows client
- software available for downloading on-line.
-
- North Shore Mac 508/921-4716 User ID and Password: visitor
- Conspiracy 508/478-1714
- Quantum 508/443-4644
- BCS Mac 617/864-3375
- BMUG Boston 617/721-5840
- Fire on the Hill 617/629-9739
- Reflections 617/593-7228
-
- On the Internet:
-
- Anonymous FTP
- ftp ftp.ai.mit.edu , login: anonymous, cd incoming/Kennedy
- ftp ftp.senate.gov , login: anonymous, cd member/ma/kennedy
-
- Gopher
- gopher gopher.senate.gov
-
- World Wide Web
- http://www.ai.mit.edu/projects/iiip/Kennedy/homepage.html
-
- Usenet
- Releases can be found in the following USENET news groups:
- ne.politics and talk.politics.misc
-
- Electronic Mail:
- Electronic mail to Senator Kennedy can be addressed to:
-
- senator@kennedy.senate.gov
-
- An electronic acknowledgment will confirm receipt of your
- message. Constituents who have included a postal address in
- their message will receive a reply via U.S. Mail.
-
-
-
- ______________________________________________ ! ________________________
- Chris Casey | |
- chris_casey@kennedy.senate.gov /''''\
- /______\
- 202/224-3570 |@@@@@@@@|
- ||0||0||0|
- Office of Senator Kennedy _____/\________ " " " " "_______/\_____
- Washington, DC 20510 {|| || || || || ____/\_____|| || || || ||}
-
- ------------------------------
-
- Date: Thu, 9 Jun 1994 03:11:48 -0400 (EDT)
- From: jporten@SAS.UPENN.EDU(Jeffrey A. Porten)
- Subject: File 6--Pugwash Sci-Tech Conference, JHU: Pub Events and Elec list
-
- Student Pugwash USA Eighth International Conference
-
- Science and Technology for the 21st Century:
- Meeting the Needs of the Global Community
-
- Johns Hopkins University, Baltimore, MD
- June 12 - 18, 1994
-
- An exceptional international forum will take place at
- Johns Hopkins University in Baltimore, Maryland from
- June 12-18, uniting 100 student leaders from around
- the world to explore critical global and technological
- challenges and to design viable alternatives for their
- resolution. These students, representing over 25
- countries, have been selected as participants of
- Student Pugwash USA's Eighth International
- Conference, *Science and Technology for the 21st
- Century: Meeting the Needs of the Global Community*.
-
- The International Conference will explore critical
- issues at the juncture of technology and world
- affairs, addressing the inter-relationships among
- issues and their impact on the global community.
- The event represents a unique opportunity for
- young people and concerned citizens to engage in
- serious discourse with experts from the fields of
- international security, environment, health care,
- information technology, genetics and community
- development.
-
- Working groups at the conference are:
- * Resource Stewardship for Environmental Sustainability
- * Preventative Diplomacy and Conflict Resolution for a
- Secure Future
- * Overcoming Barriers to Health Care Education and
- Delivery
- * Meeting Societal Needs Through Communications and
- Information Technologies
- * Designing the Future--From Corporations to Communities
- * The Social Costs and Medical Benefits of Human Genetic
- Information
-
- There are two ways you can get involved. Our plenary
- sessions and High Technology Forum are open to the public,
- and we invite everyone who is interested to attend.
-
- We will also be running an electronic mail listserver during
- the conference, to which we will distribute transcripts
- from the plenaries, summaries of the working group reports,
- and messages from student participants. Responses from
- the Internet community will be circulated at the conference!
-
- *************************************************************
- To subscribe to the electronic conference, send e-mail to
- majordomo@blaze.cs.jhu.edu with the body "subscribe pugwash".
- *************************************************************
-
-
- THE FOLLOWING EVENTS ARE OPEN TO THE PUBLIC! Please send
- e-mail to jporten@mail.sas.upenn.edu if you need directions
- to Mudd Hall at Johns Hopkins or the Maryland Science Center.
-
- Monday, June 13
-
- 7:00 pm - 9:00 pm Keynote Plenary - Envisioning the Future: Towards
- Mudd Hall Auditorium a Global Community in the 21st Century
-
- Nicholas Steneck (Introductions) - Chair, Student
- Pugwash USA Board of Directors
-
- Adele Simmons - President, The John D. and
- Catherine T. MacArthur Foundation
-
- Timothy Wirth - Under Secretary for Global
- Affairs, U.S. Department of State
-
-
- Tuesday, June 14
-
- 2:00 pm - 4:00 pm Exchanging Technologies Between Cultures and
- Mudd Hall Auditorium Countries: The Good, The Bad and the Ugly
-
- Taft Broome (Moderator) - Professor of
- Engineering, Howard University
-
- Gerard Bodeker - Coordinator, Global Initiative
- for Traditional Systems of Health
-
- Armstrong Wiggins - Executive Director, Indian Law
- Resource Center
-
- Susan Harjao - Executive Director, Morning Star
- Foundation
-
-
- 7:00 pm - 9:15 pm Science and Human Rights
- Mudd Hall Auditorium
- Rosemary Chalk (Moderator) - Study Director,
- National Academy of Sciences
-
- Carol Corillon - Director, Committee on Human
- Rights, National Academy of Sciences
-
- Clyde Snow, M.D. - Oklahoma Medical Examiner
- Office
-
-
- Wednesday, June 15
-
- 7:00 pm - 8:00 pm High Technology Forum
- Maryland Science
- Center
- This interactive forum will feature a series of
- displays and presentations featuring high and
- alternative technologies. Exhibits include:
- geographic information systems, computer-aided
- design, global positioning systems, virtual
- reality, and CD-ROM technologies, among others.
-
-
- 8:00 pm - 9:00 pm Innovations and Innovators: Technology and Social
- Maryland Science Responsibility
- Center
- Ken Phillips (Moderator) - Vice President for
- Telecommunications Policy, Citicorp
-
- Sheldon Segal - Distinguished Scientist,
- Population Council (Co-Developer of Norplant)
-
- Theodore Taylor - Nuclear Scientist, Los Alamos
- National Laboratory (1949 - 56)
-
-
- 9:00 pm - 10:00 pm Reception for Conference Participants and Public
- Maryland Science and Continuation of High Technology Forum
- Center
-
-
- Thursday, June 16
-
- 2:00 pm - 4:00 pm The Future of U.N. Peacekeeping: Prospects for a
- Mudd Hall Auditorium Volunteer Force
-
- Anne Cahn (Moderator) - Senior MacArthur Scholar,
- University of Maryland
-
- William Maynes - Editor, Foreign Policy
-
- George Rathjens - Professor of Political Science,
- Massachusetts Institute of Technology
-
- Anne Richard - International Affairs Fellow,
- Council on Foreign Relations
-
- UN Representative to be announced
-
-
- Friday, June 17
-
- 7:00 pm - 9:15 pm Closing Plenary - Creating Solutions and
- Mudd Hall Auditorium Initiating Change: Young People and the Global
- Community
-
- Jeffrey Leifer (Moderator) - President, Leifer
- Capital and Founder, Student Pugwash USA
-
- Alicia Ely Yamin - Founder of human rights
- advocacy program in Mexico
-
- David Fleming - Founder, Students' Support Council
- for Africa
-
- Brian Trelstad - Founder, Center for Environmental
- Citizenship
-
- Chai Ling - Commander in Chief, Tienanmen Square
- Democracy Movement (tentative)
-
-
- Student Pugwash USA, a national, educational, non-
- profit organization, is dedicated to building a
- commitment among young people to solve critical
- global problems through the responsible use of
- science and technology. Student Pugwash USA
- draws its name from Pugwash, Nova Scotia, where in
- 1957 several of the world's leading scientists
- gathered at the behest of Albert Einstein and
- Bertrand Russell to address pressing issues at the
- forefront of technology and global security.
- Following this tradition, Student Pugwash USA
- began coordinating educational programs for
- graduate and undergraduate students in 1979,
- beginning with an International Conference on
- technology and ethical responsibility held at the
- University of California at San Diego.
-
- Student Pugwash USA programs also include a
- student-initiated Chapter Program, extending to
- over 175 university, college and high school
- campuses nation-wide, and a "New Careers"
- Program, linking students to career opportunities
- and mentors in the areas of technology and social
- change. Additionally, Student Pugwash USA
- International Conferences have led to the formation
- of Student/Young Pugwash organizations in 18
- countries around the world.
-
-
- Student Pugwash USA
- 1638 R Street NW, Suite 32
- Washington, DC 20009
- (202) 328-6555
- uspugwash@igc.org
-
- During the conference, our phone number is (410) 518-6401.
- Send e-mail to jporten@mail.sas.upenn.edu.
-
- ------------------------------
-
- End of Computer Underground Digest #6.51
- ************************************
-
-
-