Computer underground Digest Thu June 9, 1994 Volume 6 : Issue 51 ISSN 1004-042X Editors: J

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest Thu June 9, 1994 Volume 6 : Issue 51 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Retiring Shadow Archivist: Stanton McCandlish Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Dittoer: Etaoian Shrdlu CONTENTS, #6.51 (June 9, 1994) File 1--Response to "Ghost in the Modem" (CuD 6.50) File 2--Email security user survey (fwd) File 3--HACKERS ON PLANET EARTH: The First U.S. Hacker Congress File 4--Video Game Rating Act of 1994 File 5--Senator Kennedy e-mail/www release (fwd) File 6--Pugwash Sci-Tech Conference, JHU: Pub Events and Elec list Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893; In ITALY: Bits against the Empire BBS: +39-461-980493 UNITED STATES: etext.archive.umich.edu (141.211.164.18) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Wed, 8 Jun 1994 14:53:52 -0600 From: Bryce Subject: File 1--Response to "Ghost in the Modem" (CuD 6.50) In CuD 6.50 I read an article entitled "Ghost in the Modem (Loka Alert 1:6 Wash. Post)". In this article, authors Richard Sclove and Jeffrey Scheuer deliver several warnings about the possible effects of the developement of the Information Superhighway and conclude by suggesting three restrictions that, they assert, should be placed on information service developement. While I find myself in more or less complete disagreement with the authors, I am not going to argue about the thesis of their article today. Instead, I would like to draw attention to a statement made earlier in the article which I believe indicates an underlying false assumption. The statement is: "And the risk of inequity in contriving and distributing electronic services [...] is clear." This statement seems to assume that access to information technology should be equally distributed among individuals. The reason that I find this assumption disturbing enough to write about is because I often see variations on such a theme echoed in Computer underground Digest, but I rarely if ever see a contradictory opinion stated. I would like to take this opportunity to state that I believe egalitarianism, in regard to information technology as elsewhere, is an irrational, immoral, and dangerous ideal. As a denizen of cyberspace and a long-time reader of CuD, I would like others to know that I will not assist anyone in his or her attempt to enact policies which, I believe, would be vastly destructive to the cyber-society, and the real society which I inhabit. I am sure that many of my fellow Net citizens have similar ideals and ideologies, but I would not know it from reading CuD! commentary and criticism is welcome ------------------------------ Date: Tue, 7 Jun 1994 21:24:36 -0400 (EDT) From: Stanton McCandlish Subject: File 2--Email security user survey (fwd) Subject--Email security user survey Date--Fri, 03 Jun 1994 13:22:32 -0700 From--John Gilmore Let's give Dana some data about PGP users. Please spread... John ------ Forwarded Message Subject--Request for info from Dana C. Ellingen Date--Fri, 03 Jun 94 09:33:50 -0400 From--Mark S Feldman -----BEGIN PRIVACY-ENHANCED MESSAGE----- Content-Domain: RFC822 Originator-ID-Asymmetric: MFMxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJNRDE kMCIGA1UEChMbVHJ1c3RlZCBJbmZvcm1hdGlvbiBTeXN0ZW1zMREwDwYDVQQLEwh HbGVud29vZA==,06 MIC-Info: RSA-MD5,RSA,UrO04KAws35IxkK3iROrfIsWLHc5CXq84Wu9fyJBEAc 4rwYiHlmfKYrc6j2FtIxqts+MT/KT4/De/Qr79Bdg4OW33TZ8umY4QqYmVJlWGvf 5y7686g8+EyTEyku15Pi8 Dana C. Ellingen is preparing a special issue of the Ferris E-Mail Analyzer on security in electronic mail, and would like to get your input. If any of you would like to respond to him, send him email or get in touch with him as follows: Dana C. Ellingen Electronic Commerce Consultant 415.726.9712 (telephone); 415.726.3093 (FAX); ellingen@netcom.com 410 Laurel Ave., Half Moon Bay, CA 94019-1674 Following are his questions. Mark Note that all answers will be "not for attribution," and will be melded into the overall issue. Vendors, I would like the names of several happy users of your product, even if they have just chosen it and it is not yet installed. I am interested in why they chose to make this move now rather than later, as well as how happy they may be with your product. Questions for Email Security users, for Ferris E-Mail Analyzer: A - What form of security does your firm use for electronic mail and messaging? B - Given the state of turmoil in the industry, why did you choose to be an "early adopter," and to put security into your forms and messaging applications? Why now? C - What problems have you had, having added security? D - What compromises have you had to make to add security? E - Product support: Do you currently use (or are you considering) a commercial product for secure EM? Which one? Why? Are you happy with the support you are getting? F - Interoperability: Do you currently or do you want to exchange secure EM with people outside of your organization? How do you deal with the interoperability problem? G - International: Do you have overseas offices, or do you exchange secure EM with persons outside of the US? Are you concerned about having to cut back on your security to do this? H - Certificates: Do you issue certificates to your users? I - Certificates: If someone else issues certificates, how do establish trust with that organization? J - Certificates: How do you verify the authenticity of a digital signature on a document that you receive? K - Policy: Does your firm have a written policy on electronic mail? Can your firm read its employees' EM? L - Escrowed keys: Do you keep copies of the private keys of the individuals in your firm? Do you think that you should, or that you have the right to do so? M - Integration: How important is it that you have a product that is fully integrated with your existing mail system? N - What did I leave out? What else do you want to discuss? ------------------------------ Date: Sun, 5 Jun 1994 00:45:55 -0700 From: Emmanuel Goldstein Subject: File 3--HACKERS ON PLANET EARTH: The First U.S. Hacker Congress HACKERS ON PLANET EARTH: The First U.S. Hacker Congress Yes, it's finally happening. A hacker party unlike anything ever seen before in this country. Come help us celebrate ten years of existence and meet some really interesting and unusual people in the process. We've rented out the entire top floor of a midtown New York hotel, consisting of several gigantic ballrooms. The conference will run around the clock all weekend long. SPEAKERS AND SEMINARS: Will there be famous people and celebrity hackers? Of course, but the real stars of this convention will be the hundreds of hackers and technologically inclined people journeying from around the globe to share information and get new ideas. That is the real reason to show up. Seminars include: social engineering, cellular phone cloning, cable TV security, stealth technology and surveillance, lockpicking, boxing of all sorts, legal issues, credit cards, encryption, the history of 2600, password sniffing, viruses, scanner tricks, and many more in the planning stages. Meet people from the Chaos Computer Club, Hack-Tic, Phrack, and all sorts of other k-rad groups. THE NETWORK: Bring a computer with you and you can tie into the huge Ethernet we'll be running around the clock. Show off your system and explore someone else's (with their permission, of course). We will have a reliable link to the Internet in addition. Finally, everyone attending will get an account on our hope.net machine. We encourage you to try and hack root. We will be giving away some valuable prizes to the successful penetrators, including the keys to a 1994 Corvette. (We have no idea where the car is, but the keys are a real conversation piece.) Remember, this is only what is currently planned. Every week, something new is being added so don't be surprised to find even more hacker toys on display. We will have guarded storage areas if you don't want to leave your equipment unattended. VIDEOS: We will have a brand new film on hackers called "Unauthorized Access", a documentary that tells the story from our side and captures the hacker world from Hamburg to Los Angeles and virtually everywhere in between. In addition, we'll have numerous foreign and domestic hacker bits, documentaries, news stories, amateur videos, and security propaganda. There has been a lot of footage captured over the years - this will be a great opportunity to see it all. We will also have one hell of an audio collection, including prank calls that put The Jerky Boys to shame, voice mail hacks, and even confessions by federal informants! It's not too late to contribute material! WHERE/WHEN: It all happens Saturday, August 13th and Sunday, August 14th at the Hotel Pennsylvania in New York City (Seventh Avenue, between 32nd and 33rd Streets, right across the street from Penn Station). If you intend to be part of the network, you can start setting up Friday night. The conference officially begins at noon on Saturday and will run well into Sunday night. ACCOMMODATIONS: New York City has numerous cheap places to stay. Check the update sites below for more details as they come in. If you decide to stay in the hotel, there is a special discounted rate if you mention the HOPE Conference. $99 is their base rate (four can fit in one of these rooms, especially if sleeping bags are involved), significantly larger rooms are only about $10 more. Mini-suites are great for between six and ten people - total cost for HOPE people is $160. If you work with others, you can easily get a room in the hotel for between $16 and $50. The Hotel Pennsylvania can be reached at (212) PEnnsylvania 6-5000 (neat, huh?). Rooms must be registered by 7/23/94 to get the special rate. TRAVEL: There are many cheap ways to get to New York City in August but you may want to start looking now, especially if you're coming from overseas. Travel agencies will help you for free. Also look in various magazines like Time Out, the Village Voice, local alternative weeklies, and travel sections of newspapers. Buses, trains, and carpools are great alternatives to domestic flights. Keep in touch with the update sites for more information as it comes in. WANTED: Uncommon people, good music (CD's or cassettes), creative technology. To leave us information or to volunteer to help out, call us at (516) 751-2600 or send us email on the Internet at: 2600@hope.net. VOICE BBS: (516) 473-2626 INTERNET: info@hope.net - for the latest conference information travel@hope.net - cheap fares and advisories tech@hope.net - technical questions and suggestions speakers@hope.net - for anyone interested in speaking at the conference vol@hope.net - for people who want to volunteer USENET NEWSGROUPS: alt.2600 - general hacker discussion alt.2600.hope.announce - the latest announcements alt.2600.hope.d - discussion on the conference alt.2600.hope.tech - technical setup discussion REGISTRATION: Admission to the conference is $20 for the entire weekend if you preregister, $25 at the door, regardless of whether you stay for two days or five minutes. To preregister, fill out this form, enclose $20, and mail to: 2600 HOPE Conference, PO Box 848, Middle Island, NY 11953. Preregistration must be postmarked by 7/31/94. This information is only for the purposes of preregistration and will be kept confidential. Once you arrive, you can select any name or handle you want for your badge. NAME: ______________________________________________________________ ADDRESS: ___________________________________________________________ CITY, STATE, ZIP, COUNTRY: __________________________________________ PHONE (optional): ________________ email (optional): _______________ IMPORTANT: If you're interested in participating in other ways or volunteering assistance, please give details on the reverse side. So we can have a better idea of how big the network will be, please let us know what, if any, computer equipment you plan on bringing and whether or not you'll need an Ethernet card. Use the space on the back and attach additional sheets if necessary. ------------------------------ Date: Wed, 8 Jun 1994 10:31:00 -0500 (CDT) From: David Smith Subject: File 4--Video Game Rating Act of 1994 What I don't like about this approach is that Congress is acting as the labeling agent. This violates the industry commission precedent set with movies, comic books, and music. The big video companies (Sega/Nintendo/etc) have counter-offered to create their own commission that would charge $500 per title to rate. -- David ---------- Forwarded message ---------- From--lpurple@netcom.com (Lance Purple) Date--8 Jun 1994 08:34:14 -0500 Here is a summary of the actual bill that Representative Lantos wants. The rating system will be voluntary after all (at least until 1996), so I retract the imminent-death-of-all-shareware prediction. lpurple@netcom.com ========================================================= **** 103rd Cong. Status Profile for H.R. 3785 **** BRIEF TITLE....... Video Game Rating Act of 1994 SPONSOR........... Lantos DATE INTRODUCED... February 3, 1994 HOUSE COMMITTEE... Energy and Commerce Judiciary OFFICIAL TITLE.... A bill to provide for the establishment of the Interactive Entertainment Rating Comission, and for other purposes. CO-SPONSORS....... 16 CURRENT COSPONSORS Feb 3, 94 Referred to House committee on Energy and Commerce. Mar 4, 94 Referred to subcommittee on Comerce, Consumer Protection and Competitiveness. Feb 3, 94 Referred to House Committee on the Judiciary. May 24, 94 Referred to Subcommittee on Ecconomic and Commercial Law. COS CO-SPONSORS....... 16 CURRENT COSPONSORS Feb 8, 94 Glickman. Mar 16, 94 Maloney, Morella, Shays, Smith (NJ) Mar 23, 94 Johnson (SD), Lloyd. Apr 18, 94 Bereuter, Frost, Hughes, E.B.Johnson, Orton, Parker, Taylor (MS). May 12, 94 Gejdenson, Hinchey. BD BILL DIGEST...... Feb 3, 94. Video Game Rating Act of 1994 - Establishes the Interactive Entertainment Rating Commission to: (1) coordinate with the video game industry in the development of a voluntary standard for providing information to purchasers and users concerning the contents of video games; (2) evaluate whether any standards proposed are adequate to warn purchasers and users of the violent or sexually explicit content of such games; and (3) report to the President and Congress regarding the adequacy of the industry's response. Provides Commission funding through December 31, 1996. Terminates the Comission on the earlier of such date or 90 days after submission of its report. Provides an antitrust exemption for any actions taken by the video game industry in developing such guidelines. ------------------------------ Date: Mon, 6 Jun 1994 19:02:50 -0400 (EDT) From: Stanton McCandlish Subject: File 5--Senator Kennedy e-mail/www release (fwd) From--Chris_Casey@kennedy.senate.gov Subject--Senator Kennedy e-mail/www release ___________________________________________________________________ from the office of Senator Edward M. Kennedy ___________________________________________________________________ FOR IMMEDIATE RELEASE June 2, 1994 CONTACT:Pam Hughes 202/224-2633 pam_hughes@kennedy.senate.gov Senator Kennedy Announces New Electronic Services For Improving Constituent Access Via The Internet Senator Edward M. Kennedy has announced two new services to enhance electronic access to his office. Constituents can now contact the Senator directly via electronic mail, and can locate the Senator's press releases and statements as well as explore other Massachusetts and Government resources in an easy-to-use point and click interface using the World Wide Web, a protocol developed by the European Center for Particle Physics (CERN) which links information across the Internet. Electronic Mail Senator Kennedy's Internet e-mail address is: senator@kennedy.senate.gov Electronic mail received by the Senator will receive an electronic acknowledgment automatically. An individual reply will be sent via postal mail when a postal address has been included. World Wide Web Using popular Internet browsing software such as Mosaic (developed by the National Center for Supercomputing Applications), the public can locate information about Senator Kennedy, as well as links to other Massachusetts and Government Web servers at the following URL: http://www.ai.mit.edu/projects/iiip/Kennedy/homepage.html Current links point to information from the Senator's office and the Labor and Human Resources Committee which he chairs. Other links point to other electronic resources including the House of Representatives, the Library of Congress, other Federal Government Web servers and Massachusetts information. Technical assistance with the development and maintenance of the Kennedy homepage on the World Wide Web has been provided as a public service by the Intelligent Information Infrastructure Project, at the Artificial Intelligence Laboratory, Massachusetts Institute of Technology. Senator Kennedy has been on the leading edge of developing electronic access to a Congressional office, and has been making his press releases and statements available on computer bulletin boards in Massachusetts and the Internet for over a year. The information below details the various means for locating these resources. _______________________________________________ Senator Kennedy On-line Computer Bulletin Boards: The following computer bulletin boards carry the "Sen. Kennedy Releases" conference and the "Press Release Comments" sub- conference. These boards each use the FirstClass BBS software, and can be accessed with standard telecommunications software, or in their graphical interface via Macintosh or Windows client software available for downloading on-line. North Shore Mac 508/921-4716 User ID and Password: visitor Conspiracy 508/478-1714 Quantum 508/443-4644 BCS Mac 617/864-3375 BMUG Boston 617/721-5840 Fire on the Hill 617/629-9739 Reflections 617/593-7228 On the Internet: Anonymous FTP ftp ftp.ai.mit.edu , login: anonymous, cd incoming/Kennedy ftp ftp.senate.gov , login: anonymous, cd member/ma/kennedy Gopher gopher gopher.senate.gov World Wide Web http://www.ai.mit.edu/projects/iiip/Kennedy/homepage.html Usenet Releases can be found in the following USENET news groups: ne.politics and talk.politics.misc Electronic Mail: Electronic mail to Senator Kennedy can be addressed to: senator@kennedy.senate.gov An electronic acknowledgment will confirm receipt of your message. Constituents who have included a postal address in their message will receive a reply via U.S. Mail. ______________________________________________ ! ________________________ Chris Casey | | chris_casey@kennedy.senate.gov /''''\ /______\ 202/224-3570 |@@@@@@@@| ||0||0||0| Office of Senator Kennedy _____/\________ " " " " "_______/\_____ Washington, DC 20510 {|| || || || || ____/\_____|| || || || ||} ------------------------------ Date: Thu, 9 Jun 1994 03:11:48 -0400 (EDT) From: jporten@SAS.UPENN.EDU(Jeffrey A. Porten) Subject: File 6--Pugwash Sci-Tech Conference, JHU: Pub Events and Elec list Student Pugwash USA Eighth International Conference Science and Technology for the 21st Century: Meeting the Needs of the Global Community Johns Hopkins University, Baltimore, MD June 12 - 18, 1994 An exceptional international forum will take place at Johns Hopkins University in Baltimore, Maryland from June 12-18, uniting 100 student leaders from around the world to explore critical global and technological challenges and to design viable alternatives for their resolution. These students, representing over 25 countries, have been selected as participants of Student Pugwash USA's Eighth International Conference, *Science and Technology for the 21st Century: Meeting the Needs of the Global Community*. The International Conference will explore critical issues at the juncture of technology and world affairs, addressing the inter-relationships among issues and their impact on the global community. The event represents a unique opportunity for young people and concerned citizens to engage in serious discourse with experts from the fields of international security, environment, health care, information technology, genetics and community development. Working groups at the conference are: * Resource Stewardship for Environmental Sustainability * Preventative Diplomacy and Conflict Resolution for a Secure Future * Overcoming Barriers to Health Care Education and Delivery * Meeting Societal Needs Through Communications and Information Technologies * Designing the Future--From Corporations to Communities * The Social Costs and Medical Benefits of Human Genetic Information There are two ways you can get involved. Our plenary sessions and High Technology Forum are open to the public, and we invite everyone who is interested to attend. We will also be running an electronic mail listserver during the conference, to which we will distribute transcripts from the plenaries, summaries of the working group reports, and messages from student participants. Responses from the Internet community will be circulated at the conference! ************************************************************* To subscribe to the electronic conference, send e-mail to majordomo@blaze.cs.jhu.edu with the body "subscribe pugwash". ************************************************************* THE FOLLOWING EVENTS ARE OPEN TO THE PUBLIC! Please send e-mail to jporten@mail.sas.upenn.edu if you need directions to Mudd Hall at Johns Hopkins or the Maryland Science Center. Monday, June 13 7:00 pm - 9:00 pm Keynote Plenary - Envisioning the Future: Towards Mudd Hall Auditorium a Global Community in the 21st Century Nicholas Steneck (Introductions) - Chair, Student Pugwash USA Board of Directors Adele Simmons - President, The John D. and Catherine T. MacArthur Foundation Timothy Wirth - Under Secretary for Global Affairs, U.S. Department of State Tuesday, June 14 2:00 pm - 4:00 pm Exchanging Technologies Between Cultures and Mudd Hall Auditorium Countries: The Good, The Bad and the Ugly Taft Broome (Moderator) - Professor of Engineering, Howard University Gerard Bodeker - Coordinator, Global Initiative for Traditional Systems of Health Armstrong Wiggins - Executive Director, Indian Law Resource Center Susan Harjao - Executive Director, Morning Star Foundation 7:00 pm - 9:15 pm Science and Human Rights Mudd Hall Auditorium Rosemary Chalk (Moderator) - Study Director, National Academy of Sciences Carol Corillon - Director, Committee on Human Rights, National Academy of Sciences Clyde Snow, M.D. - Oklahoma Medical Examiner Office Wednesday, June 15 7:00 pm - 8:00 pm High Technology Forum Maryland Science Center This interactive forum will feature a series of displays and presentations featuring high and alternative technologies. Exhibits include: geographic information systems, computer-aided design, global positioning systems, virtual reality, and CD-ROM technologies, among others. 8:00 pm - 9:00 pm Innovations and Innovators: Technology and Social Maryland Science Responsibility Center Ken Phillips (Moderator) - Vice President for Telecommunications Policy, Citicorp Sheldon Segal - Distinguished Scientist, Population Council (Co-Developer of Norplant) Theodore Taylor - Nuclear Scientist, Los Alamos National Laboratory (1949 - 56) 9:00 pm - 10:00 pm Reception for Conference Participants and Public Maryland Science and Continuation of High Technology Forum Center Thursday, June 16 2:00 pm - 4:00 pm The Future of U.N. Peacekeeping: Prospects for a Mudd Hall Auditorium Volunteer Force Anne Cahn (Moderator) - Senior MacArthur Scholar, University of Maryland William Maynes - Editor, Foreign Policy George Rathjens - Professor of Political Science, Massachusetts Institute of Technology Anne Richard - International Affairs Fellow, Council on Foreign Relations UN Representative to be announced Friday, June 17 7:00 pm - 9:15 pm Closing Plenary - Creating Solutions and Mudd Hall Auditorium Initiating Change: Young People and the Global Community Jeffrey Leifer (Moderator) - President, Leifer Capital and Founder, Student Pugwash USA Alicia Ely Yamin - Founder of human rights advocacy program in Mexico David Fleming - Founder, Students' Support Council for Africa Brian Trelstad - Founder, Center for Environmental Citizenship Chai Ling - Commander in Chief, Tienanmen Square Democracy Movement (tentative) Student Pugwash USA, a national, educational, non- profit organization, is dedicated to building a commitment among young people to solve critical global problems through the responsible use of science and technology. Student Pugwash USA draws its name from Pugwash, Nova Scotia, where in 1957 several of the world's leading scientists gathered at the behest of Albert Einstein and Bertrand Russell to address pressing issues at the forefront of technology and global security. Following this tradition, Student Pugwash USA began coordinating educational programs for graduate and undergraduate students in 1979, beginning with an International Conference on technology and ethical responsibility held at the University of California at San Diego. Student Pugwash USA programs also include a student-initiated Chapter Program, extending to over 175 university, college and high school campuses nation-wide, and a "New Careers" Program, linking students to career opportunities and mentors in the areas of technology and social change. Additionally, Student Pugwash USA International Conferences have led to the formation of Student/Young Pugwash organizations in 18 countries around the world. Student Pugwash USA 1638 R Street NW, Suite 32 Washington, DC 20009 (202) 328-6555 uspugwash@igc.org During the conference, our phone number is (410) 518-6401. Send e-mail to jporten@mail.sas.upenn.edu. ------------------------------ End of Computer Underground Digest #6.51 ************************************

---

E-Mail Fredric L. Rice / The Skeptic Tank