Wednesday, April 22, 2015

Fwd: OWASP Foundation April 21 Connector

OWASP Global Connector

April 22, 2015 || | Contact Us | Brought to you by the OWASP Foundation

OWASP in the News

2015 WASPY awards and Global Board Elections

OWASP Translations

New Hacking-Lab Challenges

Support OWASP through Amazon Smile


OWASP KALP Mobile project


OWASP ZAP 2.4.0 is now available

Introduction to using ZAP with Docker

OWASP AppSensor - CISO Briefing

OWASP WASC Web Hacking Incidents Database Project

OWASP Automated threats to Web Applications Project


Global AppSec Events

Local and Regional Events

Partner and Promotional Events


New OWASP Chapters

Chapter Transitions

Chapter Activities

Updates to the Chapter Leader Handbook


Corporate Members

Social Media

OWASP Foundation Social Media


OWASP in the NEWS!

OWASP Projects and activities are often the subject of webcasts and podcasts. Sit back and relax as you watch and listen to these recent episodes.
Simon Bennetts - FLOSS Weekly ZAP interview
North Sweden Chapter leaders, Markus Orebrand and Magnus Hultdin were featured in an Infotech Umea article
Fabio Cerullo - OWASP and 2015 LATAM Tour - Mundo Hacker TV
HP and OWASP Internet of Things Top Ten at RSA conference - A Good Housekeeping Seal for the Connected Home | Security Ledger
Mark Miller - OWASP 24/7 Podcast Series

2015 Global Board elections and WASPY Awards

Be on the lookout for more information on the upcoming Elections and Annual Awards! The election process will begin May 1 with the Global Board call for candidates.
More information will follow via email.

OWASP Translation

Thank you to the local teams for translating OWASP documentation into many different languages.

CISO Guide in Spanish

New Hacking Lab Challenges

The Hacky Easter challenges have returned!
Hacky Easter 2015 is a free, white-hat hacking competition for education and fun. The competition runs until May 31, 2015. CLICK HERE to access the challenges! Good luck to all.

Support OWASP Through Amazon Smile

Did you know that when you access Amazon through the special OWASP Charity link OWASP received a percentage of the purchase?
This is an easy way to help support OWASP. 100% of proceeds collected through Amazon Smile in 2015 will support the Women in AppSec initiative.


OWASP KALP Mobile project

OWASP KALP Mobile Project is for the users around the world who want to view the OWASP Top 10 vulnerabilities, download the Top 10 list on their mobile device, and email it. This is a lightweight information of OWASP Top 10 list, Cheat Sheets as well as Prevention Cheat Sheets created from the OWASP site.
Visit the project page for links to download the application for Android and iOS devices.

OpenSAMM Consortium Launches Industry's First Public Benchmarking Data for Improving Software Security

OpenSAMM is an easy-to-use assessment which provides flexible datasets that can be customized by organization demographics, including sector, development and cultural profile, resulting in pragmatic milestones towards reducing overall security risk.
The expanded access to these datasets makes OpenSAMM available to a larger number of organizations, which previously weren't able to apply valuable benchmarking data to their particular case.
Each of the practical, constructive benchmarks within the framework was derived from best practices of leading application security firms.
Read the entire press release HERE
Open SAMM Project Page

OWASP ZAP 2.4.0 is now available

Complete details of all the changes, visit the ZAP release Blog Post
Some of the highlights are:
  • New "Attack" mode
  • Advanced Fuzzing
  • Access Control Testing
  • UI Changes
  • and much, much, much more!
Please consider attending the very first ZAP Summit which will take place at AppSec EU in Amsterdam on May 20, 2015. Attendees will have the opportunity to learn and extend their knowledge as well as hands on activities. Admission to the summit is free!

Introduction to using ZAP with Docker

Following the latest release of ZAP 2.4.0, Samuli Elomaa has written a brief introduction to using ZAP with Docker
What can you do with ZAP docker images? The main advantages are:
  • Integrating ZAP as part of docker based build/deploy CI-process in order to run non-interactive ZAP active scanning against other docker containers within the same cloud.
  • Quickly deploying ZAP to docker friendly datacenter in order to use ZAP for scanning applications behind firewalls.
  • Having the latest ZAP stable/weekly release inside isolated container in your personal workstation.
Read the full article with step by step instructions for usining ZAP with Docker at the OWASP Blog.

OWASP AppSensor - CISO Briefing

AppSensor is about detecting and responding to attacks within software applications.
In February the project team created a two-page flyer "AppSensor - Introduction for Developers"
And now in April, a new 12-page booklet "AppSensor - CISO Briefing" has also been finalised
The CISO Briefing is also available to buy at cost in hardcopy.
These materials are intended to complement the more extended information on the microsite, project wiki and AppSensor - Guide. AppSensor is also participating in the project summit at AppSec EU in May.

OWASP WASC Web Hacking Incidents Database Project

WHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents.
A useful way to use WHID is to help provide data for "Likelihood of Attack" RISK ratings. There is a lot of public "vulnerability" data publicly available, but which ones are actively being used by attackers?
Read more, find Top 10 mappings, and submit an incident by visiting WASC Web Hacking Incidents Database project page

OWASP Automated Threats to Web Applications Project

There is significant knowledge about application vulnerability types, and some general consensus about identification and naming. Issues relating to the misuse of valid functionality, which may be related to design flaws rather than implementation bugs, are less well defined. Yet these problems are seen day-in day-out by web application owners. Excessive abuse of functionality is commonly mistakenly reported as application denial-of-service (DoS) such as HTTP-flooding or application resource exhaustion, when in fact the DoS is a side-effect. Some examples are blog & comment spam, fake account creation, password cracking, web scraping, etc.
These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.
The OWASP Automated Threats to Web Applications Project is in the process of reviewing reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify and name classes of these - threat events to web applications that are undertaken using automated actions.
The aim is to produce an ontology providing a common language for devops, architects, business owners, security engineers, purchasers and suppliers/vendors, to facilitate clear communication and help tackling the issues. The project also intends to identify symptoms, mitigations and controls in this problem area. But for the moment the project would like to receive real-world experience on the prevalence and naming of such threats - especially from those responsible for the ongoing operation of web applications.
One way to help would be to complete the new survey which has been published this week. Help identify real-world automated threats using this Google Form:
For more information, please visit the Project Wiki Page

OWASP Events

Global AppSec Events

EU The Conference Program is Now Available!
Limited Seats are available in the pre conference Trainings

Wednesday, May 20 - One day courses:
Tuesday and Wednesday, May 19-20 - Two day courses:
Thursday and Friday 21st and 22nd May, 2015 are Conference Days including: Keynotes, CISO, DEV, Hack, Ops, and Research talks, HackPra Allstars, Hands on sessions, and more ...
USA 2015 AppSec USA 2015 (September 22 - 25, 2015, San Francisco, CA)
  • Tickets Sales Now Open! CLICK HERE to register!
  • Limited Sponsorships Are Still Available
  • Career Fair Spaces now open! Recruit the best AppSec Talent! Spaces are limited. Please contact Kelly Santalucia for more information or to reserve your spot.

Regional and Local Events

LASCON 2015 (October 19-22, 2015) Austin, TX
AppSec Rio de la Plata 2015 (November 17-20, 2015) Montevideo, Uruguay

Partner and Promotional Events

AppsWorld Germany 2015 (April 22-23, 2015) Berlin, Germany
NCCDC (April 24-26, 2015) San Antonio, TX
AppsWold North America 2015 (May 12-13, 2015) San Francisco, CA. OWASP members recieve 15% off delegate passes. Enter voucher code: I89GS/APPSP15
SANS CyberTalent Fair (May 14-15, 2015) Virtual, online
BSides Knoxville (May 15, 2015) Knoxville, TN
International Conference on Cyber Security (ICCS) (May 16-17, 2015) City of Redlands, CA. OWASP members receive 25% off the general event fee. Discount code ICCSOWASP
Cloud Security World 2015 (May 19-21, 2015) New Orleans, LA..OWASP members receive a 25% discount off standard event fee. Discount code CLD15-OWASP
Hack In the Box (May 26-29, 2015) OWASP members receive 20% off by using discount code OWASP-HITB2015AMS
SC Congress Toronto (June 10 - 12, 2015) Toronto, Canada. Register with your @owasp email address and receive a discount.
Hack in Paris (June 15-19, 2015) La Plaine Saint-Denis, Paris
EuroPython 2015 (July 20-26, 2015) Bilbao, Spain
(ISC)2 Security Congress APAC 2015 (July 28-29, 2015) Manila, Philippines
BlackHat USA (August 1-6, 2015) Las Vegas, NV
BSides Las Vegas (August 4-5, 2015) Las Vegas, NV
Info Security Malaysia Conference (August 6, 2015) Kuala, Lumpur
Security One2One Summit (October 4-6, 2015) Austin, TX
SecTor (October 19-21, 2015) Toronto, CN

oneconsult symantec trustwave
Ads are not endorsements and reflect the messages of the advertiser only. CLICK HERE for more information on advertising.

OWASP Chapters

New Chapters

Leeds Beckett University: New Student Chapter and Academic Supporter - Chapter Leaders - Joseph Gwynne-Jones - President, Christopher Easton - Vice President, James Johnson - Treasurer, Connor Wilson - Secretary, Cliffe Schreuders - Faculty Advisor

Chapter Transitions

Manaus, Brazin - New Chapter Leader - Fabio Lapuinka
Phoenix, AZ USA - New Chapter Leader - Joaquin Fuentes
Charlottesville, VA USA - New Chapter Leader - Jeff Collyer
UW Bothell Student Chapter - New Chapter Leaders - Tyler Laws, Brendan Sweeney

Chapter Activities

OWASP Noida, India hosted a tour beginning April 6 to promote Cyber Safety Campaign Across India. The tour began on 6th April 2015 at the Poddar International School in Nagpur, Maharashtra, India
Check out the event on Facebook!
Check out the Twitter Feed!
Share your chapter's successes! Submit your stories here

Updating the Chapter Leader Handbook

Noreen Whysel, OWASP Community Manager has begun processing your comments and suggested changes to the Chapter Leader Handbook
To add your comments, go to the Chapter Handbook page. On each chapter of the handbook, click the "Discussion" tab at the top left of the page to review the suggested changes. You will need to log in to add your own suggestions. At this time do not make any edits to the Chapter Leader Handbook pages. Only add suggestions to the Discussion page. Please contact Noreen if you need assistance.


New Corporate Members

Renewed Corporate Members

Social Media

OWASP Social Media Sites

Monday, April 20, 2015

Introduction to using ZAP with Docker

By Samuli Elomaa


For those who are not familiar with Docker. Docker is an application container, which works bit similar to "user mode Linux" or LXC containers, allowing users to deploy applications inside containers containing full virtualized OS install while having isolated container which can easily be deployed as needed.

The build process for the docker images is as simple as downloading the ascii-file containing the configuration along with specific OS-commands and running "docker build" -command, or just use the existing images with simple "docker pull" -command in order to download pre-made images from the docker hub.

In order to support zap usage on docker environments, the ZAP project has pre-made images available allowing easy use and deployment of Stable and Weekly versions of ZAP through docker.

What can you do with ZAP docker images?

For me the main advantages are:
  • Integrating ZAP as part of docker based build/deploy CI-process in order to run non-interactive ZAP active scanning against other docker containers within the same cloud.
  • Quickly deploying ZAP to a docker friendly datacenter in order to use ZAP for scanning applications behind firewalls.
  • Having the latest ZAP stable/weekly release inside an isolated container in your personal workstation.

How to get started:

First you need to have the docker tool installed. You can do this by following instructions at the docker website. Or if you are using debian compatible OS, you can just type "apt-get install".

Once you have docker installed you can pull the latest zap docker image from owasp's docker image repository (hosted by docker hub).
docker pull owasp/zap2docker-stable
Or for weekly images:
docker pull owasp/zap2docker-weekly
This will download and install the zap docker images from docker project's image hub. Alternatively you can build your own with the docker files located at build/docker directory of the zap source code archive.

How to access the ZAP running inside the docker

  • ZAP GUI (via VNC)
  • ZAPR for script/CI-friendly automatic active scanning without user interaction.

1. GUI via VNC

The easiest way to access the ZAP GUI is via the embedded vnc-server:
docker run -u zap -p 5900:5900 -p 8080:8080 -i owasp/zap2docker-stable x11vnc --forever --usepw --create
This will first ask you to set VNC server password, once done it will startup the VNC session. Which you can connect with your VNC client (eg. in the example its localhost and tcp port 5900). In order to reach the ZAP proxy from your web browser just set your http proxy point to your docker host's IP (or localhost) and TCP port 8080, when you are done you can just kill the docker image with ctrl+c.

For downloading the report files from the docker image, you can use the data volume mounting option: -v localdir:/home/zap/ , altough this does have problems when using systems like boot2docker. Please see the following site for more detailed information regarding managing data in docker containers:


Zapr is ruby script for ZAP which allows non-interactive active scanning for desired targets, which is nice for things like cronjobs or shell-script jobs. Notice that the summary report from Zapr is printed to the console after running the docker command.
docker run -u zap -i owasp/zap2docker-stable zapr --debug --summary http://target

3. API or headless mode

The best way to integrate ZAP as part of your CI-scripts (if you use Java or Python) is through the API:
docker run -p 8090:8090 -i owasp/zap2docker-stable -daemon -port 8090 -host
When this is run, you can access the ZAP API from localhost/host-ip at tcp port 8090. Eg. or http://dockerip:8090/

See more details regarding the ZAP api usage here:

For the Docker help, the docker project has nice Docker User guide at:

Happy Hacking!

Tuesday, April 14, 2015


ZAP is an OWASP Flagship project, and is currently the most active open source web application security tool.

A major new release of ZAP, 2.4.0 is now available:

For a quick introduction to the new release see this video:

Some of the most significant changes include:

‘Attack’ Mode

A new ‘attack’ mode has been added that means that applications that you have specified are in scope are actively scanned as they are discovered.

Advanced Fuzzing

A completely new fuzzing dialog has been introduced that allows multiple injection points to be attacked at the same time, as well as introducing new attack payloads including the option to use scripts for generating the payloads as well as pre and post attack manipulation and analysis.

Scan Policies

Scan policies define exactly which rules are run as part of an active scan.
They also define how these rules run influencing how many requests are made and how likely potential issues are to be flagged.
The new Scan Policy Manager dialog allows you to create, import and export as many scan policies as you need. You select any scan policy when you start an active scan and also specify the one used by the new attack mode.
Scan policy dialog boxes allow sorting by any column, and include a quality column (indicating if individual scanners are Release, Beta, or Alpha quality).

Scan Dialogs with Advanced Options

New Active Scan and Spider dialogs have replaced the increasing number of right click 'Attack' options. These provide easy access to all of the most common options and optionally a wide range of advanced options.

Hiding Unused Tabs

By default only the essential tabs are now shown when ZAP starts up.
The remaining tabs are revealed when they are used (e.g. for the spider and active scanner) or when you display them via the special tab on the far right of each window with the green '+' icon. This special tab disappears if there are no hidden tabs.
Tabs can be closed via a small 'x' icon which is shown when the tab is selected.
Tabs can also be 'pinned' using a small 'pin' icon that is also shown when the tab is selected - pinned tabs will be shown when ZAP next starts up.

New Add-ons

Two significant new ‘alpha’ quality add-ons are available:
  • Access Control Testing: adds the ability to automate many aspects of access control testing.
  • Sequence Scanning: adds the ability to scan 'sequences' of web pages, in other words pages that must be visited in a strict order in order to work correctly.
These can both be downloaded from the ZAP Marketplace.

New Scan Rules

A number of significant new ‘alpha’ quality scanners are available:
  • Relative Path Confusion: Allows ZAP to scan for issues that may result in XSS, by detecting if the browser can be fooled into interpreting HTML as CSS.
  • Proxy Disclosure: Allows ZAP to detect forward and reverse proxies between the ZAP instance and the origin web server / application server.
  • Storability / Cacheability: Allows ZAP to passively determine whether a page is storable by a shared cache, and whether it can be served from that cache in response to a similar request. This is useful from both a privacy and application performance perspective. The scanner follows RFC 7234.
Support has also been added for Direct Web Remoting as an input vector for all scan rules.

Changed Scan Rules

  • External Redirect: This plugin’s ID has been changed from 30000 to 20019, in order to more closely align with the established groupings. (This change may be of importance to **API Users**). Additionally some minor changes have been implemented to prevent collisions between injected values and in-page content, and improve performance. (Issues: 1529 and 1569)
  • Session ID in URL Rewrite: This plugin has been updated with a minimum length check for the value of the parameters it looks for. A false positive condition was raised related to this plugin (Issue 1396) whereby sID=5 would trigger a finding. Minimum length for session IDs as this plugin interprets them is now eight (8) characters.
  • Client Browser Cache: The active scan rule TestClientBrowserCache has been removed. Checks performed by the passive scan rule CacheControlScanner have been slightly modified. (Issue 1499)

More User Interface Changes

  • The ZAP splash screen is back: It now includes new graphics, a tips & tricks module, and loading/progress info.
  • The active scan dialog show the real plugin’s progress status based on the number of nodes that need to be scanned.
  • There is a new session persistence options dialog that prompts the user for their preferred settings at startup (you can choose to “Remember” the option and not be asked again).
  • For all Alerts the Risk field (False Positive, Suspicious, Warning) has been replaced with a more appropriately defined Confidence field (False Positive, Low, Medium, High, or Confirmed).
  • Timestamps are now optionally available for the output tab.

Extended API Support

The API now supports the spidering and active scanning or multiple targets concurrently, the management of scan policies as well as even more of the ZAP functionality.

Internationalized Help Add-ons

The help files are internationalized via
If you use ZAP in one of the many languages we support, then look on the ZAP Marketplace to see if the help files for that language are available. These will include all of the available translations for that language while defaulting back to English for phrases that have not yet been translated.

Release Notes

See the Release Notes ( for a full list of all of the changes included in this release.

ZAP Community - first Summit and scripts on GitHub

Although its not directly related to this release, this is too good an opportunity not to mention the very first ZAP Summit, which will take place at AppSec EU in Amsterdam on May 20th 2015 (
Entry is free - come along and help define the future direction of ZAP!
And we have a set of ZAP community scripts on GitHub - pull requests very welcome!

To keep up to date with ZAP related news follow @zaproxy on twitter.

Tuesday, March 31, 2015

OWASP Community Manager News Flash – March 2015

Greetings OWASP Community,

Goodbye, March. Hello, April. I realized as I am finalizing this email that it may already be April for some of you when you get this newsletter. With Springtime in the Northern Hemisphere and Autumn beginning in the Southern Hemisphere, it is a time of change (for the better) and time to reflect on your participation with OWASP activities.

Read on to find out how we can support positive changes, starting with our 2015 Strategic Goals, which focus on developing training, strengthening our chapters and maturing our projects platforms. There are many ways for you to get involved and I look forward to your participation.

Happy journeys,

Noreen Whysel
Community Manager
OWASP Foundation

Announcing the 2015 Strategic Goals

The 2015 Strategic Goals have been posted to the wiki. Thanks to all who participated in our 2015 Strategic Goals Survey. You will notice that each of these goals require the participation of the entire OWASP Community. We hope you will help out where you are able and interested.

1. Build a scalable OWASP training program that spreads security training around the world (contact Andrew van der Stock at to help)

2. Strengthen OWASP chapters and increase Chapter’s abilities to spread message of OWASP through locally organized and run events. (contact to help out)

3. Mature the OWASP Projects Platform: Provide the OWASP projects community a mature project platform to encourage senior developers to participate in the various and many OWASP projects. (contact to help)

View metrics, board sponsors and foundation support for each goal at:

Latest News – Updating the Chapter Leader Handbook

Whats New?

I have been working on updating the Chapter Leader Handbook and invite our community to participate in discussions around what is working and what is not working, what needs changing and what should be kept as is.

If you would like to participate, please visit the Chapter Leader Handbook at:

I have started adding comments and suggested changes to the Talk pages of each chapter. To add your comments, you will need to login to the wiki, click the "Discussion" tab at the top left of the page, and it will open an edit form where you can make suggestions, challenge suggested changes or suggest clarifications and additional content. I can copy comments or concerns reported via the mailing lists to the discussion page as well. This way comments can be tracked and addressed directly in the wiki. 

It would be helpful if you sign you name to any suggestions or comments you make. The MediaWiki platform makes this very easy: simply type four tildes in a row (~~~~) and click Save. This will automatically save your name and a timestamp so we can address specific comments.

At this time do not make any edits to the Chapter Leader Handbook pages. Unauthorized edits will be reverted to the current version.

If you have any questions, please feel free to reach out to me.

Refresher on the Mandatory Chapter Rules

We recommend that everyone take a refresher view at Chapter 2: Mandatory Chapter Rules, which contains the minimum requirements for OWASP chapter leaders. One of the areas which could see improvement is in announcing upcoming chapter meetings. The rules state that you must post upcoming meetings to the wiki and to the mailing list. Not all chapters do this consistently. Some simply point to an external forum such as Facebook or Meetup. This is not sufficient since the wiki posting and mailing lists are intended to keep the broader OWASP community informed in addition to your local group.

Think of this from the perspective so someone new to your chapter. If the most recent meeting on your wiki site is from 2011, or the only way to learn about meetings is via joining an external social media site, your visitors may seek a different group. Meeting listings on the wiki and mailing list are indicators that a chapter is active and affiliated with the global OWASP Foundation. Also, we occasionally hear from security minded folks (wouldn't you know?) who do not want to join yet another social media group just to find out when a meeting will be held. OWASP's first rule is "free and open" and the best way to keep it that way is to post all announcements to the wiki.

Finally, we receive multiple requests each week from people who want to "restart" a chapter that appears to be inactive. Failing to comply with this rule risks having your chapter labeled "inactive" and possibly handed over to someone new.

OWASP On the Move - Recent Chapter Activity

We are just a week away from the launch of LATAM 2015. We now have 10 countries participating! Registration is open for the following dates and locations:

Santiago, Chile: April, 8th-9th 2015 Patagonia, Argentina: April, 10th-11th 2015
Bucaramanga, Colombia: April, 14th 2015
Montevideo, Uruguay: April, 15th-16th 2015
Lima, Peru: April, 17th-18th 2015
Santa Cruz, Bolivia: April 17th -18th 2015
San Jose, Costa Rica: April, 21st 2015
Guatemala, Guatemala: April, 21st-22nd 2015
Buenos Aires, Argentina: April, 24th 2015
Caracas, Venezuela: April, 23rd 2015

Also Mark Miller interviewed the organizing team for AppSecEU 2015 You can find the audio file here: 2015 AppSecEU Pre Conference Update [AUDIO]. AppSecEU is May 19-22, 2015 in Amsterdam.

We have a group who are working on launching an AppSec Africa event. If you are interested, you can follow the discussion on the owasp-leaders mailing list (see link below) or visit the draft event page and add your name to the Team tab.

The New York City chapter successfully held a (mini)Project Summit at HACKNYC 2015 at the Pennsylvania Hotel, with teams working onOWASP Mobile Security Project, WIASP Incident Response Project, ASVS and Open SAMM. Community Manager, Noreen Whysel, was also on hand to teach attendees about OWASP and Application Security on Wikipedia.

New Chapters

This month, we launched new chapters in Bihar State, India; Stockholm, Sweden;a and Southern New Hampshire, USA. We are also in the process of setting up a student chapter at Lovely Professional University in Phagwara India. For information or to join these communities, please visit their chapter wiki pages:

TIP: Updating Chapter Leader Information

We realize that commitments change and your chapter may need to name a new leader. Please update your wiki pages and mailing lists with any new leader contact information and submit a request for a new email account, if required. 

Ideally, chapter leader changes should be reported by the current leader or a member of the leadership team. If we receive a request directly from someone who intends to become a new leader, we will always contact the listed leader for verification. If a chapter is inactive and a new leader would like to take over, we favor those who have demonstrated experience with OWASP and/or application security and may reach out to the existing chapter members for discussion. Since the leader has responsibility for any funding allocated to that chapter, it is in everyone's interest that all chapter members be involved in any leadership changes.

Leader turnover is not something where we have hard and fast rules. For the most part we encourage the chapters to initiate any leadership changes internally, and provide assistance in case of a dispute. Leadership is covered in the Chapter Leader Handbook in Chapter 5: Governance. Again, we would love to hear your thoughts about chapter governance on the wiki Discussion page.

Academic Supporters

Since launching our new Academic Supporter application, we have begun to receive interest from universities in becoming supporters. This month, we welcomed the Rajsthan Institute of Engineering of Technology in Jaipur, India and the University of Vienna, Austria. If you are affiliated with either of these institutions or know people in the program, feel free to reach out to say thanks and to work on developing collaborations.

Thanks to everyone who has passed along the new Academic Supporter application form. Do let your local universities know that this opportunity exists by pointing them to the program:


Academic Supporter Information and Application: (application)

Contact Me

Feel free to contact me at any time if you have a question or suggestion. To create a trackable case, please use the contact us form at