From the beginning of Nixon’s “war on drugs” to the present, most estimates of its direct cost to the United States are around one trillion dollars, this figure does not include indirect or associated costs. The costs of imprisonment fueled the drive for private profit making prisons (now the primary source for caging immigrant families). Increased border patrols and customs scrutiny add to the taxpayer burdens. Police time and training should be added. School resources are sometimes involved; human resources for business. The health delivery system is strained by wounds (and death) in the pursuit of “drug dealers and users”. The Courts must consider many cases which occupy prosecutors and defense counsel (whose availability for indigent representation in other area is decreased.) The costs to other countries (including vulnerability to denigrate them as havens of drug pushers. now being exploited by right wing bigots running the Federal government, attacking Mexico, etc.) is not included in the one trillion.

Addiction itself brings societal costs. Researchers at Penn State calculate that the opioid epidemic alone has cost about $38 billion in lost Federal and State taxes. The loss of productivity in all areas of work from academic to manufacturing is widespread. Many students use restricted or prohibited drugs, some on the theory it may help studying or writing or exams, but usually interferes with learning. It acerbates class differences as celebrities laugh and boast publicly about and cannabis, cocaine, and alcohol use and abuse while others, not so celebrated, worry about arrest and imprisonment. Addiction is almost always bad for the health (gambling induces stress) with additional economic costs. (Much more dangerous with no regulations or quality control). Many individuals struggle with it and some are preoccupied by it. Extreme addicts often think simultaneously about what they are producing or discussing and how to satisfy their craving. Drugs take on a special appeal to many young people not only for rebellion or for experimentation or peer pressure but also because they are labeled “illegal.”

Enforcement of laws primarily against the poor and people of color who have swollen the punitive punishing prisons in this country is a well known devastating defect of the policy. (The Minnesota Court of Appeals struck down disparate sentencing for “crack” compared to usual cocaine.) This condition leads to tension between representatives of the law and communities. The opioid crises has increased the number of heroin users. This fact raises the question which is why the Doctors who, stupidly seduced by the manufacturers lies, propaganda, and salesmen, don’t continue to prescribe opioids to the addicted so that they don’t fall into heroin hell. We will return to this question. Many sane student of this area indicate that addiction is a public health problem not an occasion for flawed law enforcement.

The question of what constitutes addiction is complicated. There is a range of individual attraction and use from habit to addiction. Some addictions such as to food result from basic needs. Physical addiction may be indicated by withdrawal and its speed. But gambling seems pyschological. Note it is now encouraged hypocritically rather than discouraged by many States with lotteries whose winning amount is overstated while winning possibility displays astronomical odds. Advertised aggressively, the deprived and desperate turn to these lotteries, losing needed resources. Sports betting is legal in some states while Casinos have multiplied greatly. Gamblers Anonymous helps some in many localities.

Freud predicted accurately that “prohibition” would fail. The demonization of Marijuana by the FBI (e.g. Reefer Madness) and others is fading now into legalization and medication. Most societies use “mind altering” substances from which effective chemicals can be extracted. (E.g. peyote and LSD.) Some “party drugs” like Keratin are now being used medically – in Keratin’s case, to fight depression quickly and completely. We have fairly good ideas about the deleterious effect of alcohol over time, but not of cannibis, etc. because, being illegal they were not and could not be studied for a long time and in large control groups. (Cf. Nurses health studies based on self reporting). What has been prohibited, may, in certain context be helpful but we need to know the other consequences: – opioids, synthetic, fentanel too, have helped with pain (and sometimes sleeplessness?), but they are addictive.

Alcohol is now legal and taxed, Cannibis seems headed that way. Nicotine (disgracefully adulterated and combined with other chemicals by its manufacturers) one of the apparently worse addictions with difficult withdrawal is heavily taxed (to the point of making it regressive with working people who seem to desire it for breaks in work paying the high taxes which mean nothing to the many rich). Gambling, we have noted, is now widely accepted. What is legal and addictive seems not to be different in nature than what is not legal but addictive.

Why not abolish completely the whole misbegotten destructive “war on drugs?”

With what would we replace it?  We can recur for models to community health services and the War on Poverty community centers with social work, housing help, nutritional guidance, job training, counseling, child care, maternal care, Head Start, and legal services, etc. Different centers would deal with different groups of addiction.

Suppose we took all the money now directly spent in the “War on Drugs” and created many community centers (near addicts) which dispensed the now illegal substances for free in a center which also provided withdrawal (and death preventing) drugs for free.

Added to these would be the availability and offer of counseling, group therapy, social work, help with housing and families, healthy living styles taught, etc. – all available to those who wanted to withdraw or quit. These centers could also specialize differently given classes of drugs. All the above services would be provided along. with gentle verbal encouragement for voluntarily entering all the addiction curative services that might help (opioid addiction is not well served by the 12 Step programs) Voluntary services work better than those imposed. Allowing the use of the free addictive substances away from the center would keep addict apart and more likely to seek the services with the substances.

The first effect of free addictive substances now illegal would be the destruction of drug cartels and dealers at all levels. They could no longer claim to be filling a “felt need” like for other consumables.

The second effect would be to improve the health of those getting the substances. They would no longer be adulterated.

The third, perhaps most important, would be the abolition of the “war on drugs”.  All its horrors would be diminished.

The fourth would be the correlative release of all imprisoned on drug convictions with rehabilitation made available. This release and support could ser ve as a model of services for release in general as we work towards the end of mass incarceration.

The fifth would be to remove the temptation doing something illegal. Many adolescents will now find other, hopefully less destructive, means for rebellion and testing limits and identity.

Will this encourage more use? Perhaps it may become desirable in the future to require some proof of addiction. For the moment, not, as pushers no longer have the motivation. We have the examples, without centers, of alcohol, marijuana, and tobacco (diminishing use advanced by negative ads, a possible tool.)

Will some never quit, although some users “age out”, Some never shed their addiction (although often many attempts finally work). Some like lawyers, stock brokers and others may remain cokeheads, while others still dread withdrawal and enjoy their “vice.” We have mentally ill (far too many since Regan began the closing of community mental health facilities) on the street and elsewhere in bad conditions. We can so classify the drug addicts and include those addicted to gambling, offering general social services.

The money to try this social services can be taken from, not exhausting, the money spent on the “War on Drugs.” Of course, the best way it to build the facilities immediately and then close down the doomed Nixonian “war”. At best, this could be accomplished in one budget year.

After this suggestion is implemented rather than considered “utopian” (as legalizing cannibis once was) we, as a society could move from satisfying cravings as a social health program to recognize the obligation to provide living essentials to all.

Now we have a sixth reason to end current enforcement, prosecution, and imprisonment. and then move to the best treatment modality.


Also See:

911 Criminals by Jonathan Weiss Esq


EDTECH mailing list was upgraded to H-Net platform blog that killed the conversation

The Educational CyberPlayGround Inc. ® NetHappenings™ 1989 Mailing List Celebrates 30 years 2019


NetHappenings Founded in 1989 is the granddaddy of all education mailing lists distributes announcements about the Internet, latest resources, especially those that are education-related. In 1993 former biology teacher of twenty years, and internet pioneer Gleason Sackmann, was at the helm.
History of this free educational mailing list, moderated and published by the Educational CyberPlayGround, Inc.

You are looking at K12 Internet History from 1991 up to the present! No other K12 site on the net has been alive this long collecting our K12 information and bringing you up to what is happening now.

The EDTECH listserv mailing list was moved [aka what they call upgraded ] to H-NET where it went to die.  It’s a fact that Mailing lists allow for easy replies. therefore, ease of conversation and continued community.

Blogs allow moderators to publish content just like a mailing list but readers won’t automatically get this in their email box unless they know to put their email address into the RSS feed.

The intended audience – the folks who were on the email list may not be aware that if they still want the email notification they will need to use the RSS feed now.










If you the mailing list reader is too lazy to bother to put their own their damn email ADDY  into THE  RSS feed THAT IS OFFERED then it’s just too damn bad.

You can NOT claim that you don’t know anything, don’t understand technology, if you want to go there  then throw your machine into the get trash and get off the internet. You are a problem for everyone!!

You can’t DISRESPECT the  Volunteers who  are giving you and hosting the information party –  day in and day out – 997 which means  9am to 9pm  — 7 days a week.

YOU are the Guest of the party and part of the community.
The guests / readers / posters to the mailing list or a blog  have a job.


The community is expected to:

  • use the RSS feed
  • protect their own damn privacy
  • protect the privacy of other members
  • know the basics of email protocol
  • sign in to reply / comment

    That’s the guests job!!!

    The real ID OR EMAIL is not ever needed – ever!

    All readers who enjoy what they are reading are free to reply if the moderator thinks what they are adding is appropriate.

  • NOT everything is appropriate.

2019 We are currently in a cyberwar.

Merck was attacked by ransomware in 2017.

Insurers paid $275 million to cover the insured portion of their loss from the NotPetya cyber attack < THE INSURED PORTION>  We don’t know how much Merck had to pay for its uninsured losses. Merck’s insurance only cover ed some costs, they never revealed how much they had to pay to recover.


When you get hacked your Insurance Company will cite a common, but rarely used, clause in insurance contracts: the “war exclusion” which protects insurers from costs related to damage from war. Collateral damage in a cyberwar – Look up war games video. The Only Winning Move Is Not To Play.

A virus spreads across computer networks, encrypting hard drives so that machines cannot run. Attacks cause massive disruptions to industrial networks that rely on computers because businesses must individually replace damaged drives, a labor-intensive process.
Cyber insurance can be expensive to buy and is not widely used outside the United States, with one insurer previously describing the cost as $100,000 for $10 million in data breach insurance.
Policies typically cover expenses stemming from a data breach, such as forensics and data restoration, among other costs.


  • Educational Technology
  • H-NET Humanities and Social Sciences

Happy Birthday

It was founded on February 10, 1989, by a group of graduate students and
faculty at Michigan State University, lead by Vickie Banks Gaynor, to further
communication among students and professionals in the field of educational technology.  It subsequently joined the H-NET Humanities and Social Sciences Online list umbrella, though the original BitNet feed is still
available through Google Groups.
The current list moderators include Jeff Hogan, and Kathy-Ann Daniel-Gittens.

Details about them can be viewed through the “Editors” menu item on EDTECH’s H-Net Web presence at

Jeffrey L. Jones, EDTECH Editor #6 (the original writer of this)
Current Editors:
Jeff Hogan
Kathy-Ann Daniel-Gittens

Humanities and Social Sciences Online

H-net Networks

Staff listing for the H-Education network


Educational CyberPlayGround: NetHappenings 4.15.19

EU Council of Ministers Approves Copyright Directive, Including Article 17 (13) – (Updated) by Andy on April 15, 2019
The EU Council of Ministers has approved the Copyright Directive, which includes the controversial Article 17 (formerly 13). The legislation was voted through by a majority of EU ministers just a few minutes ago, despite opposition from Italy, Luxembourg, Netherlands, Poland, Finland, and Sweden.


Southern Baptist Take on Interesting philosophical position on AI.
If nothing else, shows the ability to shoe-horn anything as anticipated by scripture.

Artificial Intelligence: An Evangelical Statement of Principles

As followers of Christ, we are called to engage the world around us with the unchanging gospel message of hope and reconciliation. Tools like technology are able to aid us in this pursuit. We know they can also be designed and used in ways that dishonor God and devalue our fellow image-bearers. Evangelical Christians hold fast to the inerrant and infallible Word of God, which states that every human being is made in God’s image and thus has infinite value and worth in the eyes of their Creator. This message dictates how we view God, ourselves, and the tools that God has given us the ability to create.

In light of existential questions posed anew by the emergent technology of artificial intelligence (AI), we affirm that God has given us wisdom to approach these issues in light of Scripture and the gospel message. Christians must not fear the future or any technological development because we know that God is, above all, sovereign over history, and that nothing will ever supplant the image of God in which human beings are created. We recognize that AI will allow us to achieve unprecendented <sp> possibilities, while acknowledging the potential risks posed by AI if used without wisdom and care.

We desire to equip the church to proactively engage the field of AI, rather than responding to these issues after they have already affected our communities. In light of this desire and hope, we offer the following affirmations and denials about the nature of humanity, the promise of technology, and the hope for the future.

The New York Times sells premium ads based on how an article makes you feel – Poynter –
Engineered to give you All the feels sell for more money

The Only Answer Is Less Internet
Our emerging post-privacy order isn’t quite totalitarian, but it’s getting there. By Ross Douthat Apr 13 2019

In our age of digital connection and constantly online life, you might say that two political regimes are evolving, one Chinese and one Western, which offer two kinds of relationships between the privacy of ordinary citizens and the newfound power of central authorities to track, to supervise, to expose and to surveil.

The first regime is one in which your every transaction can be fed into a system of ratings and rankings, in which what seem like merely personal mistakes can cost you your livelihood and reputation, even your ability to hail a car or book a reservation. It’s one in which notionally private companies cooperate with the government to track dissidents and radicals and censor speech; one in which your fellow citizens act as enforcers of the ideological consensus, making an example of you for comments you intended only for your friends; one in which even the wealth and power of your overlords can’t buy privacy.

The second regime is the one they’re building in the People’s Republic of China.

This is a dark joke; it isn’t meant to minimize the horrors of China’s march into information-age totalitarianism. Beginning with its successful taming of the internet, Beijing has treated the darkest episodes of “Black Mirror” as a how-to guide for social control and subjugation — with “social credit” scores and official public shamings for people whose daily conduct disappoints, official Communist Party apps that you’d better use if you know what’s good for you, surveillance technologies and facial recognition software as boots on the back of nonapproved religions, and compulsory internet as part of the brutal, tech-enabled replay of the Cultural Revolution imposed in China’s Muslim west.

What’s happening in the West with privacy and authority is happily different. Unlike China’s system, our emerging post-privacy order is not (for now) totalitarian; its impositions are more decentralized and haphazard, more circumscribed and civilized, less designed and more evolved, more random in the punishments inflicted and the rules enforced.

This means that, for instance, there is no central party apparatus encouraging our corporations to create individual “trust scores” for every consumer (even if they’re still doing it), no official commissars organizing digital mobs (even if shaming for random wrongthink is now a commonplace), no political persecution involved in most cases where public figures have their secrets and selfies exposed on the internet. (Perhaps Jeff Bezos’s claims of Saudi involvement will pan out, but so far he mostly seems to have been the victim of his own stupidity and his mistress’s brother’s greed.) And it means that the radicals surveilled by corporate-government cooperation are mostly white nationalists and jihadists, not human rights advocates and Christian pastors, as in China.

But this list of real differences is still also a list of partial similarities, of ways in which the architecture of our system replicates certain features of the emergent Chinese panopticon, even if the life lived within our system is still blessedly freer than in theirs.

Indeed our system cannot help recreating features of the Chinese order, because the way that we live on the internet leaves us naked before power in a radical new way. In the West that power is still decentralized, diffuse, divided and polarized, and therefore likely to be limited and checked. But to adapt Deng Xiaoping’s famous call for “socialism with Chinese characteristics,” the Western order in the internet age might be usefully described as a “liberalism with some police-state characteristics.” Those characteristics are shaped and limited by our political heritage of rights and individualism. But there is still plainly an authoritarian edge, a gentle “pink police state” aspect, to the new world that online life creates.

And what’s striking is how easily we have come to tolerate it. Yes, there are moments when particular organs of surveillance get pushback — the N.S.A. during the brief “libertarian moment” starring Rand Paul and Edward Snowden, the social media companies from liberals when it turned out that the Trump digital team no less than the Obama whiz kids could exploit their user data.

But apart from the high-minded and the paranoid, privacy per se is not a major issue in our politics. Most people want the convenience of the internet far more than they want the private spaces that older forms of communication protected. They shrug off the stalker-ish ways that corporations hurl their ads at you throughout your day. They put surveillance devices in their homes and pockets without a qualm. They accept hackings and online shamings the way a Californian shrugs off earthquakes. They assume that the extremists being surveilled and censored and sometimes arrested probably deserve it. And they welcome the possible advantages of panoptical living, hoping for less crime and less police misconduct, better public health, more exposure of corruption — plus, of course, the chance to see their favorite celebrities in the nude.


Tracking Phones, Google Is a Dragnet for the Police The tech giant records people’s locations worldwide.

Now, investigators are using it to find suspects and witnesses near crimes, running the risk of snaring the innocent. By JENNIFER VALENTINO-DeVRIES APRIL 13, 2019 When detectives in a Phoenix suburb arrested a warehouse worker in a murder investigation last December, they credited a new technique with breaking open the case after other leads went cold.

Incognito mode won’t keep your browing private – do this instead

Browser compartmentalization can help you escape the clutches of the data gathering machine.

Users will use one browser for any and all websites they need to log in to. This browser is the one on which they’ll access their social media, banks, and shopping sites.

The big catch here is that users will never use this browser to search the web or randomly browse the internet. This browser is only used for bookmarked sites you need to log in to. Let’s call this your “accounts” browser.

Users will then use a second browser for all their web searching and random browsing. On this browser, a user will never log into any website–ever. They will never use this browser to personally identify themselves in any way, period. We’ll call this your “everyday” browser.


King of the Dudes, What is Battle of the Bros all duded up?

King of the Dudes

Other words such as dude also emerged in the Five Points, said Cassidy.

Dud in old Irish, appearing in the Irish-English dictionary by Father Patrick Dineen published in 1927, means “dolt, a numbskull, a rubbernecker; a mopish, shy, foolish-looking fellow”, he said. In the Five Points, says Cassidy, richer classes would come for the booze and the girls, and the working-class Irish used to look at them with their monocles and top hats and derogatorily called them “dud”.

1888 Evander Berry Wall a New York Socialite was dubbed
“King of the Dudes.”
New York American newspaper “Battle of the Dudes”. The New York Journal-American was a daily newspaper published in New York City from 1937 to 1966.

This version of the word is still in occasional use in American slang, as in the phrase “all duded up” for getting dressed in fancy clothes.
He inherited $2 million before the age of 22.  He went bankrupt in 1899 and  declared that “New York had become fit only for businessmen” and left for Paris in 1912. He used bespoke shirtmaker Charvet, where Wall had his signature “spread eagle” collar shirts and cravats custom-made for himself and his dog. Wall always dined at the Ritz with his dog, whose collars and ties were made by Charvet in the same style and fabric as his master’s. When he died, he left only $12,608, having “squandered nearly every cent on pleasure.”

Learn about Irish American Vernacular English
How the Irish Invented Slang
Subtitle: The Secret Language of the Crossroads
by Professor Dan Cassidy

How the Irish Invented American Gambling Slang into Irish American Vernacular English.

What Does Boogie Mean?
The Linguist is taking notes. 1941 Ball of Fire – Billy Wilder, Gary Cooper, Barbara Stanwyk.

Slang is words that takes off his coat, spits on it’s hands and gets to work!

Giniker – Irish American Vernacular English: The Sunday Times Ireland July 9th 2006

IT SOUNDS like a load of bunkum, or in this case buanchumadh, but according to an American academic the Irish language has been a huge influence on American slang.

The Sanas (Irish Etymology) of Faro, Poker and the Secret Flash Words for the Brotherhood of American Gamblers. By DANIEL CASSIDY 5/13/06

Remember in 1859 Philadelphia is the 4th largest city in the WORLD.

“There’s A Sucker (Sách úr, fresh new “fat cat”) Born Every Minute.” See etymology of Bunk and Dude both are Irish.

The Sanas (Irish Etymology) of Faro, Poker and the Secret Flash Words for the Brotherhood of American Gamblers. By DANIEL CASSIDY 5/13/06

“Language is a virus from outer space.” – William S. Burroughs BEAT generation

Irish American Vernacular English words traced, found, and borrowed into Standard American English.

Karen Ellis Guest Lecturer
Honoring the work of Scholar Peter Tamony and The Sanas, the Etymology of Jazz and Dan Cassidy

Dudes: NYT News Desk 1942


Well dressed in 1902 

The best-dressed American in Europe, the King of the Dudes. He was reported to possess 285 pairs of pants, 5,000 custom-tailored neckties. It was rumored that he changed his ties six times a day. His conduct was motivated by a great principle: find out what suits you and always wear it. Berry Wall usually wore capes and coats of horse-blanket plaid, high horse-collars cinched with lush Ascot cravats.

Donald Trump advisor/confidante Roger J Stone Jr with wife Nydia at the Inauguration. #Dandy #Style Roger Stone is primarily known as a political consultant, but he also serves as the men’s fashion correspondent for the Daily Caller. #1 DUDE The Dapper Don

Panicked Wall Street Bros Wonder: What Is Business-Casual??

Goldman Sachs bank execs Panicked Wall Street Bros Wonder: What Is Business-Casual???

Patter for Three-Card Monte – thanks to Whit Haydn School for Scoundrels

Who Killed Society by Cleveland Amory

DHS, FBI say election systems in all 50 states were targeted in 2016

DUDE Trump’s Justice Department OKs Trading with the Enemy
Trading with the Enemy Act  George Bush’s grandfather, the late US senator DUDE Prescott Bush, was a director and shareholder of companies that profited from their involvement with the financial backers of Nazi Germany. Files in the US National Archives shows Prescott Bush – how did we get here was a director  involved with…

Thorstein Veblen, the greatest American thinker you probably never heard of, predicted the rise of a Gilded Business Man and the demolition of democracy. The man who saw this coming a century ago

Louis the 14th thought “The State” was a person. HIM!

DUDE Trump’s money came from his grandfather another DUDE WHO owned a general store and whore house.

Donald Trump’s money originally came from his grandfather Friedrich Trump a German immigrant, who ran a whore house /restaurant – bar, in British Columbia.
Buried in a ghost town in Canada’s subarctic are the roots of the family fortune that paved Donald Trump’s path to prominence.

Guthrie reworked his signature Dust Bowl ballad “I Ain’t Got No Home” into a blistering broadside against his landlord: BEACH HAVEN AIN’T MY HOME (aka. “Old Man Trump”) Words by Woody Guthrie

Nov. 8 election that Eric had asked if American Hat Co. could make a custom hat for his father. Soon after, the manufacturer was at work getting measurements ready as well as the materials befitting the president of the United States.
“It morphed into now we’re making hats for Eric, for Don Jr. and for Mike Pence as well,” Mundee said.
Mundee said the Trump family requested a light-colored hat versus black, so the manufacturer went with a silverish tone. The material is a mixture of beaver belly fur and mink, making the hat soft as silk. The crown, or top of the hat, is done in a cattleman’s style. He said this specific style of hat is widely known as the finest in the cowboy market.
And it’s not just the material that American Hat Co. uses that puts their stamp on the product. It’s also the gold foil stamp on the inside band that also illustrates its quality, as well as the Keith Maddox mark of “KM” on the brim of the hat. The hat retails for about $2,800.

K12 PlayGround Find a School Discover the right school for your child. Find a School Discover the right school for your child.

Submit or Update Your School or Organization.

Once you’ve located your school, update the information about the school such as the amenities, features or programs that make this school special.

Find and compare K12 Schools and School Districts in the USA and Territories.

Federal watchdog issues scathing report on ed department’s handling of student loans NPR

The department’s own inspector general says student loan companies aren’t following the rules, and that the government isn’t doing enough to hold them accountable

The audit documents several common failures by the servicers, among them, not telling borrowers about all of their repayment options, or miscalculating what borrowers should have to pay through an income-driven repayment plan. According to the review, two loan servicing companies, Navient and the Pennsylvania Higher Education Assistance Agency, better known as FedLoan, repeatedly placed borrowers into costly forbearance without offering them other, more beneficial options.

trump goes beyond cronyism to something far worse

The man who saw this coming

betsy devoss paid for her appointment


A critical new report from the U.S. Department of Education’s Office of Inspector General finds the department’s student loan unit failed to adequately supervise the companies it pays to manage the nation’s trillion-dollar portfolio of federal student loans. The report also rebukes the department’s office of Federal Student Aid for rarely penalizing companies that failed to follow the rules.

Instead of safeguarding borrowers’ interests, the report says, FSA’s inconsistent oversight allowed these companies, known as loan servicers, to potentially hurt borrowers and pocket government dollars that should have been refunded because servicers weren’t meeting federal requirements.

“By not holding servicers accountable,” the report says, “FSA could give its servicers the impression that it is not concerned with servicer noncompliance with Federal loan servicing requirements, including protecting borrowers’ rights.”

FIND A #JOB: Cybersecurity talent gaps exist across the country.

Resources for High School Students Interested in Cyber Security

Summer Camps are a great introduction to cyber security.
Online Courses are the next step to growing knowledge and experience, while at the same time learn more about a potential career path.

Hackathons are the playground for testing how far you’ve come.

Many internship programs available to exact academic paths/interest. Generally speaking, cyber security degree seeking students may pursue positions at the CIA in STEM, Clandestine, Analysis, or Enterprise and Support Roles.

Must apply senior year in high school. Rigorous application process includes polygraph, mental health evaluation, financial need, background checks, high academic marks, abstinence from drugs, and more. Successful applicants will be provided a salary as well as have tuition covered up to a certain price. Successful applicants will work at the CIA in summers and continue to work for the CIA after graduation.

Meet the Terabytches: Fergus students prep for cyber security competition
‘We’re like the biggest collective knowledge in a girls’ team,’ Emily Younghans says

MOST Inexpensive Colleges With the Highest Graduation Rate


  • Cyber Security Engineer
  • Cyber Security Analyst
  • Network Engineer / Architect
  • Cyber Security Manager / Administrator
  • Systems Engineer
  • Software Developer / Engineer
  • Systems Administrator
  • Vulnerability Analyst / Penetration Tester
  • Cyber Security Consultant

11 federal agencies help start Cybersecurity Talent Initiative

11 federal agencies help start Cybersecurity Talent Initiative

How the FBI Conceals Its Payments to Confidential Sources

A classified policy guide creates opportunities for agents to disguise payments as reimbursements or offer informants a cut of seized assets.

For the first time, we can now point to an internal government document that provides the framework for how informants are paid.

The FBI’s Confidential Human Source Policy Guide, a nearly 200-page manual classified secret and obtained by The Intercept, describes how payments to FBI informants are accounted for and authorized and how these payments can quickly become serious money.

The picture that emerges is of an approach that borrows some of the sophistication of modern banking. The bureau has devised a variety of ways to pay informants, including directly, before or after trial; via reimbursements; and through a cut of asset forfeitures.

A special agent-in-charge has the authority to pay each of his office’s informants up to $100,000 per fiscal year. However, informants may earn substantially more as long as each additional $100,000 is approved by successively higher levels within the bureau. With deputy director approval, according to the policy guide, an informant may earn more than $500,000 per year.

In addition to compensation, an informant may be eligible for 25 percent of the net value of any property forfeited as a result of the investigation, up to $500,000 per asset, according to the guide. This can be a particularly lucrative benefit for drug informants, whose cases sometimes result in the forfeiture of planes, boats, cars, and real estate.


EU Tells Internet Archive That Much Of Its Site Is ‘Terrorist Content’

We’ve been trying to explain for the past few months just how absolutely insane the new EU Terrorist Content Regulation will be for the internet.

Among many other bad provisions, the big one is that it would require content removal within one hour as long as any “competent authority” within the EU sends a notice of content being designated as “terrorist” content. The law is set for a vote in the EU Parliament just next week.

And as if they were attempting to show just how absolutely insane the law would be for the internet, multiple European agencies (we can debate if they’re “competent”) decided to send over 500 totally bogus takedown demands to the Internet Archive last week, claiming it was hosting terrorist propaganda content.

< – >