We need to develop nationwide policies and security protocols that would govern how voting machines are secured.

We need to develop nationwide policies and security protocols that would govern how #voting machines are secured.


The fact that information is stored unencrypted on hard drives simply makes no sense in the current threat environment. That they can be left on devices, unencrypted, that are then sold on the open market is malpractice.

Since these machines are for sale online, individuals, precincts, or adversaries could buy them, modify them, and put them back online for sale. Envision a scenario in which foreign actors purchased these voting machines. By reverse engineering the machine like I did to exploit its weaknesses, they could compromise a small number of ballot boxes in a particular precinct. That’s the greatest fear of election security researchers: not wholesale flipping of millions of votes, which would be easy to detect, but a small, public breach of security that would sow massive distrust throughout the entire election ecosystem.



IN 2016, I bought two voting machines online for less than $100 apiece. I didn’t even have to search the dark web. I found them on eBay. Surely, I thought, these machines would have strict guidelines for lifecycle control like other sensitive equipment, like medical devices. I was wrong. I was able to purchase a pair of direct-recording electronic voting machines and have them delivered to my home in just a few days. I did this again just a few months ago. Alarmingly, they are still available to buy online.
reverse-engineered the machines to understand how they could be manipulated. After removing the internal hard drive, I was able to access the file structure and operating system. Since the machines were not wiped after they were used in the 2012 presidential election, I got a great deal of insight into how the machines store the votes that were cast on them. Within hours, I was able to change the candidates’ names to be that of anyone I wanted. When the machine printed out the official record for the votes that were cast, it showed that the candidate’s name I invented had received the most votes on that particular machine.
This year, I bought two more machines to see if security had improved. To my dismay, I discovered that the newer model machines—those that were used in the 2016 election—are running Windows CE and have USB ports, along with other components, that make them even easier to exploit than the older ones. Our voting machines, billed as “next generation,” and still in use today, are worse than they were before—dispersed, disorganized, and susceptible to manipulation.

A recent in-depth report on voting machine vulnerabilities concluded that a perpetrator would need physical access to the voting machine to exploit it. I concur with that assessment. When I reverse-engineered voting machines in 2016, I noticed that they were using a smart card as a means of authenticating a user and allowing them to vote. There are many documented liabilities in certain types of smart cards that are used, from Satellite receiver cards to bank chip cards. By using a $15 palm-sized device, my team was able to exploit a smart chip card, allowing us to vote multiple times.

Karl Auerbach
Date: March 18, 2019
Well more than a decade ago, but after the disastrous Gore vs Bush election the Open Voting Consortium bought a used Diebold DRE (touchscreen) voting machine that had become unclaimed freight. An interesting aspect is that the laws regarding unclaimed freight can potentially extinguish or diminish things like license limitations – or non-disclosures – that might have applied to those taking the items in a normal chain of transfers.

The machine was as heavy as a Diebold vault, but that’s where the security ended.  It had a cheap lock that could, and was, picked in just a few seconds.  It ran MS Windows CE off of a compact flash.  It even still had the votes from the last election in which it was used (in Ohio.)

Subsequently I was part of a team on a project to build a reference implementation of voting systems for the state of California (and anyone else) – from precinct and canvassing (counting) center hardware to vote capture machines to vote counting machines to all of the surrounding procedures.  We had buy in for all of the various parts – UCLA and UC Berkeley law on procedures, UC Merced on hardware, UC Santa Cruz on software, etc.

We did not find “open source” to be necessary.  Rather we felt that the public would be best served by systems that could be inspected by anyone (including inspection of code), full testing by any interested party (of all components), and open publication of test results.  We did not feel that it was necessary to take the step to require free distribution (or re-distribution) of parts: we wanted to encourage private vendors to produce this stuff and we had to leave them some incentive to do so.

The key element was that all of the devices would be totally open for inspection and testing – and that at the precinct all inter-machine APIs would be in the form of paper that could be reliably read by both humans (with normal eyesight) and machines.

Some precinct machines would gather voter intent – with different machines for different kinds of human frailties ranging from bad eyesight to inability to accurately use a finger on a touch screen.  All would produce that paper ballot.  Separate machines would record those ballots.

Most people have tended to forget that often the easiest place to steal an election is in the transfer of ballots/tallies from precincts to the counting/canvassing center or at the counting center itself, especially as we move towards instant runoff style ballots.  So we designed all of that stuff, and procedures, as well.

One surprising obstacle was from county clerks:  they are tasked with the very difficult jobs of delivering a believable election on a small budget.  They have to deal with all of the practical things like warehousing voting machines and training precinct workers.  They have a real concern about the costs of storing paper ballots; they are not equipped to become local versions of Iron Mountain.

In addition various states have old laws that have to be rewritten.  For example, California has very strict limits on how long voting materials – such as cast ballots – can be retained after an election.

Unfortunately the project died before it was launched due to a sex (I think) scandal involving the California Secretary of State that broke on the day he was to sign the papers to launch the project.)

I think that it is a project that deserves to be resurrected.


Exactis, as the source of a leak of the personal records of nearly everyone in the United States.

Exactis, as the source of a leak of the personal records of nearly everyone in the United States.

The result is a cautionary tale about the liability that a massive dataset can create for a tiny company like Exactis. It also hints at just how easy it’s become for small firms to wield massive, leak-prone databases of personal information—without necessarily having the resources or know-how to secure them.


WIRED had revealed that Exactis exposed a database of 340 million records on the open internet, as first spotted by an independent security researcher named Vinny Troia.

Using the scanning tool Shodan, Troia identified a misconfigured Amazon ElasticSearch server that contained the database, and then downloaded it. There he found 230 million personal records and another 110 million related to businesses—more than two terabytes of information in total. Those files didn’t include credit card information, passwords, or Social Security numbers. But each one enumerated hundreds of details on individuals, ranging from the value of people’s mortgages to the age of their children, as well as other personal information like email addresses, home addresses, and phone numbers.

Exactis licensed that information to marketing and sales customers, so that they could integrate it with their existing databases to build more comprehensive profiles. But privacy advocates have warned that those same details, left open to the public, could just as easily allow spammers or scammers to profile targets.

the most painful breaches, like the Office of Personnel Management or Anthem health insurance incidents that involved stolen Social Security numbers and other hard-to-change personal data, are naturally the most valuable targets for attackers. Don’t forget the massive credit reporting agency Equifax to that list.

The Rich and Educated like Rand Paul and Robert Kennedy Jr., both vaccine skeptics put society at risk

FACT: There is NO link between autism and childhood vaccines. If you do not wish to be vaccinated then there should be a consequence and that is that you cannot infect other people.”


FACT: There is a link between not getting vaccinated dying from  measles, mumps, and rubella (MMR).

Not vaccinated? then you’ll die and nature weeds out the ignorant.

Rand Paul  is vaccinated and  vaccinated my kids. For myself and my children I believe that the benefits of vaccines greatly outweighing the risks.

Virtually all medical literature shows that the benefits of vaccines dramatically outweigh the limited risks.

A lack of vaccinations fueled a measles outbreak that has sickened 69 people in Washington and Oregon and more than 200 in New York. In 2015, an outbreak that began at Disneyland sickened 147 people.

Temple University

At least 54 cases of mumps tied to Temple University, according to health officials. The effectiveness of the mumps vaccination tends to wane over time so it’s not necessarily a case of unvaccinated people, according to health officials


After Mumps Outbreak, Temple to Require New Students to Get Vaccinated
At least 15 mumps cases have been reported at Temple. For those wondering “Aren’t we supposed to get anti-mumps vaccines in elementary school?,” here’s an explainer.


State Vaccination Requirements

Studies have shown that vaccine exemptions tend to cluster geographically, making some communities at greater risk for outbreaks

State School and Childcare Vaccination Laws

States with laws that only allow for medical or religious exemptions: Alabama, Alaska, Arkansas, California, Connecticut, Delaware, Florida, Georgia, Hawaii, Illinois, Indiana, Iowa, Kansas, Kentucky, Maryland, Massachusetts, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, Rhode Island, South Carolina, South Dakota, Tennessee, Vermont, Virginia, West Virginia, Wyoming, and the District of Columbia. States with laws that expressly exclude philosophical exemptions: Delaware, Iowa, New Jersey, North Carolina, West Virginia. States with laws that allow for exempted student exclusion from school during an outbreak: Arizona, Arkansas, California, Colorado, Delaware, Florida, Georgia, Hawaii, Idaho, Kansas, Louisiana, Maine, Massachusetts, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New York, North Carolina, North Dakota, Ohio, Rhode Island, South Carolina, Texas, Utah, Virginia, Washington, Wisconsin, Wyoming, and the District of Columbia. States with laws that require parental acknowledgment during the exemption application process of exempted student exclusion during an outbreak: Arkansas, Montana, North Dakota, and Washington. States with laws that say that exemption might not be recognized during an outbreak: Alabama, Colorado, Georgia, Hawaii, Iowa, Kentucky, Maryland, Massachusetts, Nevada, North Dakota, and Tennessee. States with laws that require parental affidavit or notarization during the exemption application process: Alaska, Arizona, Delaware, Georgia, Iowa, Kentucky, Minnesota, Montana, Nebraska, New Hampshire, New Mexico, Tennessee, Texas, and Virginia. States with laws that require enhanced education during the exemption application process on the benefits of vaccinations and the risks of not being vaccinated: Arizona, Arkansas,  Michigan, Oregon, Vermont, Utah, and Washington. States with laws that distinguish between temporary or permanent medical exemptions: Arizona, Arkansas, California, Connecticut, Florida, Georgia, Hawaii, Indiana, Iowa, Maryland, Michigan, Montana, New Jersey, New York, North Carolina, Pennsylvania, South Carolina, Virginia, Washington, and West Virginia. States with laws that require an annual or more frequent healthcare provider recertification for medical exemptions: Arkansas, Connecticut, Georgia, Kansas, Massachusetts, New Mexico, New York, Texas, and West Virginia.

How Cambridge Analytica got away with it Investigate Facebook

This is why GDPR had no minimum size of business or turnover, or exemptions for small businesses: a 10-person startup in Florida leaked data on 230 million people.

The rhetoric: Compliance will be too expensive for startups.
The reality: A startup that makes data compliance cheap for startups.

The Case for Investigating Facebook

Why I am calling on the Federal Trade Commission to investigate Facebook for violating antitrust laws.

Why I am calling on the Federal Trade Commission to investigate Facebook for violating antitrust laws.

@davidcicilline David N. Cicilline, a member of the House of Representatives, is chairman of the House Subcommittee on Antitrust, Commercial and Administrative Law.

Mr. Cicilline, a member of the House of Representatives from Rhode Island, is chairman of the House Subcommittee on Antitrust, Commercial and Administrative Law.

A year ago, the world learned that Facebook allowed a political consulting company called Cambridge Analytica to exploit the personal information of up to 87 million users, to obtain data that would help the company’s clients “fight a culture war” in America. Since then, a torrent of reports has revealed that the Cambridge Analytica scandal was part of a much broader pattern of misconduct by Facebook.

The commission has the authority to impose substantial fines on Facebook. Given that the corporation had more than $55 billion in revenue in 2018 alone, even a fine in the low billions of dollars will amount to a slap on the wrist, a mere cost of doing business. Moreover, because Facebook is a repeat offender, it is critical that the commission’s response is strong enough to prevent future violations. America’s laws are not suggestions.

When a company has repeatedly shown contempt for its legal commitments, the remedy must change how the company operates. Enforcement agencies can do this through deep reforms of the company’s structure. This includes removing members of the company’s board, or even top executives, along with other changes to the company’s business model to address dysfunction at the top.

Facebook recently announced plans to merge Instagram, WhatsApp and Facebook into one integrated product, furthering its monopoly power.



Here’s What It’s Like to Accidentally Expose the Data of 230M People

Exactis, the source of a leak of the personal records of nearly everyone in the United States.

The Exactis Data Breach: What Consumers Need to Know

By on Jun 28, 2018

There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which compromised the personal information of over half of the citizens of the United States? And now, a breach of similar magnitude has emerged, as a security researcher has discovered that marketing firm Exactis’ database was sitting on a publicly accessible server. Specifically, there were two versions of the database exposed online, each with around 340 million records—roughly two-thirds on consumers and the rest on businesses.

So how did Exactis have this much data in the first place? The Florida-based marketing firm collects and trades consumer data in order to refine the accuracy of targeted ads. Which is precisely what makes this breach so crucial, as the information exposed is highly personal. The leaked data includes people’s phone numbers, home and email addresses, interests, and the number, age, and gender of their children. As of now, credit card information and Social Security numbers don’t appear to have been leaked.

The behavioral data involved in this leak, alongside the personal information, makes this breach particularly concerning because of how this information can be used by cybercriminals to improve the success of socially engineered attacks. For instance, crooks can use such personal information in phishing attacks over email or social media. Now, cybercriminals can enact highly personalized attacks against consumers, who will already be faced with potentially fraudulent activity against their names.




Agency, Human Rights, Labor Unions, Executives and the Dress Code

Informed Agency, Advocacy, and Activism

Corporate Dresscodes Disguise verses Informed Agency

Changing the Dress Code
Used to be:
1930’s The executive secretary  position was the CEO in training.
The Executive – did not wear jeans to the office.
1960s Jeans originally made for gold miners and  worn by farmers make it into the counter culture.
1970’s “Dress For Success” meant suiting, heels, ties, jackets  skirts, blouses, heels all a work place uniform of the white collar executive.
1990s Silly Valley West Coast hoodie culture changes to  “Dress Down” everydays
2000 East coast Casual Fridays allows dark blue dress jeans
2019s East coast dark blue jeans allowed everyday and have become appropriate “executive” wear.
“White coller Executives” wear dark blue tailored jeans which helps to  disguise class, status, and power in the corporate structure.
Today it’s jeans for all every day for everybody. There is no Dress for Success requirements to help disguise power inside corporations.
Corporate in their subtle way has disguised the line of power. They have created the illusion that “you are one of us, and we are one of you.”
The unions  fought for the 8 hour work day and that weekend off.  Turns out we all work on Maggies Farm. The work day is now  24/7/365 because we are all at their beck and  cell phone text work call.
When they look like one of us – but aren’t – and they have all the power.
And robbing  your ability to sue them for injustices and forcing you to work on projects without agency.
Working without the right to be in a union is under the control of corporate.
Suing to have the right to unionize is a political act.

“When they substitute their knowledge for ours, we grow angry because they have robbed us of our agency.”

Privacy is Political.
  • Choosing not to work on projects that destroy privacy is a political act.
  • Suing for the right of agency to know what the project will be used for is a political act.
National Council for the Social Studies (NCSS)
Social studies is learning, doing, being, growing, and acting. 
The questions we pose, the inquiries we pursue lead us: to a deeper understanding of ourselves and others, to appreciate the complexity of the world in which we live, to grapple with difficult topics, and to speak out against systemic injustices.
The study of social studies enables us to not only have a voice, but to actively engage in our local, national, and international communities as informed, educated, and compassionate citizens. Our collective civic engagement is not simply about advocacy or action, but also about listening, questioning, respectful dialogue, and seeking common ground around shared democratic values.
Social studies teaches us that knowledge is not neutral; it is socially constructed.  Thus, the real value of knowledge is what one can do with that knowledge in pursuit of inquiry.  Examining how we communicate and act upon our knowledge compels us to realize the importance of critical inquiry.  In fact, critical inquiry is at the heart of social studies and in practice is informed action through agency, advocacy, and activism.

[ECP] NetHappenings 3/18/19



Office for Civil Rights Headquarters
U.S. Department of Health & Human Services
200 Independence Avenue, S.W.
Washington, D.C. 20201
Toll Free Call Center: 1-800-368-1019
TTD Number: 1-800-537-7697

HHS Releases Voluntary Cybersecurity Practices for Health Industry

GDPR, California’s Consumer Privacy Act, and next-generation ransomware and denial of service attacks, a firm’s ability to provide security is also becoming a matter of survival. Put it all together, and many CISOs today exist in environments where they are not understood by business executives and thus are not being included in business initiatives until it is too late and security vulnerabilities expose the enterprise to cyberattacks and compliance violations.


In 2016, more than 100 million Americans have had their electronic medical records hacked from health systems. For example, this June, Banner Health in Phoenix had a breach of 3.7 million electronic medical records.
Many hospitals throughout the country have been held hostage for their health information system by hackers and have had to pay ransom to regain control of their patients’ medical data.

2016 more than 100 million Americans have had their electronic medical records hacked. Each one can be sold for $50.
The Health Insurance Portability and Accountability Act was written 20 years ago, when medical records were kept on paper, and is not applicable to the contemporary digital era.

Moreover, the pervasive selling of our medical data is unchecked, with no legal protection. The massive hacking of health system data has not resulted in any new legislation to date or enforcement via established laws.

Informed Patient Institute
We rate the websites that help you find the right doctor, hospital, and nursing homes and we provide tips about quality concerns. also see


ProPublica analyzed nearly 17,000 surgeons and found wide variations in complication rates for some of the most routine elective procedures. Explore our database to know more about a surgeon before your operation.

2016 Consumer Reports Medical Board Ratings

Medicare Provider Utilization and Payment Data: Physician and Other Supplier

Digital business has become a key driver to business strategy across industries.
CIOs have digital transformation at the center of their corporate
strategy.  #Cybersecurity, amazingly, is often not a top-tier priority in enterprise risk management. The #CISO, is only noticed when things go wrong. This is why CISOs are almost always fired or “resign” after major data breaches. The CISO is usually the most qualified person to manage post breach forensics, cleanup, and compliance audits.

Think a strong information security posture means you’re complying with HIPAA? Without proper documentation for government regulators, infosec protocols might safeguard data without meeting federal criteria.

Staff lapses and IT system vulnerabilities are key reasons behind SingHealth cyberattack, according to COI Report

ClassAction.org is a group of online professionals who are committed to exposing corporate wrongdoing and giving consumers the tools they need to fight back. We’ve been reporting on the legal space for nearly a decade and have built relationships with class action and mass tort attorneys across the country.

Prescription Hope
Prescription Hope offers over 1,500 brand-name medications all for the
set price of $50 per month for each medication. This covers 100% of the medication cost, no matter the retail price.

Market Share Matters: Evidence Of Insurer And Provider Bargaining Over Prices
Health-care providers and insurers have to agree on how much doctors will be reimbursed before doctors begin treating insurers’ clients. Those fees, which depend on the two parties’ relative clout. Abstract

A survey of the numbers, published this week in Health Affairs, shows that small-time doctor’s offices and insurance companies are getting squeezed by their larger competitors.

Finally, U.S. hospitals will have to post their prices online.

Hospitals must post ‘chargemaster’ prices online.
Patient Estimate team call  484.337.1970
FAQ Requirements for Hospitals To Make Public a List of Their Standard Charges via the Internet
The chargemaster is not a useful tool for consumers who are comparison shopping between hospitals or health systems.
The chargemaster amounts are billed to an insurance company, Medicare, or Medicaid, and those insurers then apply their contracted rates to the services that are billed. In situations where a patient does not have insurance, our hospital has financial assistance policies that apply discounts to the amounts charged.

A huge trove of medical records and prescriptions found exposed Thousands of health records and doctor’s notes were exposed daily
By Zack Whittaker TechCrunch.com March 17, 2019 A health tech company was leaking thousands of doctor’s notes, medical records, and prescriptions daily after a security lapse left a server without a password. The little-known software company, California-based Meditab, bills itself as one of the leading electronic medical records software makers for hospitals, doctor’s offices, and pharmacies. The company, among other things, processes electronic faxes for healthcare providers, still a primary method for sharing patient files to other providers and pharmacies. But that fax server wasn’t properly secured, according to the security company that discovered the data. SpiderSilk, a Dubai-based cybersecurity firm, told TechCrunch of the exposed server. The exposed fax server was running a Elasticsearch database with over six million records since its creation in March 2018. The faxes also included personal data and health information on children. None of the data was encrypted. […] Board of Directors responsible


800 West El Camino Real, Suite 350
Mountain View, California 94040
General +1 650 458 2620
Sales +1 650 458 2625

The server was hosted on an subdomain of MedPharm Services, a Puerto Rico-based affiliate of Meditab, both founded by Kalpesh Patel.

NY Governor Cuomo Calls For Investigation on Facebook Health Data Collection

American Travelers Seek Cheaper Prescription Drugs In Mexico And Beyond
In Utah last year, the Public Employee Health Plan took this idea to a new level with its voluntary Pharmacy Tourism Program. For certain PEHP members who use any of 13 costly prescription medications — including the popular arthritis drug Humira — the insurer will foot the bill to fly the patient and a companion to San Diego, then drive them to a hospital in Tijuana, Mexico, to pick up a 90-day supply of medicine.

TechCrunch: Screen time inhibits toddler development, study finds. “In news that will surprise few but still alarm many, a study has found that kids 2-5 years old who engage in more screen time received worse scores in developmental screening tests. The apparent explanation is simple: when a kid is in front of a screen, they’re not talking, walking or playing, the activities during which basic skills are cultivated

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Computer program that could bypass patents to produce synthetic drugs Software that can bypass current intellectual property and design medication with the same function as top drugs could help pharma companies…

“Massachusetts Attorney General Maura Healey alleges eight Sackler family members and nine Purdue board members or executives played key roles in the nation’s deadly opioid epidemic.

How to Bribe your way into Yale, Georgetown and Stanford


How to Bribe your way into Yale, Georgetown and Stanford


Wealthy Americans cheat their children’s way into elite universities, including  TPG Capital senior executive Bill McGlashan on 

NEED A COLLEGE DEGREE? click to learn how.


Admitted Into college Through Fraud



cheat their children’s way into elite universities


I don’t know how much of school I’m gonna attend,” Giannulli said in one video clip where she talks about her plans for school. “But I do want the experience of like game days and partying … I don’t really care about school, as you guys all know.” ~ Olivia

What waste of 1/2 a million dollars.

Federal prosecutors charged 50 people on Tuesday in a #$25 million scheme to help celebrities, CEOs and other wealthy Americans cheat their children’s way into elite universities, including

Yale, Georgetown and Stanford.

Oh yes, Rick Caruso is nobody’s fool “abuse their positions of trust” yeah like right! Lets try to sell Rick a bridge in NY.

Lori Loughlin’s Daughter Olivia Leaves Richard Joseph Caruso’s Yacht.

Billionaire Real Estate King Rick Caruso is USC’s Board of Trustees Chairman

The charges filed today against employees of USC are disturbing and the alleged activity is absolutely wrong.  I am saddened that these people would abuse their positions of trust and, as the government has alleged, victimize USC in the process.  There is no option other than zero tolerance for this type of behavior.  As a result, USC has fired the alleged wrongdoers. ~ Rick J. Caruso Chair of the USC Board of Trustees.


Welfare Queens
Buckley School, Sherman Oaks Campus for Super Rich Kids, Granted $40M Charity Loan by L.A. City Hall https://www.buckley.org/
prices  include only tuition and do not account for the cost of school supplies, uniforms, or extracurricular activities.




Tipster in college admissions scandal was Yale father Morrie Tobin who was under investigation for securities fraud; in effort to gain leniency, he offered a tip about how a #Yale #soccer #coach sought a #bribe in return for getting his daughter into the #IvyLeagueSchool. Tobin told authorities that the women’s soccer coach at Yale University sought money from him in return for getting his daughter into the school. 

THERE IS NO SIDE DOOR THERE IS ONLY CLASS / STATUS / WEALTH the wealthy and undeserving ALWAYS get into schools. Power placed in the hands of people who  shouldn’t have it. Colleges get accredited in the first place to serve the “common good” that is the contract.

SATs are far more useful at predicting a candidate’s racial and economic background, information that is already readily available to college admissions boards. And while many colleges and universities have intended to course-correct by eliminating standardized testing requirements, SAT and ACT scores still factor heavily into most of the elite schools’ admissions decisions — which is why such an integral part of Singer’s alleged scam was geared towards bribing proctors to changing kids’ test answers to raise their scores for them.

The College Admissions Scandal Proves the System Is Broken  — the real scam is the college admissions process

Jill Bolte Taylor: My Stroke of Insight and How Inuit Parents Teach Kids To Control Their Anger

Left Hemisphere and the Right Hemisphere of the Brain

When you are by yourself this is what you have on your own.

These are the “we” inside of “me” which would you choose? Which do you choose? and when?

Jill Bolte Taylor got a research opportunity few brain scientists would wish for: She had a massive stroke, and watched as her brain functions — motion, speech, self-awareness — shut down one by one. An astonishing story.Jill Bolte Taylor got a research opportunity few brain scientists would wish for: She had a massive stroke, and watched as her brain functions — motion, speech, self-awareness — shut down one by one. An astonishing story.

Jill Bolte Taylor got a research opportunity few brain scientists would wish for: She had a massive stroke, and watched as her brain functions — motion, speech, self-awareness — shut down one by one.
An astonishing story.

Right Brain Hemisphere = Peace

The more you use your right hemisphere the more peace you will project into the world and the more peaceful our planet will be. And that is an idea worth spreading.

Adults can can help the right brain hemisphere get strong and work well in children.

How to help keep children from getting angry? How Inuit Parents Teach Kids To Control Their Anger.

Moms mention one golden rule: Don’t shout or yell at small children.
The culture views scolding — or even speaking to children in an angry voice — as inappropriate. Parents who control their own anger are helping their children learn to do the same. The Inuit’s no-yelling policy is the secret of raising kids that internalized discipline for themselves.

How The Inuit Teach Kids Not To Get Angry
How To Discipline Your Kids Without Yelling


Briggs quickly realized something remarkable was going on in these families: The adults had an extraordinary ability to control their anger.
“They never acted in anger toward me, although they were angry with me an awful lot,” Briggs told the Canadian Broadcasting Corp. in an interview.

Even just showing a smidgen of frustration or irritation was considered weak and childlike, Briggs observed. By contrast, Briggs seemed like a wild child, even though she was trying very hard to control her anger. “My ways were so much cruder, less considerate and more impulsive,” she told the CBC. “[I was] often impulsive in an antisocial sort of way. I would sulk or I would snap or I would do something that they never did.”

Technique #HowToDisciplineChildren?  #WeUseStorytellingToDiscipline

Using #oralStories passed down from one generation of Inuit to the next, designed to sculpt kids’ behaviors in the moment. Sometimes even save their lives.

1) Teach kids to stay away from the ocean, where they could easily drown Instead of yelling, “Don’t go near the water!”
Inuit parents take a pre-emptive approach and tell kids a special story that will explain the consequence of getting lost and separated from the family. The story is about what’s inside the water.
“It’s the sea monster,” Jaw says, with a giant pouch on its back just for little kids. “If a child walks too close to the water, the monster will put you in his pouch, drag you down to the ocean and adopt you out to another family,” Jaw says.

2) Not  listening to Parents story ear inspections  because too much ear wax

3) Don’t ask before taking food, long fingers could reach out and grab you

There is no scolding, no punishment, no time outs, instead the parents waited for a calm peaceful moment and begin to


The Parent would reenact the child having a tantrum including the consequences of their behavior.

During the Drama the parent always had a playful fun tone.
And the drama typically started by trying to provoke the child . Now the child has to think……. what should i do? Should I hit Mom? so if they do take the rock and hits Mama she reenacts the consequences and keep the kid thinking …. did the child want to hurt mom? did they want to hurt mom’s feelings?

Parent’s keep putting on these little plays until the child understands and learns why not to hit.

Plays – are the little dramas parents use to teach kids to keep their cool, to be strong mentally and emotionally. Not to react and be provoked easily. Kids get practice internalizing control over their anger because once you’re angry it’s hard to stop.


MEDIA  Oral Story Tellers Exerts in Hate Speech

Jen Senko: How Right Wing Media Divided the Country and Brainwashed My Dad – 2/19/17 New York Society for Ethical Culture

Fox News: Radical Right Wing Media divided the country.
Roger Ails Fake News Propaganda Fair and Balanced, if you tell a lie big enough people will believe it.

HATE EXPERTS #FOXNEWS 14:18 Right Wing Conspiracy started with Goldwaters loss to Johnson in 1964 beginning with “alternative facts” complaint which snowballed into Fake News.
1970 Roger Ailes at 27 years old was hired to package Nixon with Fair and Balanced GOP Friendly News  as a propaganda strategy – do their thinking for them and the blue print for Fox News.
1971 Memo from Powel  Heritage foundation planned free market ideology  attack on the free enterprise system.
Fairness Doctrine — Power of Media / Roger Ailes Limbaugh Story Teller
The  consequences of mass media #OralStories  #FoxRadio Brain Washing,  #Propaganda,  #FoxNews.

Do Republicans want to you angry? Do they want you to hurt others?

Fox News / Rush Limbaugh national right wing radio unofficial leader of the republican party to enilate the truth so you don’t know what to believe. Expert Propaganda Story Tellers exist to make you angry.

Murdock, Limbaugh created 2 hemispheres mainstream corporate media, and 97% of talk radio is far right wing because they sell fear and anger!

Master language experst  frame issues

What scares people the most “alt right” “obama care” “the death tax” “entitlements”  the working class don’t understand they have been manipulated.

Corporate Media doesn’t combat the lies the right wing puts out daily.

It never stops it is always engaging your left hemisphere, that is how brain washing works. Turn off the 24/7/365 “news” you have a better chance of cooling down and getting more control over yourself.

Propaganda brain washing techniques

Women’s History Month #WomensHistoryMonth

Women’s History Month


When we recognize and celebrate the diverse and historic accomplishments of women by providing information and educational materials and programs.

The Educational CyberPlayGround (founded by  Karen Ellis) provides many wonderful resources to help you discover the important contributions and achievements made by women throughout our history. We hope you will find information to use all year round and for a lifetime of learning.



World War II’s Best Codebreaker Was a Woman

The Most Awesome Codebreaker in World War II Was a Woman

Women Gender Equity International Resources

About Computers in the Classroom
Changing Girls’ Attitudes About Computers

How to help Girls get into technology.

Computer wonder women and Digital Diva’s:
Women and Their Role in the Development of the Modern Computer

Real women engineers and other role models for girls.

The most common way people give up their power is by thinking they don’t have any. ~ Alice Walker