Tuesday, September 16, 2025

Gig Workers Unite

 


The Collective Action Problem of Gig Work: Why Platforms Win and Drivers Lose

When Uber, Lyft, and other gig platforms talk about their drivers, they always highlight one thing: independence. Drivers are free to log on when they want, pick up extra cash on their schedule, and be their own boss.

But scratch beneath the surface, and that “independence” looks pretty thin. Drivers don’t set their own prices. They don’t negotiate with customers. They don’t even control which rides they’re offered. Instead, they compete as individuals against an algorithm designed to maximize the company’s bottom line.

And here’s the rub: independence without coordination means no bargaining power.


Why the system works so well for the company

Platforms hold nearly all the cards. They’ve built a system where refusing bad deals is nearly impossible:

  • Someone else will take it – With thousands of drivers on the road, if you turn down a low-paying fare, it just goes to the next person.

  • The algorithm punishes non-compliance – Decline too many rides and your “acceptance rate” drops. That can cost you access to promotions, bonuses, or high-value trips. In extreme cases, drivers risk deactivation.

  • Lack of transparency – Drivers don’t know what other drivers earn, how fares are really calculated, or what share of the fare the company keeps. It’s like playing poker where the house hides the cards.

  • Psychological levers – Fear of missing out (FOMO) keeps drivers chasing the next ping. And because the platform controls visibility, many drivers believe they’ll be pushed into obscurity if they don’t play along.

In short, platforms have created an environment where drivers can say no in theory, but feel like they can’t in practice.


Why it harms independent workers

This setup isn’t just inconvenient — it systematically disadvantages drivers:

  • Earnings get squeezed – Without collective resistance, rates hover just above the bare minimum needed to keep people driving.

  • No real independence – Drivers carry the risks of being contractors (no benefits, no protections), but lack the actual freedom to set prices or negotiate terms.

  • Voice is absent – The algorithm is judge, jury, and dispatcher. Drivers can’t appeal or bargain; they just adapt or log off.

So instead of a “flexible side hustle,” many drivers find themselves working long hours for shrinking returns, with little recourse.


What drivers could do

Ironically, drivers’ greatest power lies in the one thing platforms train them not to do: refuse bad fares. If enough drivers in a city collectively declined low-paying rides, platforms would have no choice but to raise pay to move customers.

But three obstacles stand in the way:

  1. Penalty systems – The algorithm subtly punishes refusal.

  2. Lack of communication – There’s no built-in way for drivers to coordinate across a city. Everyone is in their own car, playing their own game.

  3. Distrust and turnover – With high churn and varied motivations (part-time vs. full-time), it’s hard to build solidarity.

Some drivers are fighting back through independent associations, online forums, and even informal “strike days.” But without widespread participation, these efforts struggle to move the needle.


The limits of bargaining power

Even if drivers organized successfully, there’s a ceiling to how far rates can go. Customers still compare the price of a ride to alternatives: driving themselves, taking a cab, or carpooling. If driver pay gets pushed too high, demand will dry up.

That doesn’t mean drivers shouldn’t fight for more — only that gains must balance with the economic value customers perceive. The sweet spot is making rides profitable for drivers and still worthwhile for riders.


What broader change might take

For real balance, outside forces may need to step in:

  • Policy intervention – Cities like New York and Seattle have set minimum pay floors for ride-hail drivers, ensuring a baseline standard of fairness.

  • Sectoral bargaining – Legal frameworks could allow contractors to negotiate collectively without being accused of price-fixing.

  • Transparency rules – Forcing platforms to disclose fare breakdowns, pay structures, and algorithmic penalties would let drivers make informed decisions.

These changes don’t eliminate flexibility, but they inject accountability into a system tilted too heavily toward corporate interests.


The bottom line

Gig platforms survive by keeping workers atomized, dependent on the algorithm, and afraid to refuse low pay. Drivers do have leverage — platforms collapse without them — but as long as that leverage is scattered and uncoordinated, the company wins.

For drivers, the path forward means finding ways to act together, even informally, and pushing for policies that give independents a fair shot at shaping the terms of their work. Independence should mean more than working alone under someone else’s rules.

In the meantime, drivers can help themselves by refusing rides that don’t meet a clear personal minimum — for example, only accepting trips that pay at least $1.20 per mile or $25/hour effective. If enough drivers set that kind of baseline, platforms are forced to adjust upward.






How to Set a Personal Minimum Fare (Baseline)

  1. Know your costs

    • Fuel: $X per mile (varies by gas prices & vehicle efficiency).

    • Maintenance: Tires, oil, brakes, depreciation. A common estimate is $0.15–$0.20 per mile.

    • Insurance & misc. overhead: Divide your monthly costs by your estimated gig miles to get a per-mile number.

    Many drivers use the IRS standard mileage rate as a shortcut. For 2025, that’s 67 cents per mile. That’s what the government considers the cost of operating a car.

  2. Decide your hourly target
    What do you want to earn before expenses? For example, $25/hour gross is a common target because after car costs and taxes, that still leaves you with ~$15–18/hour net.

  3. Do the math for each trip

    • Estimate trip time (pickup wait + driving).

    • Estimate distance.

    • Plug into:

      Fare ÷ (time in hours) = hourly rate Fare ÷ miles driven = pay per mile

    If either falls below your personal minimums (say, $1.20/mile or $25/hour), decline.

  4. Set your baseline rule
    For example:

    • Don’t accept rides under $7, no matter how short.

    • Require at least $1.20/mile AND $25/hour effective.

  5. Stick to it
    The key is consistency. If enough drivers refuse underpriced rides, the platform will have to raise pay in that area to keep customers moving.



Written by me, in collaboration with ChatGPT.



Friday, August 29, 2025

CEH v13 - A Surprising Pass

 

CEH v13 - A Surprising Pass

I took and (surprisingly) passed the CEH v13 exam yesterday.

First, I want to thank and praise Northern Virginia Community College (NVCC) and its Workforce program for all the help it gave me in passing this exam. Professor Nick Pierce is one of my favorite Workforce professors. Ms. Pico is the awesome staff member who reaches out to students and keeps them on track with credentials, exam scheduling, and provides us with great course and time management outlines.

If you live in Virginia, love learning about technology, and want to make a career change, or just improve your knowledge, I highly recommend NVCC's Workforce program and their G3 grant.

The CEH course I took was a 5-day boot camp conducted by Professor Pierce via Zoom in early August of 2025. It runs from 9 a.m. until 5:30 p.m. Monday through Friday. It's both an instructor-led lecture and a hands-on VM labbing experience. It's an official EC-Council recognized course (for which you need to take the CEH exam if you do not have 2 years of job experience). 

The tuition for the Workforce course covers an exam voucher and a retake, if needed. It also covers the official EC-Council CEH courseware - a 3,000+ page e-book and virtual labs for every module.

I'm going to warn you ahead of time that you should consider the 5-day bootcamp as your introduction to the course. You need to put twice as much effort into studying after the bootcamp as you did while taking the bootcamp. And it's rough and hard because Workforce requires you to attempt your first take of the exam within 2 weeks of successfully completing the course.

My Study Routine & Tips for Learning

Hands-On Labs: Don’t Skip Them

First, do as many of the labs as you can. I did not complete them all, but I did go back in after the course ended and completed many of the labs. Getting that hands-on feel for what you're learning conceptually will really help you to internalize and remember things.

Nmap. Learn it. Know the flags. I found this cool little Nmap learning tool while surfing Reddit: https://wordwall.net/teacher/21960721/marukatee. In addition to all the ones you learn from it, learn the Maimon flag too.

Study Habits That I Wish I Had Used

I believe the biggest 'misses' I had on the exam were the names of tools. Learn not only the main tools a section of the book teaches you, but also the names of alternative tools that do the same or similar things to the main tool they teach. I missed (I assume) multiple questions because all 4 choices were tool names (or fake tool names) that I had not seen before/ paid attention to beyond recognizing the main tool name the EC-Council introduced you to in the official courseware.

Let me give you an example of what to look out for when you're reading through the official book:

Screenshot from EC-Council, Certified Ethical Hacker (CEH v13) Official Courseware (Aspen/VitalSource, 2024), Module 18, p. 2832. Used under fair use for commentary and educational purposes.

This page is on Shodan, but in really small print at the bottom, I've highlighted additional tools they mention. PAY ATTENTION to these. Learn them too - at least insofar as they relate to or may be used in place of the main tool they are talking about. These are found throughout the textbook. Always be looking for them and take notes when you see them.

Study Habits That Worked for Me

After my initial go through of the book, I have 2 main ways of learning: video series and practice test questions. Because CEH v13 is relatively new, there was not a lot of material out for v13. I had trouble finding good practice exams/ questions to go over. I did find 2 good video series.

LinkedIn Learning has a good v13 video series by Omar Santos. And he's got an awesome-looking home lab setup, which you can do via VMs and containers. Here's a link to it.

I found another one on Percipio, though, that I preferred. And I preferred it because it had quizzes after each module and a final exam you could take, too. Here's a link to it.

The first source I used for practice questions, though, was the Sybex CEH v12 Study Guide; there is no Sybex v13 Study Guide out at this time, so I was stuck doing much of my practice exam using this older exam guide book. I generally like Sybex books because of their online tests they give you access to when you purchase the books. And for some aspects, this book was okay. But when it came to tools and tools that Pentesters are currently using, I think using this book hurt me a little. It's great for the concepts of the CEH exam itself; you just have to be wary of the tools they mention and make an effort to reconcile them with what's relevant for v13.

Some third-party question banks can be poorly worded. One I tried on Udemy didn’t match EC-Council’s style, so I dropped it quickly. If you use outside sources, pick carefully.

I did buy a practice set of exam questions from Udemy, but I was not happy with these and never got through the first set. The guy's wording was often so wonky and off that I felt his material was not a good representation of what I should expect on the actual exam. I think that part of exam learning/preparation is learning how the actual certification exam provider words and/ or articulates their questions. And this Udemy course, especially after completing the exam and now knowing for sure, was not good IMO.

Turning Wrong Answers Into Study Wins

I learn the most from the actual questions I get wrong. And I use ChatGPT and the official book to help me learn. I'm going to link a Google Doc that contains my prompt for a conversation with ChatGPT to help me learn and understand any questions I get wrong (and questions I got correct only because I guessed).


Here's an example of a Practice question from Percipio and the output I get from ChatGPT:


An innovative city traffic control system suddenly receives false reports of heavy traffic from multiple "sensors". As a result, traffic lights change their timing unnecessarily, causing congestion and confusion. Investigators have found that these false reports originate from multiple fake device identities controlled by a single attacker. Which attack is most likely happening here? 

A. MitM 
B. Sybil 
C. Exploit 
D. Ransomware
ChatGPT said:

This one is a classic IoT/OT scenario 👇


✅ Correct Answer: Sybil attack


Why "Sybil" is Correct

  • In a Sybil attack, an adversary creates multiple fake identities or nodes in a network.

  • Those fake nodes send false data (here: fake traffic congestion reports).

  • Because the system trusts the number of inputs, the attacker can manipulate system behavior — in this case, traffic light timing.

  • This exactly matches the scenario: many fake sensors, one attacker controlling them.


Why the Other Options Are Wrong

  • MitM (Man-in-the-Middle)

    • Intercepts communication between two legitimate parties.

    • Here, the attacker isn’t intercepting; they’re injecting false identities.

  • Exploit

    • General term for abusing a software vulnerability.

    • The key here is fake multiple identities, not a single exploit.

  • Ransomware

    • Malicious encryption of files/systems demanding ransom.

    • Not relevant here; the attacker isn’t encrypting or demanding payment.


Key Concepts

  • Sybil Attack: Multiple fake identities controlled by one attacker to manipulate reputation/voting/consensus systems.

  • IoT/Smart City Vulnerability: When systems trust quantity of sensors without strong authentication, Sybil attacks can overwhelm decision logic.

  • Real-world analogy: One person stuffing a ballot box with hundreds of fake votes.


Supplemental Flashcards (Self-Contained)

Q: What is a Sybil attack in IoT networks?
A: An attack where a single adversary creates multiple fake device identities to send false data and manipulate system behavior.


Q: How does a Man-in-the-Middle (MitM) attack differ from a Sybil attack?
A: MitM = intercepting and altering communications between two real parties. Sybil = creating many fake identities to inject false information.


Q: Why are IoT systems particularly vulnerable to Sybil attacks?
A: Many IoT devices use weak authentication, so attackers can easily impersonate many fake devices.


Q: What is a real-world consequence of a Sybil attack in smart city infrastructure?
A: Fake traffic or pollution sensors can cause incorrect traffic management or emergency response decisions.


Beware of Improper Study Materials

One trap you want to avoid while preparing for CEH is using shady or unauthorized test prep sources. Some websites and “question banks” floating around online are nothing more than braindumps — copies of actual test questions that were harvested and shared in violation of EC-Council’s policies.

Here’s why that’s a problem:

  • Ethical risk – CEH is literally built on ethics. Using stolen or unauthorized material undercuts the very certification you’re trying to earn.

  • Practical risk – These dumps are often outdated, wrong, or poorly copied. If you train yourself on bad questions, you’ll develop bad habits and may misread the real exam.

  • Career risk – If EC-Council or an employer suspects you used braindumps, that can follow you professionally.

When in doubt, check with a trusted source. I almost fell into this myself — Gemini suggested a resource that looked helpful, but a quick Reddit search raised red flags. I emailed my professor to be sure, and he recommended against it. That saved me from wasting time (and possibly creating problems later).

Stick to trusted prep sources:

  • EC-Council’s official courseware and labs (Aspen/VitalSource).

  • Reputable publishers like Sybex or O’Reilly.

  • Recognized platforms like LinkedIn Learning or Percipio.

  • Professors, mentors, or certified peers who can sanity-check what you’re using.

⚠️ Bottom line: If something looks “too real” or too easy, it probably is. Don’t jeopardize your cert or your integrity with questionable study material.


Final Thoughts

Walking out of the exam center, I was honestly more relieved than confident. I knew I’d put in the work, but CEH v13 had more curveballs than I expected - especially around tool names and scenario-based questions. Seeing “Pass” pop up on the screen was a surprise I won’t forget anytime soon.

If you’re planning to take CEH, here’s my biggest advice:

  • Don’t rely on the bootcamp alone. Treat it as a starting point, not the finish line.

  • Practice the labs. Hands-on work cements the concepts better than reading.

  • Vet your study sources. Stick to official materials and trusted publishers, and avoid shady question banks.

  • Learn the tools and their cousins. Don’t just memorize tools like Dig - know the alternatives too.

Passing CEH is doable - even on the first attempt - but it takes discipline, focus, and the right study plan. Hopefully, sharing my experience helps you avoid some of the blind spots I hit along the way.

Good luck with your own CEH journey!





Thursday, April 17, 2025

Caught on Camera: The Legal Fault Line Beneath Virginia’s Speed Camera Programs

 



Caught on Camera: The Legal Fault Line Beneath Virginia’s Speed Camera Programs

I received a speed camera ticket for a car I co-own—even though I wasn’t the one driving. That ticket was issued through an automated enforcement system run by a private company hired by the City of Harrisonburg. But the deeper I looked, the more I realized: the problem wasn’t just what happened to me. It was how the system is structured.

And under Virginia law, it might be unlawful.

Let me explain.


What the Law Actually Says

Virginia Code § 46.2-882.1 allows law-enforcement agencies to use speed cameras and to hire private vendors to support that process. But it doesn’t say that cities or counties can do so.

In Virginia, that distinction matters. It’s a Dillon Rule state, which means cities and counties only have the powers the General Assembly expressly gives them. If the legislature wanted to authorize municipalities to contract for photo enforcement, it could have—but it didn’t. Instead, the statute gives that power to law-enforcement agencies, which are not the same thing as the city or county itself.


Who Actually Signed These Contracts?

In Harrisonburg, it was the City, not the Police Department, that signed the contract with Altumint. This isn’t unique—municipalities like Arlington, Albemarle, and Prince William have done the same.

But here’s the catch: police departments in Virginia generally don’t have independent legal authority to enter contracts. They’re part of the city structure. So if the statute gives power to the agency, but that agency can’t contract—and the city wasn’t granted authority—then who had the legal right to act at all?

That’s the legal gap moving to the center of this fight.


Vendors Acting Like Courts

The statute also outlines how to rebut a citation. If you weren’t the driver, you can submit a sworn affidavit to the clerk of the general district court. But cities like Harrisonburg tell drivers to send those affidavits to the vendor—Altumint in Pennsylvania or Verra in Arizona.

These companies then decide whether your affidavit is “good enough” to avoid a hearing. That makes them the gatekeepers of your right to contest a ticket, even though they’re not part of the court system—and they have a financial interest in keeping the process moving.

That’s not due process. That’s privatized adjudication.


The Certified Question Before the Court

Because of these structural problems, I’ve asked the federal court to certify the following question to the Virginia Supreme Court:

Whether, under Virginia Code § 46.2-882.1(H), a city or county may lawfully enter into a contract with a private vendor to operate a photo speed enforcement program when the statute authorizes such contracts only by a “law-enforcement agency,” and such agency lacks independent legal capacity to contract.

This isn’t just about my case. There’s no appellate guidance on this. If courts decide these contracts are unlawful, the entire system built on them could be, too.


What’s at Stake

If the contracts are unauthorized, then:

  • Tickets issued under them may be void.

  • Vendors may have operated without legal authority.

  • Money collected could be subject to refund.

  • Drivers denied a hearing due to vendor discretion could raise due process violations.


This Fight Isn’t Just About Me

I didn’t file this lawsuit to dodge a fine. I filed it because the rules matter. Cities shouldn’t bypass the legislature. Vendors shouldn’t decide whether you get your day in court. And enforcement systems shouldn’t be built on shaky legal foundations.

That’s why I asked the courts to get clarity from Virginia’s highest court. Because if no one has the authority to sign these contracts, then we shouldn’t be issuing tickets based on them.


Read the Motion Summary

If you’d like to see a non-technical breakdown of the legal motion currently before the court, here it is:


Summary of Plaintiff's Motion to Certify a Question of State Law

Proposed Question to the Virginia Supreme Court:

Whether, under Virginia Code § 46.2-882.1(H), a city or county may lawfully enter into a contract with a private vendor to operate a photo speed enforcement program when the statute authorizes such contracts only by a “law-enforcement agency,” and such agency lacks independent legal capacity to contract.

Why It Matters:

  • Virginia law limits municipal power under the Dillon Rule—cities can only act when the legislature explicitly says they can.

  • The statute gives contracting authority only to law-enforcement agencies, not to localities themselves.

  • Most police departments can’t sign contracts independently, and cities weren’t granted this power under the statute.

Additional Concerns:

  • Vendors are receiving and reviewing sworn affidavits that the law says must go to a court clerk.

  • This delegates a judicial function to private companies with a financial stake—raising serious due process concerns.

  • The statute is fully workable without expanding its scope: sheriffs’ departments, which are independent, could serve this role lawfully.

Requested Relief:

  • That the court certify the question to the Virginia Supreme Court.

  • That the court stay proceedings until a definitive ruling is issued.


The Virginia Supreme Court hasn’t weighed in yet. But they should. Because no one—not a city council, not a vendor—gets to rewrite the rules of justice.





[Link to full motion coming soon.]


Wednesday, April 2, 2025

A Cautionary Tale With LRCC's Cybersecurity Program



Spring 2025 - My Frustrating Experience with LRCC’s Cybersecurity Program: An Administrative Letdown

As a cybersecurity student at Laurel Ridge Community College (LRCC), I've maintained a 4.0 GPA and fulfilled nearly all requirements for my associate's degree. However, I'm writing today out of sheer frustration—frustration caused not by academic difficulty, but by administrative oversight and poorly managed course scheduling at LRCC.

The Missing Link

I was just two courses away from completing my associate's degree: ITN 270, a core prerequisite class that must be taken before ITN 298, my capstone. After careful planning, I expected this class would be offered this summer, allowing me to smoothly transition into my bachelor's program at Western Governors University (WGU). Unfortunately, LRCC decided not to offer ITN 270 this summer, despite it being a mandatory requirement.

I checked the entire Virginia Community College System (VCCS)—including Northern Virginia Community College (NVCC)—and found that not a single institution was offering ITN 270 this summer. This isn't merely inconvenient; it's a complete systemic failure affecting students' ability to graduate on time.

Poor Advisement and Communication

Throughout my time at LRCC, advisement and administrative guidance have been significantly lacking. Had the school made it clear from the beginning that ITN 270 would not be available during the summer, I could have adjusted my plans accordingly. Instead, I've been blindsided by inadequate communication and advisement that failed to foresee and prevent this situation.

Credit Transfer Disappointments

My frustration doesn’t end with course scheduling. Even more disappointing was seeing how little of my recent coursework from LRCC transferred to WGU. Despite completing nearly an entire associate’s degree in cybersecurity with a 4.0 GPA, only two LRCC courses were accepted into WGU’s cybersecurity program. In stark contrast, an AAS in Automotive Technology from 30 years ago at NVCC and just a few CompTIA CE courses were far more impactful on my WGU transfer evaluation (I transfered 60 credits to WGU - of those 60, only 6 credits came from LRCC's cybersecurity curriculum). That raises a serious question: What value do LRCC’s cybersecurity courses really hold if they’re not recognized by reputable out-of-state institutions like WGU? This is supposed to be an accredited cybersecurity program—so why is much of it ignored in the transfer process?

The reality is simple: LRCC’s cybersecurity classes are structured more like vocational workforce training than academic equivalents, and without a completed degree or recognized certifications to back them up, WGU doesn’t many of them. It’s not just a transfer issue—it’s a reflection of how little value these courses carry beyond LRCC without a degree completion.

Why This Matters

This isn’t merely personal frustration—it’s a matter of accountability in higher education. LRCC’s lack of foresight in course scheduling and inadequate advisement directly impacted my academic timeline, financial planning, and sense of progress. But beyond that, this experience raises a deeper concern: how much real value does LRCC’s cybersecurity program actually provide if its courses aren’t even recognized by major accredited universities like WGU? When students invest their time and money into an accredited program, they expect it to hold academic weight—not just locally, but nationally. If that isn’t happening, something is fundamentally broken.

Moving Forward

I've already transferred my credits to WGU and will be moving forward with my bachelor's degree there. While I’m disappointed not to finish my associate’s at LRCC, the bigger lesson here is clear: institutions must do better in communicating with students, planning their course offerings, and managing credit transfers fairly and effectively.

I want to acknowledge that the majority of the instructors at LRCC were excellent. Their classes were engaging and informative, and they clearly cared about student success. My final semester here, Spring 2025, all 4 of my professors were great. Unfortunately, all of my cybersecurity professors efforts were overshadowed by structural issues and a curriculum that, in the end, did not translate into recognized academic progress beyond LRCC. The fault, not theirs, but rather the administration above them and my own.

I hope my experience prompts meaningful reflection and change at LRCC. Future students deserve better. Until then, my advice to prospective cybersecurity students is clear: think twice about LRCC’s cybersecurity program if you’re aiming for a transferable degree. If you're seeking a path toward a bachelor’s degree, you’ll likely get more cyber transfer credit—and more value—out of earning a few recognized industry certifications like the ones I took at NVCC. Don’t waste your time chasing a credential that won’t move with you.

In retrospect, if i knew then what I know now, I'd have asked better questions of my faculty advisor in regards to critical class availability. Unfortunately, the Course Catalog is not always accurate. I've seen many instances in the catalog where it says a class is only available in the 'Spring'. Yet, it will be available in the Summer too (and sometimes even in the Fall - despite the warning in the catalog on limited availability). Such is the case for the class I needed. Although it says it's only offered in the spring, Linux ITN 270 is being offered this fall - 2025; just not this summer like I needed. This lack of communication about class availabilities is an administrative communication issue.

The cyber associate degree itself is not without value. But it works and transfers better as a completed degree. If I had know I would leave LRCC without completing the associates degree, I would have stuck with NOVA's Continuing Education program and gathered even more certifications than I did (I managed to complete 3 CompTIA certifications from NVCC while simultaneously enrolled full time at LRCC). The certifications transfer better to a college that counts them for cyber course credit and/or experience credit. In addition to CompTIA's A+, Network+, and Security+ I could have completed CEH, Linux+ or RHCSA, and CISSP. And, without the constraints of the dual enrollment requiring all my time, I would have had them done now too.






Saturday, February 8, 2025

CIA USAID Impact


How Eliminating USAID Harms U.S. Intelligence Operations

In a controversial move, former President Donald Trump has taken steps to dismantle the United States Agency for International Development (USAID), a decision that could have serious repercussions beyond foreign aid. While USAID is widely recognized for providing humanitarian assistance and supporting global development, it also plays a crucial, albeit indirect, role in U.S. intelligence operations, particularly those conducted by the Central Intelligence Agency (CIA).

For decades, USAID has served as a gateway for intelligence collection and influence operations in foreign nations. Although the CIA is legally restricted from using certain organizations, such as the Peace Corps, as a front for intelligence gathering, USAID operates in a more ambiguous space. The agency's vast network of programs provides the CIA with opportunities to operate in remote and politically unstable regions without raising suspicion. Intelligence officers have historically used USAID-backed projects as a cover for gathering information, developing local contacts, and even conducting clandestine operations.

By eliminating USAID, the Trump administration risks depriving U.S. intelligence agencies of a critical tool for both soft power and covert activities. Without USAID-backed initiatives, intelligence officers would have fewer ways to access regions where traditional diplomatic or military presence is either impractical or unwelcome. This could significantly hinder the CIA’s ability to monitor potential threats, including terrorist organizations and hostile foreign actors.

Additionally, dissolving USAID could inadvertently pressure intelligence agencies to explore alternative cover organizations, which could have dangerous implications. The CIA has maintained a strict policy against infiltrating the Peace Corps due to ethical concerns and the risk of putting humanitarian workers in jeopardy. Without USAID, there is concern that intelligence agencies might be forced to lean on other humanitarian organizations for operational cover, potentially endangering their missions and credibility.

The broader impact of USAID’s elimination extends beyond intelligence concerns. As one of the key arms of American soft power, USAID not only provides assistance to developing nations but also fosters goodwill toward the U.S. among foreign populations. Losing this tool could diminish American influence abroad, creating power vacuums that adversaries such as China and Russia could exploit.

Ultimately, dismantling USAID is not just an issue of cutting foreign aid; it represents a significant shift in how the U.S. projects power and gathers intelligence abroad. The long-term consequences could leave both American diplomats and intelligence officers with fewer resources to navigate an increasingly complex global landscape.


This article explores the potential consequences of eliminating USAID, particularly its impact on U.S. intelligence operations. While the role of USAID in supporting American foreign policy is well-documented, some connections discussed here involve informed speculation based on historical cases and geopolitical analysis. The views expressed are for discussion purposes and do not represent classified or insider knowledge.


Sunday, January 26, 2025

LRCC Spring 2025 Professors First Impressions




Quick First Impressions on Instructors - Spring 2025


This is just a quick first impressions post on professors for this semester. Not in any order:


Professor Rebecca Smith-Terry: my second time having her. Highly recommend taking any class she teaches. She's on top of things, runs the assignments herself to verify things work in the lab, and is always a quick responder to emails.

Dr. George Efi Agbor: my second time with him. He's slightly different in his teaching approach - he seems to favor papers and discussions. He takes his time making quizzes that require you to think. So far the quizzes have been open book. But you must pay attention to the question. I would have no problem taking another class from him.

Professor Matthew Hansel: my first time with him. I think he's on par with my favorite professor (Dr. El Gbouri). Professor Hansel has gone above and beyond in helping students in a subject I really didn't want to take (Python Cybersecurity). He makes it bearable and he's willing to adjust his schedule to help students out.

Professor Jason Pell: my first time with him as a professor. Initial impressions are that he's engaging and also reviews the online material for accuracy. His fairly quick in responding and engages with the class throughout the week. So far I recommend this professor.


UPDATE 5/7/2025:

Just wanted to update saying this was an overall good semester with great professors. My initial impressions proved accurate.

I think Dr. Efi Gabor's Discussion Board questions were some of the best I've seen during my academic journey so far at LRCC. I wish some of the other students had chosen to engage more with the questions, but overall a great job by Dr. Efi Agbor.

Professor Pell's class was fun learning about digital forensics and getting our feet wet on the topic and I liked how a lot of his weekly lessons started off with a video showing digital forensics in action. Also, a lot of his assignments required verbatim answers from the book - something I prefer.

Python class - the bane of existence for all non-programmers. And yet, Professor Hansel made it bearable and do-able. Kudos to him and the extra time he took out of his teacher availability time in the evening to conduct Zoom meetings going over how to get everything done.

Professor Smith-Terry is one of the most efficient professors I've had. One of the best things I liked about her teaching method was she got things graded quickly and responded fast to emails. I find that really helpful if I'm struggling on something - quick feedback is nice.



Saturday, January 4, 2025

Beat An Automated Speed Camera Ticket In Virginia

 





How to Beat An Automated Speed Camera Ticket In Virginia: A Guide to Exploiting the Summons Defect

Disclaimer

I am not a lawyer, and this is not legal advice. The information here is based on how I argued my own ticket. Always research your situation and consult an attorney if you need legal assistance.


 

1. Understand the Issue

Automated speed camera tickets often rely on a process that includes mailing you a summons. However, in some cases, the instructions on these summonses violate Virginia law by directing you to send affidavits rebutting the ticket to a third-party vendor instead of the Clerk of the General District Court. This defect is significant because Virginia Code § 46.2-882.1 mandates that affidavits must be filed directly with the Clerk.

This misstep is not a minor error—it’s a fatal flaw that can make the summons legally invalid from the moment it’s issued. If the summons is defective, the court cannot hear the case, and you can request dismissal.


 

2. Check Your Summons for Errors

  • Carefully examine the summons you received. Pay special attention to the back or the instructions section.
  • Look for any language that tells you to send your affidavit to a third-party vendor (such as Conduet or Altumint) rather than directly to the Clerk of the General District Court. Sometimes the summons will actually say the name of the City you are in and use the physical address of the third-party vendor. Either way is incorrect.
  • Highlight or make a note of the problematic language, as this will form the foundation of your argument. (E.g. Falls Church, VA at the time of this writing instruct its citizens to mail the affidavit to Violation Processing Center in Tempe, AZ – which is obviously not the Clerk of the General District Court.)



 

3. Prepare for Your Court Hearing

  • Bring Evidence: Bring a copy of your summons to court, clearly marking the section where it misdirects affidavits to a vendor. This will serve as your primary piece of evidence.
  • Know the Law: Familiarize yourself with the relevant parts of Virginia Code § 46.2-882.1:
    • Part E: Requires affidavits to be filed with the Clerk.
    • Part G: Specifies that summons instructions must comply with Part E.
  • Practice Your Argument: Be prepared to explain why the error in the summons invalidates it and deprives the court of jurisdiction.

 

4. Bring Up the Summons Defect in Court

Your defense relies on demonstrating that the summons package is defective because it violates Virginia law. Specifically, the summons misdirects affidavits to a third-party vendor instead of the Clerk of the General District Court, as required by Part E of the statute. This is not just a minor issue—it is a fundamental flaw that invalidates the summons and deprives the court of authority to proceed. Here’s how to present your case:

A. Show the Defect in the Summons

  1. Identify the Error:
    • Look at the summons mailing, particularly the instructions (usually on the back or in accompanying materials).
    • Point out that the summons directs affidavits to a third-party vendor, such as Altumint or a Violation Processing Center, instead of to the Clerk of the General District Court.
  2. Explain Why This is a Problem:
    • Virginia law (Part E) requires affidavits to be filed directly with the Clerk of the General District Court. By misdirecting affidavits, the summons violates this statutory requirement and fundamentally misinforms defendants of their legal obligations.

B. Cite the Law

  1. Virginia Code § 46.2-882.1(E):
    • Quote the section requiring affidavits to be filed with the Clerk:

“Such presumption shall be rebutted if the owner… files an affidavit by regular mail with the clerk of the general district court…”

    • Emphasize that the summons violates this mandate by instructing defendants to file affidavits elsewhere.
  1. Virginia Code § 46.2-882.1(G):
    • Reference the additional requirement that summons instructions comply with Part E:

“Every such mailing shall include… instructions for filing such affidavit, including the address to which the affidavit is to be sent.”

    • Argue that the summons package fails to meet this requirement because the instructions do not align with Part E.

C. Argue Why the Defect is Fatal

  1. The Summons Violates Statutory Mandates:
    • The defect arises from the summons itself, which directly violates Part E by misdirecting affidavits.
    • This failure renders the summons invalid and prevents the court from obtaining jurisdiction.
  2. Part G Amplifies the Failure:
    • Part G strengthens your argument because it explicitly ties the summons’ instructions to Part E. The instructions’ failure to comply with Part E highlights a deeper, systemic issue.
  3. Impact on Defendants’ Rights:
    • Denial of Proper Affidavit Filing: The summons misleads defendants into sending affidavits to the wrong entity, depriving them of their statutory right to rebut the presumption.
    • Loss of Judicial Oversight: Misdirected affidavits bypass judicial review, undermining the fairness of the process.
    • Confusion and Barriers: Many defendants may not realize the error, leaving them unable to properly contest the ticket.



 

5. Be Clear and Confident

  • Stay on Point: Focus on the defective summons. You do not need to argue about whether you were speeding or whether you can rebut the presumption of guilt. The defective summons is enough to request dismissal.
  • Use Simple Language: Avoid overcomplicating your argument. Explain the issue clearly and rely on the plain language of the statute to support your position.

 

6. Request Dismissal

  • At the end of your argument, formally ask the court to dismiss the ticket due to the defective summons. State that because the summons fails to meet statutory requirements, it is void from the outset and cannot be enforced.

 

Final Thoughts

Challenging an automated speed camera ticket can feel daunting, but understanding your rights and identifying errors in the process can give you a strong defense. The law is on your side when procedural rules are not followed, but it’s important to act decisively and prepare effectively.

That said, this argument is only valid until the language on the summons is corrected. If the issuing authority updates their summons to comply with the statutory requirements, this specific defense may no longer apply. Therefore, if you’re pursuing this argument, it’s critical to check your summons carefully to ensure the defect still exists.

Additionally, be cautious of prosecuting attorneys who might incorrectly cite Part H of Virginia Code § 46.2-882.1. Part H permits the outsourcing of administrative functions by "law enforcement", such as the installation and operation of speed cameras or the handling of fines. However, affidavit review and processing are judicial functions under Part E of the statute. These responsibilities must remain under the oversight of the Clerk of the General District Court, as mandated by law. Law enforcement is not part of the judicial branch of government; they are part of the Executive branch of government. The statutes permissions for outsourcing administrative function only allows executive branch delegations. Be ready to highlight this distinction if the prosecution raises Part H as a defense for their summons process. If needed, cite Article I, Section 5 of the Virginia Constitution. This is the provision that mandates separation of powers (it means one branch of government cannot take the power or authority of another branch of government without express authorization by statute).

By staying informed and vigilant, you can ensure that your rights are respected and that any procedural defects are properly addressed in court.



DO NOT GO BELOW THIS TEXT UNLESS YOU HAVE A STRONG STOMACH FOR LEGALESE



MEMORANDUM

RE: Statutory and Constitutional Defects in Virginia Speed Camera Summonses

I. INTRODUCTION

This memorandum analyzes fundamental statutory and constitutional defects in speed camera summonses issued pursuant to Virginia Code § 46.2-882.1. Specifically, summonses that misdirect affidavit filing by either naming private vendors directly or naming municipalities while providing vendor processing addresses (rather than directing filing to the clerk of court) violate explicit statutory requirements and constitutional principles of separation of powers. For example, some localities direct affidavits to private vendors explicitly, while others (like Harrisonburg) name the City but provide Altumint's Pennsylvania processing center address - both approaches violate statutory requirements for court clerk filing. These violations render such summonses void ab initio and may subject municipalities to disgorgement of improperly collected fines.

II. LEGAL FRAMEWORK

A. Statutory Requirements

Virginia Code § 46.2-882.1 establishes specific procedural requirements for speed camera enforcement:

  1. Section (E) explicitly requires that rebuttal affidavits be "filed by regular mail with the clerk of the general district court."
  2. Section (G) mandates that summonses include "instructions for filing such affidavit, including the address to which the affidavit is to be sent."
  3. Section (H) permits law enforcement agencies to delegate certain administrative functions to private vendors but does not authorize delegation of judicial functions.

B. Constitutional Principles

  1. Article I, Section 5 of the Virginia Constitution establishes separation of powers between branches of government and prohibits one branch from exercising powers properly belonging to another.
  2. The Dillon Rule limits municipal authority to powers explicitly granted by the General Assembly or necessarily implied therefrom. Winchester v. Redmond, 93 Va. 711 (1896).

III. ANALYSIS

A. Statutory Violations

  1. Direct Violation of § 46.2-882.1(E)
    • Summonses directing affidavit filing to private vendors directly contravene the statutory requirement for filing "with the clerk of the general district court."
    • For example, the City of Harrisonburg's summonses direct affidavits to be sent to Altumint's processing center in Pennsylvania rather than the Harrisonburg-Rockingham General District Court clerk.
    • This violation is not a mere technical defect but undermines a core procedural safeguard designed to maintain judicial oversight.
  2. Non-Compliance with § 46.2-882.1(G)
    • Summonses fail to provide legally correct filing instructions as required by statute.
    • The erroneous instructions actively misdirect defendants from proper judicial channels.
    • The statute's requirement for correct filing instructions is mandatory, not directory.
  3. Misapplication of § 46.2-882.1(H)
    • Section (H) specifically permits "law enforcement" - an executive branch function - to delegate certain administrative tasks to private vendors.
    • Law enforcement agencies, as part of the executive branch, cannot delegate judicial branch functions.
    • The clerk of court's affidavit processing duties are judicial branch functions that fall outside the scope of Section (H)'s delegation authority.
    • Affidavit processing involves judicial determinations such as:
      • Assessing sufficiency of affidavits
      • Maintaining official court records
      • Preserving chain of custody for evidence
      • Ensuring proper service and filing

B. Constitutional Violations

  1. Separation of Powers
    • Delegation of judicial functions to private vendors violates Article I, Section 5 of the Virginia Constitution.
    • The executive branch (municipalities and law enforcement) cannot assume or delegate judicial branch responsibilities.
    • Current practices improperly merge executive and judicial functions by allowing executive branch entities to process court filings.
    • No statutory provision explicitly authorizes this transfer of judicial power to the executive branch or private vendors.
  2. Dillon Rule Violation
    • No statutory provision authorizes municipalities to redirect court filings to private vendors.
    • Such delegation exceeds municipal authority under the Dillon Rule.
    • The General Assembly's silence on delegation of judicial functions cannot be interpreted as implicit authorization - indeed, under the Dillon Rule, silence must be interpreted as a prohibition.
    • This is particularly true where, as here, the proposed municipal authority would cross constitutional separation of powers boundaries.
    • Section H's explicit grant of authority to "law enforcement" to delegate administrative functions reinforces that no such authority exists for judicial functions - expressio unius est exclusio alterius.
    • Municipality contracts with private vendors cannot create authority not granted by statute, especially authority that would violate constitutional separation of powers.

C. Legal Consequences

  1. Void Ab Initio
    • Summonses containing incorrect filing instructions are void from inception, not merely voidable.
    • As held in Board of Supervisors v. Conn, 206 Va. 822, 826 (1966), actions exceeding statutory authority are void ab initio.
    • Each summons directing affidavits to private vendors is independently void.
    • No subsequent action can cure this fundamental defect.
  2. Jurisdictional Impact
    • Void summonses fail to establish court jurisdiction.
    • Cases proceeding on defective summonses must be dismissed.
    • Courts cannot acquire jurisdiction through defective process.
    • Jurisdictional defects may be raised at any time.
  3. Potential Remedy: Disgorgement
    • Fines collected through void summonses were obtained without legal authority.
    • Municipalities may be required to disgorge improperly collected funds.
    • The void ab initio doctrine suggests all actions taken under defective summonses are nullities.
    • Class action relief may be appropriate for systemic violations.

IV. CONCLUSIONS AND RECOMMENDATIONS

  1. Immediate Actions
    • Challenge jurisdiction in pending cases based on void summonses
    • Seek dismissal of cases initiated through defective process
    • Preserve records of improper collections for potential disgorgement
    • Document all instances of misdirected affidavits
  2. Systemic Reforms Required
    • Municipalities must revise summonses to direct affidavit filing to court clerks
    • Private vendor contracts require modification to respect separation of powers
    • Clear procedures needed for proper handling of judicial functions
    • Training required for proper implementation
  3. Long-term Considerations
    • Legislative clarification may be needed
    • Municipal procedures require comprehensive review
    • Interagency coordination protocols should be established
    • Constitutional compliance mechanisms must be implemented

V. SUPPORTING AUTHORITY

  1. Statutory Authority
    • Va. Code § 46.2-882.1
    • Va. Const. Art. I, § 5
  2. Case Law
    • Board of Supervisors v. Conn, 206 Va. 822 (1966)
    • Winchester v. Redmond, 93 Va. 711 (1896)
    • Commonwealth v. County Board of Arlington County, 217 Va. 558 (1977)
  3. Constitutional Principles
    • Separation of Powers
    • Dillon Rule
    • Municipal Authority Limitations

This analysis reveals fundamental defects in current speed camera enforcement practices that render summonses void ab initio and require systemic reforms to achieve statutory compliance while respecting constitutional separation of powers.

 

Gig Workers Unite

  The Collective Action Problem of Gig Work: Why Platforms Win and Drivers Lose When Uber, Lyft, and other gig platforms talk about their d...