Accept Government Credit Card Purchases to Fast Track Federal Contracting Sales

Big Numbers

Very often we become buried in statistics and very large numbers when talking about government contracting. It is easy to be seduced by the big numbers: Over 500 billion dollars in contracts are awarded last year to small and large businesses throughout the US, some who may provide the exact services or products that you do. For instance, in the case of small businesses nationwide, according to the Federal Procurement Data System – Next Generation web site small businesses received over 84 billion dollars in contracts just last year.

Medium Numbers

Further dissection shows that last year, Minority-owned firms won $ 41 billion; Small Disadvantaged Businesses won $ 36 billion; 8 (a) certified firms won $ 26 billion, Women-owned firms won $ 20 billion, HUBZone designated firms won $ 13 billion and Service Disabled Veteran-owned firms won $ 9 billion in contracts. Note that these numbers, when added together, total higher than the $ 84 billion won by all small business. This is due to some contracts may satisfy more than one design, depending on company ownership. For instance, a company may be owned by a woman who is a minority and her business is located in a HUBZone. Her winning contracts could then be countered in all three related categories.

Small Numbers

To bring this a little closer to home, if you look at the average single transaction by 8 (a) firms you will find that it is $ 165,000 per sale in 2007 (the most recent year data at this detailed level is available). Many business people find that it is well worth the time to learn how to be successful in this market if it is possible to average $ 165,000 per transaction. While $ 165,000 seems to be very small when compared to $ 500 billion, it is a very realistic amount. Ten of those contracts equal $ 1.65 million, not a bad start in this market.

Getting Started: Accept Government Credit Cards

One of the quickest ways to enter the government marketplace, or to sell more volume, is to sell your products or services via credit card. The federal government's main credit card purchase system is called GSA SmartPay 2. This program provides charge cards to US government agencies and departments, through master contracts that are negotiated with major national banks. There are currently over 350 agencies and organizations participating in the program spending $ 30 billion annually, through 100 million transactions on over three million cards.

Why Accept Government Charge Cards?

Charge cards enable authorized government employees to make purchases on behalf of the government to support their agency or organization's mission, mostly for small (generally under $ 3,000) work-related purchases, travel expenses, and fuel. While an individual transaction limit may be $ 3,000, do not be misled by that figure. Certain purchasers have authority for much higher purchases – up to $ 25,000 and in certain cases, even up to $ 100,000 per purchase. The federal government started using GSA SmartPay …

Psychology Of A Suicide Bomber

It could be you.

Terrorist attacks are not about terrorism. Politicians like to spread the view that terrorist attacks are carried out by ‘evil’ men in order to spread terror. Nothing is further from the truth. Just as “warfare is politics being carried out by other means” – to use Major-General Von Clausewitz’s famous phrase, so is terrorism. Just as the number of soldiers likely to be killed in a particular war action is almost incidental to the general who plans it, so is the number of civilians likely to be killed in a terrorist action. What is very clear about all acts of terrorism is that they are carried out as specific acts designed to achieve specific political results.

Take for example 9/11 in New York City in 2001. This was a general declaration of war following a series of build-ups by both sides. American needs for oil and Saudi Arabian Wahhabism. The kicking out of US oil corporations from further developmental work in Saudi Arabia. The Gulf War against Saddam’s take-over of the Kuwaiti oilfields. The closure on the part of the Saudis of the last US base, as well as the full adoption of Shariah law in the constitution of Saudi Arabia. The build up of a massive US base in Qatar and Special Units around Saudi Arabia. The 9/11 attacks were specifically planned against the Pentagon, the White House probably (which didn’t succeed) and world trade in general, symbolized by the Twin Towers. The large number of people killed was incidental. No one believes for one minute that Mohammad Atta thought the World Trade Center Towers would actually collapse.

Too easily the word ‘mindless’ is used by politicians in conjunction with terrorists and their acts when, in fact, terrorists are far from being ‘mindless’. Suicide bombers are not the mindless, evil individuals they are often portrayed to be. They are, more often than not, well educated and more sensitive than the norm for their age groups, and they see themselves as carrying out political acts rather than terrorism per se. Furthermore, suicide bombers are not necessarily confined to religious protesters.

This is the conclusion reached by Dr. Ariel Merari, Director of the Political Violence Research Unit at Tel Aviv University. It is also the conclusion reached by a host of other political analysts and counter-terrorism experts throughout the world.

Most suicide bombers anywhere appear to be normal. Study after study has shown that suicide terrorists are better off than the average for their community, and better educated just as well. They are also rarely suicidal in the pathological sense. Dr. Merari in particular has traced the background of every suicide bomber in the Middle East since 1983, and has found symptoms of mental illness or drug and alcohol abuse in very few. Furthermore, suicide bombers do not have to be Islamic extremists either, or even radicalized by faith. True, the 9/11 attackers were all Muslims, as are the vast majority of suicide attackers in Iraq, Afghanistan …

HP P3015d Toner Based Laserjet Printer is designed for High Volume Monochrome Printing

HP LaserJet P3015D


For high-volume printing that contains quality from the first page to the last, the HP LaserJet P3015D is an excellent choice. The moderate price range provides busy offices and workgroups with all the speed and functionality they need, and with a variety of options for upgrades. The HP LaserJet P3015D also allows for greater flexibility in print media and double-sided results, making it easier than ever before to create polished, professional results in-house.

Features and Functionality

Speed ​​is one of the hallmarks of the Hewlett Packard LaserJet P3015D, with a first page output in as little as 7.5 seconds and a speed of up to 42 pages per minute for standard monochrome prints. The dpi resolution is offered at a high 1200 x 1200 rate, and the results come out as sharp black and white ink for both text and graphics.

The HP LaserJet P3015D is a powerhouse of a printer in all of its components. It comes standard with a 540Mz processor and 128MB of memory, which can be expanded to up to 640MB in all. The primary paper input tray holds up to 500 sheets of paper, while a second multipurpose tray adds an additional 100 pages of feed. The option to expand to up to 1,600 sheets in all is offered when users purchase two additional 500-page trays.

In addition to automated double-sided printing on letter-size paper, which comes standard on this model, the P3015D can also print on a variety of media formats, including legal paper, label paper, envelopes, transparencies, and card stock. Results are crisp and clear, thanks to the high-yield HP P3015D toner options. Offered in sizes up to 6,000 pages (part number CE255A) and 12,500 pages (part number CE255X), the standard Black P3015D cartridges are easy to install and maintain.

One of the features of the HP P3015D that makes it so ideal for a business or workgroup setting is the enhanced security features. Confidential print jobs can be created with ease, released only by entering individual user or administrative PIN numbers on the 10-key pad.

Connectivity for the machine is offered via the standard USB and Parallel ports, with an additional walk-up option for direct printing from a USB storage device. This walk-up option is accessed on a front panel, which lies next to the LCD control panel and menu.

Why Choose the HP LaserJet P3015D Printer?

Like most printers offered through the HP brand, the P3015D is built with "greener" technology in mind. This model allows you to save energy with a reduced warm-up time and with automated duplexing options. When combined with the fast speeds, large paper input and output options, and fully upgradeable memory features, the result is a printer that will help your business create flawless documents at low operating costs and with a minimum hassle. …

The Obstacles Facing Cyber ​​Law Enforcement

The online community is cruel and ruthless leaving no margin of error for anyone. Once you make a bona fide mistake you get crucified immediately. It is because of this general attitude among many people in social communities, that people jump to unfair and unjustified conclusions. Most participants of these communities are used to this behavior and are not bothered by it too much. Most of these unjustified remarks often cause confusion for the comment maker, which is well deserved, because you should take the consequences of your actions for speaking out loud without thinking. Where am I going with this? What does this have to do with fighting cyber crime?

Let me explain with an example: When a big company like Microsoft cause a security risk for users of Internet Explorer out of negligence, you can be sure that the press (including the online community) will throw some big stones at them. This response is justified because the safety of innocent users is put at risk because of the negligence of a respectful organization. But when Microsoft makes a remark that is misunderstood by some people, without causing any security threats because of this ill formulated remark, why should they be crucified? Microsoft is run by people and people make mistakes. If the community wants to rant and rave about something, then find something that describes some ranting and raving and stop wasting time on things that can be excused. The company has to waste valuable resources to put out the fires caused by this overreaction instead of using those resources to improve the security of their products. No, I am not a Microsoft prophet, I am simply using them as an example.

Investigating spam and determining the origin of a scam letter is not as simple as tracking an IP address. Most people think so, but that is because they never really tried to locate a spammer on their own after being spammed. It is very easy to forge an e-mail header and that makes it almost impossible to locate the real sender of the e-mail. Even if the header is not forged, you never know whether it is a case of identity theft. Computer criminals hack into e-mail accounts, they hijack web sites and use it to their advantage under the identity of an innocent victim. This enables them to operate undetectable by moving from one account to another. Jurisdictional constraints makes it hard for federal organizations of one country to prosecute crimes committed in another crime, not even to speak of locating the criminal.

Abuse departments of hosting companies and service providers are so swamped with so many daily reports of spam and network abuse that it is impossible for them to respond to each and every spam report individually. It obviously creates the impression that they do not really take action against the guilty parties. Of course, some companies appear to have an abuse department, but it is only a front to make people believe …

Self Service Your Lawn Mower and Save Money

Around where I live the small engine retail and service stores charge $75 an hour to work on lawn mowers and ride-on tractors. Most people can do the necessary basic service themselves and keep their mower running smoothly for years.

We all do it, we get to the end of the grass cutting season, shove the mower or tractor to the back of the shed and forget about it till next Spring. Don’t do that this year, it will cost you money and time to get it back in working order.

What you’ll need: Digital camera, SAE30 oil, wire brush, spray can of black enamel paint, heavy duty gloves, container for used oil, replacement spark plug, (just in case), face mask and cleaning rags.

Drain the fuel tank and let the engine burn the last of it from the carburetor and fuel lines. The fuel in the tanks will partially evaporate over winter leaving a residue, particularly fuels blended with ethanol which will leave a gooey mess, that’s a real pain to clean out especially from the fine jets in the carburetor.

Before doing any further work on your machine, disconnect the spark plug lead. Although electrical interlocks should prevent the engine accidentally starting it’s better to be safe than sorry.

Drain out the old engine oil. For most lawn mowers the drain plug is underneath in the mower deck. For others and lawn tractors the drain plug is at the base of, and on the side of the engine. Be sure to collect the oil in a container to dispose of correctly later, don’t let the oil drain onto the ground.  Replace the oil drain plug. Leave the dipstick out to remind you there is no oil in the engine.

Clean dirt and grass off the mower, a small amount of debris in the engine will cause it to seize. Clean dirt from the engine cooling fins, you may have a cover to remove to do this. If this is the first time you are doing your own maintenance, have a digital camera handy to take photos as you work to ensure parts go back correctly. Take as many pictures as you need, use the zoom for close-ups, so as you put things back in place you won’t waste any time figuring things out. Don’t rely on your memory it will let you down!

Clean the deck, for lawn mowers tip the machine on its side, carburetor side up. Use a block of wood to wedge the blade so that it cannot move. Put on a pair of heavy duty garden gloves before removing the blade. Clean debris from the underside of the deck, wire brush and spray with black enamel paint from an auto parts dealer, always use a mask for this job. Painting the underside of the deck will prolong its life. Have a professional sharpen and balance the blade before replacing it. Then turn your mower upright.

Take out the spark plug, wire brush it clean …

DOJ Retaining Its Position on GPS Tracking

In a surprise move on Thursday, the federal government notified an appeals court that it reserves the right to secretly place GPS tracking devices on privately owned vehicles without first obtaining a warrant. Many wonder what the Department of Justice is thinking since the long-anticipated ruling in January by the Supreme Court on just this issue. In January, the Supreme Court Justices rule unanimously in the United States vs. Jones case that the practice of law enforcement placing a GPS tracking device on a vehicle without first obtaining a warrant was unconstitutional and a violation of the Fourth Amendment. In the Fourth Amendment it protects the "right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures."

According to a Department of Justice spokesperson, "A warrant is not needed for a GPS search, as the Supreme Court did not resolve that question." However, the Department expressed restraint when using these practices. The government made this argument to the 9th Circuit of Appeals, claiming that the Supreme Court intentionally left their language vague as a loophole in the law.

The media has been covering the argument of warrantless GPS tracking as well as other privacy related issues for quite some time. If the reader of this article believes that the government's argument is based solely on physical GPS tracking devices used by law enforcement agencies, you would be wrong as the significance goes much deeper.

Tracking The Average Citizen

Whether you are aware of it or not, the ability to track yourabouts is already in place. Even without GPS tracking technology, your cell phone can be tracked by cellular triangulation where cell towers can roughly pinpoint your location. However, most modern electronics, especially smart phones are equipped with a GPS receiver due to low cost modules and popular applications that help Americans locate services, navigate, etc. Cellular triangulation is inaccurate and unreliable whereas GPS pinpoints your location within a few feet.

Manufacturers of GPS tracking devices design portable and hard-wired devices as a tool that improves business productivity, provides peace of mind for parents of teen drivers and location of elderly parents, as well as the tools for law enforcement investigation. The question of the US government's position should not be whether or not they are protecting the law enforcement agencies use of devices for investigative purposes. The real question lies whether they are setting the stage to separate the existing Supreme Court ruling as specific to law enforcement investigations. Therefore, monitoring mobile devices is not part of the existing law. The government will always have the ability to state that they are monitoring the device, not the individual. This is a slippery slope that most likely leads to the Supreme Court in the future. …

What Are The Causes Of Deflation?

The causes of deflation are linked directly to inflammation and the only cure for inflammation is a deflation. The following is a list of causes of deflation and manifestations of deflation leading up to the GREATER DEPRESSION that started in 2000 and may not end until 2020 (end of the mania).

When seeking the causes of deflation we need to remember that the real cause was credit inflation. Many items on this list are manifestations of the credit bubble popping. What is remarkable is the depth and number of related items on the list.

1. Growth of government at all levels federal, state, county and city. Money sucked away from the market economy to fund inefficient and bloated programs reaches one third of the economy and then causes it to get top heavy and crash.

2. Military waste. Wars and much of the money spent by all the different divisions of our defense departments is beloved down a whole in the ground-never to be seen again. Oil, food, materials, manpower, blood and lives.

3. Governments support of (favorite) industries that would not make it in a free economy. Real estate bubble – unwinding lending practices.

4. Real estate deflation leading to reduced wealth and reduced taxes to government due to lower revenue from both capital gains tax and real estate property taxes. 90% drop by 2018

5. Stock market losses. People feel poorer so the do not spend. Pension and retirement accounts lose money on stock and bond investments hurting ability to pay those retiring. 90% drop.

6. High petroleum prices sucking money out of peoples pockets that could have gone to purchasing goods and services in the market. We are all on an oil food chain using dead dinosaur deposits for our energy instead of whale blubber like we we used to. Money sent to foreign entities that in some cases is used to pay for attacks on us. Inefficient gas guzzling autos, appliances, lighting and phantom loads on TVs, computers, microwaves etc. Heat rises right? Why is the working parts of refrigerators underneath the area meant to be cooled. Heat rises up through the whole refrigerator or freezer box. A waste of trillions of dollars in oil all these years.

7. Job losses – high unemployment means less money is around to buy goods and services. Causes businesses to layoff more workers in a vicious cycle snowball effect.

8. Collectibles, antiques, art and possessions in general losing value. Lower prices when people try to sell. They feel less wealthy and can not buy as many necessities. There will be many bargains in all kinds of property and possessions at the bottom as people sell assets to stay alive

9. Credit tightens up. Bank and lenders fears lead to strict standards. Low interest rates are a sign money is on sale. It is a sign of weak demand and deflation. 10.The internet. Lower cost of doing business online means it is easier to start a business. Business and jobs …

Criminal Justice Jobs

Criminal justice is a vast field and covers various topics such as criminal detection, investigation, prosecution, adjudication, detention, correctional supervision and rehabilitation. For students pursuing criminal justice, there may be a myriad of topics for them to focus on like law enforcement, forensics, crime scene investigation, prosecution, private security and many others. When pursuing a career in criminal justice, there are many degrees, diplomas and certificates to consider. Anything from an associate to bachelor to even a doctorate degree is available. Some of the jobs that are related to criminal justice are prosecutor, defender, police investigator, judge, prison guard, administrator, security guard, probation officer and more. Students specializing in criminology, psychology, sociology, law, political science and social work have an edge over the others and find it easier to get employed.

Crime Scene Investigation

Careers in crime scene investigation are difficult and demanding careers. There are various, degree, diploma and certificate programs that help prepare students for these types of careers. These programs provide a concrete foundation in the areas of American criminal justice and law enforcement. Crime scene investigation teaches students about crime scene safety and how to look for, gather, preserve and present evidence in crime scenes. Advanced technology plays a big role in all areas of crime investigation and if you are a student pursuing such a program, you will be trained in the most up-to-date technological advancements. For entry-level jobs, students will receive a certificate in crime scene investigation, whereas a bachelor degree in crime scene investigation or criminal justice will prepare students for the next level of jobs in the field of crime detection. Students are also offered internships, which provide them with the essential practical knowledge.


For those interested in the field of criminal investigation, forensics might be an interesting career option to pursue. Students of forensics deal with digital technology and their uses in investigating crime scenes. The main subjects of focus here chemistry, biology, biochemistry and genetics. These subjects form the essence of forensics. Forensics also has an accounting program that teaches students to prevent, investigate and finally detect any online fraud. Cyber crime trains students in the area of criminology, data recovery, intrusion detection, encryption and network security. Toxicology, serology and the study of forensic DNA are also interesting branches of forensics.


For those who are interested in working with criminal offenders, there are various degrees and certificate programs. These programs help provide students with the necessary skills and abilities that it takes to excel in the field. The duties involved in this profession are diverse and can be anything from dealing with violent convicts to working with juvenile delinquents. Students also learn all about working in courts. Rehabilitation of criminals forms a major part of the lessons. Students are also educated in the fields of probation, parole and in monitoring the activities of criminal offenders. How prisons and jails function form a major part of the syllabus.

Court Reporting

For those interested in specializing in court reporting, be …

Is America a Democracy?

A nubile young woman entered a bar wearing very suggestive clothing, leaving little to the imagination. More than one young man offered her money for her services. She was quite offended and protected her due to the bartender. He explained to her that if she were wearing a policeman's uniform, it would be logical to assume that she was a cop, even though she was not. However, that night she was wearing the "uniform" of a hooker, and should not take offense when mistaken for one.

Benjamin Franklin said, "Actions speak louder than words, but not nearly as often." My own variation on that phrase is, "If you want to know what's important to people, do not listen to what they say, only watch what they do."

The united States of America was organized as a Constitutional Republic. But the American Federal Government is not now, and has not been for at least 150 years, a constitutional republic. And, contrary to what I hear most politicians, news reporters and school teachers say, it's not a true democracy, either. To know what political form the government of the early 21st century has taken, we must look at its "uniform" … what it's actually doing in real time.

And what of that American Constitution? I have long wondered how all three branches of the Federal Government continue to operate without consideration of the strictures of the Constitution. Then I read Lysander Spooner's booklet entitled "No Treason," written in the late 1800s, making the irrefutable argument that the Constitution never had ANY power, and is neither law nor legal contract between any parties.

It all made sense. The elected class knew what I had just just discovered. They knew that the Constitution was a dead letter … a meaningless document with no legally binding power. It served, and still serves, as an icon, but an icon that has been swept clean of all original meaning.

So what is it?

It's not a Constitutional Republic. That form of government is based upon a separation of powers between the three branches of government, and was abandoned no later than 1865. In a republic, citizens elect representatives who receive delegated powers from those very citizens. Today's elected officeholder thinks himself a leader, not an employee, and ignores the citizens' desires … until re-election.

The federal government is not a democracy, because it has not yet degenerated into mob rule.

It's not a true monarchy with only a King and no Parliament.

It's not a dictatorship, but it's close. Dictators can be elected into an office and then take over power from the rest of the government. Look at Hugo Chavez inVenezuela.

Is it Fascism? The American Heritage Dictionary defines fascism as "a system of government marked by centralization of authority under a dictator, stringent socioeconomic controls, suppression of the opposition through terrorism and censorship, and typically a policy of belligerent nationalism and racism." I do not think that the American government has an overt policy of …

FBI Online Cyber ​​Crime Victims Form

The FBI has a convenient online Cyber ​​Crime form for victims and / or the 3rd party to the complaint that is an easy-to-use reporting mechanism. A partnership has been formed with the FBI's Internet Crime Complaint Center (IC3 formerly known as the Internet Fraud Complaint Center IFCC) and the National White Collar Crime Center (NW3C) for the combined objective of identifying and bringing to justice those responsible for online internet fraud .

The FBI-IC3's stated Mission concerning Cyber ​​Crime is "to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime." The IC3 provides the victims of cyber crime with an online reporting form that will be used to alert authorities of suspected criminal or civil violations. IC3 also provides their law enforcement partners and regulatory agencies at the federal, state, local and international level the internet related crime with information collected through complaint forms to this centralized referral system.

In addition to partnering with law enforcement and regulatory agencies, it will remain a priority objective of the IC3 to establish effective alliances with industry. These alliances will enable the IC3 to leakage both the intelligence and subject matter required in identifying and crafting an aggressive, proactive approach to combating cyber crime.

IC3 accepts online Internet crime complaints from either the person who believes that they were defrauded or from a third party to the complainant can best be processed if accurate and complete information companies the complaint. Provide the following listed items and any additional information when filing a complaint at website:

· Your name

· Your mailing address

· Your telephone number

· The name, address, telephone number, and Web address, if available, of the individual or organization you believe defrauded you.

· Specific details on how, why, and when you believe you were defrauded. …