Couple Hugging in the Lafayette Statue Park by James Pate Williams, Jr., BA, BS, MSwE, PhD

I just came in from one of my 15 to 20-minute walks. While I was circling the downtown fountain square park, I observed a couple tightly hugging each other like it was until death do us part. In a previous blog entry, I have stated I do not like Public Displays of Affection (PDAs). I used my better discretion and did not yell “save it for home or the bedroom” at the couple since I might have gotten a beating or been shot. But come on people PDAs are sure fire signs generally that there is something fundamentally wrong in a couple’s relationship. So much for my pontificating.

I just remembered the name of a song from “Outside Inside” by the West Coast acid rock band Blue Cheer. Coincidentally, Blue Cheer like Strawberry Fields were slang for lysergic acid diethylamide (LSD-25). We had windowpane, orange barrel, and pure Sandoz LSD-25 back in my experience early in the 1970s. Back to a song off the previously mentioned album. It is “The Hunter”. Sometimes I feel like the character in the song. It is a cover of the Albert King tune off his “Born Under a Bad Sign” album. Here is the website of the lyrics:

https://www.azlyrics.com/lyrics/albertking/thehunter.html

I would like for a beautiful to me female to reverse roles and play the hunter of me!

United States Federal Government Sanctioned Assassin Versus a United States Spy by James Pate Williams, Jr., BA, BS, MSwE, PhD

The United States CIA is now known to have sponsored several plans to assassinate Fidel Castor of Cuba. The agency would not send in a CIA operator to do the dirty work but would recruit a nefarious criminal probably a member of the Mafia which is also known as the Cosa Nostra. The hired hand would be recruited clandestinely so the CIA would have plausible deniability. The Mafia was angry with Castro for kicking them out of the country and the subsequent loss of their gambling and other rackets empire in Cuba. President John Fitzgerald Kennedy was aware of these attempts. Supposedly Lee Harvey Oswald assassinated President Kennedy for his attempts to take out Castro.

Assassinating the head of state of some other country is very dirty business and will probably cause a retaliatory attempt to kill the sponsor. Before leaving office, President Gerald Rudolf Ford, Jr. recruited George Herbert Walker Bush (Bush 41) and had him confirmed as Director of the CIA. President Ford then ordered DCI Bush to clean up the agency and stop all pending and future assassination plans.

https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol49no4/Castro_Obsession_10.htm

https://en.wikipedia.org/wiki/Executive_Order_11905

https://www.cia.gov/news-information/featured-story-archive/2016-featured-story-archive/bush-as-director-of-central-intelligence.html

A United States spy is a human intelligence (HUMINT) operative of the Directorate of Operations of the CIA now known as the Clandestine Service. A spy must maintain a low profile and is an individual who uses her/his training and wits instead of a lot of sophisticated equipment.  The spy probably does not carry weapons nor use her/his cellphone as a primary means of communication with her/his handler (usually a station chief). The time-honored way of passing messages is the dead drop. The spy goes about her/his business with little or no fanfare.

A United States spy must rely on the CIA to swap a foreign operator for our her/him if he or she has the great misfortune of being arrested as a spy. It is a good tradition to always recover your valuable spy by nearly any means. See the great movie “Bridge of Spies”.

https://www.cia.gov/about-cia/cia-museum/experience-the-collection/text-version/collection-by-subject/directorate-of-science-and-technology.html

https://www.imdb.com/title/tt3682448/plotsummary

My Rejections – Employment and Personal by James Pate Williams, Jr., BA, BS, MSwE, PhD

I just received another rejection on Zoosk. That made me think about the myriad rejections I have hand to face head on in my life. Here are some of my employment rejections:

  1. Auburn University – Multiple Rejections
  2. Columbus State University – Multiple Rejections
  3. Georgia Tech – Multiple Rejections
  4. LaGrange College – Multiple Rejections
  5. West Georgia Technical College – Multiple Rejections, but earned one job
  6. West Georgia University – Multiple Rejections
  7. Central Intelligence Agency – Multiple Rejections
  8. Federal Bureau of Investigation – One Rejection
  9. NASA – Multiple Rejections
  10. National Geological Survey – One Rejection
  11. National Institutes of Health – One Rejection
  12. National Patent and Trademark Office – Multiple Rejections
  13. National Security Agency – Three Live Interviews, Multiple Rejections
  14. Oakridge National Laboratory – One Rejection
  15. Civilian Air Force – Multiple Rejections
  16. Civilian Army – Multiple Rejections
  17. Civilian Navy – Multiple Rejections
  18. Etc.

My personal rejections are too numerous to fully enumerate but here goes:

  1. Failed to skip the second grade – One Rejection
  2. Female drug addicts – Multiple Rejections
  3. High school girlfriend – One Rejection
  4. LaGrange College Coeds – Multiple Rejections
  5. Match.com – Multiple Rejections
  6. Zoosk.com – Multiple Rejections

My Long and Unsuccessful Search for a Suitable Potential Mate by James Pate Williams, Jr., BA, BS, MSwE, PhD

My dating experience has been extremely limited. I was very shy in junior high school and high school and a teenage alcohol and later drug user or abuser. Most sane people meet their matches at church, school, or work. I would rule out work due to unethical fraternization.

I remember my next oldest sister set me up with an older high school cheerleader with a date to a dance. I was in the eighth grade at the tender age of 13. I am not a dancer and I like to express music by playing a musical instrument like an electric guitar (started back playing in 2001 after a hiatus about 20 years). The date did not turn out so well. My dad had to drive us around as a chaperon. Anyway, I had my sights on a female living in my neighborhood, but I did not make any direct overtures towards her.

Jump forward to my first college years 1971 to 1972. I had girlfriends but most were involved in short stands involving sex (Sex, Drugs, and Rock and Roll was my mantra). While I should have been cultivating long term relationships, I was satisfied with sex, mutual drug usage, and conversations. Those affairs were ephemeral.

I had infrequent sexual encounters in the period 1973 to 1983. These amounted to one night or a couple of nights stands. I was still doing drugs and I had a lot of emotional baggage that I would sling around. I pretty much gave up sex after 1980s due to the fact I feared I had Hepatitis-C. It is an exceptionally low probability event to infect a sexual partner with Hep-C since it requires blood to blood contact. Hover, I did not want to take any chances and ruin someone else’s health and life. I took Harvoni in late 2014 and early 2015 and I was clear of the virus via a quantitative assay of my blood. I had Genotype I Hep-C virus which is the easiest to cure by modern antiviral medicine.

I am done with my disclaimer.

I have already found rough approximations to “perfect” matches for me. One is neurological psychiatrist and the other a clinical mental health registered nurse. I need someone who can understand my mental illness and has great empathy etc. for me. Unfortunately, I cannot contact either of the preceding two females due to the chains of idiotic ethics. If one or both of my potential dates is married, then all bets are off due to oath breaking, and I cannot abide breaking moral edicts again.

I am on Zoosk, but all the attractive to me females are above my pay grade. Zoosk by the way is an up and coming dating website.

Caste System in the United States by James Pate Williams, Jr., BA, BS, MSwE, PhD

It well known that in India the Hindi tradition of castes and arranged marriages still exists. We have a caste system in the United States that leads to discrimination. In the United States the socioeconomic divide creates several classes. I will elucidate the United States caste system as I perceive it:

  1. Former and current poor criminals
  2. The unemployable poor
  3. The poor with almost starving children
  4. The so-called middle class of labor pool
  5. The millionaires
  6. The billionaires

Number 4 class was very prevalent after World War II. I fit into the number 2 class. We have said nothing about education because it does not seem to be that important despite what politicians and the general public may state.

Two of My Regrets by James Pate Williams, Jr., BA, BS, MSwE, and PhD

“I only regret that I have but one life to lose for my country.” – Nathan Hale one of the United States first spies.

I regret having been sexually abused, a teenage abuser of alcohol and drugs, and being an unbelievably bad student especially in high school. Theoretically, had I done well in in school I could have been accepted at Georgia Tech and done my undergraduate work there, probably majoring in physics. I would have then attempted to join the Central Intelligence Agency provided that my grades at the Georgia Tech were impressive enough. Had I earned a job at the CIA in 1975, I could have probably advanced through the Directorate of Operations to at least a senior station chief or an executive in that part of the CIA.

Another regret is that I should have started going to the Jobs Fair at Auburn University every year from 2000 to 2005. That way I could have become a somewhat known individual to the CIA and National Security Agency recruiters. After graduate school and I received my terminal degree (PhD), I should have gotten myself together and every six months put in new online applications to both the CIA and NSA. I was 53 when I finally received my Doctor of Philosophy in Computer Science so really ageism started operating on my application process.

Chapter 4 – Professor Kenneth Cooper, BS, MCSE, MS, PhD Attempt to Embed me in the Data General Corporation 1983 and 1984

In the late summer of 1983, I developed a Trojan Horse program for the Data General Eclipse line of minicomputers. The program was written in Data General BASIC which was a variant of Dayton BASIC (Beginner’s All-Purpose Symbolic Instruction Code). The user interface of the program exactly mimicked the logon screen of the DG Eclipse. The program would capture username and password login combinations and write them to a disk file. Of course, the program was running in my account, so I could not allow the unsuspecting user to logon. I would just simulate failed login attempts. Normally, when you pressed the “Esc” (escape) key while in a Dayton BASIC program, the program would you stop executing and return the user to his login user account. Well Data General’s BASIC has a statement “On Esc Go To #####” where ##### was a line number. I used this statement to keep the user from aborting my program and discovering the logon ruse. I captured a few unsuspecting users’ logon credentials during the test phase of the program. Then I informed Professor Kenneth Cooper of the existence of my Trojan Horse program. We used this program to successfully capture the logon credentials of the system manager Steve Dudley.

Dr. Cooper was so impressed with my Trojan Horse and other security flaws that I discovered in the Data General Advanced Operating System (AOS) Program Manager (PG) that he arranged for me to have an interview with the company in its Atlanta office in the fall of 1983. I was still living at my birth-family’s house on 601 Hill Street, LaGrange, GA with my mother and father. I was not driving at the time and Atlanta is about 70 miles northeast of LaGrange. Dr. Cooper volunteered to take me to the interview. The day of the interview we stopped at an International House of Pancakes Restaurant in Atlanta. I had never eaten at an IHOP before that day. I was interviewed by a male individual whose name I have long forgotten. I remember the interviewer had attended Georgia Tech as a math major in graduate school and he had not finished like I failed to finish in chemistry as a graduate student in the period 1980-1983. He showed me a copy of the Data General macro-assembly language source code for the DG Program Manager. He asked if I would like to have the copy. I immediately and emphatically stated “Yes”. Well right about that point he was conveniently called out of his office leaving me alone with the source code and my briefcase.  I proceeded to load the two-inch high printout into my briefcase. In retrospect, this could have been a loyalty test to see if I would take Data General source code out of the facility. I think the interviewer left his office, so he would have plausible deniability about the whereabouts of the source code. Anyway, I was never a truly serious candidate for the job due to my home living conditions and the fact that I was not driving at the time. Also, Data General was trying extremely hard to transition from a minicomputer manufacturing company to a personal computer builder and seller. I saw the writing on the wall that the company could never compete efficiently in that marketplace. The company struggled on to 1999 but was never successful with its portable computer that was introduced in 1984.

In late 1983 and early 1984 I started thinking about ways to become a superuser on the Data General Eclipse system without using a Trojan Horse or a direct attack by patching the operating system’s Program Manager. I remembered that in the corner of the physics laboratory at LaGrange College was a little bricked off enclosure that housed alpha, beta, and gamma radioactive emitters. Well the only thing I needed for a normal user to transition to a superuser was to change one bit in the memory image of the profile of the user. I got to thinking that if I could cause a limited cascade of multiple bit errors in the memory word containing the superuser flag bit that the ECC (Error Checking and Correction) hardware of the minicomputer could not correct then I might have a chance changing from a normal user state to a superuser state. I performed a thought experiment where I would expose the semiconductor memory chips to some form of radiation to induce the desired transition. I never carried out a real experiment because the minicomputer was a $250,000 system and I could perhaps cause serious damage to the machine. In retrospect, I think a gamma ray emitter with a collimating lens would have been best hope of causing the desired cascade a multiple bit memory error.

The Meanings of an Abbreviation (PDA) to Me by James Pate Williams, Jr., BA, BS, MSwE, PhD

The initials PDA have at least two definitions in my mind: Personal Digital Assistant and Public Displays of Affection. I will define Personal Digital Assistant as a computerized palmtop computer. One of the first Personal Digital Assistants was the Palm Pilot running the venerable Palm Operating System. I took a course at Auburn University in the Spring of 2002 taught by my research advisor, a genius, Professor Richard Chapman entitled Comp 7500 Mobile Computing. We learned how to program Palm OS devices and some primitive cellphones. I loved writing Palm OS C computer language code for my Palm Pilot. I did some networking programs on the Palm Pilot using a specially designed analog modem. I made an A in the class. I still have my Palm OS books. The Palm Pilot used a stylus and had special easy to draw symbols for letters. This form of handwriting and handwriting recognition was called Palm Graffiti. My research advisor and another of his PhD students patented a new handwriting set of characters for Palm OS devices. I wrote Java code to emulate the handwriting system using the mouse on desktop workstations for my research colleague.

I do not like Public Displays of Affection. I believe such gestures mean that there is some insecurity of the partners in their relationship. I especially find kissing and cuddling offensive in public, please save such activity for your bedroom.

MSB by James Pate Williams, Jr., BA, BS, MSwE, PhD

In computer architecture, a branch of computer science, the initials MSB stand for most significant byte of a multiple byte computer word. Suppose you have a 16-bit word the MSB can be either the leftmost byte of the rightmost byte. The order of the bytes is significant and determine whether the computer word belongs to a big endian or little-endian processor. Incidentally, a byte is generally eight bits nowadays. A byte can represent either 0 to 255 or -128 to 127 depending on whether it is unsigned or signed, respectively. So much of this simple lesson.

More importantly, MSB are the initials of someone I miss terribly and would like to get to know better. She is like Dr. Yvonne Marie Greene, MD, a former psychiatrist of mine with whom I experienced transference for the first time in the period 2005 to 2007. Both Yvonne and MSB ran away from me when things were just getting interesting. If “You can’t be with the one you love, love the one you’re with” to quote Stephen Stills. I guess I always have Zoosk since I missed finding a mate in high school and college, etc.

No Second Amendment Right by James Pate Williams, Jr., BA, BS, MSwE, PhD

According to either federal or state law a person who is incarcerated in a mental facility cannot apply for a concealed weapon permit for five years after discharge! We should not allow the federal or state authorities to abrogate the law of the land, the United States Constitution. This is an arbitrary and capricious abridgement of my inherent right as a United States citizen to “bear arms”.