Worst Case Scenario for the West and Especially the United States by James Pate Williams, Jr., BA, BS, MSwE, PhD

It is doubtful that the Covid-19 plague was intentionally initiated as a weapon of mass destruction aimed at the Western powers. The novel SARS-Corona-19 virus is a positive sense single strand messenger RNA virus and as such it is just too unpredictable and unstable virus that is prone to mutation to be used as an effective and intentional biological weapon. A standard hypothesis is that a glory seeking virologist went into a dawn of time sort of cave seeking viruses which might become the carriers of the next great pandemic and mishandled some mammal vectors. That virologist was probably working with the Wuhan Institute of Virology in China.

Now here is where the accidental unleashing of the Covid-19 plague was fortuitous for a number of states that are very skilled in spreading destructive propaganda and cyber warfare. There are many targets of opportunity in the United states in particular our essential military personnel and politicians. Remember a few nefarious states would love to be able to spread chaos and havoc before our 2020 general elections.

Our country is in a vulnerable state of affairs. A concerted cyber terrorist attack on our delicate and unpredictable financial institutions and banking sector could further devastate the United States. Also security is probably not as efficient in our infrastructure as it was before our current health debacle. Hopefully, the key components of our civil engineering work force and their works (airports, hydroelectric dams, train and road construction, etc.) are being adequately monitored and hardened against computer initiated attacks.

X(x) and Y(y) Contour Plots for a Multidimensional Set of Boundary Value Problems in a Square by James Pate Williams, Jr., BA, BS, MSwE, PhD

The equations are as follows:

-X(x)-k * k * X(x) = -x ^ p, X(0) = 0, X(1) = 1, p =2

-Y(x)-l * l * Y(x) = -x ^ p, Y(0) = 0, Y(1) = 1, p = 2

Solution of a Second Order Ordinary Differential Equation Eigenvalue Boundary Value Problem by James Pate Williams, Jr., BA, BS, MSwE, PhD

The equation is of the following form:

-X(x)+r(x)X(x) = f(x)

r(x) = -k * k, f(x) = -x * x, X(0) = 0, X(1) = 1

Changing the equation some as follows:

-X(x)+r(x)X(x) = f(x)

r(x) = k * k, f(x) = x * x, X(0) = 0, X(1) = 1

yields the following graphs:

Covid-19 Radial Basis Function Network by James Pate Williams, Jr., BA, BS, MSwE, PhD

I developed a radial basis function neural network for calculating the mean number of deaths caused by the covid-19 disease. You can read all about radial basis function neural network in the books: “Pattern Recognition and Neural Networks” by B. D. Ripley and “Computational Intelligence” by Andries P. Englebrecht. However, for most people, taking a graduate course in artificial intelligence then a higher level machine learning course is the optimal method for learning about neural networks. I don’t recommend online courses.

Medical and/or Psychiatric Records and Their Intellectual Property Rights

The ideal intellectual property rights model of medical and/or psychiatric rights should be like a online magazine subscription. Each time these records are obtained the patient should be charged a concomitant fee for later online access by the patient of the computerized records. Nowadays there are two competing computer applications for medical and/or psychiatric records:

  1. Epic Software
  2. CareLogic Software

Medical and/or psychiatric records consist of anatomical and physiological observable data:

  1. Weight
  2. Height
  3. Temperature
  4. Oxygen level
  5. blood pressure
  6. Other more exotic data such as an EEG or EKG or ultrasound or other imaging data (CT, MRI, etc.)

The medical provider also makes subjective “observations” which can be tainted or incorrect for a myriad of reasons. These records are the ones that the medical service provider organization fears the most of revealing to the patient.

It should be a relatively easy operation using either software package to give the patient full access to all the “observations” made during a session online and at nominal cost.

Disassembly and Identification of Command and Control Structure and Key Individuals of Organizations

This short blurb is about the dissection of the hierarchy of a nonprofit or a for- profit organization using Internet open sources and information. Such analysis is useful for counterintelligence or intelligence investigations of organizations and/or their authoritative actors. Such fact gathering and profiling is very useful and necessary for vetting these entities and players or for just info foraying missions, also known as spying.

Many for profit corporations are very open for legal and tax reasons about their organizational hierarchical chart or charts. Using these published top-down charts, the chain of command and control is usually clearly delineated by the positions in the diagrams. Clearing the organization is typically a top-down process guided by need-to-know level-by-level constraints.

The process of surreptitiously vetting or sub rosa internal data garnering is much more difficult for organizations that can by law be less open about their power structure. In this case, open Internet sources and web apps can be extremely useful in elucidating the structure of a secretive organization. Suppose for instance that the organization only resides in the state of Georgia in the United States then you can find information from the licenses of the employees which are granted by the Georgia Secretary of State Department:

http://verify.sos.ga.gov/verification/

A number of licenses can be found using the preceding search engine. If you are interested in a medical doctor then use the search engine:

https://medicalboard.georgia.gov/look-licensee

For an attorney, you must use the following search engine:

https://www.gabar.org/membership/membersearch.cfm

The search techniques vary from state-to-state within the United States.

An especially useful tool for medical organizations is the NPI Profile:

https://npiprofile.com/npi-lookup

An algorithm for determining the employees and their roles of a small state-wide distributed mental health organization would consist of:

  1. Identifying all the typical roles of the organization
  2. Identifying the addresses of the distributed organization
  3. For each address elucidate the case managers, counselors, nurses, physicians, etc.

Further information can be obtained by perusing online articles and data published by the organization.

The best way of getting real-time and definitive organizational intelligence data is by inserting a vetted operative also known as a spy into the organization. If this optimal technique turns out to be unavailable then another option is to bribe or blackmail a current employee and convert that individual into a double agent. The key trick in enticing an employee to turn into a double agent is to somehow placing that person in an ethical, legally, and/or morally compromising situation.

Music Soothes the Savage Beast by James Pate Williams, Jr., BA, BS, MSwE, PhD

I was in a couple of very dark milieus from May 8, 2019 to June 12, 2019 and June 12, 2019 to October 17, 2019 and October 17, 2019 to November 26, 2019. The first and the third were incarcerations were in the Troup County Jail and the second period was spent in Pathways Center Second Season. In my first long term in jail cells I had nothing to do except to generate percussion music using the jail footwear which I could not bear to wear. The famous neoclassic arranger, composer, and conductor of music the German Karlheinz Stockhausen taught each musician should be able to design and play his own instruments made from items in the musician’s environment. For many of the first 35 days in jail I pounded out my various beats on the shoes in isolation (primarily Booking 704 suicide prevention cell).

When I arrived at Pathways Center Second Season on June 12, 2019 I again used the provided shoes as percussion instruments and also the glass and doors provided decent drum kits.

Finally, one of the social technicians, a trained psychologist, whose name I distinctly remember but I will choose not to disclose that individual’s name, bought a child’s inexpensive synthesizer and drum kit toy. This caring technician had purchased the instrument for approximately $4.00 at a Good Will Store and the technician had refurbished the electronic device using the technician’s funds of a couple more dollars. This technician allowed me to use the instrument for a couple of days. The toy gave me a lot of joy and satisfaction. Unfortunately, out of boredom and the constraints of confinement again in for the most part isolation, I acted out more and more in my attempts to garner as much attention as possible.