Worst Case Scenario for the West and Especially the United States by James Pate Williams, Jr., BA, BS, MSwE, PhD

It is doubtful that the Covid-19 plague was intentionally initiated as a weapon of mass destruction aimed at the Western powers. The novel SARS-Corona-19 virus is a positive sense single strand messenger RNA virus and as such it is just too unpredictable and unstable virus that is prone to mutation to be used as an effective and intentional biological weapon. A standard hypothesis is that a glory seeking virologist went into a dawn of time sort of cave seeking viruses which might become the carriers of the next great pandemic and mishandled some mammal vectors. That virologist was probably working with the Wuhan Institute of Virology in China.

Now here is where the accidental unleashing of the Covid-19 plague was fortuitous for a number of states that are very skilled in spreading destructive propaganda and cyber warfare. There are many targets of opportunity in the United states in particular our essential military personnel and politicians. Remember a few nefarious states would love to be able to spread chaos and havoc before our 2020 general elections.

Our country is in a vulnerable state of affairs. A concerted cyber terrorist attack on our delicate and unpredictable financial institutions and banking sector could further devastate the United States. Also security is probably not as efficient in our infrastructure as it was before our current health debacle. Hopefully, the key components of our civil engineering work force and their works (airports, hydroelectric dams, train and road construction, etc.) are being adequately monitored and hardened against computer initiated attacks.

X(x) and Y(y) Contour Plots for a Multidimensional Set of Boundary Value Problems in a Square by James Pate Williams, Jr., BA, BS, MSwE, PhD

The equations are as follows:

-X(x)-k * k * X(x) = -x ^ p, X(0) = 0, X(1) = 1, p =2

-Y(x)-l * l * Y(x) = -x ^ p, Y(0) = 0, Y(1) = 1, p = 2

Solution of a Second Order Ordinary Differential Equation Eigenvalue Boundary Value Problem by James Pate Williams, Jr., BA, BS, MSwE, PhD

The equation is of the following form:

-X(x)+r(x)X(x) = f(x)

r(x) = -k * k, f(x) = -x * x, X(0) = 0, X(1) = 1

Changing the equation some as follows:

-X(x)+r(x)X(x) = f(x)

r(x) = k * k, f(x) = x * x, X(0) = 0, X(1) = 1

yields the following graphs:

Covid-19 Radial Basis Function Network by James Pate Williams, Jr., BA, BS, MSwE, PhD

I developed a radial basis function neural network for calculating the mean number of deaths caused by the covid-19 disease. You can read all about radial basis function neural network in the books: “Pattern Recognition and Neural Networks” by B. D. Ripley and “Computational Intelligence” by Andries P. Englebrecht. However, for most people, taking a graduate course in artificial intelligence then a higher level machine learning course is the optimal method for learning about neural networks. I don’t recommend online courses.

Medical and/or Psychiatric Records and Their Intellectual Property Rights

The ideal intellectual property rights model of medical and/or psychiatric rights should be like a online magazine subscription. Each time these records are obtained the patient should be charged a concomitant fee for later online access by the patient of the computerized records. Nowadays there are two competing computer applications for medical and/or psychiatric records:

  1. Epic Software
  2. CareLogic Software

Medical and/or psychiatric records consist of anatomical and physiological observable data:

  1. Weight
  2. Height
  3. Temperature
  4. Oxygen level
  5. blood pressure
  6. Other more exotic data such as an EEG or EKG or ultrasound or other imaging data (CT, MRI, etc.)

The medical provider also makes subjective “observations” which can be tainted or incorrect for a myriad of reasons. These records are the ones that the medical service provider organization fears the most of revealing to the patient.

It should be a relatively easy operation using either software package to give the patient full access to all the “observations” made during a session online and at nominal cost.

Disassembly and Identification of Command and Control Structure and Key Individuals of Organizations

This short blurb is about the dissection of the hierarchy of a nonprofit or a for- profit organization using Internet open sources and information. Such analysis is useful for counterintelligence or intelligence investigations of organizations and/or their authoritative actors. Such fact gathering and profiling is very useful and necessary for vetting these entities and players or for just info foraying missions, also known as spying.

Many for profit corporations are very open for legal and tax reasons about their organizational hierarchical chart or charts. Using these published top-down charts, the chain of command and control is usually clearly delineated by the positions in the diagrams. Clearing the organization is typically a top-down process guided by need-to-know level-by-level constraints.

The process of surreptitiously vetting or sub rosa internal data garnering is much more difficult for organizations that can by law be less open about their power structure. In this case, open Internet sources and web apps can be extremely useful in elucidating the structure of a secretive organization. Suppose for instance that the organization only resides in the state of Georgia in the United States then you can find information from the licenses of the employees which are granted by the Georgia Secretary of State Department:

http://verify.sos.ga.gov/verification/

A number of licenses can be found using the preceding search engine. If you are interested in a medical doctor then use the search engine:

https://medicalboard.georgia.gov/look-licensee

For an attorney, you must use the following search engine:

https://www.gabar.org/membership/membersearch.cfm

The search techniques vary from state-to-state within the United States.

An especially useful tool for medical organizations is the NPI Profile:

https://npiprofile.com/npi-lookup

An algorithm for determining the employees and their roles of a small state-wide distributed mental health organization would consist of:

  1. Identifying all the typical roles of the organization
  2. Identifying the addresses of the distributed organization
  3. For each address elucidate the case managers, counselors, nurses, physicians, etc.

Further information can be obtained by perusing online articles and data published by the organization.

The best way of getting real-time and definitive organizational intelligence data is by inserting a vetted operative also known as a spy into the organization. If this optimal technique turns out to be unavailable then another option is to bribe or blackmail a current employee and convert that individual into a double agent. The key trick in enticing an employee to turn into a double agent is to somehow placing that person in an ethical, legally, and/or morally compromising situation.