Books & Writings by SPam McGee

Alaska Short Stack Stories, Series I, II, & III ~ Alaska's Deadliest Sin-Drill Baby Drill ~ Alaskan Company Man ~ Eklutna Lake Worrier ~ From the Fifth Floor ~ Hannah Cove ~ My Journey to Landes House ~ Poemetrics ~ Quinn the "Tanik" Eskimo ~ S.O.S. from Beaver Lake ~ The Teachings of the Swamp Fox ~ Trans-Alaska-Pipeline Funny Stories ~ Spirit Dog & the Ghost Wind


This Yankee BLOG kills
Contact the Ghost of Spam McGee

Wednesday, December 31, 2014

Global WARMING 101

The “Global Warming” debate finds fundamentallyA Tale of Two Cities - For or Against” attitude. With such a split, don't expect anything to actually be accomplished in efforts to combat what many believe is nothing to worry about and on the other hand everything to worry about. And as far as political talking points, “I'll huff and I'll puff and I'll...sorry out of breath”! Here is the real take as too why there exists a lackadaisical opinion so split. Yes, lackadaisical on both sides of the isle, as regardless of how one perceives this threat or not, nothing is getting accomplished to combat the warming trend “warning”. Yet, polar bears continue to weaken to death because of “No Ice” and this is the beginning of the end for many species, except the birds of prey – those flying high on Wall Street, as it all boils down to “money” this “Global Warming” debate! And it will remain just that, a “Debate” and no action taken, said again for a reason. What is well known finds the first hand fact not fiction and accepted without friction that the man-made “Warming” - whether a concern or not - is caused by excess carbon” entering the atmosphere and acting as a “heat trap”, a byproduct from the energy we use day-in day-out to fuel the lifestyle we have come accustomed with. It is estimated that over 440GigaTonnes(970,000,000,000,000-pounds) of greenhouse producing gas enters the atmosphere from natural earthly emissions, like from plant matter decaying then through “photosynthesis” and other processes, it is regurgitated and made harmless through a clever balancing act. Humans augment that by an additional 29GigaTonnes, which is not consumed or rendered harmless by the “natural sickle cycle”, so things heat up. Even though what we send aloft is small in comparison, without a mechanism to render it harmless, we find side effects that contribute to abuse upon the normalcy – like with the Arctic ice melting away. See, it has taken many moons for Mother Earth to adjust to her own comfort level, and then we come along and disrupt things – a human nature attribute as we cannot leave well enough alone. So hold that thought, that the earth is equipped with a mechanism to “offset” the naturally occurring greenhouse gases – so can we do the same? Not by limiting what we puke into the atmosphere from the burning of fossil fuels, but by reuse also – wow, what a concept! Several years ago there existed an overnight threat that crude oil exploitation had reached that plateau, and it would be all down hill from there on end and in a matter of 30 to 40-years, we would be broke energy wise. The world that is! Lights out, or don't start your engines! Yes, and our nation's dream of ever becoming “Energy Independent” would be but a dream still. But, as energy prices started to escalate so the speculators could prove that Wall Street can indeed get blood out of a turnip again and again, other recovery methods to exploit “stranded” oil and gas pockets saw a revolution and we made it to the “Independent” status and actually started to export oil, as we didn't give a rat's ass about one day running on empty. Remember, it is all for the “money” and many believe they can take it with them to bribe the gatekeeper! And all this “fracing” is only extending that energy plateau, maybe by 10-years – a little blip lift in the decay trend. So come 2050 or so, we will see “stranded” motorists, gas lines and a ruptured economy due the fact we are an energy based society and laughed at a “rainy day” piggy bank fund. Basically, if we cared about tomorrow and future generations, all this “fracing” would be for purposes of a reserve. We don't care! And said again, instead of driving straight ahead on a road of conservation, we have veered off course and it is drive-baby-drive, as if we care not if we start to run out of energy derived from crude oil and natural gas. It is not just the energy from underground we use for gasoline and heating our homes that will one day be quarantined for limited distribution, but it also makes plastics and other chemicals necessary today for our basic survival. We are addicted to this easy energy source! It's like one day by end of day we find our nation and the world energy broke and wake up the next day realizing we must start over in our fire making efforts! Look, we are a “Hydrocarbon” based baboon society, just scratching our ass as we run amuck. So why so comfortable this attitude of not caring about the future with respect to energy needs as good things don't last forever? And through our continued thirst - addiction - we keep on sending an over abundance of greenhouse producing gas aloft, without any concern and continue to piss off the “White Bear”! Well this is where the “Truth” about “Global Warming” takes a turn for the worse...OK, maybe a happy ending. Don't think for a single split second that energy giants like EXXON will ever be but an historical memory. As humans, we continue to survive on this earth because we have easily accessible sources of energy, as we still need fire to boil the water for that morning caffeine rush. Fire, we use it for almost everything. It heats our homes, cooks the pizza, it melts the steel to build skyscrapers and it causes combustion to accelerate our vehicles and it keeps planes in the sky. When you are flying in a plane and look out at the wing mounted engine that seems so innocent, there's a “Big Fire” going on inside to create “Thrust”! Fire, so convenient and that is what makes the “Hydrocarbon” so desirable, as we have based our existence on it and it is “Fire Ready” with respect to “Energy”. You don't get fire from a “Wind Turbine” or hydro-dam directly, those energy sources can produce electricity then the electric currents can produce heat. It's indirect and renewable but won't do much wherein “direct fire” is needed - so NO, we will never see “Electric Planes”. Whereas crude oil for instance finds all the constituents for direct fire, like with methane, propane, butane and considered non-renewable – so based on supply & demand theory, it makes money. And therein exists the bone of contention, that of the theory ofRenewable verses Non-renewable”. The latter scares the money making rackets, the reason today “Renewable” energy finds scrutiny, just like with “Global Warming”. Getting back to that thought held, about reusing the “carbon” we send aloft by using fossil fuels to get to work each day. Wow, nature's way our way also? Yes, if it can make a “buck”. So, way back when the “plateau” was looking like a reality and serenading the doom & gloom - that we were starting to run on empty - money was secretly funded to study what happens when all the oil and gas disappears. Then what? Fossil fuels are very simple in the way the atoms are arranged, which adds simplicity into transforming these chemical skeletons and other man-made uses – different liquid fuels to chemicals to plastics to pharmaceuticals. Basically made from a defined skeleton of hydrogen and carbon – chained together to form methane and up the ladder to say pentane – which is natural gasoline. There is a field in Alaska that may go into production next year, it is what geologists call a retrograde condensate formation - in layman's terms, it can run your engine as is without any refinement! So we have become accustomed to an energy source that is somewhat easy to extract along with the fact it can be easily manipulated for other purposes to make life comfortable on earth. If only it were “Renewable” comes the thought! So during this “Secret Research”, there existed a begging question. If we have loads of “hydrogen” - as it is the basis of “water” - and if we found a readily available source of “carbon” then with our knowledge of “cracking”, would it be possible to reconstruct and provide “synthetic” fossil fuels? Wow, what a concept. But there came a perplexing problem, as where does one find a source of “carbon”? How about the atmosphere, as every time we light a match, we send carbon into the ether. So that is where scientist started to concentrate their efforts to locate a “missing” link to the world's future energy needs – to find a direct replacement for fossil fuels as our infrastructure was already based on that energy source and changing it out for something else was not really an option. But at first glance, there came confusion, as when scientists sampled the atmosphere, there came a deviation from what one would expect with the amount of CO2 floating around. See, we know how much excess CO2 we send aloft through the burning of fossil fuels, we have a very accurate assessment through knowledge gained over time – world wide speaking. But when the samples were analyzed, it didn't compute – what the samples rendered fell short of what was expected. That perplexed the science community, especially those working on this “Secret” project. And that is where they focused their attention as this proved to be a scientific abnormally that needed an answer. Then, like a miracle, the problem was solved. Carbon that was sent aloft by man-made sources found it behaved differently then the naturally occurring CO2, as it went hidden due its construction. Some of the research has concluded that only 1/6th of man-made greenhouse gases generated from tailpipes or power-plant stacks went detected through global sampling – which meant for every pound humans sent into the once clear blue sky, 5/6ths went hidden away mysteriously – which helped fuel the debate over “Global Warming” as inaccurate, as it appeared our “carbon” was unaccountable through testing. Basically squeaking, our footprint on earth was different then the footprint in space! Then the research paid off as the so-called “Missing Carbon” theory had been solved. Yes, the research found that the carbon was sequestered, in what is called a “Bucky Ball” - named in honor of Richard Buckminster “Bucky” Fuller. Yes, this brilliant architect that made famous the importance of the “Geodesic Dome” structure was now at the center of attention, as the so-called “Bucky Balls” acted as a cage based on the geometry of a dome, to capture carbon and render it somewhat incarcerated. Then it hit home. If man could capture these so-called “Bucky Balls”, that much needed source being the missing link in efforts to fabricate synthetic “fossil fuel”, then our future energy needs would be fulfilled. And that research to capture these “Balls” filled with carbon was supposedly successful and then over-night the entire project was shelved. Why so? Think about it. As “Global Warming” becomes a bigger and bigger problem, one day the world leaders will be faced with a dilemma, by making decisions unpopular by calling for new forms of energy, not like wind and water, but with sources that also place controls on greenhouse gases and when we start retrieving the “Bucky Balls” and re-chaining our means the money will continue to roll on it like it always did, as we will remain a “Hydrocarbon” based society - only difference in round-two a synthetic society. And even though that sequestered “carbon” is free-floating in those cages way up high, it may someday find legal ownership rights, by those that can prove this pollution was their's to begin with wherein the capture by “outlaws” is well, “Outlawed”! Wow, what an about face on accepting responsibility for pollution. Bottom-line, energy trading makes humongous profits. And in efforts for the giant energy conglomeration to continue its reign to raid that wallet, research must find a source of energy that is not truly by definition renewable but re-capture-able, and the only thing with some semblance of “renewable” will be the continuation of that monthly bill they send us. And it appears they are already set for the future and counting their “Bucky Balls” instead of loosing sleep counting sheep. In a nutshell, take 2-molecules of water along with a molecule of “Bucky Ball” CO2 recaptured from the atmosphere by a proprietary process patented under “Intellectual Property” rights then send it to a “crack pot” and the result is a synthetic methane with a few extra “oxygen” atoms to act as an accelerant for near perfect combustion – Ka ching, and the circle be unbroken!

Richard Buckminster Fuller famous quotes:
There is nothing in a caterpillar that tells you it's going to be a butterfly.

Pollution is nothing but the resources we are not harvesting. We allow them to disperse because we've been ignorant of their value.

Nature is trying very hard to make us succeed, but nature does not depend on us. We are not the only experiment.

 "Simple WATER"
"Bucky Ball CO2"
"Synthetic Methane with an Oxygen Accelerant"

Tuesday, December 30, 2014

Blah, blah Humbooger

Wow, what a fantastic Christmas – best ever! First and foremost, the people I enjoyed during the holidays said not a peep about the “Interview”, which means we were not infected by the SARS virus – Seth Aaron Rogen Shithead, that Canadian asshole that thinks he finds a privilege under the 1st Amendment of the Unites States Constitution. In all honesty, when a foreigner gets more protection under the “Stituation”, cannot we interfere by deporting his ass back to Canada? Talk about lack of border security! And at least with those coming across down south to pick our crops, they show some respect for our sovereignty. So I felt at ease over the Christmas holidays, that those friends and acquaintances so enjoyed, embraced and cherished as company were in reality “True Americans” and showed such by not paying any attention to Flung Dung Phooey – that North Korean that gives “fruitcake” an entirely different “bored again Christmas” attitude. Anyway, my gifts have already proven that this coming year will bring “Comfort & Joy”. See, secret Santa's gift was a device camouflaged as a package of “Lucky Strike” but in reality a “hi-tech” gizmo from Israel that sends out a voice-over-voice signal that will interlace John Lennon's “Happy Xmas(War is Over)” upon any cell-phone conversation within a respectable distance of 8-feet in radius my location, even has enough “humph” to “Twitter Interact” with the lyrics also broadcast across a nearby “smart-phone” not in “Airport Mode” - but will not interfere with a 911 transmission. It's like if I were just under-the-influence singing so as everybody could hear! Wow, I never saw so many disgruntled cell phone users when I was at the crowded airport awaiting a flight home, when they came too close to invade my peace and quiet and were greeted by John Lennon and the Harlem choir singing “War is over if you want it”! Not that they despise this master-peace, just the fact we have gotten so damn use to self-inflicted-annoyance tuned into being tuned in to the “Mother of Contradiction”, that of non-necessity. So it acted as a minor inconvenience when a caller was trying to make a conversation out loud and the voice-over-voice competed - but one irate guy did call 911 to complain, as he couldn't call his broker to “Sell Now” as SONY stocks continued to crash and making a comment to the police dispatcher that he thought “Lennon” was dead! But all in all, when people couldn't communicate, well they were then allowed time to converse with each other after the initial “Twitter Rage” was abducted by some semblance of, “oh well I can do without” - like we used to do, and with that many did then have the opportunity for neighborly eye-contact which ignited a dialogue and allowed a reason to get a kick out of my other gift from Santa, this sweatshirt:

Captain Hook

According to “cyber-forensic” eavesdropping, the “cyber-bullying” attack that targeted SONY and made public right before Christmas was not really initiated by North Korea looking to trespass! It is estimated that this rouge attack may cost SONY upwards a $Billion$ dollars when it is all said and done, from movie revenue loses to employee law suits – so to date the costliest attack on record and ushers in an entirely redefined “WAR” favoring the hi-tech drama stage. From independent analysis so far including my own, it just appeared to be orchestrated from the North Korean dysentery dynasty, but was instead a successfully planned “cyber-hook” maneuver and in reality the perpetrator doing the ultimate damage was “baited”. Like “Fool’s Gold”, thinking you hit it rich when…well foolish! Herein, the perpetrator is the individual or organization that intercepted the “Red Flag of Vulnerability” then entered into the SONY domain and commenced to wreak havoc, thinking it was actually attacking the Hung Phung Phooey infrastructure through a compromised cyber-network. To find the opportunity to sneak into North Korea’s industrial infrastructure and embed malicious destructive codes - a.k.a. malware, virus or Trojan - it could have paid out a handsome ransom – as that is what this “cyber-bullying” is all about, making money. See, this particular “cyber-bullying” was a “bait” attempt, wherein North Korea's network services allowed a World-Wide-Web “broadcast” of what appeared to be a security breach within its own information network - with links to industrial and government computers on the NK network that held critical financial information and possibly secret military data. SPY verses SPY today is performed from the comfort of an office environment, coffee shops and strip joints, with computers linked to open networks that allow for skipping and hopping all over the globe in search of the good and the bad. Data sent over the network has a DNA of sorts, and that “packet script” can be dis-ciphered and thus manipulated for that “good & bad” aspect. Modern day espionage “code” can do all kinds of nasty things once secretly embedded, like turning on a victimized desk top computer’s built in microphone, to record meetings, take screen shots of “Power Point” presentations, you name it and it can be accomplished remotely and unknowingly to those so affected. And when successful in infiltrating another's network, stolen data is streamed to many locations, depositories set-up to offer capture and then that data can be held hostage for ransom or outright destructive attempts. Ever wonder how many credit card or Social Security numbers have already been stolen through “cyber-spying”? You may not want to know, but some expert estimates place it at 25% with respect to how many Americans have at one time or another been “hacked” for personal data. We always hear of “Hackers”, but this is not limited to some punks hoping to prove something, as “Hacking” or “Cyber-Bullying” has become a necessity it appears, so it employs many professionals as it has become the ultimate “SPY verses SPY”. The “Stuxnet” was the famed eavesdropping virus designed by the United States and Israel that caused destruction upon Iran’s nuclear bomb making attempts and ushered in a whole new era in “cyber-bullying”. But when that virus got out of control, it also destroyed a giant blast furnace in Germany! Many industrial destructive attempts have been kept somewhat silent, as it can sour a company’s stock value. Right now as we speak, what is going on in your office could be listened in on. What you type, same thing, recorded. Basically speaking, just because you are surrounded by four walls and went through security this morning, well security today is but a fa├žade with respect to computers and a network's vulnerability – maybe that cop keeps the disgruntled employees away, that’s about it! But the race for software that protects the computer from home to office against this modern day espionage affecting everyone, it is running on empty most of the time! We will live with “cyber-bullying” forever. Why? There is money to be made! A single attack like occurred at “SONY” becomes a money maker’s mark. Remember, its “WAR”! Just like we witnessed in the Iraq and Afghanistan conflicts, the longer such can be protracted, the more money is made for the defense contractors. Same thing is happening today, finding a weakness and allowing it it to be exploited then to the rescue – at a cost! How much do you think SONY will dish out now for network security? Best sell that stock, as when it buckled under pressure from this attack to release the “Interview” movie that seemed to be the catalyst of the “cyber-attack”, well it lost a whole lot of money! There exists today questionable legitimacy to spying and rogue like eavesdropping going on all the time across the web, it has become a big game to see what and how deep a “private” system may be infiltrated through such weaknesses, or back doors left open. Basically, there exists hardly any “privacy” when a business out of necessity must have an outside network connection - in this day and age to do without a link it's almost impossible to find bsuiness success. If something is linked, it can be hacked. Think of what it does to somebody working on a new patent, if eavesdropping is going on in the background? Or if testing a new this or that widget – why not spy? And when a destructive need exists, initiate that “code” that was embedded years ago. See, many experts believe that destructive code initiated by the “Stuxnet” has infiltrated a large percentage of the industrial infrastructure world-wide, just waiting for the call to come out of hibernation. In fact, this destructive virus is so stealth like that at times it is impossible to find at a glance, wherein some of the experts tell clients “buy a new computer”! At one test lab in Russia that actually infected an industrial computer with the “Stuxnet” for research purposes, it has spent over 3-years trying to find all the bits and pieces associated with embedding it in the hard drive! Said again, experts designed these “bombs”. And it could be a coded time-bomb, just waiting for a trigger point. And if so embedded already, it isn’t easy to detect as it takes years to decipher the code once it is found in efforts to learn what it can do when unleashed. In fact, one particular eavesdropping method utilizes “Big Bad Wolfgang”, a series of commands that tries to “blow the house down”, as a means to enter restricted areas. Some nations, like Russia and US, have produced some very powerful “codus operandifor both destructive and information collecting interests and unfortunately due lack of security that “code” is available on the web – which means it can be duplicated and morphed into performing all kinds of illegal activity. Look, you could piss someone off and then find your house or office PC downloaded with “child pornography” then a knock at the door – guilty! So if there exists a breach, either through a planned infiltration or from stupidity, the attacks progress. Now with the SONY attack, once the eavesdropping spies realized this “weakness” and celebrated a bonanza, that is when the infiltration into this vulnerability commenced. Said again, it was “Fool’s Gold” as there came a “cross-pollination-algorithm” embedded into the command center servers that were used by North Korea - called “mirrored bits” that acts as a mirage - that re-directed that vulnerability to “SONY” and possibly other industrial and financial computers in the United States. What happened to “SONY” was a wake-up call from a “cyber-bully” and has become a wake-up call for all, as it has now morphed itself into a business opportunity. Hackers live for the thrill, to exploit. It is not complicated, I can easily use this “cross-pollination” routine to spy on my neighbor! That is wherein the money to be made exists, by “cyber-bullying” police. With respect to the “SONY” attack, the “CPA” – Cross-Pollination-Algorithm – was so stealth like, when the infiltrators were successful in gaining access created by the “Red Flag Vulnerability” they thought it was North Korea’s network that had been penetrated when all the time the “hook” was directed at “SONY” and concealing the true identity. Thus the reason it is called “Captain Hook”, as all the time critical data was being collected and sent to the hackers depositories then erased off the “SONY” data base, all the time it appeared to be an attack on the North Korean infrastructure. Said again, with the “hook” in effect poor old “SONY” was mirrored into looking like North Korea. So who done it? Probably some kid came up with the steering code, the mirroring effect and that opened “Pandora’s” box when it fooled the “$multi-million$ dollar eavesdropping police – nations spying on other nations and taking advantage of such “vulnerabilities”. Yes, it could have been us or them infiltrating what was believed to be a North Korean vulnerability when all the time it was the “SONY” network under attack - yes kind of like shooting yourself in the foot. This is why the FBI remains pretty aloof in providing information it has collected upon this “cyber-attack”. See, today’s “cyber-bullying” doesn’t leave a single blood stained hands' trail, but many trails as a confusing element of surprise. So, this could be an entirely new hassle, this “hooking”. If somebody can re-direct data away from intended receivers – with a “Fool’s Gold” baiting attempt – it basically makes espionage...well if you don’t know who you are attacking, what good is it? So now when a “cyber-spy” enters another’s domain, you have to make sure you are at the right address! As industrial and administrative networks become more and more complicated, there is also room for human error and costly mistakes. It is not always the “hackers” that are trying to raise havoc on our privacy, but they are eavesdropping and looking for that opportunity. I witnessed a “cyber-attack” at a major military installation a few years ago. The private contractor under contract with the ARMY had spent over a $million$ on securing a network, a dedicated network for the industrial side of the “mission critical” operation and a completely separate network for the administrative side of things – like for phones and company e-mailing. Now the system was safe and secure due separation of the two networks and equipped with “sniffer” technology to “sniff” out illegal equipment hooked up to the network, say like a personal PC used by an employee. Now this “sniffer” technology is good but has its limitations, and with the administrative network - even though equipped with a firewall for protection - by using that network for phone traffic with outside access, it made that network vulnerable to hacking. All was secure until a maintenance worker hooked a laptop into both networks in a shop area, as he was working on an industrial component problem at the same time he was trying to update his personal data in the company data base, as he had just become a new father and needed to re-enter some medical data. So with that said, being a company laptop computer that didn't alert the “sniffer” and now engaged in communicating on both the industrial and administrative networks, the “cross-pollination” allowed a link to the outside. So when this was going on, with a laptop that was “hardened”, well with two cables at $2.50 a whack cross-connecting the networks, the outsiders were now looking in and a virus was unleashed into the industrial network - the perpetrator most likely a disgruntled IT technician that once worked at the plant and knew where the target was and commenced to cause damage that could have reached into the $billions$ but was in the last minutes before doom rescued. So “Who to Blame” has taken on an entirely different face, as today we have no idea. This is why the FBI is so quiet on the SONY “cyber-bullying” attempt as well as many other past breaches as we have no idea who did it, what else was affected and in time we may see what the ultimate damage goal “mission accomplished” amounts to. Bottom-line with the “SONY” attack, most likely it was the Israelites or a contractor acting on that nation's behalf as a “cyber-police” that went baited by the North Korean broadcast of a “vulnerability”, took that bait and commenced to do what it gets paid for, data collecting followed by sabotage - but with the “hook” designed by some kid board with snow-ball fights and stuck in his room with a $200 laptop and a connection to the outside world – that's how it goes! The reason we call it a it starts with a mind of destruction and carried over into reality, and we thought “classroom” bullying was a problem!

Wednesday, December 24, 2014

Victory Speech?

Victory Speech? Let’s hope that NORAD is tracking Santa Clause’s sleigh instead of a rogue missile from North Korea under Phlegm Dung Pussy’s command and headed towards Camp Nipple in South Korea – armed with a nuclear warhead and targeting our American troops trying to enjoy a Christmas turkey dinner. With all the hoopla over the “Interview”, I don’t know if that was really a victory for freedom of the speaker, definitely not a victory for human rights. Look, to joke about assassinating even a fruitcake finds no merit in advancing human rights. Why we have afforded a fruitcake so much attention this season is mindboggling. If we make it through the next few days without a “fringe” attack, like occurred when Sarah Palin targeted Gabrielle Giffords, we are lucky. If so, then maybe it was a victory for “Free Speech”. Surely not a victory for John Lennon, and “So this is Christmas”! See, we are treading on thin ice with both 1st and 2nd Amendments, by the “abuse” upon the responsibility inherent in each amendment. If you are asking yourself what “abuse”, then you have not an understanding of “States Rights” – and if it continues to be abused, we will loose! So let’s hope for peace, but too think “True” Americans would waste Christmas day in front of the boob-tube entertaining a movie about assassinating a fruitcake, what in hell has happened to the American Spirit? We should not be giving this jerk any attention.

Seth Trojan Interview

Dear Barack;

Thanks for your Christmas present to America, by getting involved with the “Interview” in the realization it was merely an exercise in “Free Speech”. We need your help again, as some ex-LA policemen are in trouble for writing a song and just another exercise in “Free Speech” under attack, so can you take a few seconds from your vacation in Hawaii to address the nation showing your support for this song like you did for the “Interview”. Merry Christmas. Seth Trojan

 “This is America. We can say what we want. This is a free America.”
 Michael Brown learned a lesson about a messin'
With a badass policeman
And he's bad, bad Michael Brown
Baddest thug in the whole damn town
Badder than old King Kong
Meaner than a junkyard dog

Two men took to fightin'
And Michael punched in through the door
And Michael looked like some old Swiss cheese
His brain was splattered on the floor

And he's dead, dead Michael Brown
Deadest man in the whole damn town
His whole life's long gone
Deader than a roadkill dog

Monday, December 22, 2014

Responsibility Clause

1st Amendment to the United States Constitution: Congress shall make no law prohibiting or abridging the freedom of speech”

Freedom of Speech(States' Right): “Every person may freely speak, write, and publish on all subjects, being responsible for the abuse of that right.”
Very challenging, as today we may be involved in a situation wherein the United States government has covertly exercised “States' Right” for us? The SONY “cyber-attack” is at the center-of-attention with the Left vs. Right, with the end result the delayed release of a controversial movie called the “Interview”, wherein a satire tries to make an “Assassination” against North Korea's Hung Dung Fruitcake an acceptable reality. “Free Speech” or not? The U.S. Constitution finds not a “Responsibility Clause” for this “Freedom of Speech” right, wherein many states do indeed include such a “Precautionary Clause” in its own “Constitution” which due the 10th can trump any action or inaction by Uncle Sam. And I believe this “Abuse” clause finds merit, especially in society today as the “Internet” has allowed for an entirely new ways and means to communicate and exercise this “Right” to be heard, but not seen - which finds consequences. Case in point the litmus test: So if Sarah Palin publishes a “targeting map” on her SarahPAC support web-site, wherein those targeted find themselves in the “cross-hairs” of a deadly assault rifle along with captions of “It's time to take a STAND”...OK, so what as we all have come to realize that Mama Caboose loves to flirt with danger. Now what if a wacko fringe interprets this “map” and takes action, like in the case of Gabrielle Giffords? That's where the “abuse” clause comes into effect and is a component of contributory negligence – so why are we so afraid to incarcerate those that violate the “Freedom” with the intent of causing harm? Yes, had this attack taken place in Alaska and that was my beloved daughter now somewhat crippled for life, Sarah Palin may have faced jail time due that state's constitutionality, it is that simple and we must start contemplating the seriousness of the “abuse” clause. It was inserted for a reason. It is not designed to limit “Free Speech”, but as a measure to make sure what we say does not inflict harm, or pain and suffering against an innocent citizen, as that in itself is very “UN-Constitutional”! We must start today to be not afraid of the 1st Amendment, and it appears both sides of the isle are so afraid of the 2nd Amendment – we should be not afraid of either one – as if we found respect upon the 1st and 2nd, wow, maybe we could get on with our lives with some decency as both amendments shout out loud, but lets be heard with some respect instead of disrespect! So did Uncle Sam see a potential of harm, due the exercise of “Free Speech” with the release of this movie? And what else could it do if that be the case, except use everything in its power to abide by the “abuse” of responsibility and take responsibility to protect our interests – that my friend is a dynamic Commander-in-Chief as when we fail to act, someone else does!
 U.S. Representative Giffords before “Cross-Hairs” Attack
 The SarahPAC Attack Aftermath
Gabrielle, 5-years in recovery!