I am honored that you are enjoying the thread, Laughing as I say that I am also.
Spring is a time to shut down the computer and go outdoors, you are lucky that you can work with what you love.
I like your writing and will be waiting to read the book you are writing.
You are welcome here when you can pop in, LOL, even as a lurker.
I do love what I do, and I have written several books. Writing is the easy part—getting published is the hard part! LOL
You said you were Cherokee? Eastern or western? My people are from eastern NC originally. I’m a Heinz 57—Cherokee, Welsh, Scotch irish....
Western NC—that would definitely be western NC. LOL at myself
http://www.frugaltimes.com/frugaltips.html
Tips for the Truly Frugal
Whether you are frugal by choice or by necessity, here are some
tips for saving money when money is very tight.
RECYCLING
In the Kitchen
*When you boil potatoes, always save the water. Use it in soups
and stews, or cool it and use it to fertilize your house plants.
*Empty plastic liners from cereal boxes make good freezer bags or
wax paper. Use for lunch bags also.
*Save plastic mesh bags to hold small items you want to run
through the dishwasher, use to scrub dishes, or place items in to drip dry.
*Save the packaging from convenience food and make your own. Fill
tv dinner trays with your own leftovers; jello and pudding cups with similar food, etc.
*Use old TV dinner trays to reheat food in the microwave.
*Cut off the tops of empty plastic milk cartons to use as funnels.
*Pour old baking soda from the refrigerator down your drain to freshen.
*Use pantyhose to hang onions and potatoes in your pantry. Store
in leg section, with knots in between vegetables. Hang from the ceiling.
GARDENING
*Roses love crushed egg shells. They help keep snails out of the garden.
*Save money growing your own food. Get a jump on the gardening
seasons by starting your plants indoors in potting soil placed in empty egg cartons.
*Use old garden hoses to drip irrigate your garden. Cut holes
along the length of the hose, and lay along plants.
*Be creative when it comes to containers. Some possibilities:
-Egg cartons; use to start plants.
-Old shoes, cute for ornamentals.
-Plastic milk and ice cream containers; cut to size and add drainage holes, or use to transport soil, rocks, or water. Cut tiny holes and place by plants for drip irrigation.
-Cracked mugs and bowls; use on the bottom of containers for good
drainage.
- Cardboard boxes; use on a temporary basis for short-lived plants.
-Old tires; stacked them up, and filled with straw to grow potatoes.
CLEANING
*Use old newspapers for cleaning glass and windows.
*Use old dryer sheets to dust. Place them on the bottom of
garbage cans and other areas of the house to eliminate odors.
*Cut up old, worn clothes for cleaning rags. Use old socks for
washrags. Place them over your hand for easy dusting.
*Cut the top off empty milk jugs, and use to store bathroom cleaning accessories. Use to hold your toilet brush cleaner, and then just discard when dirty.
STORAGE
*If you can, buy your ice cream in big 2 gallon buckets. They can be used for all kinds of storage, from food to toys, as well as sand buckets for children.
*Use empty soda bottles to store water. You can also use them to
water house plants when you are away. Cut small holes in the bottom, fill with water, and set inside the plant pots to slowly drip.
*Cut off the top of empty plastic milk containers to desired height to make storage containers to fit in drawers.
*Use ice cube trays for storage of small items.
*Use baby food jars to store small items. Screw the lid to the top of a shelf to save space.
*Use film canisters to store small items (like sewing notions) and small amounts of paint.
*Use empty luggage to store blankets, seasonal clothes, or gift items purchased in advance during sales.
*If you have items in storage areas with empty space, fill them with smaller items, and label them. Try to group things in a logical manner. Keep a master list on your computer.
*Store extra blankets in pillow shams that you can set on sofas and beds.
*Decorate large oatmeal containers and other similar empty containers with contact paper, pictures, etc., and use for storage of smaller items.
*Save empty plastic eggs that come out of bubble gum type machines: They can be used like plastic Easter eggs at Easter or to store small pieces of jewelry and keep earrings together.
*Use old shower curtains to cover wood stored outside.
[This is only a few of those on this page]
This is one of my favorite greens, steam and eat:
http://www.plantsciences.ucdavis.edu/gepts/pb143/crop/amaranth/amaranth.htm
PLB143 - Crop of the day: Amaranth
The crop of the day: Amaranth (Amaranthus spp., Amaranthaceae)
© Paul Gepts and Cristina Mapes 1996-2002
[nice history and photos]
http://www.nationalterroralert.com/default/
How To Prepare For A Terrorist Attack
Preparing for a terrorist attack now, provides you your best chance of survival, in the event of an actual attack.
Introduction
Devastating acts, such as the terrorist attacks on the World Trade Center and the Pentagon, have left many concerned about the possibility of future incidents in the United States and their potential impact. They have raised uncertainty about what might happen next, increasing stress levels. Nevertheless, there are things you can do to prepare for the unexpected and reduce the stress that you may feel now and later should another emergency arise. Taking preparatory action can reassure you and your children that you can exert a measure of control even in the face of such events.
What You Can Do to Prepare
Finding out what can happen is the first step. Once you have determined the events possible and their potential in your community, it is important that you discuss them with your family or household. Develop a disaster plan together.
1.Create an emergency communications plan.
Choose an out-of-town contact your family or household will call or e-mail to check on each other should a disaster occur. Your selected contact should live far enough away that they would be unlikely to be directly affected by the same event, and they should know they are the chosen contact. Make sure every household member has that contacts, and each others, e-mail addresses and telephone numbers (home, work, pager and cell). Leave these contact numbers at your childrens schools, if you have children, and at your workplace. Your family should know that if telephones are not working, they need to be patient and try again later or try e-mail. Many people flood the telephone lines when emergencies happen but e-mail can sometimes get through when calls dont.
2. Establish a meeting place.
Having a predetermined meeting place away from your home will save time and minimize confusion should your home be affected or the area evacuated. You may even want to make arrangements to stay with a family member or friend in case of an emergency. Be sure to include any pets in these plans, since pets are not permitted in shelters and some hotels will not accept them.
3. Assemble a disaster supplies kit.
If you need to evacuate your home or are asked to shelter in place, having some essential supplies on hand will make you and your family more comfortable. Prepare a disaster supplies kit in an easy-to-carry container such as a duffel bag or small plastic trash can. Include special needs items for any member of your household (infant formula or items for people with disabilities or older people), first aid supplies (including prescription medications), a change of clothing for each household member, a sleeping bag or bedroll for each, a battery powered radio or television and extra batteries, food, bottled water and tools. It is also a good idea to include some cash and copies of important family documents (birth certificates, passports and licenses) in your kit.
Copies of essential documents-like powers of attorney, birth and marriage certificates, insurance policies, life insurance beneficiary designations and a copy of your will-should also be kept in a safe location outside your home. A safe deposit box or the home of a friend or family member who lives out of town is a good choice.
For more complete instructions, ask your local Red Cross chapter for the brochure titled Your Family Disaster Supplies Kit
4. Check on the school emergency plan of any school-age children you may have.
You need to know if they will they keep children at school until a parent or designated adult can pick them up or send them home on their own. Be sure that the school has updated information about how to reach parents and responsible caregivers to arrange for pickup. And, ask what type of authorization the school may require to release a child to someone you designate, if you are not able to pick up your child. During times of emergency the school telephones may be overwhelmed with calls.
For more information on putting together a disaster plan, request a copy of the brochure titled Your Family Disaster Plan from your local American Red Cross chapter. You may also want to request a copy of Before Disaster Strikes . . . How to Make Sure Youre Financially Prepared for specific information on what you can do now to protect your assets.
If Disaster Strikes
* Remain calm and be patient.
* Follow the advice of local emergency officials.
* Listen to your radio or television for news and instructions.
* If the disaster occurs near you, check for injuries. Give first aid and get help for seriously injured people.
* If the disaster occurs near your home while you are there, check for damage using a flashlight. Do not light matches or candles or turn on electrical switches. Check for fires, fire hazards and other household hazards. Sniff for gas leaks, starting at the water heater. If you smell gas or suspect a leak, turn off the main gas valve, open windows, and get everyone outside quickly.
* Shut off any other damaged utilities.
* Confine or secure your pets.
* Call your family contactdo not use the telephone again unless it is a life-threatening emergency.
* Check on your neighbors, especially those who are elderly or disabled.
A Word on What Could Happen
As we learned from the events of September 11, 2001, the following things can happen after a terrorist attack:
* There can be significant numbers of casualties and/or damage to buildings and the infrastructure. So employers need up-to-date information about any medical needs you may have and on how to contact your designated beneficiaries.
* Heavy law enforcement involvement at local, state and federal levels follows a terrorist attack due to the events criminal nature.
* Health and mental health resources in the affected communities can be strained to their limits, maybe even overwhelmed.
* Extensive media coverage, strong public fear and international implications and consequences can continue for a prolonged period.
* Workplaces and schools may be closed, and there may be restrictions on domestic and international travel.
* You and your family or household may have to evacuate an area, avoiding roads blocked for your safety.
* Clean-up may take many months.
Evacuation
If local authorities ask you to leave your home, they have a good reason to make this request, and you should heed the advice immediately. Listen to your radio or television and follow the instructions of local emergency officials and keep these simple tips in mind.
* Wear long-sleeved shirts, long pants and sturdy shoes so you can be protected as much as possible.
* Take your disaster supplies kit.
* Take your pets with you; do not leave them behind. Because pets are not permitted in public shelters, follow your plan to go to a relatives or friends home, or find a pet-friendly hotel.
* Lock your home.
* >Use travel routes specified by local authoritiesdont use shortcuts because certain areas may be impassable or dangerous.
* Stay away from downed power lines.
* Listen to local authorities.Your local authorities will provide you with the most accurate information specific to an event in your area. Staying tuned to local radio and television, and following their instructions is your safest choice.
If youre sure you have time:
* Call your family contact to tell them where you are going and when you expect to arrive.
* Shut off water and electricity before leaving, if instructed to do so. Leave natural gas service ON unless local officials advise you otherwise. You may need gas for heating and cooking, and only a professional can restore gas service in your home once its been turned off. In a disaster situation it could take weeks for a professional to respond.
Devastating acts, such as the terrorist attacks on the World Trade Center and the Pentagon, have left many concerned about the possibility of future incidents in the United States and their potential impact. They have raised uncertainty about what might happen next, increasing stress levels. Nevertheless, there are things you can do to prepare for the unexpected and reduce the stress that you may feel now and later should another emergency arise. Taking preparatory action can reassure you and your children that you can exert a measure of control even in the face of such events.
If you are advised by local officials to shelter in place, what they mean is for you to remain inside your home or office and protect yourself there. Close and lock all windows and exterior doors. Turn off all fans, heating and air conditioning systems. Close the fireplace damper. Get your disaster supplies kit, and make sure the radio is working. Go to an interior room without windows thats above ground level. In the case of a chemical threat, an above-ground location is preferable because some chemicals are heavier than air, and may seep into basements even if the windows are closed. Using duct tape, seal all cracks around the door and any vents into the room. Keep listening to your radio or television until you are told all is safe or you are told to evacuate. Local officials may call for evacuation in specific areas at greatest risk in your community.
Additional Positive Steps You Can Take
Raw, unedited footage of terrorism events and peoples reaction to those events can be very upsetting, especially to children. We do not recommend that children watch television news reports about such events, especially if the news reports show images over and over again about the same incident. Young children do not realize that it is repeated video footage, and think the event is happening again and again. Adults may also need to give themselves a break from watching disturbing footage. However, listening to local radio and television reports will provide you with the most accurate information from responsible governmental authorities on whats happening and what actions you will need to take. So you may want to make some arrangements to take turns listening to the news with other adult members of your household.
Another useful preparation includes learning some basic first aid. To enroll in a first aid and AED/CPR course, contact your local American Red Cross chapter. In an emergency situation, you need to tend to your own well-being first and then consider first aid for others immediately around you, including possibly assisting injured people to evacuate a building if necessary.
People who may have come into contact with a biological or chemical agent may need to go through a decontamination procedure and receive medical attention. Listen to the advice of local officials on the radio or television to determine what steps you will need to take to protect yourself and your family. As emergency services will likely be overwhelmed, only call 9-1-1 about life-threatening emergencies.
Granny’s note:
One of the most important items on this list, is the contacting of the schools.
When I did so about 1958 and told them that if there was a disaster, I did not want them to load my daughter on a school bus and take her to ‘safety’ driving through a military base, as at that time, all exits for San Diego, skirted bases.
I was told that the schools plans called for the school to move them and if I attempted to stop it from happening...........
I WOULD BE SHOT!!!
You can bet it has not changed, in fact they are still using the 1958 plans, would be a safe bet.
scan san diego.net on scanner #1, will allow you to listen to the San Diego Police and other San Diego departments, including the school bus drivers as they are assigned.
Thursday morning, in about 30 minutes, I heard:
“My bus quit running and I am on freeway #?”
“ARE YOU STOPPED IN THE MIDDLE OF THE ROAD? “
“WHERE ARE THE CHILDREN?”
“No, I managed to coast to the side, I am out of the lanes, and there are no children, I cannot get to the stops, it won’t run.....”
Ten minutes later:
“HE CREAMED ME RIGHT IN THE MIDDLE”
“YOU HIT A CAR”
“NO, HE HIT ME, CAME BOUNDING OFF THE FREEWAY OFF-RAMP AND HIT ME IN THE MIDDLE OF THE BUS”
“are the children ok?”
Again we were lucky, the driver was alone, wanted the medics, as his back hurt.
5 minutes later, a report of a child, that had hurt her leg, running to get on the bus........
And 2 reports that I am not clear as to who the buses belonged to, the Police dispatcher gave them to the Officers to answer:
“TEN TEENS ATTACKED THE BUS DRIVER AND BEAT HIM, THEY HAVE LEFT THE BUS AND ARE RUNNING DOWN___STREET”....
A FEW MINUTES LATER:
” A TEEN HAS THROWN A LARGE ROCK THRU THE BUS WINDOW THE DRIVER HAS SOME CUTS FROM THE GLASS”.
And I would not allow a kid of mine on a school bus, not today and not in 1958, when I could stop it from happening.
granny
http://www.nationalterroralert.com/quickreference/
Quick Reference Guide
National Security Emergencies
In addition to the natural and technological hazards described in this publication, Americans face threats posed by hostile governments or extremist groups. These threats to national security include acts of terrorism and acts of war. The following is general information about national security emergencies. For more information about how to prepare for them, including volunteering in a Citizen Corps program, see the For More Information chapter at the end of this guide.
Terrorism
Terrorism is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation,coercion or ransom. Terrorists often use threats to create fear among the public, to try to convince citizens that their government is powerless to prevent terrorism, and to get immediate publicity for their causes.
Acts of terrorism range from threats of terrorism, assassinations, kidnappings,hijackings, bomb scares and bombings, cyber attacks (computer-based), to the use of chemical, biological and nuclear weapons. High-risk targets include military and civilian government facilities, international airports, large cities and high-profile landmarks. Terrorists might also target large public gatherings, water and food supplies, utilities, and corporate centers. Further, they are capable of spreading fear by sending explosives or chemical and biological agents through the mail. In the immediate area of a terrorist event, you would need to rely on police, fire and other officials for instructions. However, you can prepare in much the same way you would prepare for other crisis events.
Preparing for terrorism
1. Wherever you are, be aware of your surroundings. The very nature of terrorism suggests there may be little or no warning.
2. Take precautions when traveling. Be aware of conspicuous or unusual behavior. Do not accept packages from strangers. Do not leaveluggage unattended. Unusual behavior, suspicious packages and strange devices should be promptly reported to the police or security personnel.
3. Do not be afraid to move or leave if you feel uncomfortable or if something does not seem right.
4. Learn where emergency exits are located in buildings you frequent. Notice where exits are when you enter unfamiliar buildings. Plan how to get
5. out of a building, subway or congested public area or traffic. Note where staircases are located. Notice heavy or breakable objects that could move, fall or break in an explosion.
6. Assemble a disaster supply kit at home and learn first aid. Separate the supplies you would take if you had to evacuate quickly, and put them in a backpack
7. or container, ready to go.
8. Be familiar with different types of fire extinguishers and how to locate them. Know the location and availability of hard hats in buildings in which you spend a lot of time.
Protection against cyber attacks
Cyber attacks target computer or telecommunication networks of critical infrastructures such as power systems, traffic control systems, or financial systems. Cyber attacks target information technologies (IT) in three different ways. First, is a direct attack against an information system through the wires alone (hacking). Second, the attack can be a physical assault against a critical IT element. Third, the attack can be from the inside as a result of compromising a trusted party with access to the system.
Be prepared to do without services you normally depend on that could be disruptedelectricity, telephone, natural gas, gasoline pumps, cash registers, ATM machines, and internet transactions.
Be prepared to respond to official instructions if a cyber attack triggers other hazards, for example, general evacuation, evacuation to shelter, or shelter-in-place, because of hazardous materials releases, nuclear power plant incident, dam or flood control system failures.
Preparing for a building explosion
Explosions can collapse buildings and cause fires. People who live or work in a multi-level building can do the following:
1. Review emergency evacuation procedures. Know where emergency exits are located.
2. Keep fire extinguishers in working order. Know where they are located, and learn how to use them.
3. Learn first aid. Contact the local chapter of the American Red Cross for information and training.
4. Building owners should keep the following items in a designated place on each floor of the building.
* Portable,battery-operated radio and extra batteries
* Several flashlights and extra batteries
* First aid kit and manual
* Several hard hats
* Fluorescent tape to rope off dangerous areas
Bomb Threats
If you receive a bomb threat, get as much information from the caller as possible. Keep the caller on the line and record everything that is said. Then notify the police and the building management.
If you are notified of a bomb threat, do not touch any suspicious packages. Clear the area around suspicious packages and notify the police immediately. In evacuating a building, dont stand in front of windows, glass doors or other potentially hazardous areas. Do not block sidewalk or streets to be used by emergency officials or others still exiting the building.
Suspicious parcels and letters
Be wary of
suspicious packages and letters. They can contain explosives, chemical
or biological agents. Be particularly cautious at your place of employment.
Some typical
characteristics postal inspectors have detected over the years, which
ought to trigger suspicion, include parcels that
* Are unexpected
or from someone unfamiliar to you.
* Have no
return address, or have one that cant be verified as legitimate.
* Are marked
with restrictive endorsements, such as Personal, Confidential or
Do not x-ray.
* Have protruding
wires or aluminum foil, strange odors or stains.
* Show a
city or state in the postmark that doesnt match the return address.
* Are of
unusual weight, given their size, or are lopsided or oddly shaped.
* Are marked
with any threatening language.
* Have inappropriate
or unusual labeling.
* Have excessive
postage or excessive packaging material such as masking tape and string.
* Have misspellings
of common words.
* Are addressed
to someone no longer with your organization or are otherwise outdated.
* Have incorrect
titles or title without a name.
* Are not
addressed to a specific person.
* Have handwritten
or poorly typed addresses.
With suspicious
envelopes and packages other than those that might contain explosives,
take these additional steps against possible biological and chemical agents.
* Refrain
from eating or drinking in a designated mail handling area.
* Place
suspicious envelopes or packages in a plastic bag or some other type
of container to prevent leakage of contents. Never sniff or smell suspect
mail.
* If you
do not have a container, then cover the envelope or package with anything
available (e.g., clothing, paper, trash can, etc.) and do not remove
the cover.
* Leave
the room and close the door, or section off the area to prevent others
from entering.
* Wash your
hands with soap and water to prevent spreading any powder to your face.
* If you
are at work, report the incident to your building security official
or an available supervisor, who should notify police and other authorities
without delay.
* List all
people who were in the room or area when this suspicious letter or package
was recognized. Give a copy of this list to both the local public health
authorities and law enforcement officials for follow-up investigations
and advice.
* If you
are at home, report the incident to local police.
What
to do if there is an explosion
Leave the
building as quickly as possible. Do not stop to retrieve personal possessions
or make phone calls. If things are falling around you, get under a sturdy
table or desk until they stop falling. Then leave quickly, watching for
weakened floors and stairs and falling debris as you exit.
1. If there
is a fire:
* Stay
low to the floor and exit the building as quickly as possible.
* Cover
your nose and mouth with a wet cloth.
* When
approaching a closed door, use the back of your hand to feel the
lower, middle and upper parts of the door. Never use the palm of
your hand or fingers to test for heat: burning those areas could
impair your ability to escape a fire (i.e., ladders and crawling).
o If
the door is NOT hot, open slowly and ensure fire and/or smoke
is not blocking your escape route. If your escape route is blocked,
shut the door immediately and use an alternate escape route,
such as a window. If clear, leave immediately through the door.
Be prepared to crawl. Smoke and heat rise. The air is clearer
and cooler near the floor.
o If
the door is hot, do not open it. Escape through a window. If
you cannot escape, hang a white or light-colored sheet outside
the window, alerting fire fighters to your presence.
* Heavy
smoke and poisonous gases collect first along the ceiling. Stay
below the smoke at all times.
2. If you
are trapped in debris:
* Do
not light a match.
* Do
not move about or kick up dust. Cover your mouth with a handkerchief
or clothing.
* Rhythmically
tap on a pipe or wall so that rescuers can hear where you are. Use
a whistle if one is available. Shout only as a last resort when
you hear sounds and think someone will hear youshouting can cause
a person to inhale dangerous amounts of dust.
Chemical
and Biological Weapons
In case of
a chemical or biological weapon attack near you, authorities will instruct
you on the best course of action. This may be to evacuate the area immediately,
to seek shelter at a designated location, or to take immediate shelter
where you are and seal the premises. The best way to protect yourself
is to take emergency preparedness measures ahead of time and to get medical
attention as soon as possible, if needed.
Chemical
Chemical
warfare agents are poisonous vapors, aerosols, liquids or solids that
have toxic effects on people, animals or plants. They can be released
by bombs, sprayed from aircraft, boats, or vehicles, or used as a liquid
to create a hazard to people and the environment. Some chemical agents
may be odorless and tasteless. They can have an immediate effect (a few
seconds to a few minutes) or a delayed effect (several hours to several
days). While potentially lethal, chemical agents are difficult to deliver
in lethal concentrations. Outdoors, the agents often dissipate rapidly.
Chemical agents are also difficult to produce.
There
are six types of agents:
* Lung-damaging
(pulmonary) agents such as phosgene,
* Cyanide,
* Vesicants
or blister agents such as mustard,
* Nerve
agents such as GA (tabun), GB (sarin), GD (soman), GF, and VX,
* Incapacitating
agents such as BZ, and
* Riot-control
agents (similar to MACE).
Biological
Biological
agents are organisms or toxins that can kill or incapacitate people, livestock
and crops. The three basic groups of biological agents which would likely
be used as weapons are bacteria, viruses, and toxins.
1. Bacteria.
Bacteria are small free-living organisms that reproduce by simple division
and are easy to grow. The diseases they produce often respond to treatment
with antibiotics.
2. Viruses.
Viruses are organisms which require living cells in which to reproduce
and are intimately dependent upon the body they infect. Viruses produce
diseases which generally do not respond to antibiotics. However, antiviral
drugs are sometimes effective.
3. Toxins.
Toxins are poisonous substances found in, and extracted from, living
plants, animals, or microorganisms; some toxins can be produced or altered
by chemical means. Some toxins can be treated with specific antitoxins
and selected drugs.
Most biological
agents are difficult to grow and maintain. Many break down quickly when
exposed to sunlight and other environmental factors, while others such
as anthrax spores are very long lived. They can be dispersed by spraying
them in the air, or infecting animals which carry the disease to humans
as well through food and water contamination.
* AerosolsBiological
agents are dispersed into the air, forming a fine mist that may drift
for miles. Inhaling the agent may cause disease in people or animals.
* AnimalsSome
diseases are spread by insects and animals, such as fleas, mice, flies,
and mosquitoes. Deliberately spreading diseases through livestock is
also referred to as agroterrorism.
* Food and
water contaminationSome pathogenic organisms and toxins may persist
in food and water supplies. Most microbes can be killed, and toxins
deactivated, by cooking food and boiling water.
Anthrax spores
formulated as a white powder were mailed to individuals in the government
and media in the fall of 2001. Postal sorting machines and the opening
of letters dispersed the spores as aerosols. Several deaths resulted.
The effect was to disrupt mail service and to cause a widespread fear
of handling delivered mail among the public.
Person-to-person
spread of a few infectious agents is also possible. Humans have been the
source of infection for smallpox, plague, and the Lassa viruses.
What
to do to prepare for a chemical or biological attack
* Assemble
a disaster supply kit (see the Emergency Planning and Disaster Supplies
chapter for more information) and be sure to include:
* Battery-powered
commercial radio with extra batteries.
* Non-perishable
food and drinking water.
* Roll of
duct tape and scissors.
* Plastic
for doors, windows and vents for the room in which you will shelter
in placethis should be an internal room where you can block out air
that may contain hazardous chemical or biological agents. To save critical
time during an emergency, sheeting should be pre-measured and cut for
each opening.
* First
aid kit.
* Sanitation
supplies including soap, water and bleach.
What
to do during a chemical or biological attack
1. Listen
to your radio for instructions from authorities such as whether to remain
inside or to evacuate.
2. If you
are instructed to remain in your home, the building where you are, or
other shelter during a chemical or biological attack:
* Turn
off all ventilation, including furnaces, air conditioners, vents
and fans.
* Seek
shelter in an internal room, preferably one without windows. Seal
the room with duct tape and plastic sheeting. Ten square feet of
floor space per person will provide sufficient air to prevent carbon
dioxide build-up for up to five hours. (See Shelter chapter.)
* Remain
in protected areas where toxic vapors are reduced or eliminated,
and be sure to take your battery-operated radio with you.
3. If you
are caught in an unprotected area, you should:
* Attempt
to get up-wind of the contaminated area.
* Attempt
to find shelter as quickly as possible.
* Listen
to your radio for official instructions.
What
to do after a chemical attack
Immediate
symptoms of exposure to chemical agents may include blurred vision, eye
irritation, difficulty breathing and nausea. A person affected by a chemical
or biological agent requires immediate attention by professional medical
personnel. If medical help is not immediately available, decontaminate
yourself and assist in decontaminating others. Decontamination is needed
within minutes of exposure to minimize health consequences. (However,
you should not leave the safety of a shelter to go outdoors to help others
until authorities announce it is safe to do so.)
1. Use extreme
caution when helping others who have been exposed to chemical agents:
* Remove
all clothing and other items in contact with the body. Contaminated
clothing normally removed over the head should be cut off to avoid
contact with the eyes, nose, and mouth. Put into a plastic bag if
possible. Decontaminate hands using soap and water. Remove eyeglasses
or contact lenses. Put glasses in a pan of household bleach to decontaminate.
2. Remove
all items in contact with the body.
3. Flush
eyes with lots of water.
4. Gently
wash face and hair with soap and water; then thoroughly rinse with water.
5. Decontaminate
other body areas likely to have been contaminated. Blot (do not swab
or scrape) with a cloth soaked in soapy water and rinse with clear water.
6. Change
into uncontaminated clothes. Clothing stored in drawers or closets is
likely to be uncontaminated.
7. If possible,
proceed to a medical facility for screening.
What
to do after a biological attack
In many biological
attacks, people will not know they have been exposed to an agent. In such
situations, the first evidence of an attack may be when you notice symptoms
of the disease caused by an agent exposure, and you should seek immediate
medical attention for treatment. In some situations, like the anthrax
letters sent in 2001, people may be alerted to a potential exposure. If
this is the case, pay close attention to all official warnings and instructions
on how to proceed. The delivery of medical services for a biological event
may be handled differently to respond to increased demand. Again, it will
be important for you to pay attention to official instructions via radio,
television, and emergency alert systems. If your skin or clothing comes
in contact with a visible, potentially infectious substance, you should
remove and bag your clothes and personal items and wash yourself with
warm soapy water immediately. Put on clean clothes and seek medical assistance.
For more information, visit the website for the Centers for Disease Control
and Prevention, www.bt.cdc.gov.
Nuclear
and Radiological Attack
Nuclear explosions
can cause deadly effectsblinding light, intense heat (thermal radiation),
initial nuclear radiation, blast, fires started by the heat pulse, and
secondary fires caused by the destruction. They also produce radioactive
particles called fallout that can be carried by wind for hundreds of miles.
Terrorist
use of a radiological dispersion device (RDD)often called dirty nuke
or dirty bombis considered far more likely than use of a nuclear device.
These radiological weapons are a combination of conventional explosives
and radioactive material designed to scatter dangerous and sub-lethal
amounts of radioactive material over a general area. Such radiological
weapons appeal to terrorists because they require very little technical
knowledge to build and deploy compared to that of a nuclear device. Also,
these radioactive materials, used widely in medicine, agriculture, industry
and research, are much more readily available and easy to obtain compared
to weapons grade uranium or plutonium.
Terrorist
use of a nuclear device would probably be limited to a single smaller
suitcase weapon. The strength of such a weapon would be in the range
of the bombs used during World War II. The nature of the effects would
be the same as a weapon delivered by an inter-continental missile, but
the area and severity of the effects would be significantly more limited.
There is
no way of knowing how much warning time there would be before an attack
by a terrorist using a nuclear or radiological weapon. A surprise attack
remains a possibility.
The danger
of a massive strategic nuclear attack on the United States involving many
weapons receded with the end of the Cold War. However, some terrorists
have been supported by nations that have nuclear weapons programs.
If there
were threat of an attack from a hostile nation, people living near potential
targets could be advised to evacuate or they could decide on their own
to evacuate to an area not considered a likely target. Protection from
radioactive fallout would require taking shelter in an underground area,
or in the middle of a large building.
In
general, potential targets include:
* Strategic
missile sites and military bases.
* Centers
of government such as Washington, D.C., and state capitals.
* Important
transportation and communication centers.
* Manufacturing,
industrial, technology and financial centers.
* Petroleum
refineries, electrical power plants and chemical plants.
* Major
ports and airfields.
Taking shelter
during a nuclear attack is absolutely necessary. There are two kinds of
sheltersblast and fallout.
Blast shelters
offer some protection against blast pressure, initial radiation, heat
and fire, but even a blast shelter could not withstand a direct hit from
a nuclear detonation.
Fallout shelters
do not need to be specially constructed for that purpose. They can be
any protected space, provided that the walls and roof are thick and dense
enough to absorb the radiation given off by fallout particles. The three
protective factors of a fallout shelter are shielding, distance, and time.
* Shielding.
The more heavy, dense materialsthick walls, concrete, bricks, books
and earthbetween you and the fallout particles, the better.
* Distance.
The more distance between you and the fallout particles, the better.
An underground area, such as a home or office building basement, offers
more protection than the first floor of a building. A floor near the
middle of a high-rise may be better, depending on what is nearby at
that level on which significant fallout particles would collect. Flat
roofs collect fallout particles so the top floor is not a good choice,
nor is a floor adjacent to a neighboring flat roof.
* Time.
Fallout radiation loses its intensity fairly rapidly. In time, you will
be able to leave the fallout shelter. Radioactive fallout poses the
greatest threat to people during the first two weeks, by which time
it has declined to about 1% of its initial radiation level.
Remember
that any protection, however temporary, is better than none at all, and
the more shielding, distance and time you can take advantage of, the better.
Electromagnetic
pulse
In addition
to other effects, a nuclear weapon detonated in or above the earths atmosphere
can create an electromagnetic pulse (EMP), a high-density electrical field.
EMP acts like a stroke of lightning but is stronger, faster and briefer.
EMP can seriously damage electronic devices connected to power sources
or antennas. This include communication systems, computers, electrical
appliances, and automobile or aircraft ignition systems. The damage could
range from a minor interruption to actual burnout of components. Most
electronic equipment within 1,000 miles of a high-altitude nuclear detonation
could be affected. Battery powered radios with short antennas generally
would not be affected.
Although
EMP is unlikely to harm most people, it could harm those with pacemakers
or other implanted electronic devices.
What to do
before a nuclear or radiological attack
1. Learn
the warning signals and all sources of warning used in your community.
Make sure you know what the signals are, what they mean, how they will
be used, and what you should do if you hear them.
2. Assemble
and maintain a disaster supply kit with food, water, medications, fuel
and personal items adequate for up to 2 weeksthe more the better. (See
the Emergency Planning and Disaster Supplies chapter for more information).
3. Find out
what public buildings in your community may have been designated as
fallout shelters. It may have been years ago, but start there, and learn
which buildings are still in use and could be designated as shelters
again.
* Call
your local emergency management office.
* Look
for yellow and black fallout shelter signs on public buildings.
Note: With the end of the Cold War, many of the signs have been
removed from the buildings previously designated.
* If
no noticeable or official designations have been made, make your
own list of potential shelters near your home, workplace and school:
basements, or the windowless center area of middle floors in high-rise
buildings, as well as subways and tunnels.
* Give
your household clear instructions about where fallout shelters are
located and what actions to take in case of attack.
4. If you
live in an apartment building or high-rise, talk to the manager about
the safest place in the building for sheltering, and about providing
for building occupants until it is safe to go out.
5. There
are few public shelters in many suburban and rural areas. If you are
considering building a fallout shelter at home, keep the following in
mind.
* A
basement, or any underground area, is the best place to shelter
from fallout. Often, few major changes are needed, especially if
the structure has two or more stories and its basementor one corner
of itis below ground.
* Fallout
shelters can be used for storage during non-emergency periods, but
only store things there that can be very quickly removed. (When
they are removed, dense, heavy items may be used to add to the shielding.)
* See
the Tornadoes section in the Thunderstorms chapter for information
on the Wind Safe Room, which could be used as shelter in the event
of a nuclear detonation or for fallout protection, especially in
a home without a basement.
* All
the items you will need for your stay need not be stocked inside
the shelter itself but can be stored elsewhere, as long as you can
move them quickly to the shelter.
6. Learn
about your communitys evacuation plans. Such plans may include evacuation
routes, relocation sites, how the public will be notified and transportation
options for people who do not own cars and those who have special needs.
See the Evacuation chapter for more information.
7. Acquire
other emergency preparedness booklets that you may need. See the For
More Information chapter at the end of this guide.
What
to do during a nuclear or radiological attack
1. Do not
look at the flash or fireballit can blind you.
2. If you
hear an attack warning:
* Take
cover as quickly as you can, BELOW GROUND IF POSSIBLE, and stay
there unless instructed to do otherwise.
* If
you are caught outside, unable to get inside immediately, take cover
behind anything that might offer protection. Lie flat on the ground
and cover your head.
* If
the explosion is some distance away, it could take 30 seconds or
more for the blast wave to hit.
3. Protect
yourself from radioactive fallout. If you are close enough to see the
brilliant flash of a nuclear explosion, the fallout will arrive in about
20 minutes. Take shelter, even if you are many miles from ground zeroradioactive
fallout can be carried by the winds for hundreds of miles. Remember
the three protective factors: shielding, distance and time.
4. Keep a
battery-powered radio with you, and listen for official information.
Follow the instructions given. Local instructions should always take
precedence: officials on the ground know the local situation best.
What
to do after a nuclear or radiological attack
In a public
or home shelter:
1. Do not
leave the shelter until officials say it is safe. Follow their instructions
when leaving.
2. If in
a fallout shelter, stay in your shelter until local authorities tell
you it is permissible or advisable to leave. The length of your stay
can range from a day or two to four weeks.
* Contamination
from a radiological dispersion device could affect a wide area,
depending on the amount of conventional explosives used, the quantity
of radioactive material and atmospheric conditions.
* A
suitcase terrorist nuclear device detonated at or near ground
level would produce heavy fallout from the dirt and debris sucked
up into the mushroom cloud.
* A
missile-delivered nuclear weapon from a hostile nation would probably
cause an explosion many times more powerful than a suitcase bomb,
and provide a greater cloud of radioactive fallout.
* The
decay rate of the radioactive fallout would be the same, making
it necessary for those in the areas with highest radiation levels
to remain in shelter for up to a month.
* The
heaviest fallout would be limited to the area at or downwind from
the explosion, and 80% of the fallout would occur during the first
24 hours.
* Because
of these facts and the very limited number of weapons terrorists
could detonate, most of the country would not be affected by fallout.
* People
in most of the areas that would be affected could be allowed to
come out of shelter and, if necessary, evacuate to unaffected areas
within a few days.
3. Although
it may be difficult, make every effort to maintain sanitary conditions
in your shelter space.
4. Water
and food may be scarce. Use them prudently but do not impose severe
rationing, especially for children, the ill or elderly.
5. Cooperate
with shelter managers. Living with many people in confined space can
be difficult and unpleasant.
Returning
to your home
1. Keep listening
to the radio for news about what to do, where to go, and places to avoid.
2. If your
home was within the range of a bombs shock wave, or you live in a high-rise
or other apartment building that experienced a non-nuclear explosion,
check first for any sign of collapse or damage, such as:
* toppling
chimneys, falling bricks, collapsing walls, plaster falling from
ceilings.
* fallen
light fixtures, pictures and mirrors.
* broken
glass from windows.
* overturned
bookcases, wall units or other fixtures.
* fires
from broken chimneys.
* ruptured
gas and electric lines.
3. Immediately
clean up spilled medicines, drugs, flammable liquids, and other potentially
hazardous materials.
4. Listen
to your battery-powered radio for instructions and information about
community services.
5. Monitor
the radio and your television for information on assistance that may
be provided. Local, state and federal governments and other organizations
will help meet emergency needs and help you recover from damage and
losses.
6. The danger
may be aggravated by broken water mains and fallen power lines.
7. If you
turned gas, water and electricity off at the main valves and switch
before you went to shelter:
* Do
not turn the gas back on. The gas company will turn it back on for
you or you will receive other instructions.
* Turn
the water back on at the main valve only after you know the water
system is working and water is not contaminated.
* Turn
electricity back on at the main switch only after you know the wiring
is undamaged in your home and the community electrical system is
functioning.
* Check
to see that sewage lines are intact before using sanitary facilities.
8. Stay away
from damaged areas.
9. Stay away
from areas marked radiation hazard or HAZMAT.
For
more information relevant to terrorism consult the following chapters:
* The Earthquakes
chapter for information about protecting yourself when a building is
shaking or unsafe and the Fire chapter for tips on fire safety.
* The Hazardous
Materials Incidents chapter for information about sealing a home.
* The Emergency
Planning and Disaster Supplies chapter for information about preparing
a disaster supply kit.
* The Shelter
chapter for measures regarding water purification.
* The Evacuation
chapter for information about evacuation procedures.
* The Recovering
from Disaster chapter for information about crisis counseling.
Homeland
Security Advisory System
The Homeland
Security Advisory System was designed to provide a comprehensive means
to disseminate information regarding the risk of terrorist acts to federal,
state, and local authorities and to the American people. This system provides
warnings in the form of a set of graduated Threat Conditions that increase
as the risk of the threat increases. At each threat condition, federal
departments and agencies would implement a corresponding set of Protective
Measures to further reduce vulnerability or increase response capability
during a period of heightened alert.
Although
the Homeland Security Advisory System is binding on the executive branch,
it is voluntary to other levels of government and the private sector.
There are five threat conditions, each identified by a description and
corresponding color.
The greater
the risk of a terrorist attack, the higher the threat condition. Risk
includes both the probability of an attack occurring and its potential
gravity.
Threat conditions
are assigned by the Attorney General in consultation with the Assistant
to the President for Homeland Security. Threat conditions may be assigned
for the entire nation, or they may be set for a particular geographic
area or industrial sector. Assigned threat conditions will be reviewed
at regular intervals to determine whether adjustments are warranted.
Threat
Conditions and Associated Protective Measures
There is
always a risk of a terrorist threat. Each threat condition assigns a level
of alert appropriate to the increasing risk of terrorist attacks. Beneath
each threat condition are some suggested protective measures that the
government and the public can take, recognizing that the heads of federal
departments and agencies are responsible for developing and implementing
appropriate agency-specific Protective Measures:
Low Condition
(Green). This condition is declared when there is a low risk of terrorist
attacks. Federal departments and agencies will consider the following
protective measures.
* Refine
and exercise prearranged protective measures;
* Ensure
personnel receive proper training on the Homeland Security Advisory
System and specific prearranged department or agency protective measures;
and
* Institute
a process to assure that all facilities and regulated sectors are regularly
assessed for vulnerabilities to terrorist attacks, and all reasonable
measures are taken to mitigate these vulnerabilities.
Members of
the public can:
* Develop
a household disaster plan and assemble a disaster supply kit. (see Emergency
Planning and Disaster Supplies chapter).
Guarded Condition
(Blue). This condition is declared when there is a general risk of terrorist
attacks. In addition to the measures taken in the previous threat condition,
federal departments and agencies will consider the following protective
measures:
* Check
communications with designated emergency response or command locations;
* Review
and update emergency response procedures; and
* Provide
the public with any information that would strengthen its ability to
act appropriately.
Members of
the public, in addition to the actions taken for the previous threat condition,
can:
* Update
their disaster supply kit;
* Review
their household disaster plan;
* Hold a
household meeting to discuss what members would do and how they would
communicate in the event of an incident;
* Develop
a more detailed household communication plan;
* Apartment
residents should discuss with building managers steps to be taken during
an emergency; and
* People
with special needs should discuss their emergency plans with friends,
family or employers.
Elevated
Condition (Yellow). An Elevated Condition is declared when there is a
significant risk of terrorist attacks. In addition to the measures taken
in the previous threat conditions, federal departments and agencies will
consider the following protective measures:
* Increase
surveillance of critical locations;
* Coordinate
emergency plans with nearby jurisdictions as appropriate;
* Assess
whether the precise characteristics of the threat require the further
refinement of prearranged protective measures; and
* Implement,
as appropriate, contingency and emergency response plans.
Members of
the public, in addition to the actions taken for the previous threat condition,
can:
* Be observant
of any suspicious activity and report it to authorities;
* Contact
neighbors to discuss their plans and needs;
* Check
with school officials to determine their plans for an emergency and
procedures to reunite children with parents and caregivers; and
* Update
the household communication plan.
High Condition
(Orange). A High Condition is declared when there is a high risk of terrorist
attacks. In addition to the measures taken in the previous threat conditions,
federal departments and agencies will consider the following protective
measures:
* Coordinate
necessary security efforts with federal, state, and local law enforcement
agencies, National Guard or other security and armed forces;
* Take additional
precautions at public events, possibly considering alternative venues
or even cancellation;
* Prepare
to execute contingency procedures, such as moving to an alternate site
or dispersing the workforce; and
* Restrict
access to a threatened facility to essential personnel only.
Members of
the public, in addition to the actions taken for the previous threat conditions,
can:
* Review
preparedness measures (including evacuation and sheltering) for potential
terrorist actions including chemical, biological, and radiological attacks;
* Avoid
high profile or symbolic locations; and
* Exercise
caution when traveling.
Severe Condition
(Red). A Severe Condition reflects a severe risk of terrorist attacks.
Under most circumstances, the protective measures for a Severe Condition
are not intended to be sustained for substantial periods of time. In addition
to the protective measures in the previous threat conditions, federal
departments and agencies also will consider the following general measures:
* Increase
or redirect personnel to address critical emergency needs;
* Assign
emergency response personnel and pre-position and mobilize specially
trained teams or resources;
* Monitor,
redirect, or constrain transportation systems; and
* Close
public and government facilities not critical for continuity of essential
operations, especially public safety.
Members of
the public, in addition to the actions taken for the previous threat conditions,
can:
* Avoid
public gathering places such as sports arenas, holiday gatherings, or
other high risk locations;
* Follow
official instructions about restrictions to normal activities;
* Contact
employer to determine status of work;
* Listen
to the radio and TV for possible advisories or warnings; and
* Prepare
to take protective actions such as sheltering-in-place or evacuation
if instructed to do so by public officials.
Dr. Bill Wattenberg [kgo.com], suggests:
If you are outdoors and exposed to chemicals or nuclear, run of course, but even more important to cover your face and mouth, a wet towel, but you will not have that, so any piece of clothing that will allow you to breathe, men’s under shorts are good. A shirt or anything.
He talks about a wet towel over the face being egual to a ____ type of respirator.....[may not be the right word] a face mask, designed to protect you.
When you do reach the shelter, home or?, you must not wear your clothes into it, or you will contaminate it.
Strip outdoors, put the clothes in a plastic bag, and in the trash, they are ruined and cannot be saved.
Take a shower and wash your hair, with a good laundry soap, none of these sissy soaps, you want it all off and bare skin.
I would not reach for lotions to apply, as what is still on your skin, would be locked in by the lotion......just my thought.
And then you wait for the rest of the events, after sealing as many cracks, as under the doors, windows etc, as possible.
granny........
http://www.nationalterroralert.com/suspicious-activity/
Suspicious Activity
What To Do If You Spot Suspicious Terrorist ActivityIf you see suspicious behavior, do not confront the individuals involved.
Take note of the details:
S - Size (Jot down the number of people, gender, ages, and physical descriptions)
A - Activity (Describe exactly what they are doing)
L - Location (Provide exact location)
U - Uniform (Describe what they are wearing, including shoes)
T - Time (Provide date, time, and duration of activity)
E - Equipment (Describe vehicle, make, color etc., license plate, camera, guns, etc)
Suspicious activity is often recalled after an event. We must train ourselves to be on the lookout for things that are out of the ordinary and arouse suspicions.
Keep in mind, those who commit terrorist acts:
Usually live among us without appearing suspicious while planning and
preparing for their attack. They may be your neighbor, student or friend.
Often they will need training or equipment that will arouse suspicion.
Need to conduct surveillance on possible targets and
gather information on the planned attcak location.
All of these things make terrorists vulnerable to detection, by those watching for certain characteristics.
earn to recognize the difference between normal and abnormal behavior. It can be a fine line. Stay alert in your daily travels and routines and get to know:
Who your neighbors are
What cars are normally in your neighborhood
Who regularly makes deliveries at work and in your neighborhood
Staying alert is NOT about becoming paranoid. Staying alert is being aware of ones surroundings. Be alert to indications of possible trouble. They may include:
A local activity that could indicate problems in your community.
One of the clues that led to the recent break-up of a terrorist plot was that several of the cell members were spotted celebrating in an apartment complex on the anniversary of 911.
Previous activity or crimes.
Controversial issues being debated.
Suspicious thefts.
It is impossible to identify a terrorist by
Appearance
Nationality
Language
You CAN only identify a terrorist threat by observing or hearing about suspicious activity that may lead to a criminal act.
Identifying suspicious activity is not a difficult science. Rely on your judgment. Your suspicion of a threat could be confirmed with only one incident or it could take a series of incidents. Your suspicions will need to be based on:
Experience
Judgment
Common sense
Review some possible suspicious activity.
Here is just one example:
Unusual Interest in High Risk or Symbolic Targets
Maybe you are at a high profile location or, perhaps a National Monument and you notice a person nearby taking several photos. Thats not unusual. But then you notice that the person is only taking photos of the locations surveillance cameras, entrence crash barriers and access control procedures. Is that normal for a tourist? Not.
The following should cause a heightened sense of suspicion:
suspicious or unusual interest
surveillance (suspicious in nature)
inappropriate photographs or videos
note-taking
drawing of diagrams
annotating maps
using binoculars or night vision devices
Unusual or suspicious activity does not necessarily mean that terrorist activity is happening, but be aware of the following suspicious behaviors:
Individuals acting furtively and suspiciously
Individuals avoiding eye contact
Individuals departing quickly when seen or approached
Individuals in places they dont belong
A strong odor coming from a building or vehicle
An overloaded vehicle
Fluid leaking from a vehicle, other than the engine or gas tank
Over dressed for the type of weather
Fraudulent Identification
Many of the 9/11 terrorists were in the country illegally and using fraudulent IDs. Altering or using false government identification in any way and for any purpose is against the law.
Read a recent news article we featured discussing this.
Fraudulent IDs include:
drivers license
social security card
passport
birth certificate
INS identification
If you believe someone is using or has altered government identification, please notify the law enforcement authrities. Do NOT request to see another persons ID when not appropriate. Allow law enforcements to do the investigating.
Terrorists, when not acting alone, need to meet with their conspirators and often times work within a cell. Pay attention to visitors and guests that
arrive and leave at unusual hours
try not to be noticed
act in a suspicious manner
park an unusual distance from the meeting
have an unusual number of unrelated people living together
Not all people who maintain privacy are terrorists. But people intent on doing illegal acts want to be left alone.
Some signs that may raise your suspicions.
they only let you into the apartment or house with plenty of prior notice
they change the locks often
they keep certain rooms off limits
they cover tables and other pieces of furniture
they never allow maid service in a hotel room
they only take hotel room service outside the door
they only accept deliveries at the hotels front desk or outside a closed door
Deliveries are a common method for terrorists to carry out their attacks. Be aware of:
a vehicle with hazardous material parked or driving in an inappropriate area
unusual deliveries of chemicals or fertilizer
unattended bags or boxes in a public access place
fire extinguishers that may have been moved or tampered with
unusual or unexpected mail
Unusual Purchases or Thefts
Terrorists need supplies to carry out their attacks and accomplish their goals.
Pay attention to purchases, rentals or thefts of:
police, security, public utility, mail carrier, or airline uniforms and equipment
explosives
weapons
ammunition
propane bottles
toxic chemicals
vehicles able to contain or haul hazardous materials
Additional suspicious activity may include:
* Someone bragging or talking about plans to harm citizens in violent attacks or who claims membership in a terrorist organization that espouses killing innocent people.
* Suspicious packages, luggage, or mail that have been abandoned in a crowded place like an office building, an airport, a school, or a shopping center.
* Suspicious letter or package that arrives in your mailbox. (Stay away from the letter or package and dont shake, bump or sniff it; wash hands thoroughly with soap and water.
* Someone suspiciously exiting a secured, non-public area near a train or bus depot, airport, tunnel, bridge, government building, or tourist attraction.
* Any type of activity or circumstance that seems frightening or unusual within the normal routines of your neighborhood, community, and workplace.
* Someone unfamiliar loitering in a parking lot, government building, or around a school or playground.
* Anyone asking a lot of questions especially concerning routes or loads or drop-off times.
* Recruiters should be alert for unusual employment applications. Dont assume it couldnt be an inside job.
* A trucker returning to his or her vehicle from a restaurant or truck stop should make sure no one is loitering around the truck. Watch out for walk-arounds.
Best of all, so far:
Make your own gifts:
Excellent sites/patterns:
Another good collection of patterns:
Free clothing patterns, incl back packs:
http://www.breakitdowndesign.com/
Free tunic design, could be shirt or dress:
http://www.kaboodle.com/reviews/t-tunic-pattern
http://www.kaboodle.com/arlenem/sewing-stuff-free-pattern?startIndex=0§ion=
This site, I would put in my idea file, barter for patterns, done in an effort to become better known.
http://www.makethemyourself.com/free.html
Make your own soft soled leather shoes.
This page will help get you started, there was a period of about 3 years that I could not wear shoes of any kind on my feet, my friend Mary, started making me soft shoes.
She used things we found at the dump, LOL, or as she called it, the city exchange.
Old levi’s for the sole, old coats for a soft lining, pretty double knits or the material that struck her fancy for the tops.
This is much the same, but is a high top, Mary followed the canvas deck she or slip on shoe pattern, made them lined and simple.
At the time, I had a gift and antique shop, in Wellton, people liked my shoes so well that Mary made them in all sizes and I sold them in the store.
No, she didn’t get rich, but she made a little, of course if we had been on the internet.......how she would love it.
granny
Make your own soft soled leather shoes.
http://www.ohelene.net/blog/?p=118
The next site, I have dug in before, it is amazing what is tucked away here, also free paper dolls and halloween costumes:
http://www.costumes.org/advice/1pages/free_stuff.htm
http://weblog.signonsandiego.com/news/breaking/2008/03/disaster_supplies_to_stay_in_s.html
http://weblog.signonsandiego.com/news/breaking/2008/03/disaster_supplies_to_stay_in_s.html
March 28, 2008
Disaster supplies to stay put
A federal plan to move a cache of emergency medical supplies out of San Diego has been abandoned after local politicians cried foul.
The U.S. Department of Health and Human Services wanted to move the supplies to Los Angeles or Las Vegas under a plan to regionalize medical caches nationwide.
Three truckloads of supplies including tents, generators, surgical kits and medications have been stored in a Kearny Mesa warehouse since 1994. The supplies are used by local disaster teams for emergencies in San Diego as well as federal disasters, such as Hurricane Katrina.
The federal government announced it would move the supplies last month and local officials protested.
In a compromise announced Friday, the supplies will be stored at the naval base in Point Loma rather than shipped out of the county.
[This has nutrition in it too....LOL]
Velveeta Peanut Butter Fudge
1/2 lb Velveeta cheese
3/4 cup butter
1 tablespoon vanilla
1 cup peanut butter
2 lbs powdered sugar
Melt first 2 ingredients together in microwave.
Add vanilla, peanut
butter.
Then add sugar.
Knead like bread dough until you can no longer
see the sugar.
Roll candy with a glass.
Spread into greased pan.
Refrigerate until set. Cut and enjoy!
[This group has interesting old recipes, if you ignore the nut that has taken over several pages.....granny]
http://groups.google.com/group/rec.food.historic/topics
http://www.foodtimeline.org/fooddecades.html#1930s
Butterless, Eggless, Milkess cake
The original inspiration of Butterless, Eggless, Milkless cake dates back to the Medieval Ages. Spices and raisins were popular ingredients of that time. Great cakes and steamed puddings are hundreds of years old. These recipes were introduced to America by European settlers. Early American cookbooks are full of recipes for spice cakes (aka rich cakes and great cakes). Did you know up until the late 19th century fruit/spice cakes were served as wedding cakes?
Although thrifty pioneer cooks were well versed in “making do,” recipes for “Butterless, Eggless, Milkless” cakes begin to nudge their way into American cookbooks during the early years of the 20th century. Why? These ingredients were sometimes difficult to obtain from World War I through World War II, and cakes such as these were often served on family tables. Crisco, salad oil, lard, mayonnaise were the most common substitutions for the butter (fat). Baking powder/soda substituted for the eggs (to make the cake rise) and water (or canned soup) was used instead of milk (liquid). White sugar was also expensive and rationed during this period. Brown sugar, corn syrup, honey and molasses were often substituted. These cakes are found under a variety of names including “War Cake” and “Depression Cake.”
“Depression cake. In the March 1989 issue of Country Living, Food Editor Joanne Lamb Hayes assembled a fascinating colleciton of recipes to show “how families coped in the kitchen during the Great Depression and wartime.” This sugarless, eggless cake was developed during the First World War. “Sugar, the cheapest and most compact form of energy...was saved for our boys overseas, so creatie cooks learned to use molasses, honey, or corn syrup instead. For scarce wheat, they substituted barley, oats, for corn; for butter they used vegetable oil.” When the Great Depression arrived, just eleven years after the Great War, this frugal cake was renamed Depression cake.”
-—American Century Cookbook: The Most Popular Recipes of the 20th Century, Jean Anderson [Clarkson Potter:New York] 1997 (p. 441)
[NOTE: this book contains a recipe for Depression cake.]
RECIPES FOR BUTTERLESS, EGGLESS, MILKLESS CAKE
[1914]
“Butterless-Milkess-Eggless Cake.
2 cupfuls brown sugar
2/3 cupful Crisco
2 cupfuls water
2 cupfuls sultana raisins
2 cupfuls seeded raisins
1 teaspoonful salt
2 teaspoonfuls powdered cinnamon
1 teaspoonful powdered cloves
1/2 teaspoonful powdered mace
1/2 teaspoonful grated nutmeg
2 teaspoonfuls baking soda
4 cupfuls flour
1 teaspoonful baking powder
1 1/2 cupfuls chopped nut meats
3 tablespoonfuls warm water
Put Crisco into saucepan, add sugar, water raisins, salt, and spices, and boil three minutes. Cool, and when cold add flour, baking pweder, soda dissolved in warm water and nut meats. Mix and turn into Criscoed and floured cake tin and bake in slow oven one and a half hours. Sufficient for one medium-sized cake.”
-—A Calendar of Dinners with 615 Recipes, Marion Harris Neil [Procter & Gamble:Cincinnati] 1914 (p. 120)
[NOTE: Procter & Gamble manufactured Crisco shortening. This company cookbook shows the home cook how easy it is to incorporate Crisco into everyday recipes, including cakes.]
[1944]
“Butterless, Eggless, Milkless Cake (No Eggs):
1 c. Brown sugar, firmly packed
1 1/4 c. Water
1/3 c. Vegetable shortening or lard
2/3 c. Raisins
1/2 teasp. Nutmeg
2 teasp. Cinnamon
1/2 teasp. Powdered cloves
1 teasp. Salt
1 teasp. Baking soda
2 teasp. Water
2 c. Sifted all-purpose flour
1 teasp. Baking powder
Boil brown sugar, 1 1/4 c. Water, shortening, raisins, and spices together for 3 min. Cool. Add salt and baking soda which has been dissolved in 2 teasp. Water. Gradually add the flour and baking powder which have been sifted together, beating smooth after each addition. Bake in a greased and floured 8”X8”X2” pan in a moderate oven of 325 degrees F. About 50 min., or until done. Needs no frosting.”
-—The Good Housekeeping Cook Book, New edition, completely revised 1944 [Farrar & Rinehart:New York] 1944 (p. 698)
http://www.foodtimeline.org/foodcakes.html#wackycake
[Texas 1851]
“Pioneer Birthday Cake
This recipe was used to make a birthday cake for a small girl eighty-five years ago. There was no flour to be had, and corn was ground on a handmill. The meal was carefully emptied from one sack to another, and fine meal dust clinging to the sack was carefully shaken out on paper; the sack was again emptied and shaken, and the process was repeated labouriously time after time until two cupsful of meal dust was obtained.
The rest of the ingredients were as follows: 1/2 cup of wild honey, 1 wild turkey egg, 1 teaspoonful of homemade soda, 1 scant cupful of sour milk and a very small amount of butter, to all of which was added the meal dust.
The batter was poured into a skillet with a lid, and placed over the open fire in the yard, the skillet lid being heaped with coals.
To a little girl’s childish taste the cake was very fine, but looking back through the years, the nonoree said relfectively, “It was none too sweet.”
-—Cooking Recipes of the Pioneer, Bandera Library Association [Frontier Times:Bandera TX] 1936 (p. 23)
http://www.foodtimeline.org/foodcakes.html#wackycake
Wacky cake & Dump cake
Wacky cake is an interesting study in culinary chemistry. What sets Wacky Cake apart from other chocolate cakes? Vinegar and method.
It is interesting to note that two popular 20th century American food history books (Jean Anderson’s American Century Cookbook and Sylvia Lovegren’s Fashionable Food) place this recipe in the 1970s. Culinary evidence confirms this recipe existed in the 1940s. Wacky cake is but one example of the tradition of “make do” cakes that were popular during times of short supply. Contrary to popular opinion, eggless, butterless cakes were not invented at that time, they were revived from WWI days (which were revived from pioneer days). Dump Cake is another descendant of Wacky Cake in method.
“Dump cake. A cake made by “dumping” the ingredients directly into the baking pan, mixing them, and baking the batter.”
-—Encyclopedia of American Food and Drink, John F. Mariani [Lebhar-Friedman:New York] 1999 (p. 117)
The earliest reference we find to Dump cake is from a Duncan Hines company cooking brochure published in 1980 (sorry, we don’t own a copy).
“Wacky Cake or Crazy Cake. In a way, this is a variation on Chocolate Pudding Cake...But it takes the “quick-and-easy” one step further: The cake is mixed in the baking pan. That’s part of the wackiness. Another is that the batter contains vinegar and water, but no eggs. Like Chocolate Pudding Cake, this one is shortened with oil instead of butter or margarine.”
-—The American Century Cookbook: The Most Popular Recipes of the 20th Century, Jean Anderson [Clarkson Potter:New York] 1997 (p. 467)
RECIPES
[1943]
“Hole-In-The-Middle Cake 1 1/2 c flour
1 c sugar
2 T cocoa
1 t soda
1/2 c melted butter
1 c sour milk or cream
1 egg
1 t vanilla
Sift dry ingredients and make a deep hole in the middle. Add sour milk, egg, butter, and vanilla, and mix well. Bake in 350 dgtree oven 40 min.
Icing
1 c white sugar
1 c brown sugar
lump of butter
milk to moisten
Boil until it reaches the soft ball stage. Remove from fire and beat throroughly. Helen Olheim.”
-—The Connecticut Cookbook, Woman’s Club of Westport [Harper & Brothers:New York] 1944 (p. 210)
[1949]
“Wacky cake. A favorite recipe of Mrs. Donald Adam, Detroit, Michigan.
1 1/2 cups sifted flour
1 cup sugar
3 tablespoons cocoa
1 teaspoon soda
1/2 teaspoon salt
5 tablespoons shortening
1 tablespoon vinegar
1 teaspoon vanilla
1 cup cold water.
Sift flour, Measure. Add sugar, cocoa, soda and salt. Sift into greased and waxed paper lined 9X9X2 inch pan. Make 3 grooves in dry ingredients. Put shortening in 1 groove, vinegar in the second, and vanilla in the third. Pour over cold water. Beat until almost smooth. Bake in moderate oven (350 degrees F.) for 30 minutes. Makes 12 servings.”
-—New York Times, November 17, 1949 (p. 23)
[NOTE: This recipe was included in a display ad for The Time Reader’s Book of Recipes, Time magazine, (E.P. Dutton:New York)]
[1978]
Wacky Cake or Crazy Cake
Cake
1 1/2 cups sifted all-purpose flour
1 cup granulated sugar
2 tablespoons unsweetened cocoa powder
1 teaspoon baking soda
1/2 teaspoon salt
6 tablespoons vegetable oil
1 tablespoon vinegar
1 teaspoon vanilla extract
1 cup cold water
Frosting
3 tablespoons butter or margarine
1 cup sifted confectioners’ (10X) sugar
3 tablespoons unsweetened cocoa powder
1/2 teaspoon salt
1 teasoon vanilla extract.
1. Cake: preheat oven to 350 degrees F.
2. Sift four, sugar, cocoa, soda, and salt together into ungreased 8X8X2-inch baking pan.
3. Make three wells in mixture with spoon: one large, one medium, and one small. Into large well pour oil; into medium well, vinegar; into small well, vanilla. Pour water over all and stir with fork until smooth; do not beat.
4. Bake 30 to 35 minutes, until springy to touch
5. Frosting: Melt butter in saucepan, add 10X sugar, cocoa, salt and vanilla and beat until smooth. If too stiff to spread, thin with few drops hot water.
6. As soon as cake tests done, transfer to wire rack and spread at once with frosting. Cool cake before cutting.
-—Woman’s Day Old-Fashioned Desserts [1978], as reprinted in The American Century Cookbook: The Most Popular Recipes of the 20th Century, Jean Anderson [Clarkson Potter:New York] 1997 (p. 467)
http://www.foodtimeline.org/foodbeverages.html#cowboycoffee
ABOUT COFFEE SUBSTITUTES
When *real* coffee was unavailable, a variety of natural substitutes were employed. The final brew varied from somewhat acceptable to downright poor.
“Coffee Substitutes: As substitutes for coffee, some use dry brown bread crusts, and roast them; other soak rye grain in rum, and roast it; other roast peas in the same way as coffee. None of these are very good; and peas so used are considered unhealthy. Where there is a large family of apprentices and workmen, the coffee is very dear, it may be worth while to use the substitutes, or to mix them half and with coffee; but, after all, the best economy is to go without.
French coffee is so celebrated, that it may be worth while to tell how it is made; though no prudent housekeeper will make it, unless she has boarders, who are willing to pay for expensive cooking. The coffee should be roasted more than is common with us; it should not hang drying over the fire, but should be roasted quic; it should be ground soon after roasting, and used as soon as it is ground. Those who pride themselves on first-rate coffee, burn it and grind it every morning. The powder should be placed in the coffee-pot in the proportions of an ounce to less than a pint of water. The water should be poured upon the coffee boiling hot. The coffee should be kept at the boiling point; but should not boil. Coffee made in this way must be made in a biggin. It sould not be clear in a common coffee-pot.
A bit of fish-skin as big as a ninepiece, thrown into coffee while it is boiling, tends to make it clear. If you use it just as it comes from the salt-fish, it will be apt to give an unpleasant taste to the coffee: it should be washed clean as a bit of cloth, and hung up till perfectly dry. The whites of eggs, and even egg shells are good to settle coffee. Rind of salt pork is excellent. Some people think coffee is richer and clearer for having a bit of sweet butter, or a whole egg, dropped in and stirred, just before it is done roasting, and ground up, shell and all, with the coffee. But these things are not economical, except on a farm, where butter and eggs are plenty.
A half a gill of cold water, poured in after yo take your coffee-pot off the fire, will usually settle the coffee. If you have not cream for coffee, it is a very great improvement to boil your milk, and use it while hot.-—Amercian Frugal Housewife, 1830.”
-—Early American Beverages (p. 88-89)
Take of these roasted acorns ground like other coffee) half an ounce every other morning and evening, alone mixed with a dram of other coffee, and sweetened with sugar, or with or without milk. This receipt is recommended by a famous German physician, as a much esteemed, wholesome nourishing, strengthening nutriment for mankind; which, by its medicinal qualities, had been found to cure slimy obstructions in the viscera, and to remove nervous complaints when other medicines have failed.
Remark: Since they duty was taken off, West India coffees is so cheap that substitutes are not worth making. On the continent the roasted roots of the wild chicory, a common weed, have been used with advantaged. -—Family Receipt Book, 1819.”
-—Early American Beverages (p. 100)