25 November 2013

cottage potato casserole

 

ham...broccoli....potatoes.... cheeeeeese... how much more dreamy can you get on a rainy cold autumn or winter evening??  cold?  warm up with this.

 

this recipe is a giant, heavy 9x13 pan, usually with leftovers after this crew dives in.  i use pork products: ham, ground sausage, polska kielbasa, brats... whatever is leftover and sitting in the freezer.... but i am sure you can use birds or cows.  this is my ultimate "freezer casserole" because i always use leftover prepared meat that has been chopped & frozen, frozen broccoli, and frozen potatoes. takes less than 10 minutes to prepare, with a 45-60 min bake time.

 

32oz bag of frozen hash browns (the cubed potatoes, not the shredded stringy things)

2 cans cream of [whatever flavor you want] soup  (i mix it up and combine flavors.  wild thing.  i know it.)

1 cup sour cream (yes, we use fake sour cream so i get to eat)

4-6 oz shredded cheddar cheese (i usually omit this and just sprinkle cheese on top as it is served because my fake cheese is too expensive to serve up all of us)

2 C chopped cooked ham

1 pound chopped broccoli

(i add french fried onions in the last 5 min for some zing)

salt & pepper to taste

 

combine soups, sour cream, and cheese in a large mixing bowl.  i mean LARGE.

pour in potatoes, ham and broccoli.  stir like mad until well combined.

spray 9x13 baking dish with cooking spray.  dump really cold mixture into prepared dish.  even the casserole out.  season.

bake at 350 x 45-60 minutes.  add french fried onions in last five minutes. 

 

nom on the couch wrapped in your favorite blankie, watching movies.  or just at the table, playing uno.  at least have the decency to put on slipper socks.

25 October 2013

the origin of my nightmares. it really is an essay. five pages.

 

“[H]ow frequently, and without any terrorist action at all, we dance along the knife’s edge between safety and catastrophe.” (p 75)  Charles “Sam” Faddis lays everything out in his book, Willful Neglect, describing in gruesome detail at times, the probable consequences of inaction in protecting our nation’s delicate infrastructure.  Multiple times throughout his writing, he assures the reader that he is “no expert” in various avenues, such as SWATeam operations, physical security details, and psychiatric diagnoses; however, his unique counterterrorism background, born in the grit of Iraq and Afghanistan, overrides those technicalities, because, well, he has a point.  He has a lot of points.  Those points are sharp and should be driven through the heart of the Department of Homeland Security.

Sam Faddis spent years as part of teams designed to infiltrate terrorist organizations.He has the know-how to insert himself unnoticed into places where he does not belong. For the purposes of Willful Neglect, he remained a law-abiding citizen and stayed outside of locked fences, on public-accessible roads and walkways, taking only pictures and leaving only footprints.He did not trespass, but took precise notes about how one might be able to do that very thing, if one had the desire, knowledge, expertise, and arsenal to back one up.

Terrorist organizations have all four.

Mr. Faddis conducted digital reconnaissance prior to visiting any site and found shocking open source details on security measures, and the lack thereof, before setting foot on the ground, like a good terrorist would.

Next he cased his site, either himself or with the assistance of a colleague, sometimes on more than one occasion.In one instance, his fourteen-year-old son was able to observe a security perimeter for five minutes and determine that the easiest method to penetrate the perimeter of that American military installation was a vehicle-born improvised explosive device straight through the front gate. (p 9) What a stark demonstration of how defenseless we really are. Mr. Faddis raises blisters on the skin of security measures in our country.

When written in 2009, he compared the clock-ticking eight hours between the bombing of Pearl Harbor and the obliteration of Clark Field in the Philippines to the eight years of stagnation between 9/11 and that present day. Nothing meaningful was done. In eight hours’ time, the aircraft of Clark Field could have been scrambled to other locations, hidden, or used in a counter-offensive.Instead, they were destroyed while sunning on the deck. (p vi

In eight years’ time, we have the security theater of the Transportation Security Administration in the airports, but nothing is stopping a would-be terrorist from simply creating a home-made IED with a sensitive altimeter to detonate when a chlorine car is at a particular depth inside the Baltimore Howard Street Tunnel. "I visited the port areas of Baltimore. […] Over the course of several months, […] I encountered no fences, and never saw any security presence of any kind.” (p 83) As a military veteran, as a citizen of the United States, and as a resident of the state of Maryland, I find that last statement completely unacceptable.

In each chapter of the book, Mr. Faddis describes, in great detail, an accident that occurred. He notes the root cause, whether it was structural failure, human error, human stupidity, mechanical failure, or something else. He then describes the aftermath. He lists the known body count and injuries, structural damage in dollar amounts, disruption of infrastructure and support networks (including transportation, utilities, businesses, and schools), cost of cleanup, and more. He then gathers his digital reconnaissance notes and maps and takes a day trip or asks a colleague to take a trip in his place.

As a law-abiding citizen he “cases” his locations, noting perimeter barriers, security presence, camera equipment, access points, judges distance and obstructions between perimeter barriers and key structures within each compound, and takes photos.In his year of research and physical reconnaissance, he encountered exactly one security guard, not including the military installations. That security guard waved from behind the wheel of a truck as Mr. Faddis was walking away from a security gate, padlocked with a single chain, at the end of a road. Apparently Kearney Port Security did not find a lone person on foot at the end of a road at the entrance to “the single-most dangerous chemical facility in America” (p 89) extraordinary enough to even slow down and inquire about the business of Mr. Faddis at that location. Disgusting.

Mr. Faddis outlines holes in security networks in our nation’s infrastructure. On the mass transit systems between Maryland and New York, he noted that “more people pass through Penn Station than all three major airports servicing the region combined.” (p 32) At one of the thousands of Bio-Safety Level 3 (BSL3) labs, whose “express purpose is to conduct research on dangerous microorganisms that cause disease,” (p152) Mr. Faddis was able to enter the building without notice or identification, but did not attempt to enter the actual labs. Based on his observations, he would have been able to force an entry and then get away with very little effort. By contrast, the bank branch nearby had visible security cameras and signage as well as a reception area requiring one to state one’s business prior to further entry to the building. “Evidently it was significantly more important to protect money than viruses capable of killing human beings.” (p 152)

In multiple instances of each chapter, he goes on to summarize, as a terrorist, using terrorist tactics and widely-known terrorist weapons, how many ways each installation could be breached. Mr. Faddis does a fine job of pointing the fingers in the correct direction, admonishing the parties responsible for maintaining tight security. The Nuclear Regulatory Commission’s standards for maintaining security at the nuclear plants nationwide are sadly lacking imagination. “[S]emantics aside, we are not really talking about a Design Basis Threat. We are talking about a Money Basis Threat. We work the equation backwards. We decide what we are willing to make the power companies pay, and then we calculate how many guards and guns that will buy.” (pp 181-182)

Unable to gain access to nuclear power plants without causing a big stink, Mr. Faddis conducted many interviews with persons who were connected to the nuclear industry. These interviews found that terrorist “drills” conducted at the plants resulted in a nuclear meltdown in 28 out of 29 attempts, even when the guards were aware of the number of attackers, the “plan of attack,” and end goal due to drill repetition. One private firm, unable to afford to fire guards who failed yearly certification tests, began to hand out the answer key just to maintain adequate staffing. ( p 185)

In the final chapter, Mr. Faddis discusses five steps to begin safeguarding our nation’s many layers of infrastructure, beginning with “Taking the Threat Seriously.” (p 197) Throughout his book, that sentiment has been the drumbeat behind every unlocked gate, every guard shack defended by a single sidearm, every bio-research lab that can be accessed via an open exterior window, (p 151) every lonely dry-storage cask on a tv monitor 30-40 minutes away from the nearest law-enforcement facility, and every road that has been designed to drive straight across the top of a hydroelectric dam.

It is clear that our leadership is not taking any of these threats to our “principally, high value targets and critical infrastructure” (p xi) seriously. A terrorist has no need to smuggle anything. As Timothy McVeigh so aptly showed the American public, a terrorist can rent a truck, build a bomb inside of it and drive that bomb directly where the terrorist wants it to go. Whether that bomb is driving straight through a chain link fence into the chlorine tanks at the Back River wastewater treatment plant, parked in traffic at the center of the Conowingo Dam, rammed via speedboat into the side of an LNG tanker in the Chesapeake Bay, or plowing through a platoon of Marine Corps graduates assembled on the parade deck on Parris Island, SC, these threats are real and very little security exists to be enforced to prevent these tragedies.

I already have nightmares about not doing enough to protect the citizens of this country. My skin crawled as I read about the dangers that go completely unnoticed, un-flagged, and unpublicized in my area alone.I have only lived in Maryland since 2002, and in reading Willful Neglect, this is the first time I have heard of the LNG facility proposed in Sparrows Point. Apparently it was quite the hot topic.One of my sons aspires to be an environmental science student in Sparrows Point. In an accidental or intentional release of LNG from the Sparrows Point facility, my son would be within the 2.7-mile “fireball” radius, and the accompanying 1100-meter thermal radiation “incinerate-on-contact” radius. (p 100) Charming. A quick Google search this morning showed that just three weeks ago, the terminal project was scrapped after seven years; the company cited no reasons for pulling the plug. I did not hear about that story either. I get to breathe a sigh of relief in knowing that at least he won’t meet his untimely death in a LNG fireball.

This reading assignment did absolutely nothing to help me sleep better at night.

07 October 2013

pumpkin snickerdoodles

 

guess what i am doing.....  :D

 

3-3/4 C flour

1-1/2 t baking powder

1/2 t salt

1/2 t ground cinnamon

1/4 t ground nutmeg

1 C (2 sticks) unsalted room temp butter, ((although i have been known to use 1/2 C butter, 1/2 C butter shortening))

1 C sugar

1/2 C dark brown sugar

1 C pumpkin puree

1 large egg

2 t vanilla extract

 

For the coating:

1/2 C sugar

1 t cinnamon

1/2 t ground ginger

Dash of allspice

 

1. combine flour, baking powder, salt, cinnamon, and nutmeg.

2.  beat together butter and sugars on medium speed until well combined. beat in pumpkin. then add the egg and vanilla extract. add in the dry ingredients. Beat until combined, but do not overmix.

3.  cover & refrigerate for one hour, until firm.

Preheat oven to 350.

stir the sugar and spices in a small bowl. scoop into about 1" ball and roll in spiced sugar.  flatten slightly on parchment paper lined sheet.   bake x 10-12 minutes. cool on the baking pan for approximately 5 minutes, then transfer to wire cooling racks to cool completely.

apple-cranberry stuffed pork tenderloin

 

~3 pound roast - butterflied, then each half butterflied again.  beat heartily with mjulnir (that's what i call my meat mallet...)

1C croutons (i had leftover homemade italian spiced bread AWESOME)

1-1/2 C finely diced granny smith apple (i used fuji.  i don't follow directions well.)

1/2 C toasted walnuts (i used almonds...see?)

3/4 C chicken stock or white wine (.....i used woodchuck fall cider)

1/2 C craisins

1/4 C chopped shallots

1 t crushed rosemary

 

1.  beat your meat to about 1-inch thick.  salt & pepper to taste.  but don't actually taste it yet.

2.  soak croutons in stock x 5 minutes.  mash w/for and add rest of ingredients.

3.  spread on roast to within 1" of edges.  roll tightly from shortest side.  tie with kitchen twine.  (pretty sure the kids used my twine to make bows to shoot arrows in the back yard, so i secured them with 3 toothpicks.  but that was tough!!)

4.  oil roasting pan.  (i forgot.  it was fine.)  cook uncovered at 325 x 1 hour 10 min or until internal temp reacheds 140-145.  let stand 10 minutes.  untie, slice, and savor.

25 September 2013

you mad, bro?

 

ok.  scenario:  several gender-neutral employees - terry m., chris a., taylor g., etc...  these employees are working on a project.  they are not shown in a picture, otherwise they would be listed in order of appearance L-R in the picture.  how should their names be placed in the article?

 1 - alphabetical by last name

2 - chronological by tenure

3 - highest ranking first

any one of those is acceptable, correct?  well, what if all three were true about the group?  what if the highest-ranking person was also the one with the longest tenure, chris a?  what if the second-longest-tenured person was the same rank as the the third, and their last names happened to also fall in the tenure and alphabetical pattern?  does that automatically mean that chris is the boss of the project?  it does not say so in the article.  no one is named as "in charge" in the article.

you would list them in the article as sergeant chris a., private taylor g., and private terry m., correct?

of all the childish, panty-twisting, acid-reflux things to be mad about....  and on that note, I AM NOT THE ONE WHO CHANGED THAT.  try talking to me instead of making assumptions that i think i am the "boss" of the whole thing.  i have never said any such thing and i have

never

taken credit for your work... i make sure everyone knows how hard you have worked.  it would be nice to see you return the favor instead of being a douchecanoe.  if i wanted the silent treatment i would talk to my mother, ya dick.

(...she posts on the internet instead of talking to him directly... ahh, the irony.  too pissed to have a conversation tho.)

16 July 2013

the cookies i lerve

 

Nancy Olin's Chocolate Chip Cookies

from the Bake Sale Cookbook, 2000

  • 1 cup (2 sticks) unsalted butter, at room temperature
  • 1 cup light brown sugar
  • 3/4 cup white sugar
  • 2 large eggs, at room temperature
  • 1 generous teaspoon vanilla extract
  • 2 cups all-purpose white flour
  • 3/4 teaspoon baking soda
  • 1 teaspoon kosher salt
  • 2 cups semi-sweet chocolate chips

Preheat the oven to 340 degrees. Line a cookie sheet with parchment paper.

Place the butter and sugars in the bowl of a mixer fitted with the paddle attachment and mix until smooth and creamy. Scrape down the sides of the bowl, add the eggs and vanilla, mixing well between additions. Scrape down the sides of the bowl, add the flour, baking soda and salt and mix until everything is well incorporated. Scrape down the sides of the bowl, add the chocolate chips and mix again.

Drop the cookies by heaping tablespoons 2 inches apart onto the prepared pan. Transfer to the oven and bake until the cookies begin to brown on the edges but are soft in the middle, 10 to 12 minutes. Cool on the cookie sheet for 2 to 3 minutes and then transfer to a wire rack. Let the cookie sheet cool completely between batches and repeat with remaining dough.

19 May 2013

dairy-free spinach quiche

yields 6-8 servings depending on how ya slice it


3 C wilted spinach

leftover veggies (mushrooms, onions, peppers...)

6 eggs

3T flour

3/4 C almond milk

1/2 tsp each baking powder, salt, paprika, thyme

pie crust



preheat oven to 350.

i wilt my spinach in butter and then saute the veggies. (you could add cooked sliced sausage or crumbled bacon in this step too.) tonight we have thin-sliced yellow zucchini, minced garlic, and fire-roasted red peppers mixed in with our spinach, and i added 1/4 tsp roasted coriander to see how it turns out.



beat 1 egg until lemon-colored. combine with flour.

add remaining 5 eggs, milk and spices.

fold in spinach & veggies. salt & pepper to taste.

pour into pie crust and bake for 45-50 min.

let it rest for 5-10 minutes before cutting.



noms. we serve with a side of sausages or bacon and muffins.

08 February 2013

split hairs


student A has a drink in the classroom. this drink is not part of or provided by BCPS school breakfast program. student A puts the drink on a file cabinet between the teacher's desk and the trash can. this location is not recognizable as "near" student A's desk. an unknown number of other students may or may not have been playing with the drink, picking it up and pretending to drink out of it.
student B sees the drink next to the trash and throws it away. student B claims to not know the owner until after it was in the trash.
student A picks up student B's binder and throws it across the room. student A is sent to the office.
student B is called to the office. student B is given a 2-hour after school detention for touching another student's property by throwing the drink in the trash.
W. T. F.
1. drinks are not allowed in the classroom. student A was breaking the rules. student B should not have touched the drink. student B should apologize and possibly replace the price of the drink.
2. if student A had not thrown a temper tantrum, would student B get a detention anyway? that question is apparently "splitting hairs."
3. will the will the first students to "play with the drink" be given detention for touching student property? how about student A? he touched student B's property when he threw it across the room. the administration "will not discuss other students."
bottom line is, sweetcheeks, my boy isn't serving a detention for throwing trash away. next time, make sure your students are all obeying the rules, and there won't be a drink in the classroom at all. i split hairs for a living.

details of a domestic goddess

part-time SAHM to four kids: Bear (96), Schmoo (99), Hercules (01), and Princess (02). I wear many hats, including that of the chef, maid, nanny, chauffeur, accountant, triage nurse, laundress, educator, admin assistant, maintenance, gardener, weekend warrior, and just mom too. when i'm not busy momming, i get up at 2am to go to work as an international spy.