Rule of Thumb For Exporting Technology

Rule of Thumb for exporting technology. The American People need piece of mind to get this economy moving. We should never export anything, which can be used as a weapon against the American people or our close allies, which we in fact cannot defeat quickly and effortlessly. Such as F-16's with electronic warfare components, Phoenix Missile Systems, Smart Bombs, UAVs, Small Pox Viruses. (Yep Ft. Detrich, want to read a scary book? Try Cobra Event and Hot Spot and the new one The Demon in the Freezer).

There is no excuse to give away technology or viruses, which can be combined with other technologies to produce weapons of mass destructions. WMDs are too common already and we cannot assume that today an ally will be a foe tomorrow. You guys ought to be up on this stuff and need not wait until you are warned by fiction writers such as Richard Preston, Tom Clancy or others to get you act in gear. Why is it that this careless stuff is happening? You have foreign scientists going through the annals of the Library of Congress, reading 1000's of pages a day from the PTO and we allow exports of technology to literally 155 countries? Who on Earth is watching these things. We get mad a Boeing and other component manufacturers for selling aluminum tubing and then in Washington freely respond to inquiries which are not verified? What is going on? Half of Washington D.C. is afraid of an attack meanwhile "those fine people in government" put us at risk?

Please spare me the Yellow, red, pink, color pastel finger paints. With the extra money we are spending to fight terrorism we are coming up with some dandy technologies which will spill into the private sector and create jobs, security, increased quality of life, efficiency for profits and so many benefits for mankind, yet those technologies used for DARPA's next wave, should be lock and key baby. No way in, no way out. As technology gets smaller it will be harder to detect and easier to conceal, and even more potent with the right enemy. We must slow the flow of technologies to potential adversaries and increase our forward momentum of offensive efforts to seek out and kill the enemy and make examples of them so others in those countries do not come calling. Shoulder launched SAM technologies, RF Bullet devises, etc, cannot fall into enemy hands until we have technologies to defeat them.

There are hundreds of technologies that we are developing now that are very efficient to defend our population, but without counter measures, we could get into trouble. Pay attention people. Half way is no way to run this country. If you are serious about the safety of the American People, then how come that message has not permeated the staffers and fine folks in government at the lower levels? Just some thoughts on this safety game, color scheme and reality check.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

no-contract cleaning service Mundelein ..
In The News:

Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.

Congress Considers National Data Privacy Law

Legislation was introduced into Congress this week that would establish... Read More

What Price Loyalty?

With the recent shakeups in the presidential cabinet, it has... Read More

Cindy Sheehan ? President Bush and the Accountability Moment

Death may not be dignified in any light but the... Read More

The New Goo Review is Coming Right At You

Non-lethal Goo Concepts have been tossed around by many war... Read More

The Dawn On The Nile Valley Has Secrets To Tell!

Amnesty International comments on the proposal that has been laid... Read More

Employment Legislation: Proposed Employment Law Changes - To Take Effect 1 October 2005

Proposed changes to the Sex Discrimination Act ("SDA") 1975 and... Read More

Are American Twins - Majority Rule and Public Opinion, Sometimes Just a Couple of Dumbbells?

The idea that the majority shows the will of the... Read More

OPECs Swan Song?

Indonesia's Energy Minister, Purnomo Yusgiantoro, is unhappy with the modest... Read More

World Moving from Socialism to Capitalism

The recent Jakarta summit of Asia and Africa brought remembrance... Read More

Death and Destruction and the Run Up to D Day

This is the third in a short series of four... Read More

NASCAR to be Shut Down by FTC?

The Federal Trade Commission has very important Anti-trust Laws. They... Read More

Some Farmers and Organic Growers are Upset at Monsanto

The organic farmers are angry that Monsantos terminator GM seeds... Read More

Victims of Child Support

"Similar to Medieval Inquisitions, judges have been given the authority,... Read More

Faith in Our Government

Many have lost faith in the government and are completely... Read More

The Dawn On The Nile Valley Has Secrets To Tell! (2)

Submiting the Criminals to The ICC!Everybody concerns about justice in... Read More

Thomas Paine / Jefferson

Conor MacDari was a Mason but his Masonry deplored the... Read More

A Few Quick Thoughts on Freedom and Technology

We have known of the innate characteristic need of members... Read More

Population Control and Water Supply Issues

As we increase our populations every new soul will require... Read More

The U.S. Department of Justice vs. the Realty Industry, and Its Effect on Consumers

From the National Association of Realtors' Virtual Office Website policy,... Read More

The Gun Control Debate

The gun control debate in America is a battle between... Read More

Mexicanizing America

A friend of mine, who lives in the thick of... Read More

Internet in Russia and Ukraine - Part 1. General Information and Statistics

User BaseThe non-US and non-English Web segments have been boosted... Read More

Economic Illiteracy Can Be Very Costly!

I'VE ALWAYS ARGUED THAT ECONOMIC ILLITERACY IS VERY COSTLY.This is... Read More

Top 30 Politics Quotations

"It is the duty of every citizen according to his... Read More

More Devastating Than a Nuclear Bomb

Despite their signature on the Biological Weapons Convention of 1975,... Read More

maid service near Glenview ..