Rule of Thumb For Exporting Technology

Rule of Thumb for exporting technology. The American People need piece of mind to get this economy moving. We should never export anything, which can be used as a weapon against the American people or our close allies, which we in fact cannot defeat quickly and effortlessly. Such as F-16's with electronic warfare components, Phoenix Missile Systems, Smart Bombs, UAVs, Small Pox Viruses. (Yep Ft. Detrich, want to read a scary book? Try Cobra Event and Hot Spot and the new one The Demon in the Freezer).

There is no excuse to give away technology or viruses, which can be combined with other technologies to produce weapons of mass destructions. WMDs are too common already and we cannot assume that today an ally will be a foe tomorrow. You guys ought to be up on this stuff and need not wait until you are warned by fiction writers such as Richard Preston, Tom Clancy or others to get you act in gear. Why is it that this careless stuff is happening? You have foreign scientists going through the annals of the Library of Congress, reading 1000's of pages a day from the PTO and we allow exports of technology to literally 155 countries? Who on Earth is watching these things. We get mad a Boeing and other component manufacturers for selling aluminum tubing and then in Washington freely respond to inquiries which are not verified? What is going on? Half of Washington D.C. is afraid of an attack meanwhile "those fine people in government" put us at risk?

Please spare me the Yellow, red, pink, color pastel finger paints. With the extra money we are spending to fight terrorism we are coming up with some dandy technologies which will spill into the private sector and create jobs, security, increased quality of life, efficiency for profits and so many benefits for mankind, yet those technologies used for DARPA's next wave, should be lock and key baby. No way in, no way out. As technology gets smaller it will be harder to detect and easier to conceal, and even more potent with the right enemy. We must slow the flow of technologies to potential adversaries and increase our forward momentum of offensive efforts to seek out and kill the enemy and make examples of them so others in those countries do not come calling. Shoulder launched SAM technologies, RF Bullet devises, etc, cannot fall into enemy hands until we have technologies to defeat them.

There are hundreds of technologies that we are developing now that are very efficient to defend our population, but without counter measures, we could get into trouble. Pay attention people. Half way is no way to run this country. If you are serious about the safety of the American People, then how come that message has not permeated the staffers and fine folks in government at the lower levels? Just some thoughts on this safety game, color scheme and reality check.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

disinfecting cleaning services Arlington Heights ..
In The News:

Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.

More Devastating Than a Nuclear Bomb

Despite their signature on the Biological Weapons Convention of 1975,... Read More

The FTC Purports and Misrepresents Their Law Enforcement Experience as It Attacks Business

We should all give much kudos to the Federal Trade... Read More

Let us Disband The FTC?s Franchising Division

Previously Senator Dick Armey and his staff in 2000 to... Read More

High Speed Trains and The Future of Transportation

Where are all the high-speed trains we were promised? Where... Read More

Protecting Our Buses from International Terrorists

We know that the International Terrorists like the idea of... Read More

Environmental Economics, Stream of Thought

Entrepreneurs can clean up the environment if we would let... Read More

Market Impeders and Market Inefficiencies

Even the most devout proponents of free marketry and hidden... Read More

RFID: Californias Identity Information Protection Act

Utah introduced a bill designed to limit the use of... Read More

US Government Regulators and Aides with AIDS

All government regulators or diplomat who are in high risk... Read More

Federal Trade Commission Will Not Monitor MLM Companies

Having been to every city in the country over the... Read More

The Blessings of the Black Economy

Some call it the "unofficial" or "informal" economy, others call... Read More

A Few Quick Thoughts on Freedom and Technology

We have known of the innate characteristic need of members... Read More

Simple Middle East Peace Plan

I. WARS ARE BASIC CONFLICTS OVER LAND. II. BOUNDARIES. THE... Read More

Jihad Will Continue

The Jihad against the Western World will continue. It will... Read More

Revitalizing The Power of the Baby Boomers

As baby boomers, we have been spoiled all of our... Read More

Army Recruiting Dilemma Discussed

Currently the US Army is having trouble recruiting. These problems... Read More

Council of Six

The head of the Club of Rome has said that... Read More

The Will To Fight for Islam

The more I study the dynamics of WWII the more... Read More

The Ugly American Returns!

Originally published in 1958, "The Ugly American" (Lederer & Burdick)... Read More

Where have all the Heroes gone

America is filled with standouts and perserverance; our nation has... Read More

Anarchy: Law, Order, and Authority

[Author's Note: Another essay that I wrote on notebook paper... Read More

America Needs an Education Reinvention Bill NOW!

In order to build a stronger, more self-sufficient America, America... Read More

The Liberal Solution: Assault a Conservative?

Ok, here is what happened: On March 31, 2005, Pat... Read More

The History of Trade and Using it as a Weapon for Peace

The Flow of Trade is a major consideration of civilizations... Read More

Gone With the Wind Almost Did Not Make It

Corporate America has been shaken recently by lawsuits and criminal... Read More

bathroom cleaning service Mundelein ..