Rule of Thumb For Exporting Technology

Rule of Thumb for exporting technology. The American People need piece of mind to get this economy moving. We should never export anything, which can be used as a weapon against the American people or our close allies, which we in fact cannot defeat quickly and effortlessly. Such as F-16's with electronic warfare components, Phoenix Missile Systems, Smart Bombs, UAVs, Small Pox Viruses. (Yep Ft. Detrich, want to read a scary book? Try Cobra Event and Hot Spot and the new one The Demon in the Freezer).

There is no excuse to give away technology or viruses, which can be combined with other technologies to produce weapons of mass destructions. WMDs are too common already and we cannot assume that today an ally will be a foe tomorrow. You guys ought to be up on this stuff and need not wait until you are warned by fiction writers such as Richard Preston, Tom Clancy or others to get you act in gear. Why is it that this careless stuff is happening? You have foreign scientists going through the annals of the Library of Congress, reading 1000's of pages a day from the PTO and we allow exports of technology to literally 155 countries? Who on Earth is watching these things. We get mad a Boeing and other component manufacturers for selling aluminum tubing and then in Washington freely respond to inquiries which are not verified? What is going on? Half of Washington D.C. is afraid of an attack meanwhile "those fine people in government" put us at risk?

Please spare me the Yellow, red, pink, color pastel finger paints. With the extra money we are spending to fight terrorism we are coming up with some dandy technologies which will spill into the private sector and create jobs, security, increased quality of life, efficiency for profits and so many benefits for mankind, yet those technologies used for DARPA's next wave, should be lock and key baby. No way in, no way out. As technology gets smaller it will be harder to detect and easier to conceal, and even more potent with the right enemy. We must slow the flow of technologies to potential adversaries and increase our forward momentum of offensive efforts to seek out and kill the enemy and make examples of them so others in those countries do not come calling. Shoulder launched SAM technologies, RF Bullet devises, etc, cannot fall into enemy hands until we have technologies to defeat them.

There are hundreds of technologies that we are developing now that are very efficient to defend our population, but without counter measures, we could get into trouble. Pay attention people. Half way is no way to run this country. If you are serious about the safety of the American People, then how come that message has not permeated the staffers and fine folks in government at the lower levels? Just some thoughts on this safety game, color scheme and reality check.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

detailed home cleaning Park Ridge ..
In The News:

Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.

MAURITANIA: Celebrating Tayas Ouster? Musical Chairs No Longer Fashionable In Africa

A few hours ago, Colonel Ely Ould Mohamed Vall, the... Read More

The Morality of Using Stem Cells

One third of all fertilized eggs spontaneously abort and are... Read More

Ronald Reagan is Right

Why is it that every single thing government does; it... Read More

Rule of Thumb For Exporting Technology

Rule of Thumb for exporting technology. The American People need... Read More

The Transformation Of Political Science And The Rise In Crime Rates

The current field of political sciences is dominated by a... Read More

Anyone Awake Out There?

As we reel from the news of the recent bombings... Read More

More Devastating Than a Nuclear Bomb

Despite their signature on the Biological Weapons Convention of 1975,... Read More

Liquidity or Liquidation

Large parts of the world today suffer from a severe... Read More

Mass Transportation Efficiencies and Price Per Rider Theories

Having redundancies and today's technologies in transportation we have protected... Read More

Anarchy: Law, Order, and Authority

[Author's Note: Another essay that I wrote on notebook paper... Read More

Count Rumford

Why did FDR say Benjamin Franklin, Thomas Jefferson and Count... Read More

Government Credit Card Abuse

Veterans Affairs Employees using government credit cards on personal items?... Read More

A Modern Lite in the Third World

Americans pride themselves on being the best, that's a fact.... Read More

Confession of a King

Rufus King: (Said to be the fifth most important person... Read More

Screening Trucks and Containers Coming Into Our Country

We presently have adequate sniffer devices in this country to... Read More

Monsanto Terminator Seeds

How do you feel about Terminator Seeds from Monsanto? I... Read More

We Are Turning a Corner in Foreign Relations, Thanks GW Bush!

Kudos goes out to the George Walker Bush's Administration and... Read More

Boston Bankers

Many people make a lot of money in war. In... Read More

National Archives Needs to Embed RFID Tags in Ink

Perhaps we should have printers with ink which has metallic... Read More

Jay Hammond - Alaska Governor and Creator of the Permanent Fund

Former Governor of Alaska, Jay Hammond, died at age 83,... Read More

Did 9-11 Change Everything for the Business Community

For the business community 9-11 changed everything. In our company,... Read More

An Environmental Voting Guide for US State Elections

In these times when states are suffering extreme downward pressure... Read More

Ground Gas Canisters for Land Mines

Land Mines have been one of the most evil left... Read More

Trains and the Flow of Fuel

Fuel costs seem to rank high in surveys of US... Read More

Where have all the Heroes gone

America is filled with standouts and perserverance; our nation has... Read More

express cleaning service Des Plaines ..