Rule of Thumb For Exporting Technology

Rule of Thumb for exporting technology. The American People need piece of mind to get this economy moving. We should never export anything, which can be used as a weapon against the American people or our close allies, which we in fact cannot defeat quickly and effortlessly. Such as F-16's with electronic warfare components, Phoenix Missile Systems, Smart Bombs, UAVs, Small Pox Viruses. (Yep Ft. Detrich, want to read a scary book? Try Cobra Event and Hot Spot and the new one The Demon in the Freezer).

There is no excuse to give away technology or viruses, which can be combined with other technologies to produce weapons of mass destructions. WMDs are too common already and we cannot assume that today an ally will be a foe tomorrow. You guys ought to be up on this stuff and need not wait until you are warned by fiction writers such as Richard Preston, Tom Clancy or others to get you act in gear. Why is it that this careless stuff is happening? You have foreign scientists going through the annals of the Library of Congress, reading 1000's of pages a day from the PTO and we allow exports of technology to literally 155 countries? Who on Earth is watching these things. We get mad a Boeing and other component manufacturers for selling aluminum tubing and then in Washington freely respond to inquiries which are not verified? What is going on? Half of Washington D.C. is afraid of an attack meanwhile "those fine people in government" put us at risk?

Please spare me the Yellow, red, pink, color pastel finger paints. With the extra money we are spending to fight terrorism we are coming up with some dandy technologies which will spill into the private sector and create jobs, security, increased quality of life, efficiency for profits and so many benefits for mankind, yet those technologies used for DARPA's next wave, should be lock and key baby. No way in, no way out. As technology gets smaller it will be harder to detect and easier to conceal, and even more potent with the right enemy. We must slow the flow of technologies to potential adversaries and increase our forward momentum of offensive efforts to seek out and kill the enemy and make examples of them so others in those countries do not come calling. Shoulder launched SAM technologies, RF Bullet devises, etc, cannot fall into enemy hands until we have technologies to defeat them.

There are hundreds of technologies that we are developing now that are very efficient to defend our population, but without counter measures, we could get into trouble. Pay attention people. Half way is no way to run this country. If you are serious about the safety of the American People, then how come that message has not permeated the staffers and fine folks in government at the lower levels? Just some thoughts on this safety game, color scheme and reality check.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

recurring cleaning service Mundelein ..
In The News:

The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.

Rants by Lance: BRAC Committee Talks Irrelevant Completely

It is amazing we have so many men, who belong... Read More

Medicade Scam; Worse than You Think

You are not going to believe what is going on... Read More

Cracking Down on Cigar Counterfeiters

In the most rewarding new industries, there is often a... Read More

Think You Dont Need A License for A Wireless Microphone? Think Again

Believe it or not, every theatre, church, or Britney Spears... Read More

The Protocols of Sion #1

There is a lot of debate about who made the... Read More

Alternative to Land Mines in Middle East

With the recent threats from Bin Laden and Al Queda... Read More

Suicide Prevention in Prisons

Prison guards and corrections professionals are hard at work insuring... Read More

Droughts, Dirty Water and Disease

When we go through periods of droughts we also have... Read More

The Economic Giant-- A Closer Look at China

IT'S NO LONGER NEWS THAT CHINA IS BECOMING A MAJOR... Read More

The Macedonian Lottery

Every conflict has its economic moments and dimensions. The current... Read More

Public Procurement and Very Private Benefits

In every national budget, there is a part called "Public... Read More

Thomas Paine / Jefferson

Conor MacDari was a Mason but his Masonry deplored the... Read More

Protecting Children From Porn

There's a new Michigan state register (at https://www.protectmichild.com/) in the... Read More

An Introduction to the Connecticut State Budget for 2004-2005

The Connecticut Conference of Municipalities (CCM) is interested in the... Read More

DC Lawyers; Have I Got a Case for You?

This is no time for the Black community to sue... Read More

The Worlds Eldest Democracy Was A Truly Romantic Affair

Visible remnants of the world's eldest democracy can be seen... Read More

Predator or Prey; Hunter or the Hunted; Teacher or the Pupil; Winning or Losing?

This is a thought on the study of Home and... Read More

Is This All There Is?

In today's Rants from Lance session I address the question... Read More

Electronic Commerce Taxaton: Emerging Legal Issues - Part II

UNAUTHORIZED HACKINGThe term "computer hacking" traditionally describes the penetration into... Read More

3D Tactical Image Projection Enhanced Decoy System

I propose a special Projection Device code-named: "TIPED". This system... Read More

Birth of a Nation

When you see hooded Klansmen walking up Pennsylvania Avenue to... Read More

Operation Iraqi Freedom, Soldiers and Their Psyche

Have you noticed that the when the service men who... Read More

Fight Terror, With Education

A War on Terrorism? Conventional war being brought on an... Read More

Canning International Terrorists? Literally

Well here is a great new product, we first saw... Read More

The Criminality of Transition

Lecture given at the Netherlands Economic Institute (NEI) on 18/4/2001Human... Read More

tidy up service Buffalo Grove ..