Category: Security

  • A New Vision for American Power: The Peace Through Strength Act

    Rename the NDAA: It’s time to stop calling our primary military bill the “National Defense Authorization Act.” A name that reflects our true goal, The Peace Through Strength Act, is a more honest and strategic choice.

    Pivot from Ukraine to Harden NATO: Stop funding the un-winnable conflict in Ukraine and redirect those resources to prepare our actual NATO allies for Russia’s real test. This means wargaming and preparing for “Gray Zone” attacks on the Baltics and probes of the Suwałki Gap, ensuring our treaty commitments are backed by undeniable force.

    Secure Our Northern Flank: Acquire Greenland: We should begin the process of purchasing Greenland from Denmark. This move would secure vital rare-earth minerals, grant the U.S. permanent strategic dominance in the Arctic, and provide an unshakeable check against Russian and Chinese ambitions in our hemisphere.

    Give Taiwan a Choice: Present Taiwan’s critical industries (like TSMC) a “golden ticket” offer to relocate to the United States. If they refuse, our strategic focus will pivot to reinforcing our treaty allies in the region, including Japan, South Korea, the Philippines, and Australia.

    Redefine National Service: Instead of forcing women into draft registration, inspire a new patriotism. Allow women to register for the Selective Service with the clear understanding they would serve in a smaller capacity and primarily in non-combat and support roles, promoting national readiness through inspiration, not a mandate.

  • The Real Threat Isn’t AI, It’s Email and Things Like It

    The Real Threat Isn’t AI, It’s Email and Things Like It

    The panic over the Claude AI being used for cybercrime is misplaced. The AI isn’t the problem. The real threat is our ancient and fundamentally insecure communication platforms, with email being the worst offender.

    Email lacks the basic security verification, like the padlock on websites, that we should expect for critical communications. It was never built to be safe, which is why criminals find it so easy to fake identities and send fraudulent messages. The AI is simply a new tool that helps them exploit this old weakness more efficiently.

    This isn’t just about email. Even supposedly secure apps like Signal have shown major design flaws, proving we can’t just trust brand names or marketing.

    The mission is clear. America needs to stop patching these broken systems and lead the way in building secure replacements. These new systems must have real verification built in from the start.

    https://www.anthropic.com/news/detecting-countering-misuse-aug-2025

    https://archive.is/k1t6W

  • Wuhan 2.0: A US University is Open-Sourcing the Black Death

    Wuhan 2.0: A US University is Open-Sourcing the Black Death

    This new project at the University of South Florida is the Wuhan controversy playing out all over again, but on American soil and with a far deadlier pathogen.

    USF is now playing the exact same role as EcoHealth Alliance.

    EcoHealth funneled US money to a lab in China to study novel coronaviruses. USF has now physically brought more than 1,200 human samples from a Black Death mass grave in Venice to its lab in Florida.

    The stated goal is to sequence the DNA from those skeletons. But the inevitable result, dictated by academic policy, is that they will publish the full genetic blueprints of the plague online.

    So a US university, under the banner of “public health research,” is creating an open-source library for a pathogen with a 50% mortality rate. It’s the same dangerous pipeline as Wuhan, just with a different university and a much more lethal disease.

    Building on the Jerash breakthrough, the team is now expanding its research to Venice, Italy and the Lazaretto Vecchio, a dedicated quarantine island and one the world’s most significant plague burial sites. More than 1,200 samples from this Black Death-era mass grave are now housed at USF, offering an unprecedented opportunity to study how early public health measures intersected with pathogen evolution, urban vulnerability and cultural memory.

    https://www.sciencedaily.com/releases/2025/08/250828002415.htm

    https://archive.is/YHP3j

  • The New Cold War is Fought in Code: A “Digital Iron Curtain” is the Next Phase of US-China Policy

    The era of arguing about tariffs on steel and soybeans is over. The real battleground for global dominance is digital.

    The United States must move beyond traditional economic statecraft and implement a comprehensive “Digital Iron Curtain” strategy to counter China’s technological ambitions and safeguard its own national security, even if it means fundamentally altering the concept of a global, open internet.

    Explain what the core components of AI dominance are: advanced semiconductors, massive datasets, and cloud computing infrastructure.

    Discuss current U.S. export controls on chips (Nvidia, AMD) and the Commerce Department’s efforts.

    These controls have a loophole—Chinese firms can rent U.S. cloud infrastructure. Propose new regulations (like the one just announced) requiring cloud providers to act as gatekeepers, effectively denying adversaries access to America’s core computational power.

    Discuss the TikTok threat not just as propaganda, but as a massive data-harvesting operation.

    All data generated by U.S. citizens and businesses (from healthcare records to social media activity) should be treated as a strategic national asset.

    Propose legislation that prevents U.S. data from being stored or processed by companies with ties to adversarial nations, citing the risk of it being used to train their AI models.

    Connect the lessons of the COVID-19 pandemic (e.g., reliance on China for PPE, pharmaceuticals) to the technology sector.

    The U.S. cannot afford a similar vulnerability in its tech supply chain (e.g., circuit boards, drone components, network hardware).

    Analyze the role of tax credits and government spending (like the CHIPS Act) as a starting point, but argue for a more aggressive industrial policy to rebuild domestic manufacturing in critical tech sectors.

    Acknowledge the counterarguments: A bifurcated internet could stifle innovation, hurt U.S. tech companies, and run counter to First Amendment principles of openness.

    Rebuttal: The alternative is ceding the technological high ground to a strategic adversary, which poses a far greater long-term risk to economic prosperity and national sovereignty.

    Call to Action: Urge lawmakers to move with urgency to debate and enact a coherent, bipartisan strategy that treats digital infrastructure and data with the same seriousness as physical borders and military hardware.

  • Precision Doctrine: Re-evaluating Digital Assets from Peacetime Liability to Wartime Strategic Reserve

    Precision Doctrine: Re-evaluating Digital Assets from Peacetime Liability to Wartime Strategic Reserve

    David’s Note: This article was substantially revised on October 12, 2025 to incorporate new research and provide a more comprehensive analysis.

    Executive Summary

    This report argues that the Guiding and Establishing National Innovation for U.S. Stablecoins (GENIUS) Act represents a fundamental misinterpretation of digital asset technology’s strategic value. The Act integrates stablecoins into the peacetime financial system to foster innovation. However, this policy creates a significant national security liability. It strengthens a global infrastructure that adversaries exploit for illicit finance and sanctions evasion.

    The core argument is that the technology’s decisive value is not in peacetime commerce. Instead, its highest and best use is as a strategic military asset reserved for times of declared conflict. This analysis examines the GENIUS Act, the arguments of its proponents and opponents, and the extensive evidence of security threats posed by the peacetime proliferation of cryptocurrencies.

    As an alternative, this report proposes a “Wartime Digital Asset Act.” This framework would restrict the peacetime use of public cryptocurrencies. It would simultaneously develop the underlying technology as a strategic military reserve. This capability would be activated only upon a declaration of war by Congress for critical applications. These include resilient command and control, secure logistics, and wartime finance.

    The report concludes that true technological leadership requires the precise application of innovation to its most decisive purpose. In this case, that purpose is to serve as a reserved instrument of national power.

    (more…)
  • The Energy Doctrine: A Fantastical Strategy for Earth and Space

    The Energy Doctrine: A Fantastical Strategy for Earth and Space

    What follows is not a sober policy proposal. It is a thought experiment, a flight of fancy designed to shatter the narrow confines of the current energy debate. The public discourse pits solar against fossil fuels as if it were a schoolyard argument, while the real game of power operates on a level of complexity that is rarely, if ever, discussed. This article is a wild, speculative attempt to outline a more complete, if fantastical, doctrine for energy strategy across three domains: strategic deception, tactical resilience, and celestial dominance. None of this is to be taken too seriously.

    The Terrestrial Battlefield: The Art of Strategic Deception

    The first principle of this doctrine is that a nation’s true energy capacity should be its most closely guarded secret. The ancient military strategist Sun Tzu taught that all warfare is based on deception. Publicly available data on energy production is, in this light, a strategic blunder—it’s like handing your enemy the schematics to your fortress. A wiser, if more paranoid, approach would be to reveal only what a sophisticated AI predicts is the bare minimum necessary to project stability, while concealing the true depth of your power. The real strength lies in the undisclosed—the unexpected and the unseen.

    The Deception Layer: Power Beneath the Surface

    The ultimate expression of strategic energy deception lies in moving critical infrastructure where it cannot be seen or targeted: underground. To be truly secure, a nation must possess power generation that is impervious to satellite surveillance, drone attacks, and bunker-busting bombs. The most practical technologies for this are nuclear and geothermal. All forms of nuclear reactors, from today’s fission plants to tomorrow’s fusion concepts, can be housed in deep, hardened subterranean bunkers. Geothermal energy, which taps the planet’s own internal heat, is perhaps even more elegant. With a minimal surface footprint, these plants provide constant, 24/7 power, regardless of weather, time of day, or what’s happening on the surface. By creating a distributed network of hidden geothermal and nuclear sites, a nation could build an invisible power base, with energy transmitted via hardened, buried, or even laser-based systems to ensure a second-strike capability and industrial survival.

    The Solar Paradox and Strategic Response

    On the surface, solar infrastructure is a paradox. In a conflict, sprawling solar farms are a liability—fragile, indefensible, and far more costly to rebuild than the munitions needed to destroy them. If you were Ukraine, fields of glass panels would be an illogical investment. Furthermore, we must consider scenarios beyond conventional warfare. A massive earthquake, a super-volcano eruption like Yellowstone that blacks out the sky with ash, or a meteor strike would render solar power useless. There are even whispers of weather manipulation technologies that could blot out the sun over a target area—a potentially cheaper tactic than building a massive solar infrastructure in the first place.

    This is where the strategic value of natural gas becomes clear. It’s not about powering a peaceful nation; it’s about tactical response in a crisis. The ability to quickly spin up natural gas turbines provides the immediate power needed to launch a counter-attack, power essential services after a natural disaster, or simply keep the lights on in a command bunker when the sun has disappeared.

    (more…)
  • Crypto for Conflict: A Proposal to Restrict Digital Assets to Wartime Use

    Crypto for Conflict: A Proposal to Restrict Digital Assets to Wartime Use

    Many have spoken about the need for American leadership in technology and the potential of digital assets. Vice President Vance has a point about paying attention to what global competitors like China are doing in the crypto space. However, the current conversation around cryptocurrency for everyday infrastructure and investment is a distraction from its most strategic and vital use case: national security.

    Instead of trying to fit this technology into a peacetime financial system, we should be harnessing its power for when we need it most. I propose we treat the infrastructure of cryptocurrency like a strategic military asset, to be deployed only in times of war, much like war bonds. This isn’t about the coins themselves, but about the underlying technology and ASICs – a decentralized, resilient network that can be activated by the military upon a formal declaration of war.

    This approach addresses the national security risks of unregulated crypto, while giving the U.S. a powerful economic and strategic tool in a time of conflict. It’s not about stifling innovation; it’s about focusing that innovation where it can have the most decisive impact for our nation.

    Proposed Legislation: The Wartime Digital Asset Act

    A BILL

    To restrict the use of cryptocurrencies and stablecoins to times of declared war, and for other purposes.

    BE IT ENACTED BY THE SENATE AND HOUSE OF REPRESENTATIVES OF THE UNITED STATES OF AMERICA IN CONGRESS ASSEMBLED,

    SECTION 1. SHORT TITLE.

    This Act may be cited as the “Wartime Digital Asset Act”.

    (more…)