Tag: China

  • The Phoenix Plan: A Blueprint for American Rebirth

    The Phoenix Plan: A Blueprint for American Rebirth

    Prioritize national strength, economic independence, and internal order.

    Core Principles

    • Competent Government: Before voting on any bill, members of Congress must have one week to read it and pass a test to prove they understand it.
    • “Fortress America” Economy: The plan aims for a self-reliant economy. This includes:
      • Taxes: Making current individual tax rates permanent while eliminating special-interest loopholes, the Child Tax Credit, and complex corporate taxes.
      • Trade and Investment: Using tariffs to protect critical industries and offering residency to foreigners who make multi-million dollar investments in the U.S.
      • Ending Corporate Crime: Forcing companies to be specific about how they use investor money. Seized assets from convicted executives and banks will fund their own prosecution and imprisonment.
      • Nationalizing Crypto: Making all private cryptocurrency transactions illegal. The entire crypto system will be seized and reserved as a financial weapon for the military to use only during a declared war.
      • Honest Money: Transitioning away from the Federal Reserve to a system where the U.S. Treasury issues debt-free money directly.
    (more…)
  • Information Blockade: A Flawed System, Tainted Actors, and the COVID-19 Response

    Information Blockade: A Flawed System, Tainted Actors, and the COVID-19 Response

    A defective system governing taxpayer-funded research, coupled with questionable corporate actors, hampered the nation’s ability to respond to the COVID-19 crisis. This information blockade had dire consequences, not only for public health but also for the very companies that were supposed to be at the forefront of innovation.

    The problem stems from a long-standing policy that has prioritized corporate profits over public access to critical information. In 2013, the Obama administration’s White House Office of Science and Technology Policy (OSTP), then led by Director John P. Holdren, issued a memorandum entitled “Increasing Access to the Results of Federally Funded Scientific Research.” This memo established a 12-month embargo period, allowing publishers to lock away taxpayer-funded research for a full year.This delay, a significant impediment in a rapidly evolving public health crisis, was a compromise to appease the highly profitable academic publishing industry.

    This dysfunctional system created a breeding ground for opportunism and mismanagement.

    • Delayed Access, Stalled Innovation: The 12-month embargo meant that crucial data on clinical trials, epidemiological models, and virology was often obsolete by the time it became freely available. This left not only the American public in the dark, but also the very companies developing diagnostic tools. The Freedom of Information Act (FOIA) process, which should have provided a swift path to public data, was also rendered ineffective, with requests for vital information stalled for years, well beyond the supposed two-week turnaround for a clear and present danger.
    • Corporate Casualties and Questionable Practices: The story of Lucira Health exemplifies the devastating consequences of this information bottleneck. The company, which developed a promising combined COVID-19 and flu test, was financed by Silicon Valley Bank (SVB) and Hercules Capital, securing a debt facility of up to $80 million. However, Lucira was forced to file for Chapter 11 bankruptcy after a slower-than-anticipated FDA Emergency Use Authorization (EUA) process for its new test created a fatal cash crunch. Pfizer then acquired the company’s assets for a mere $36.4 million. The collapse of SVB, which held deposits for numerous Chinese companies, has also raised concerns. Treasury Secretary Janet Yellen confirmed that uninsured depositors in SVB, including those with ties to the Chinese Communist Party, would be made whole by the American banking system. This has led to questions about potential conflicts of interest, especially given the belief that the COVID-19 virus originated in a lab in Wuhan, China.
    • A System Admitting Failure: In a tacit admission of the system’s shortcomings, the White House OSTP issued a new memo in August 2022, mandating that all taxpayer-funded research be made freely and immediately available by the end of 2025, effectively ending the 12-month embargo. While a welcome change, this comes as cold comfort for the companies and the public who were failed by a system that prioritized profits and secrecy over transparency and innovation during a critical time of need.

  • My Vision for a Stronger America, Beyond the OBBB

    Prioritize the Need for a New American Fiscal Nationalism & Continue Building a Fortress America Economy: A 15% baseline tariff and sweeping deregulation are not just good ideas; they are necessary defensive measures. While they won’t single-handedly slay the $37T debt dragon, they are the foundational armor for a “Fortress America” economy.

    The $37 Trillion Elephant: Neither party has a plan to pay the debt.

    Investigate the China-California Connection: Deep-dive into how California’s state debt and business ties with Chinese entities create a national security vulnerability.

    Illinois & New York: Blue State Debt Bombs: Unfunded liabilities and corruption in states led by figures like @GovPritzker Gov. Pritzker are a key aspect of the national crisis.

    Saudi Vision 2030: The World’s Most Expensive PR Campaign: The Public Investment Fund’s acquisition of companies like Scopely isn’t about innovation; it’s about their deliberate pursuit of user data. This positions them to monitor our movements, creating a future where digital tracking could easily enable real-world stalking.

    Understand that Political Theater is the Real Insurrection: The political theater in D.C. is the primary cancer. It’s a managed spectacle that provides cover for the real, coordinated erosion of American sovereignty.

    The @SenFettermanPA (Sen. Fetterman) @marklevinshow (Mark Levin) Doctrine: A pro-Israel, anti-Ayatollah stance is the only coherent foreign policy for national security.

    The @RepThomasMassie (Rep. Massie) @Ilhan (Rep. Omar) Red Line: Bipartisan efforts to limit executive “war” powers… are a dangerous abdication of responsibility.

    Beyond Counterfeit Cryptocurrency & The Corrupt Old Guard: The post-2008 distrust in the established financial order is justified. But cryptocurrency is not the answer; it’s a digital counterfeit designed to profit from chaos. The real path forward is outside both of these failed systems: a return to productive, asset-backed economics.

    The Hypocrisy of “Stablecoins”: We need to debunk the myth of stability and expose their role in facilitating capital flight from America.

    Critique Cryptocurrency’s Role in the National Debt: Institutional adoption of BTC/ETH/etc. creates a shadow monetary system that undermines the dollar.

    Look Into the Mechanics of Sharia-Compliant Finance: Expose how deals with nations like Qatar and Saudi Arabia introduce legal and financial systems that are antithetical to U.S. economic principles.

    Take a Stand for Authentic Discourse: Public officials should actively curate their audience to prioritize verified, real individuals.

    Deconstruct “Sound Money”: Bitcoin isn’t the new gold, but the new Confederate Dollar.

    … AND A “DREAM ON” WISH LIST:

    Look Into the Qatar Gift Horse: Analyze the “gift” of an Air Force One jet as a symbol of foreign influence at the highest levels.

    Fire Engineers: A ruthless platform approach to platform integrity (purging bots) is more important than internal harmony at a tech company.

    Truth Social’s Bot Problem: Even “alternative” platforms are failing to provide authentic spaces for discourse.

  • The California Insurrection: A Planned Betrayal

    The California Insurrection: A Planned Betrayal

    The chaos that erupted in Los Angeles is no spontaneous uprising; it is a meticulously planned and ongoing insurrection fueled by a toxic alliance of foreign enemies and domestic traitors. The betrayal runs from the streets to the highest offices of the state. It’s a conspiracy where federal taxpayer money is funneled to the very groups organizing the insurrection. This support was made explicit on August 30, 2024, when Mayor Karen Bass’s office announced she had secured major federal support for the Coalition for Humane Immigrant Rights (CHIRLA), creating a direct pipeline from the U.S. government to a key organizer of the insurrection. CHIRLA’s own action fund listed her as a supporter of the DREAM Act in late 2017.

    At the heart of the violence is the Party for Socialism and Liberation (PSL), a disciplined Marxist cadre providing the ideological framework for the insurrection; they actively engage in propaganda efforts that mirror Chinese state media, defending the CCP’s actions in Hong Kong and its internal policies. The PSL’s connection to this insurrection is not incidental; they are the ideological core, providing the anti-American framework and organizational discipline for the insurrection you see on the streets.

    (more…)
  • America’s Solar Achilles’ Heel: BRICS’ Dominance and the Path to Energy Insecurity

    America’s Solar Achilles’ Heel: BRICS’ Dominance and the Path to Energy Insecurity

    Here are key problems with relying heavily on solar energy, particularly when facing a dominant manufacturing bloc like BRICS:

    1. The BRICS’ Leverage (Supply Chain Manipulation): With BRICS, and overwhelmingly China, controlling over 80% of all solar panel manufacturing stages (and nearing 95% for crucial upstream components like polysilicon and wafers), they hold immense leverage. They can strategically restrict the export of panels, components, or raw materials, effectively throttling another nation’s ability to build, maintain, or repair its solar infrastructure. This creates a powerful tool for geopolitical pressure.
    2. Cost Competitiveness (Exploitable Dependency): China is the most cost-competitive location for manufacturing all solar PV components due to massive state investment and economies of scale. This makes it difficult for other nations to establish their own fully competitive domestic supply chains. BRICS could exploit this by manipulating prices—either by gouging during periods of high demand or undercutting nascent industries in other countries to maintain their dominance, making a dependent nation’s solar ambitions economically unviable or perpetually reliant.
    3. Quality Control Weaponization (Undermining Reliability): Given their control over manufacturing, BRICS nations could, in a conflict scenario, subtly degrade the quality or introduce hidden flaws (hardware or software backdoors) into solar components destined for adversaries. This could lead to premature failures, reduced efficiency, increased maintenance burdens, and a general loss of faith in the reliability of solar infrastructure, all while being difficult to detect upfront.
    4. Trade Vulnerability (Economic Weak Point): Heavy reliance on imported solar panels and components makes a nation’s currency and economy susceptible. Any devaluation of the importing nation’s currency would drastically increase the cost of these essential goods. Furthermore, the dominant bloc could impose targeted tariffs or engage in other trade actions that specifically penalize the solar sector of a rival, exploiting this dependency. The US, for instance, imported eight times the solar modules it manufactured in 2023, showcasing this vulnerability.
    5. Investment Chill (Perceived Risk): The clear and present risk of supply chain disruption, price manipulation, or sabotage by a dominant, potentially adversarial, manufacturing bloc would create significant uncertainty. This “investment chill” would deter both domestic and foreign investment in the solar sector of the vulnerable nation. Investors would be wary of committing capital to projects that could be easily undermined by geopolitical factors beyond their control, thus slowing down the transition to solar energy and reinforcing reliance on the dominant bloc or other energy sources.
  • The TikTok Paradox: National Security, Digital Sovereignty, and the Forging of U.S. Tech Policy

    The TikTok Paradox: National Security, Digital Sovereignty, and the Forging of U.S. Tech Policy

    David’s Note: This article was substantially revised on October 10, 2025 to incorporate new research and provide a more comprehensive analysis.

    On January 17, 2025, the U.S. Supreme Court upheld a landmark law that forces the sale of TikTok, a platform used by over 170 million Americans, or face a nationwide ban.1 This decision highlighted a central paradox in modern American policy. TikTok is at once a legislative target, condemned as a grave national security threat, and an indispensable campaign tool, actively leveraged by the political actors who seek to regulate it.

    This paper argues that this apparent contradiction is not a sign of policy incoherence. Instead, it reveals an evolving and deliberate strategy to confront a novel threat to the nation’s digital sovereignty. Digital sovereignty is a nation’s ability to control its own digital destiny—the data, hardware, and software it relies upon.3 In this context, it means securing the digital infrastructure and information environment within its borders from the control of a strategic adversary.4

    The core of this argument is that the threat posed by TikTok is fundamentally structural. It is rooted in the legal and operational subordination of its parent company, ByteDance, to the government of the People’s Republic of China (PRC). This structural risk is distinct from the commercial data practices of domestic social media companies. It has compelled the U.S. to forge a new national security doctrine for the digital age.

    To develop this thesis, this paper will proceed in four parts.

    • Section I will establish that TikTok represents a structural national security threat due to its data collection capabilities under PRC law and its potential for algorithmic manipulation.
    • Section II will trace the evolution of U.S. legal strategy, from the failure of broad executive orders to the crafting of a targeted, constitutionally-sound legislative solution.
    • Section III will systematically deconstruct the primary counterarguments against this policy, including those based on the First Amendment, economic disruption, and false equivalencies with U.S. tech firms.
    • Section IV will analyze the political realities that create the central paradox, examining how electoral pragmatism and divided public opinion coexist with the national security consensus.

    Ultimately, this analysis will demonstrate that the TikTok dilemma is a landmark case in how a liberal democracy is adapting its legal and political tools to defend its sovereignty in an era of weaponized information.

    (more…)
  • An Unmitigated Threat: The National Security Case for the Prohibition of TikTok in the United States

    An Unmitigated Threat: The National Security Case for the Prohibition of TikTok in the United States

    David’s Note: This article was substantially revised on October 10, 2025 to incorporate new research and provide a more comprehensive analysis.

    With over 170 million users in the United States, TikTok is more than a social media phenomenon; it is a deeply embedded component of American digital life and commerce.1 This ubiquity, however, masks a critical vulnerability. This report presents a comprehensive analysis of the national security threat posed by the social media application TikTok, operated by its parent company, ByteDance Ltd. It argues that due to ByteDance’s inextricable links to the Chinese Communist Party (CCP), the application functions as a dual-threat vector for sophisticated data espionage and algorithmic influence operations against the United States.

    Executive Summary

    This report analyzes the national security threat from TikTok, an application operated by ByteDance Ltd. The company’s deep connections to the Chinese Communist Party (CCP) allow the app to function as a tool for data espionage and algorithmic influence against the United States.

    This report’s central thesis is that mitigation efforts cannot neutralize this threat. The application’s core architecture, corporate governance, and legal obligations are inextricably linked to the CCP, a designated foreign adversary. Therefore, a complete prohibition on its operation within the United States is the only effective policy solution.

    The report deconstructs ByteDance’s opaque corporate structure. It highlights the CCP’s control mechanisms, such as the “golden share” held by a state-backed entity, which make any claims of operational independence untenable. It also details warnings from top U.S. intelligence officials, including the FBI Director and the Director of National Intelligence, who define TikTok as a tool that a foreign adversary can leverage.

    Furthermore, the report dismisses mitigation efforts like the $1.5 billion “Project Texas” as flawed security theater. Evidence shows this project failed to sever data flows to Beijing or neutralize the threat of algorithmic manipulation. The core issue of adversarial ownership remained unaddressed.

    After refuting key counterarguments—related to the First Amendment, economic impacts, and false equivalencies with U.S. tech firms—the report concludes that partial measures are insufficient. The unique nature of the threat, rooted in ByteDance’s subservience to the CCP, demands a structural solution. The only policy that fully addresses these inherent risks is the swift enforcement of a ban on TikTok and any successor applications, as provided by the Protecting Americans from Foreign Adversary Controlled Applications Act (PAFACA).

    (more…)