Tag: National Security

  • The Phoenix Plan: A Blueprint for American Rebirth

    The Phoenix Plan: A Blueprint for American Rebirth

    Prioritize national strength, economic independence, and internal order.

    Core Principles

    • Competent Government: Before voting on any bill, members of Congress must have one week to read it and pass a test to prove they understand it.
    • “Fortress America” Economy: The plan aims for a self-reliant economy. This includes:
      • Taxes: Making current individual tax rates permanent while eliminating special-interest loopholes, the Child Tax Credit, and complex corporate taxes.
      • Trade and Investment: Using tariffs to protect critical industries and offering residency to foreigners who make multi-million dollar investments in the U.S.
      • Ending Corporate Crime: Forcing companies to be specific about how they use investor money. Seized assets from convicted executives and banks will fund their own prosecution and imprisonment.
      • Nationalizing Crypto: Making all private cryptocurrency transactions illegal. The entire crypto system will be seized and reserved as a financial weapon for the military to use only during a declared war.
      • Honest Money: Transitioning away from the Federal Reserve to a system where the U.S. Treasury issues debt-free money directly.
    (more…)
  • The Energy Doctrine: A Fantastical Strategy for Earth and Space

    The Energy Doctrine: A Fantastical Strategy for Earth and Space

    What follows is not a sober policy proposal. It is a thought experiment, a flight of fancy designed to shatter the narrow confines of the current energy debate. The public discourse pits solar against fossil fuels as if it were a schoolyard argument, while the real game of power operates on a level of complexity that is rarely, if ever, discussed. This article is a wild, speculative attempt to outline a more complete, if fantastical, doctrine for energy strategy across three domains: strategic deception, tactical resilience, and celestial dominance. None of this is to be taken too seriously.

    The Terrestrial Battlefield: The Art of Strategic Deception

    The first principle of this doctrine is that a nation’s true energy capacity should be its most closely guarded secret. The ancient military strategist Sun Tzu taught that all warfare is based on deception. Publicly available data on energy production is, in this light, a strategic blunder—it’s like handing your enemy the schematics to your fortress. A wiser, if more paranoid, approach would be to reveal only what a sophisticated AI predicts is the bare minimum necessary to project stability, while concealing the true depth of your power. The real strength lies in the undisclosed—the unexpected and the unseen.

    The Deception Layer: Power Beneath the Surface

    The ultimate expression of strategic energy deception lies in moving critical infrastructure where it cannot be seen or targeted: underground. To be truly secure, a nation must possess power generation that is impervious to satellite surveillance, drone attacks, and bunker-busting bombs. The most practical technologies for this are nuclear and geothermal. All forms of nuclear reactors, from today’s fission plants to tomorrow’s fusion concepts, can be housed in deep, hardened subterranean bunkers. Geothermal energy, which taps the planet’s own internal heat, is perhaps even more elegant. With a minimal surface footprint, these plants provide constant, 24/7 power, regardless of weather, time of day, or what’s happening on the surface. By creating a distributed network of hidden geothermal and nuclear sites, a nation could build an invisible power base, with energy transmitted via hardened, buried, or even laser-based systems to ensure a second-strike capability and industrial survival.

    The Solar Paradox and Strategic Response

    On the surface, solar infrastructure is a paradox. In a conflict, sprawling solar farms are a liability—fragile, indefensible, and far more costly to rebuild than the munitions needed to destroy them. If you were Ukraine, fields of glass panels would be an illogical investment. Furthermore, we must consider scenarios beyond conventional warfare. A massive earthquake, a super-volcano eruption like Yellowstone that blacks out the sky with ash, or a meteor strike would render solar power useless. There are even whispers of weather manipulation technologies that could blot out the sun over a target area—a potentially cheaper tactic than building a massive solar infrastructure in the first place.

    This is where the strategic value of natural gas becomes clear. It’s not about powering a peaceful nation; it’s about tactical response in a crisis. The ability to quickly spin up natural gas turbines provides the immediate power needed to launch a counter-attack, power essential services after a natural disaster, or simply keep the lights on in a command bunker when the sun has disappeared.

    (more…)
  • My Vision for a Stronger America, Beyond the OBBB

    Prioritize the Need for a New American Fiscal Nationalism & Continue Building a Fortress America Economy: A 15% baseline tariff and sweeping deregulation are not just good ideas; they are necessary defensive measures. While they won’t single-handedly slay the $37T debt dragon, they are the foundational armor for a “Fortress America” economy.

    The $37 Trillion Elephant: Neither party has a plan to pay the debt.

    Investigate the China-California Connection: Deep-dive into how California’s state debt and business ties with Chinese entities create a national security vulnerability.

    Illinois & New York: Blue State Debt Bombs: Unfunded liabilities and corruption in states led by figures like @GovPritzker Gov. Pritzker are a key aspect of the national crisis.

    Saudi Vision 2030: The World’s Most Expensive PR Campaign: The Public Investment Fund’s acquisition of companies like Scopely isn’t about innovation; it’s about their deliberate pursuit of user data. This positions them to monitor our movements, creating a future where digital tracking could easily enable real-world stalking.

    Understand that Political Theater is the Real Insurrection: The political theater in D.C. is the primary cancer. It’s a managed spectacle that provides cover for the real, coordinated erosion of American sovereignty.

    The @SenFettermanPA (Sen. Fetterman) @marklevinshow (Mark Levin) Doctrine: A pro-Israel, anti-Ayatollah stance is the only coherent foreign policy for national security.

    The @RepThomasMassie (Rep. Massie) @Ilhan (Rep. Omar) Red Line: Bipartisan efforts to limit executive “war” powers… are a dangerous abdication of responsibility.

    Beyond Counterfeit Cryptocurrency & The Corrupt Old Guard: The post-2008 distrust in the established financial order is justified. But cryptocurrency is not the answer; it’s a digital counterfeit designed to profit from chaos. The real path forward is outside both of these failed systems: a return to productive, asset-backed economics.

    The Hypocrisy of “Stablecoins”: We need to debunk the myth of stability and expose their role in facilitating capital flight from America.

    Critique Cryptocurrency’s Role in the National Debt: Institutional adoption of BTC/ETH/etc. creates a shadow monetary system that undermines the dollar.

    Look Into the Mechanics of Sharia-Compliant Finance: Expose how deals with nations like Qatar and Saudi Arabia introduce legal and financial systems that are antithetical to U.S. economic principles.

    Take a Stand for Authentic Discourse: Public officials should actively curate their audience to prioritize verified, real individuals.

    Deconstruct “Sound Money”: Bitcoin isn’t the new gold, but the new Confederate Dollar.

    … AND A “DREAM ON” WISH LIST:

    Look Into the Qatar Gift Horse: Analyze the “gift” of an Air Force One jet as a symbol of foreign influence at the highest levels.

    Fire Engineers: A ruthless platform approach to platform integrity (purging bots) is more important than internal harmony at a tech company.

    Truth Social’s Bot Problem: Even “alternative” platforms are failing to provide authentic spaces for discourse.

  • Immediately repeal the federal Real ID Act, replace with StatePass or Nothing

    Immediately repeal the federal Real ID Act. Its core danger lies not just in bureaucratic failure, but in its fundamental threat to personal liberty and privacy. Real ID creates the infrastructure for a national tracking system, linking state databases and enabling unprecedented government surveillance of citizens’ movements—precisely the kind of invasive system that evokes deep-seated fears among many Americans, including concerns resembling a “mark of the beast” scenario where government monitors and controls individuals through mandatory identification. This potential for pervasive tracking violates the spirit of the 4th Amendment and must be dismantled.

    Replace Real ID with StatePass, a new system of state-controlled secure IDs for domestic travel originating within their borders. Leveraging lessons from Real ID’s troubled history, states will implement StatePass quickly and efficiently. The absolute priority of StatePass is preventing federal surveillance; standards must prohibit centralized databases or features allowing easy federal tracking, focusing instead on secure credentials verifiable locally, not federal data collection. This state-centric approach, where states design, issue, and manage their own StatePass IDs and verification, directly counters the “mark of the beast” concerns tied to federal overreach.

    State accountability will be ensured through robust mechanisms. The State Security Assurance Fund (SSAF) is a mandatory pool of state contributions, essentially security deposits, used to levy substantial financial penalties against any state whose faulty StatePass system causes a major security breach originating there. The Interstate Travel Security Commission (ITSC), composed of representatives from participating states, manages the SSAF, investigates security failures to determine penalties, and facilitates voluntary collaboration on StatePass best practices.

    (more…)
  • Knauff Power: Tariffs + Trump Gold Card = America’s Double Whammy

    Knauff Power: Tariffs + Trump Gold Card = America’s Double Whammy

    Can the President act decisively on the Gold Card? The precedent set in Knauff v. Shaughnessy (1950) suggests yes. The Supreme Court recognized an “inherent executive power” over immigration matters tied to foreign affairs and national sovereignty. While Congress typically legislates in this area, Knauff indicates the President possesses authority, especially when national security – including economic security – is at stake. Attracting billions in investment for critical technologies certainly qualifies. This inherent authority provides a pathway to implement the Gold Card program swiftly, complementing the national security objectives of the tariffs.

    America needs more than just a nudge to reclaim its industrial dominance and secure its future. We need a powerful, two-fisted approach: the strategic pressure of tariffs combined with the magnetic pull of high-value investment. It’s time for the “Double Whammy” – leveraging both Section 232 tariffs AND President Trump’s proposed “Gold Card” program to bring jobs, capital, and cutting-edge innovation roaring back to American soil.

    (more…)
  • SPECIAL REPORT, PART II: The TikTok Betrayal: Beyond the Trojan Horse, The Rot Within

    SPECIAL REPORT, PART II: The TikTok Betrayal: Beyond the Trojan Horse, The Rot Within

    While the first report detailed the overt threat of TikTok as a weapon of the Chinese Communist Party (CCP), this second analysis drills deeper into a more insidious danger: the rot within our own institutions that has allowed this threat to fester. The story of TikTok is not just one of foreign aggression, but of domestic failure, political cowardice, and a legal system that has been twisted to protect the adversary. This is a chronicle of the swamp’s self-preservation at the expense of American security.

    The Political Uni-Party and the Propaganda Machine

    The most glaring hypocrisy in the fight against TikTok comes from the very politicians who should be our first line of defense. The Republican and Democratic parties, in their lust for votes, have proven themselves to be two wings of the same Uni-Party, willing to engage with the enemy for political gain.

    • Biden’s Betrayal: Why in the Hell would a sitting U.S. President use a CCP-controlled application? The “Biden-Harris HQ” TikTok account is a slap in the face to the entire U.S. intelligence community. We are told it is run by campaign aides, not the President himself, which is an irrelevant distinction. The account, with its hundreds of thousands of followers, legitimizes the platform and signals to our enemies that our leaders are not serious about the national security threat. We must ask: was the campaign paid? What data is being collected on the American citizens who follow and interact with this account? It is a staggering display of political malpractice.
    • Government-Sponsored Propaganda: The “No TikTok on Government Devices Act,” buried in a massive appropriations bill, was a weak and performative gesture. Why did it require the Office of Management and Budget to “establish deadlines” for removal? The ban should have been instantaneous. The real question is why these apps were on government devices in the first place. A search reveals a shocking list of U.S. agencies that maintained large TikTok accounts, effectively using a CCP platform to conduct government outreach. The TSA, the National Parks Service, and numerous state-level agencies built substantial followings, normalizing the app and handing the CCP a direct pipeline to American citizens under a veneer of officialdom.
    • The Apology of Jeff Jackson: Look no further than Rep. Jeff Jackson of North Carolina for a profile in political cowardice. After voting for the ban, he posted a now-infamous “apology video” to his massive TikTok following, explaining why he voted the way he did. This act of appeasing a digital mob, potentially inflated by foreign bots, over his duty to national security is contemptible. How does a representative from North Carolina, not a media hub like LA or NYC, amass such a following? How is follower authenticity or monetization even verified by TikTok? This entire ecosystem stinks of fraud, a problem Apple and Google refuse to address, even as new legislation against fake app store activity is debated.
    • The Chinese Embassy in the Halls of Congress: It is a fact that representatives from the Chinese embassy met directly with U.S. congressional staffers to lobby against this bill. This is not normal diplomacy; it is an act of hostile influence. For a foreign adversary to walk the halls of our government and directly pressure our lawmakers is an outrage reminiscent of a spy thriller. This practice, while technically legal, is part of a pattern of corruption that has been allowed to fester in the post-9/11 era, where foreign money and influence have become commonplace in Washington D.C.
    (more…)
  • SPECIAL REPORT: The Case for a Complete and Total Ban of TikTok in the USA

    SPECIAL REPORT: The Case for a Complete and Total Ban of TikTok in the USA

    Introduction: A Clear and Present Danger

    The ongoing debate surrounding TikTok is not merely about a social media application; it is about national sovereignty, the security of our citizens’ data, and the integrity of our democratic discourse. For too long, the conversation has been muddled by half-measures, corporate-speak, and a fundamental misunderstanding of the adversary we face. The passage of the Protecting Americans from Foreign Adversary Controlled Applications Act (PAFACA) was a necessary first step, but it is not the final solution. Current and past efforts to mitigate the threat posed by TikTok are, and have always been, ineffective at addressing the underlying security concerns. The time for divestment negotiations and technical firewalls has passed. TikTok, a tool of the Chinese Communist Party (CCP), must be banned entirely from the United States.

    The Corporate Shell Game: A Deliberate Deception

    To understand the TikTok threat, one must first dismantle the complex and deliberately opaque corporate structure of its parent company, ByteDance.

    • Cayman Islands and Delaware: Havens of Obscurity: ByteDance is not a simple tech company; it is incorporated in the Cayman Islands, a jurisdiction notorious for financial secrecy. This is not an accident. It is a calculated move to obscure ownership and evade American oversight, a direct contradiction to the “America First” principles our nation must embody. Furthermore, its U.S. entity, TikTok Inc., is registered in Delaware, a state with notoriously lax corporate transparency laws, and the home state of President Biden, a fact that should raise serious questions. This is the opposite of the patriotic move made by Truth Social, which reincorporated from Delaware to Florida, demonstrating a commitment to transparency and American values.
    • The “Global Investor” Myth: We are told that 60% of ByteDance is owned by “global institutional investors.” This is a classic globalist talking point designed to lull us into a false sense of security. It is a distraction. The critical issue is not the 60%, but the controlling interest and influence wielded by the CCP. This “globalist” structure ensures that American interests will always be subjugated.
    • The “Golden Share”: A Dagger at the Heart: The most damning evidence of CCP control lies in the 1% “golden share” held by WangTouZhongWen Technology, an entity backed by the China Internet Investment Fund, in a key ByteDance subsidiary. This is not a trivial stake; it grants the CCP a board seat and direct influence over the company’s operations. This structure is a blatant power grab. No American company would tolerate a foreign adversary holding such a position. It is an insult to our national intelligence to suggest this is anything but direct state control.
    (more…)