Skip to main content

Message to the US China trade team


Basic comment on the China deal.  My message to the Trade Team.  “Do what you can, BUT accept what cannot be done.” 

Probable facts. 1. China has already stolen enough technology and materials to sustain them for at least ten years.  They need no more now, but cannot give up their practices if only to save face. 2. China will continue to hack.  3. China will continue to promote their information hegemony worldwide, and military hegemony in the Pacific.

China’s military development in the the South China Sea.  What can you do except get promises?  Here you can exert tariff policies if it continues.  This is measurable!

China’s space explorations and militarization.  These will continue regardless. This is not measurable!

Trade deal.  Negotiate a move toward a fiscal quid pro quo over the next six/seven years. This is measurable!

China’s foreign corporate ownership (in China).  This should be a non negotiable part of a trade agreement.  China is bending on this.  Pursue it further, applying Vaseline as needed. This is measurable!

China and Huawei.  The US is correctly pursuing a policy by making the world aware of how China is stealing information.  Awareness is the first step of prevention. Increase all efforts here. Put it to Huawei to prove they are NOT co-opting data.  This is measurable! 

Tagline: The Internet is the roadway of the most dangerous “fifth column” invasion of our time. 

China will hack, i.e. cheat. Even if they promise not to hack, they will.  If necessary, they will move their operations to a client country such as NOKO.  It is up to the USA to prevent this here at home. Thus…
The USA, using the NSF, should approve protocols for securing personal data for corporations (including the US govt) that hold it.  Software should be available at nominal cost, and with Congress require/demand personal information holding companies to comply.  Many simple methods such as two-factor authentication work well. Corporate sales of personal information should be tightly regulated.

Bottom lines: 1. Secure US corporate ownership of US firms in China. 2. Stop the hacking by preventing it – at home.   3. China’s military hegemony is a public matter to be exposed and expressed to the world.   4. China’s suborning of the world’s information pool should be stopped. World pressure works. 5. Form a graduated balance for a lasting trade policy. The world will offer thanks.

Comments

Popular posts from this blog

Behavioral Science and Problem-Solving

I.                                       I.                 Introduction.                Concerning our general behavior, it’s high about time we all had some understanding of how we operate on ourselves, and it is just as important how we are operated on by others. This is the wheelhouse of behavioral sciences. It is a vast subject. It touches our lives constantly. It’s influence is pervasive and can be so subtle we never notice it. Behavioral sciences profoundly affect our ability and success at problem-solving, from the elementary level to highly complex wicked problems. This is discussed in Section IV. We begin with the basics of behavioral sciences, Section II, and then through the lens of multiple categories and examples, Section III. II.     ...

Principles of Insufficiency and Sufficiency

   The principles we use but don't know it.  1.      Introduction . Every field, scientific or otherwise, rests on foundational principles—think buoyancy, behavior, or democracy. Here, we explore a unique subset: principles modified by "insufficiency" and "sufficiency." While you may never have heard of them, you use them often. These terms frame principles that blend theory, practicality, and aspiration, by offering distinct perspectives. Insufficiency often implies inaction unless justified, while sufficiency suggests something exists or must be done. We’ll examine key examples and introduce a new principle with potential significance. As a principle of principles of these is that something or some action is not done enough while others may be done too much. The first six (§2-6) of our principles are in the literature, and you can easily search them online. The others are relatively new, but fit the concepts in the real world. At times, these pri...

The Lemming Instinct

  In certain vital domains, a pervasive mediocrity among practitioners can stifle genuine advancement. When the intellectual output of a field is predominantly average, it inevitably produces research of corresponding quality. Nevertheless, some of these ideas, by sheer chance or perhaps through effective dissemination, will inevitably gain traction. A significant number of scholars and researchers will gravitate towards these trends, contributing to and propagating further work along these established lines. Such a trajectory allows an initially flawed concept to ascend to the status of mainstream orthodoxy. However, over an extended period, these prevailing ideas invariably fail to withstand rigorous scrutiny; they are ultimately and conclusively disproven. The disheartening pattern then reveals itself: rather than genuine progress, an equally unvalidated or incorrect idea often supplants the discredited one, swiftly establishing its own dominance. This cycle perpetuates, ensurin...