The Unz Review: An Alternative Media Selection
A Collection of Interesting, Important, and Controversial Perspectives Largely Excluded from the American Mainstream Media

Bookmark Toggle AllToCAdd to LibraryRemove from Library • BShow CommentNext New CommentNext New ReplyRead More
ReplyAgree/Disagree/Etc. More... This Commenter This Thread Hide Thread Display All Comments
AgreeDisagreeLOLTroll
These buttons register your public Agreement, Disagreement, Troll, or LOL with the selected comment. They are ONLY available to recent, frequent commenters who have saved their Name+Email using the 'Remember My Information' checkbox, and may also ONLY be used once per hour.
Ignore Commenter Follow Commenter
Current Commenter
says:

Leave a Reply -


 Remember My InformationWhy?
 Email Replies to my Comment
Submitted comments become the property of The Unz Review and may be republished elsewhere at the sole discretion of the latter
Commenters to FollowHide Excerpts
By Authors Filter?
Anatoly Karlin Andrew Joyce Andrew Napolitano Audacious Epigone Boyd D. Cathey C.J. Hopkins Chanda Chisala Egor Kholmogorov Eric Margolis Forum Fred Reed Gilad Atzmon Godfree Roberts Guillaume Durocher Gustavo Arellano Ilana Mercer Israel Shamir James Kirkpatrick James Petras James Thompson JayMan John Derbyshire Jonathan Revusky Kevin Barrett Lance Welton Laurent Guyénot Linh Dinh Michael Hudson Mike Whitney Pat Buchanan Patrick Cockburn Paul Craig Roberts Paul Gottfried Paul Kersey Peter Frost Peter Lee Philip Giraldi Razib Khan Robert Weissberg Ron Paul Ron Unz Steve Sailer The Saker Tobias Langdon Tom Engelhardt A. Graham Adam Hochschild Aedon Cassiel Ahmet Öncü Alex Graham Alexander Cockburn Alexander Hart Alfred McCoy Alison Rose Levy Alison Weir Allegra Harpootlian Amr Abozeid Anand Gopal Andre Damon Andre Vltchek Andrei Martyanov Andrew Cockburn Andrew Fraser Andrew J. Bacevich Andrew S. Fischer Andy Kroll Ann Jones Anonymous Anthony DiMaggio Antiwar Staff Ariel Dorfman Arlie Russell Hochschild Arno Develay Arnold Isaacs Artem Zagorodnov Astra Taylor AudaciousEpigone Austen Layard Aviva Chomsky Ayman Fadel Barbara Ehrenreich Barbara Garson Barbara Myers Barry Lando Barton Cockey Belle Chesler Ben Fountain Ben Freeman Beverly Gologorsky Bill Black Bill Moyers Bob Dreyfuss Bonnie Faulkner Book Brad Griffin Brenton Sanderson Brett Redmayne-Titley Brian Dew Carl Horowitz Catherine Crump Chalmers Johnson Charles Bausman Charles Goodhart Charles Wood Charlotteville Survivor Chase Madar Chris Hedges Chris Roberts Christian Appy Christopher DeGroot Chuck Spinney Coleen Rowley Colin Liddell Cooper Sterling Craig Murray Dahr Jamail Dan E. Phillips Dan Sanchez Daniel McAdams Danny Sjursen Dave Kranzler Dave Lindorff David Barsamian David Boyajian David Bromwich David Chibo David Gordon David Irving David Lorimer David Martin David North David Vine David Walsh David William Pear David Yorkshire Dean Baker Dennis Saffran Diana Johnstone Dilip Hiro Dirk Bezemer Donald Thoresen Eamonn Fingleton Ed Warner Edmund Connelly Eduardo Galeano Edward Curtin Ellen Cantarow Ellen Packer Ellison Lodge Eric Draitser Eric Zuesse Erik Edstrom Erika Eichelberger Erin L. Thompson Eugene Girin F. Roger Devlin Fadi Abu Shammalah Franklin Lamb Frida Berrigan Friedrich Zauner Gabriel Black Gary Corseri Gary North Gary Younge Gene Tuttle George Albert George Bogdanich George Szamuely Georgianne Nienaber Glenn Greenwald A. Beaujean Agnostic Alex B. Amnestic Arcane Asher Bb Bbartlog Ben G Birch Barlow Canton ChairmanK Chrisg Coffee Mug Darth Quixote David David B David Boxenhorn DavidB Diana Dkane DMI Dobeln Duende Dylan Ericlien Fly Gcochran Godless Grady Herrick Jake & Kara Jason Collins Jason Malloy Jason s Jeet Jemima Joel John Emerson John Quiggin JP Kele Kjmtchl Mark Martin Matoko Kusanagi Matt Matt McIntosh Michael Vassar Miko Ml Ole P-ter Piccolino Rosko Schizmatic Scorpius Suman TangoMan The Theresa Thorfinn Thrasymachus Wintz Greg Grandin Greg Johnson Gregoire Chamayou Gregory Conte Gregory Foster Gregory Hood Gregory Wilpert Guest Admin Hannah Appel Hans-Hermann Hoppe Harri Honkanen Henry Cockburn Hina Shamsi Howard Zinn Hubert Collins Hugh McInnish Hunter DeRensis Ian Fantom Ira Chernus J. Alfred Powell Jack Kerwick Jack Krak Jack Rasmus Jack Ravenwood Jack Sen Jake Bowyer James Bovard James Carroll James Fulford James J. O'Meara Jane Lazarre Jared S. Baumeister Jared Taylor Jason C. Ditz Jason Kessler Jay Stanley Jean Marois Jeff J. Brown Jeffrey Blankfort Jeffrey St. Clair Jen Marlowe Jeremiah Goulka Jeremy Cooper Jesse Mossman JHR Writers Jim Daniel Jim Goad Jim Kavanagh JoAnn Wypijewski Joe Lauria Johannes Wahlstrom John W. Dower John Feffer John Fund John Harrison Sims John Pilger John Reid John Scales Avery John Siman John Stauber John Taylor John Titus John V. Walsh John Wear John Williams Jon Else Jonathan Alan King Jonathan Anomaly Jonathan Cook Jonathan Rooper Jonathan Schell Joseph Kishore Joseph Sobran Juan Cole Judith Coburn Julian Bradford Karel Van Wolferen Karen Greenberg Kees Van Der Pijl Kelley Vlahos Kerry Bolton Kersasp D. Shekhdar Kevin MacDonald Kevin Rothrock Kevin Zeese Kshama Sawant Laura Gottesdiener Laura Poitras Lawrence G. Proulx Leo Hohmann Linda Preston Logical Meme Lorraine Barlett M.G. Miles Mac Deford Maidhc O Cathail Malcolm Unwell Marcus Alethia Marcus Cicero Margaret Flowers Mark Danner Mark Engler Mark Perry Mark Weber Matt Parrott Mattea Kramer Matthew Harwood Matthew Richer Matthew Stevenson Max Blumenthal Max Denken Max North Max Parry Max West Maya Schenwar Michael Gould-Wartofsky Michael Hoffman Michael Quinn Michael Schwartz Michael T. Klare Moon Landing Skeptic Murray Polner N. Joseph Potts Nan Levinson Naomi Oreskes Nate Terani Nathan Cofnas Nathan Doyle Ned Stark Nelson Rosit Nicholas Stix Nick Kollerstrom Nick Turse Nils Van Der Vegte Noam Chomsky NOI Research Group Nomi Prins Norman Finkelstein Patrick Cleburne Patrick Cloutier Patrick Martin Patrick McDermott Paul Cochrane Paul Engler Paul Mitchell Paul Nachman Paul Nehlen Pepe Escobar Peter Baggins Ph.D. Peter Bradley Peter Brimelow Peter Gemma Peter Van Buren Philip Weiss Pierre M. Sprey Pratap Chatterjee Publius Decius Mus Rajan Menon Ralph Nader Ramin Mazaheri Ramziya Zaripova Randy Shields Ray McGovern Rebecca Gordon Rebecca Solnit Rémi Tremblay Richard Galustian Richard Hugus Richard Krushnic Richard Silverstein Rick Shenkman Rita Rozhkova Robert Baxter Robert Bonomo Robert Fisk Robert Hampton Robert Henderson Robert Lipsyte Robert Parry Robert Roth Robert S. Griffin Robert Scheer Robert Stevens Robert Trivers Robin Eastman Abaya Roger Dooghy Ronald N. Neff Rory Fanning Ryan Dawson Sam Francis Sam Husseini Sayed Hasan Sharmini Peries Sheldon Richman Spencer Davenport Spencer Quinn Stefan Karganovic Steffen A. Woll Stephanie Savell Stephen J. Rossi Stephen J. Sniegoski Steve Fraser Steven Yates Subhankar Banerjee Susan Southard Sydney Schanberg Tanya Golash-Boza Ted Rall Theodore A. Postol Thierry Meyssan Thomas A. Fudge Thomas Dalton Thomas Frank Thomas O. Meehan Tim Shorrock Tim Weiner Todd E. Pierce Todd Gitlin Todd Miller Tom Mysiewicz Tom Piatak Tom Suarez Tom Sunic Tracy Rosenberg Travis LeBlanc Trevor Lynch Virginia Dare Vladimir Brovkin Vladislav Krasnov Vox Day W. Patrick Lang Walter Block Washington Watcher Wayne Allensworth William Binney William DeBuys William Hartung William J. Astore Winslow T. Wheeler Ximena Ortiz Yan Shen Zhores Medvedev
Nothing found
By Topics/Categories Filter?
2016 Election Academia Alt Right American Media American Military American Pravda Anti-Semitism Blacks Censorship China Conspiracy Theories Crime Culture Culture/Society Donald Trump Economics Education Foreign Policy Genetics History Ideology Immigration IQ Iran Israel Israel Lobby Israel/Palestine Jews Miscellaneous Movies Neocons Obama Open Thread Political Correctness Politics Race Race/Ethnicity Russia Science Sports Syria Terrorism Ukraine United States World War II 100% Jussie Content 100% Jussie-free Content 2008 Election 2012 Election 2012 US Elections 2018 Election 2020 Election 23andMe 365 Black 365Black 9/11 A Farewell To Alms Aarab Barghouti Abigail Marsh Abortion Abraham Lincoln Acheivement Gap Achievement Gap Acting White Adam Schiff Adaptation Addiction ADL Admin Administration Admixture Adoptees Adoption Affective Empathy Affirmative Action Affordable Family Formation Afghanistan Africa African Americans African Genetics Africans Afrikaner Afrocentricism Age Age Of Malthusian Industrialism Agriculture AI AIDS Ainu AIPAC Air Force Aircraft Carriers Airlines Airports Al Jazeera Alain Soral Alan Clemmons Alan Dershowitz Alan Macfarlane Albion's Seed Alcohol Alcoholism Aldous Huxley Alexander Dugin Alexander Hamilton Alexandria Ocasio-Cortez Alexei Kudrin Alexei Navalny Ali Dawabsheh Alt Left Alternate History Altruism Amazon Amazon.com America America First American Dream American Empire American History American Indians American Jews American Left American Legion American Nations American Nations American Presidents American Prisons American Renaissance American Revolution Amerindians Amish Amish Quotient Amnesty Amnesty International Amoral Familialism Amy Klobuchar Amygdala Anatoly Karlin Ancestry Ancient DNA Ancient Genetics Ancient Greece Ancient Near East Anders Breivik Andrei Nekrasov Andrew Jackson Andrew Sullivan Andrew Yang Angela Stent Anglo-Saxons Anglosphere Animal IQ Animal Rights Ann Coulter Anne Frank Annual Country Reports On Terrorism Anthropology Anti-Gentilism Anti-Vaccination Anti-white Animus Antifa Antiquarianism Antiracism Antisocial Behavior Antiwar Movement Anwar Al-Awlaki Ap Apartheid Apollo's Ascent Appalachia Arab Christianity Arab Spring Arabs Archaeogenetics Archaeology Archaic DNA Archaic Humans Architecture Arctic Sea Ice Melting Argentina Arkham's Razor Armenia Armenian Genocide Armenians Army Arnon Milchan Art Arthur Jensen Arthur Lichte Artificial Intelligence Arts/Letters Aryans Aryeh Lightstone Ash Carter Ashkenazi Intelligence Ashkenazi Jews Asia Asian Americans Asian Quotas Asians Assassinations Assimilation Assortative Mating Atheism Atlanta Attractiveness AUMF Australia Australian Aboriginals Austria Autism Automation Avigdor Lieberman Ayodhhya Azerbaijan Babes And Hunks Babri Masjid Baby Gap Balanced Polymorphism Balkans Baltics Baltimore Riots Bangladesh Banjamin Netanyahu Banking Industry Banking System Banks Barack Obama Barbara Comstock Barbarians Baseball Baseball Statistics Bashar Al-Assad Basketball #BasketOfDeplorables Basque BBC BDS Movement Beauty Becky Becky Bashing Behavior Genetics Behavioral Economics Behavioral Genetics Belarus Belgium Belts Ben Cardin Ben Hodges Benedict Arnold Benjamin Netanyahu Benny Gantz Berezovsky Bernard Henri-Levy Bernie Sanders Bernies Sanders #BernieSoWhite BICOM Big History BigPost Bilateral Relations Bilingual Education Bill 59 Bill Browder Bill Clinton Bill Kristol Bill Maher Bill Of Rights Billionaires Bioethics Biology Birmingham Bisexuality Bitcoin BJP Black Community Black Crime Black Friday Black History Black History Month Black Lives Matter Black Muslims Black People Black People Accreditation Black Run America Black Undertow #BlackJobsMatter #BlackLiesMurder Blade Runner Blank Slatism Blog Blogging Blogosphere Blood Libel Blue Eyes Bmi boats-in-the-water bodybuilding Boeing Boers Bolshevik Revolution Bolshevik Russia Books Border Security Border Wall Borderlanders Boris Johnson Boycott Divest And Sanction Boycott Divestment And Sanctions Brahmans Brain Scans Brain Size Brain Structure Brazil Bret Stephens Brexit Brezhnev BRICs Brighter Brains Britain British Politics Brittany Watts Buddhism Build The Wall Burakumin Burma Bush Bush Administration Business California Californication Cambodia Camp Of The Saints Campus Rape Canada #Cancel2022WorldCupinQatar Cancer Candida Albicans Capitalism Cardiovascular Disease Carlos Slim Carly Fiorina Caroline Glick Carroll Quigley Cars Carter Page Catalonia Catfight Catholic Church Catholicism Caucasus Cavaliers Cecil Rhodes Central Asia Chanda Chisala Charles Darwin Charles De Gaulle Charles Krauthammer Charles Murray Charles Percy Charles Schumer Charleston Shooting Charlie Hebdo Charlottesville Checheniest Chechen Of Them All Chechens Chechnya Cherlie Hebdo Chetty Chicago Chicagoization Chicken Hut Children China/America China Vietnam Chinese Chinese Communist Party Chinese Economy Chinese Evolution Chinese History Chinese IQ Chinese Language Chinese People Chris Gown Christianity Christmas Christopher Steele Chuck Hagel Chuck Schumer CIA Cinema Civics Civil Liberties Civil Rights Civil War Civilization CJIA Clannishness Clans Clash Of Civilizations Class Classical Antiquity Classical Music Clayton County Climate Climate Change Clinton Clintons Cliodynamics clusterfake Coal Coalition Coalition Of The Fringes Coast Guard Cochran And Harpending Coen Brothers Cognitive Elitism Cognitive Empathy Cognitive Psychology Cognitive Science Cold War Colin Kaepernick Colin Woodard Collapse Party College Admission College Football Colonialism Color Revolution Comic Books Communism Community Reinvestment Act Computers Confederacy Confederate Flag Congress Conquistador-American Consciousness Consequences Conservatism Conservative Movement Conservatives Constitution Constitutional Theory Controversial Book Convergence Core Article Cornel West Corruption Corruption Perception Index Cory Booker Council Of Europe Counterpunch Cousin Marriage Cover Story Craig Murray Creationism CRIF Crimea Crimean Tatars Crimethink Crisis Crispr Crops crops-rotting-in-the-fields Cruise Missiles Crying Among The Farmland Ctrl-Left Cuba Cuckoldry Cuckservatism Cuckservative Cultural Anthropology Cultural Marxism Culture War Curfew Cut The Sh*t Guys Czech Republic DACA Daily Data Dump Dallas Shooting Damnatio Memoriae Dana Milbank Danny Danon Daren Acemoglu Dark Ages Darwinism Data Data Analysis Data Posts David Brog David Friedman David Frum David Hackett Fischer David Ignatius David Irving David Kramer David Lynch David Petraeus David Schenker Davide Piffer De Ploribus Unum Death Of The West Death Penalty Debbie Wasserman-Schultz Debt Decadence Decline And Fall Of The Roman Empire Deep South Deep State Degeneracy Democracy Democratic Party Demograhics Demographic Transition Demographics Demography Denisovans Denmark Dennis Ross Department Of Justice Department Of State Deprivation Derek Harvey Detroit Development Developmental Noise Dick Cheney Dienekes Diet Dinesh D'Souza Diplomacy Discrimination Disease Disney Disparate Impact Dissent Dissidence Diversity Diversity Before Diversity Diversity Pokemon Points Dmitry Medvedev Dmitry Orlov DNA Dodecad Dogs Dollar Donme Don't Get Detroit-ed Dopamine Dostoevsky Down Syndrome Dreams From My Father Dresden Dress Codes Drone War Drones Drug Use Drugs Duke Duterte Dylan Roof Dynasty Dysgenic E. O. Wilson East Asia East Asian Exception East Asians Eastern Europe Ebola Ecology Economic Development Economic History Economic Sanctions Economic Theory Economy Ecuador Ed Miller Edmund Burke Edward Gibbon Edward Snowden Effective Altruism Effortpost Efraim Diveroli Egor Kholmogorov Egypt Election 2008 Election 2012 Election 2016 Election 2018 Election 2020 Elections Electric Cars Elie Wiesel Eliot Cohen Eliot Engel Elites Elizabeth Holmes Elizabeth Warren Elliot Abrams Elliot Rodger Elliott Abrams Elon Musk Emigration Emil Kirkegaard Emmanuel Macron Empathy Energy England Entertainment Environment Environmentalism Epistemology Erdogan Espionage Espionage Act Estonia Estrogen Ethics Ethics And Morals Ethiopia Ethnic Nepotism Ethnicity Ethnocentricty EU Eugenics Eurabia Eurasia Europe European Genetics European History European Population History European Right European Union Europeans Eurozone Evolution Evolutionary Biology Evolutionary Genetics Evolutionary Genomics Evolutionary Psychology Exercise Eye Color Eyes Ezra Cohen-Watnick Face Recognition Face Shape Facebook Faces Fake News Fake Noose fallout False Flag Attack Family Family Matters Family Systems Fantasy Far Abroad FARA Farmers Farming Fascism Fast Food FBI FDD Fecundity Federal Reserve Female Homosexuality Female Sexual Response Feminism Feminists Feminization Ferguson Ferguson Shooting Fertility Fertility Fertility Rates Fethullah Gulen Feuds Fields Medals FIFA Film Finance Financial Bailout Financial Crisis Financial Debt Financial Times Finland Finn Baiting First Amendment First World War FISA Fitness Flash Mobs Flight From White Fluctuarius Argenteus Flynn Effect Food Football For Fun Forecasts Foreign Policy Foreign Service Fracking France Frankfurt School Franklin D. Roosevelt Franz Boas Freakonomics Fred Hiatt Free Speech Free Trade Free Will Freedom Of Speech Freedom French Canadians Friday Fluff Fried Chicken Friends Of The Israel Defense Forces Frivolty Frontlash Funny Future Futurism Game Game Of Thrones Gandhi Gangs Gay Germ Gay Marriage Gays/Lesbians Gaza Gen Z Gender Gender And Sexuality Gender Equality Gender Reassignment Gender Relations Gene-Culture Coevolution Genealogy General Intelligence General Social Survey Generational Gap Genes Genetic Diversity Genetic Engineering Genetic Load Genetic Pacification Genocide Genomics Gentrification Geography Geopolitics George Bush George Clooney George H. W. Bush George Patton George Soros George Tenet George W. Bush Georgia Germans Germany Gilad Atzmon Gladwell Global Terrorism Index Global Warming Globalism Globalization God God Delusion Gold Golf Google Goths Government Government Debt Government Spending Government Surveillance Government Waste Graphs GRE Great Leap Forward Great Powers #GreatWhiteDefendantPrivilege Greece Green New Deal Greg Clark Greg Cochran Gregory Clark Gregory Cochran GRF Grooming Group Intelligence Group Selection GSS Guangzhou Guardian Guest Guilt Culture Gun Control Guns Guy Swan GWAS Gypsies H-1B H.R. McMaster H1-B Visas Haim Saban hair Hair Color Hair Lengthening Haiti Hajnal Line Half Sigma Halloween Hamilton: An American Musical HammerHate Hanzi Happening Happiness Harriet Tubman Harvard Harvey Weinstein Hasbara Hate Crimes Hate Facts Fraud Hoax Hate Hoaxes Hate Speech Hbd Hbd Chick Hbd Fallout Health Health And Medicine Health Care Healthcare Heart Disease Heart Health Hegira Height Height Privilege Helmuth Nyborg Help Henry Harpending Heredity Heritability Hexaco Hezbollah Hillary Clinton Himachal Pradesh Hindu Caste System Hispanic Crime Hispanics Historical Genetics Historical Population Genetics History Of Science Hitler Hodgepodge Hollywood Holocaust Homicide Homicide Rate Homosexuality Hong Kong Houellebecq House Intelligence Committee Housing Howard Kohr Hox Hoxby Huawei Hubbert's Peak Huddled Masses Hug Thug Human Achievement Human Biodiversity human-capital Human Evolution Human Evolutionary Genetics Human Evolutionary Genomics Human Genetics Human Genome Human Genomics Human Rights Humor Hungary Hunt For The Great White Defendant Hunter-Gatherers Hunting Hurricane Katrina Hybridization Hypocrisy Hysteria I Love Italians I.Q. I.Q. Genomics #IBelieveInHavenMonahan Ibn Khaldun Ibo Ice People Ice T Iceland Ideas Identity Ideology And Worldview Idiocracy Igbo Ilhan Omar Illegal Immigration Ilyushin IMF Immigration immigration-policy-terminology Immigriping Imperialism Imran Awan Inbreeding Income Incompetence India India Genetics Indian Economy Indian Genetics Indian IQ Indians Individualism Indo-European Indo-Europeans Indonesia Inequality Infrastructure Intelligence Intelligent Design International International Affairs International Comparisons International Relations Internet Internet Research Agency Interracial Interracial Marriage Intersectionality Interviews Introgression Invade Invite In Hock Invade The World Invite The World Iosef Stalin Iosif Lazaridis Iosif Stalin Iq Iq And Wealth Iran Nuclear Agreement Iran Nuclear Program Iranian Nuclear Program Iranian Nuclear Weapons Program Iraq Iraq War Ireland IRGC Is It Good For The Jews? Is Love Colorblind ISIS ISIS. Terrorism Islam Islamic Jihad Islamic State Islamism Islamophobia Islamophobiaphobia Israel Defense Force Israel Separation Wall Israeli Occupation Israeli Settlements Israeli Spying IT Italy It's Okay To Be White Ivanka Jack Keane Jair Bolsonaro Jake Tapper Jamaica Jamal Khashoggi James B. Watson James Clapper James Comey James Jeffrey James Mattis James Watson James Wooley Jane Mayer Janet Yellen Japan Jared Diamond Jared Kushner Jared Taylor Jason Greenblatt Jason Malloy JASTA JCPOA ¡Jeb! Jeb Bush Jefferson County Jeffrey Epstein Jeffrey Goldberg Jennifer Rubin Jeremy Corbyn Jerrold Nadler Jerry Seinfeld Jesuits Jewish Genetics Jewish History Jewish Intellectuals JFK Assassination JFK Jr. Jill Stein Joe Biden Joe Cirincione Joe Lieberman John Allen John B. Watson John Bolton John Brennan John Derbyshire John Durant John F. Kennedy John Hawks John Hughes John Kasich John Kerry John McCain John McLaughlin John Mearsheimer John Tooby Jonah Goldberg Jonathan Freedland Jordan Peterson Joseph Tainter Journalism Judaism Judge George Daniels Judicial System Judith Harris Julian Assange Jussie Smollett Justice Kaboom Kalash Kamala On Her Knees Katz Kay Bailey Hutchison Keith Ellison Ken Livingstone Kenneth Marcus Kenneth Pomeranz Kennewick Man Kerry Killinger Kevin MacDonald Kevin Mitchell Kevin Williamson Khashoggi Kids Kim Jong Un Kin Selection Kinship Kkk KKKrazy Glue Of The Coalition Of The Fringes Knesset Kompromat Korea Korean War Kosovo Kris Kobach Ku Klux Klan Kurds LA Language Languages Las Vegas Massacre Late Obama Age Collapse Late Ov Latin America Latinos Latvia Law Law Laws Of Behavioral Genetics Lazy Glossophiliac Lead Poisoning Learning Lebanon Leda Cosmides Lee Kuan Yew Lenin Leonard Bernstein Lesbians LGBT Liberal Opposition Liberal Whites Liberalism Liberals Libertarianism Libertarians Libya Life life-expectancy Lifestyle Light Skin Preference Lindsay Graham Lindsey Graham Linguistics Literacy Literature Lithuania Litvinenko Living Standards Lloyd Blankfein Localism Logan's Run Longevity Loooong Books Looting Lorde Louis Farrakhan Love And Marriage Lover Boys Lyndon Johnson M Factor M.g. Machiavellianism Mad Men Madeleine Albright Madoff Magnitsky Act Mahmoud Abbas Malaysia Malaysian Airlines MH17 Male Homosexuality Mall Malnutrition Malthusianism Manor Manorialism Manosphere Manspreading Manufacturing Mao Zedong Maoism Map Map Posts maps Marc Faber Marco Rubio Maria Butina Marijuana Marine Le Pen mark-adomanis Mark Steyn Mark Warner Marriage Martin Luther King Marwan Barghouti Marxism Masculinity Masha Gessen Mass Shootings Massacre In Nice Mate Choice Math Mathematics Matt Forney Matthew Weiner Max Blumenthal Max Boot Mayans McCain McCain/POW McDonald's Mcdonald's 365Black Measurement Error Media Media Bias Medicine Medieval Russia Medvedev Mega-Aggressions Megan McCain Mein Obama MEK Memorial Day Men With Gold Chains Meng Wanzhou Mental Illness Mental Traits Merciless Indian Savages Meritocracy Merkel Merkel Youth Merkel's Boner Mesolithic Mexican-American War Mexico MH 17 Michael Flynn Michael Jackson Michael Morell Michael Pompeo Michael Vick Michael Weiss Michelle Goldberg Michelle Ma Belle Michelle Obama Microaggressions Middle Ages Middle East Migration Mike Pence Mike Pompeo Mike Signer Militarization Military Military History Military Spending Military Technology Millionaires Milner Group Mindset Minimum Wage Minneapolis Minorities Misdreavus Missile Defense Missing The Point Mitt Romney Mixed-Race Model Minority Mohammed Bin Salman Monarchy Money Monogamy Moon Landing Hoax Moon Landings Moore's Law Moral Absolutism Moral Universalism Morality Mormonism Mormons Mortality Mortgage Moscow Mossad Moxie MTDNA Mulatto Elite Multiculturalism Music Muslim Muslim Ban Muslims Mussolini Mutual Assured Destruction Myanmar NAEP NAMs Nancy Pelosi Nancy Segal Narendra Modi NASA Natalism Nation Of Islam National Assessment Of Educational Progress National Question National Review National Security State National Security Strategy National Wealth Nationalism Native Americans NATO Natural Selection Nature Nature Vs. Nurture Navy Standards Naz Shah Nazism NBA Neandertal Neandertals Neanderthals Near Abroad Ned Flanders Neo-Nazis Neoconservatism Neoconservatives Neoliberalism Neolithic Neolithic Revolution Neoreaction Nerds Netherlands Neuroscience New Atheists New Cold War New Orleans New Silk Road New World Order New York City New York Times New Zealand Shooting News Newspeak NFL Nicholas II Nicholas Wade Nick Eberstadt Nigeria Nike Nikki Haley Noam Chomsky Nobel Prize Nobel Prized #NobelsSoWhiteMale Nordics Norman Braman North Africa North Korea Northern Ireland Northwest Europe Norway #NotOkay Novorossiya Novorossiya Sitrep NSA Nuclear Power Nuclear Proliferation Nuclear War Nuclear Weapons Nutrition O Mio Babbino Caro Obama Presidency Obamacare Obesity Obituary Obscured American Occam's Butterknife Occam's Razor Occam's Rubber Room Occupy October Surprise Oil Oliver Stone Olympics Open Borders Operational Sex Ratio Opinion Poll Opioids Orban Original Memes Orissa Orlando Shooting Orthodoxy Orwell Orwellian Language Osama Bin Laden OTFI Our Soldiers Speak Out-of-Africa Out Of Africa Model Outbreeding Pakistan Pakistani Paleoanthropology Paleolibertarianism Paleolithic Paleolithic Europeans Paleontology Palestine Palestinians Palin Pamela Geller Panhandling Paper Review Parasite Manipulation Parenting Parenting Parenting Behavioral Genetics Paris Attacks Parsi Parsi Genetics Partly Inbred Extended Family Pat Buchanan Pathogens Patriot Act Patriotism Paul Ewald Paul Ryan Paul Singer Paul Wolfowitz Pavel Grudinin Peak Oil Pearl Harbor Pedophilia Pentagon Perception Management Personal Personal Genomics Personal Use Personality Pete Buttgieg Peter Frost Peter Turchin Petro Poroshenko Pets Pew Phil Onderdonk Phil Rushton Philadelphia Philip Breedlove Philippines Philosophy Philosophy Of Science Phylogenetics Pigmentation Pigs Pioneer Hypothesis Piracy PISA Pizzagate Planned Parenthood Plaques For Blacks POC Ascendancy Podcast Poland Police Police State Police Training Political Correctness Makes You Stupid Political Dissolution Political Economy Political Philosophy Politicians Polling Polygamy Polygenic Score Polygyny Poor Reading Skills Pope Francis Population Population Genetics Population Growth Population Replacement Population Structure Population Substructure Populism Porn Pornography Portugal Post-Modernism Poverty PRC Pre-Obama America Prediction Presidential Race '08 Presidential Race '12 Presidential Race '16 Presidential Race '20 Press Censorship Prince Bandar Priti Patel Privatization Productivity Profiling Progressives Projection Pronoun Crisis Propaganda Prostitution protest Protestantism Psychology Psychometrics Psychopaths Psychopathy Pubertal Timing Public Health Public Schools Public Transportation Puerto Rico Puritans Putin Putin Derangement Syndrome Pygmies Qatar Quakers Quality Of Life Quantitative Genetics Quebec Race And Crime Race And Genomics Race And Iq Race/Crime Race Denialism Race/IQ race-realism Race Riots Rachel Maddow Racial Intelligence Racial Reality Racialism Racism Racist Objects Menace Racist Pumpkin Incident Radical Islam Raj Shah Rand Paul Randy Fine Rape Raqqa Rashida Tlaib Rationality Razib Khan Reader Survey Reading Real Estate RealWorld Recep Tayyip Erdogan Red State Blue State Reddit redlining Redneck Dunkirk Refugee Boy Refugee Crisis #refugeeswelcome #RefugeesWelcomeInQatar Regression To The Mean Religion Religion Religion And Philosophy Rentier Reprint Republican Party Republicans Reuel Gerecht Review Revisionism Rex Tillerson RFK Assassination Ricci Richard Dawkins Richard Dyer Richard Goldberg Richard Lewontin Richard Lynn Richard Nixon Richard Russell Riots Ritholtz R/k Theory Robert A. Heinlein Robert Ford Robert Kraft Robert Lindsay Robert McNamara Robert Mueller Robert Mugabe Robert Plomin Robert Spencer Robots Rohingya Rolling Stone Roman Empire Romania Rome Romney Ron DeSantis Ron Paul Ron Unz Ronald Reagan Rotherham Rove Roy Moore RT International Rudy Giuliani Rurik's Seed Russia-Georgia War Russiagate Russian Demography Russian Economy Russian Elections 2018 Russian Far East Russian History Russian Media Russian Military Russian Occupation Government Russian Orthodox Church Russian Reaction Russophobes Saakashvili sabermetrics Sabrina Rubin Erdely Sacha Baron Cohen Sailer Strategy Sailer's First Law Of Female Journalism Saint Peter Tear Down This Gate! Saint-Petersburg Same-sex Marriage San Bernadino Massacre Sandra Beleza Sandy Hook Sapir-Whorf Sarin Gas SAT Saudi Arabia Saying What You Have To Say Scandinavia Schizophrenia Science Denialism Science Fiction Science Fiction & Fantasy Scotland Scots Irish Scott Ritter Scrabble Secession Seeking Happiness Select Select Post Selection Self Indulgence Self-Obsession Separating The Truth From The Nonsense Serbia Sergei Magnitsky Sergei Skripal Sergey Brin Sex Sex Differences Sex Ratio Sex Ratio At Birth Sex Recognition Sexual Dimorphism Sexual Division Of Labor Sexual Selection Sexuality Shai Masot Shakespeare Shame Culture Shanghai Shared Environment Sheldon Adelson Shias And Sunnis Shimon Arad Shimon Peres Shmuley Boteach Shorts And Funnies Shoshana Bryen Shurat HaDin Sigar Pearl Mandelker Silicon Valley Singapore Single Men Single Women Six Day War SJWs Skin Color Skin Tone Slate Slave Trade Slavery Slavery Reparations Slavoj Zizek Smart Fraction Smoking Social Justice Warriors Social Media Social Science Socialism Society Sociobiology Sociology Sociopathy Sociosexuality Solar Energy Solutions Solzhenitsyn Sotomayor South Africa South Asia South China Sea South Korea Southeast Asia Southern Poverty Law Center Soviet History Soviet Union Space Space Command Space Exploration Space Program Spain Speculation SPLC Sport Sputnik News Srebrenica Stabby Somali Stacey Abrams Staffan Stage Stalinism Standardized Tests Star Trek Comparisons State Department State Formation States Rights Statistics Statue Of Liberty Statue Of Libertyism Steny Hoyer Stephen Cohen Stephen Colbert Stephen Harper Stephen Jay Gould Stephen Townsend Stereotypes Steroids Steve Bannon Steve King Steve Sailer Steven Pinker Steve's Rice Thresher Columns Strait Of Hormuz Strategic Affairs Ministry Stuart Levey Stuff White People Like SU-57 Sub-replacement Fertility Sub-Saharan Africa Sub-Saharan Africans Subprime Mortgage Crisis Suicide Super Soaker Supercomputers Superintelligence Supreme Court Survey Susan Glasser Svidomy Sweden Switzerland Syed Farook Syrian Civil War Syriza T.S. Eliot Ta-Nehisi Coates Taiwan Take Action Taki Tamil Nadu Tashfeen Malik Tax Cuts Tax Evasion Taxation Taxes Tea Party Technical Considerations Technology Ted Cruz Television Terrorists Tesla Test Scores Testing Testosterone Tests Texas Thailand The AK The American Conservative The Bell Curve The Bible The Black Autumn "the Blacks" The Blank Slate The Breeder's Equation The Cathedral The Confederacy The Constitution The Economist The Eight Banditos The Family The Future The Great Awokening The Kissing Billionaire The Left The Megaphone The New York Times The Scramble For America The Son Also Rises The South The States The Washington Post The Zeroth Amendment To The Constitution Theranos Theresa May Thermoeconomics Thomas Jefferson Thomas Moorer Thomas Perez Thor Tiananmen Massacre Tidewater Tiger Mom Tiger Woods Tim Tebow TIMSS TNC Tom Cotton Tom Wolfe Tony Blair Tony Kleinfeld Too Many White People Torture Trade Transgenderism Transhumanism Translation Translations Travel Trayvon Martin Trolling Trope Derangement Syndrome Tropical Humans True Redneck Stereotypes Trump Trump Derangement Syndrome Trust Tsarist Russia Tsarnaev Tucker Carlson Tulsi Gabbard Turkey Turks Tuskegee TWA 800 Twin Study Twins Twintuition Twitter UK Ukrainian Crisis Unanswerable Questions Unbearable Whiteness Unemployment Union United Kingdom Universal Basic Income Universalism unwordly Upper Paleolithic Urbanization US Blacks US Civil War II US Elections 2016 US Elections 2020 US Military US Regionalism US-Russia.org Expert Discussion Panel USA Used Car Dealers Moral Superiority Of USS Liberty USSR Uttar Pradesh Uyghurs Valerie Plame Vdare Venezuela Vibrancy Victoria Nuland Victorian England Victorianism Video Video Games Vietnam Vietnam War Vietnamese Violence Vioxx Virtual World Visual Word Form Area Vitamin D Vladimir Putin Vladimir Zelensky Voronezh Voting Rights Vulcan Society Wal-Mart Wall Street Walmart War War Crimes War In Donbass War On Terror War Powers Act Warhammer Washington DC Washington Post WasPage WASPs Watergate Watson Waugh Wealth Wealth Inequality Weight Weight Loss WEIRDO Welfare Western Decline Western Europe Western European Marriage Pattern Western Hypocrisy Western Media Western Religion Western Revival Westerns White White America White Americans White Death White Decline White Flight White Helmets White Liberals White Man's Burden White Nationalism White Nationalists White Privilege White Slavery White Supremacy White Teachers Whiteness Whiterpeople Whites Who Is The Fairest Of Them All? Who Whom Wikileaks Wild Life William Browder William Buckley William Fulbright William Kristol WINEP Winston Churchill Women Women In The Workplace Wonderlic Test Woodley Effect Woodrow Wilson WORDSUM Work Workers Working Class World Bank World Cup World Values Survey World War G World War H World War I World War III World War R World War T World War Weed World War Z Wretched Refuseism Writing WSHH WSJ WTO WVS Xi Jinping Y Chromosome Yamnaya Yankees Yemen Yochi Dreazen Yogi Berra's Restaurant Yoram Hazony YouTube Youtube Ban Yugoslavia Zbigniew Brzezinski Zika Zika Virus Zimbabwe Zionism Zombies Zvika Fogel
Nothing found
All Commenters • My
Comments
• Followed
Commenters
 All / On "Government Surveillance"
    It is discouraging to note just how the United States has been taking on the attributes of a police state since 9/11. Stories of police raids on people’s homes gone wrong are frequently in the news. In one recent incident, a heavily armed SWAT team was sent to a St. Louis county home. The armed...
  • I can’t seem to live up to your expectations. What exactly were you expecting me to say?

    Well, you really don’t need to worry about my, or anybody else’s expectations, especially on the Internet. Enjoy your retirement. Working in tech you definitely deserved it.
    As for the topic itself, when somebody asks me the same question is, I ask simple questions:
    How technical you are? If they don’t know I ask a couple of questions and get the estimate.
    As:
    -how does the personal computer boot?
    -what are rings in an operating system?
    -explain OSI model for me, please.
    Hehe…most fail on the first, so you know. The “normal consumer”.
    In that case, as I get an impression the guy who asked the question is, there are only two options:
    Find somebody to do it for you.
    Do nothing.

    Writing firewall rules is dependent on the situation and what’s to be protected. I gave him the generic hardware set up, the rudimentary software setup but when it comes to the fine detail that’s just not possible on this forum.

    You did.
    You also know that having a firewall is just a tiny bit of the overall approach to IT security.
    Modern exploits don’t even care about the firewall; they travel within the allowed traffic. Let alone pure phishing and such. We know it’s a layered problem including habits, self-discipline etc. The user was, is and will always be the weakest part of the security chain.
    Besides, most “IT professionals” don’t know how to write firewall rules. PC repair techs don’t care much about it, let alone software developers. Except, of course, the OS guys and “hackers”.

    If he has the desire, what I provided is a good starting point for further enlightenment but one needs to work at it.

    Precisely.
    But, again, let’s be fair: to write proper firewall rules for new Linux installation requires learning curve the average user simply can’t do.
    You could’ve recommended him installing pfSense type of package which would ease the workload but even that would soon create issues he’d need to go to forums and ask proper questions.

    Different version of Linux have different preferred software for a firewall. They have different install procedures that I can’t possibly cover here.

    Exactly.

    Maybe I made a mistake in trying to answer his question, but at least I tried.

    You did and I appreciate that (again, you don’t need to care what I appreciate or not).
    I just felt he couldn’t do it, and even if he could, it only addresses one layer in the security chain. Even that requires monitoring, proper reaction, updates/upgrades.

    My bottom line in such cases:
    How good are you in “tech”? Usually “zero”. No prob.
    What are you concerned about (what’s the REALISTIC threat)? Usually, as the guy who asked the question, malicious organizations and individuals, looking for money/mischief.
    How much money are you willing to spend on the issue? Usually very little.
    Could you stick to written rules, procedures etc? Usually not.
    The recommendation: get a friend/acquaintance to do it for you. BTW, won’t be much, really. BACKUP your data properly and hope for the best. If/when feeling “hacked” call that guy.
    End of story.

    Now, small business owner asking the same question gets a quite different answer. But his stakes are higher and he’s willing to spend more money and effort on the issue.
    Etc.

    We both know it’s a complex issue and requires a professional approach.
    We can chat here about it but that’s pretty much it. Chat, not work, and definitely not proper delivery.

  • @peterAUS
    Don't get me wrong, but......I mean.......are you taking a piss here?
    Please.

    Especially with:


    You’ll need to set up masquerading and a firewall application.
     
    The guy did ask nicely.

    I wrote a page as a comment, read it, and trashed it.

    My only advice to the guy: find a pro you trust and have him/her do the work.
    More money and expertise....more security.
    In his case, never above script kiddies.

    I can’t seem to live up to your expectations. What exactly were you expecting me to say? Writing firewall rules is dependent on the situation and what’s to be protected. I gave him the generic hardware set up, the rudimentary software setup but when it comes to the fine detail that’s just not possible on this forum.

    If he has the desire, what I provided is a good starting point for further enlightenment but one needs to work at it. Different version of Linux have different preferred software for a firewall. They have different install procedures that I can’t possibly cover here. Maybe I made a mistake in trying to answer his question, but at least I tried.

  • @RoatanBill
    This is a broad brush overview. Don't expect to be able to bring up a firewall without spending time getting an education on the topic.

    Get an old PC; almost anything will do. Install 2 network adapters (Ethernet NIC's). Speed of NIC is really unimportant as the lowest available will be 100mbps which is more than adequate for typical web surfing. If you have some outrageously fast Internet connection then go for 1000mbps NIC's. 8 Gig of ram is more than adequate if you can find that little in 2 sticks. Get the smallest hard drive or SSD you can find. You'll need a monitor, mouse and keyboard for the install but once things are up and running, you can run the box 'headless' meaning no monitor, no mouse and no keyboard. The thing will just sit and run 24/7 sipping electricity. Linux boxes are so stable that my record at a client site was 6 years and several months on a single boot. We turned it off because we were running out of disk space. Show me a Windows box that can stay stable for 6 years without a reboot.

    Download a flavor of Linux. I prefer Ubuntu 18 or the most recent flavor of Fedora. Follow the instructions to explode the download onto a USB stick. Boot the box and via the BIOS force it to read the USB stick instead of the norm which would be a drive. Once the Linux install procedure starts, you'll have to follow the prompts for information to create a bootable Linux O/S on the drive/SSD. There's lots to know here.

    You'll need to know things about your Internet connection like do you have a static or dynamic IP from your ISP as that will be your 'Public' interface. You'll have to make up a name for the box as that will be the 'hostname'. Then you should use 192.168.something.something as the IP address of the private side NIC. A firewall application will move traffic according to rules between the Public and Private NIC's. The 'something' referenced previously is any number from 1-254. Just pick some numbers you like, eg 192.168.37.42 or 192.168.216.197 or 192.168.9.13 or ... you get the idea. For a network mask, state: 255.255.255.0 .

    Once the install is over, remove the USB stick and bounce the box. That's trade jargon for reboot the machine. A Linux Operating environment should show up. First thing is to install all the available patches for the O/S. The download could be months old and Linux is updated frequently (but painlessly), so get all the patches applied to get it up to date. After the update finishes, bounce the box to load up the new software components.

    Here's where things get tricky for a newby. You'll need to set up masquerading and a firewall application. Your personal machine/Mac/Windows/Linux/refrigerator/etc will be cable connected to the private NIC. Your Internet cable will be connected to the Public NIC.

    If you insist on WiFi, cable connect a WiFi access point or other gadget to the Private NIC and it should offer a DHCP service so your personal machine can get an IP address from it. These WiFi gadgets have varying capabilities and service offerings, so I can't give you any more info on WiFi except to say I don't like it as it's a security hole. If you have a smart neighbor he will be surfing on your Internet connection in no time and might attack you ON YOUR PRIVATE SIDE AVOIDING THE FIREWALL ENTIRELY because the WiFi is on your private side.

    If you have more than one personal machine to connect to the Private side, either do it thru the WiFi or a small Ethernet switch where the switch is connected to the Private NIC and your boxes are connected to the switch. I prefer hard coded IP addresses instead of DHCP leases and then use those firm addresses and their MAC equivalents to tell the firewall what addresses are valid on the private network.

    Good luck.

    Don’t get me wrong, but……I mean…….are you taking a piss here?
    Please.

    Especially with:

    You’ll need to set up masquerading and a firewall application.

    The guy did ask nicely.

    I wrote a page as a comment, read it, and trashed it.

    My only advice to the guy: find a pro you trust and have him/her do the work.
    More money and expertise….more security.
    In his case, never above script kiddies.

    • Replies: @RoatanBill
    I can't seem to live up to your expectations. What exactly were you expecting me to say? Writing firewall rules is dependent on the situation and what's to be protected. I gave him the generic hardware set up, the rudimentary software setup but when it comes to the fine detail that's just not possible on this forum.

    If he has the desire, what I provided is a good starting point for further enlightenment but one needs to work at it. Different version of Linux have different preferred software for a firewall. They have different install procedures that I can't possibly cover here. Maybe I made a mistake in trying to answer his question, but at least I tried.
  • This is a broad brush overview. Don’t expect to be able to bring up a firewall without spending time getting an education on the topic.

    Get an old PC; almost anything will do. Install 2 network adapters (Ethernet NIC’s). Speed of NIC is really unimportant as the lowest available will be 100mbps which is more than adequate for typical web surfing. If you have some outrageously fast Internet connection then go for 1000mbps NIC’s. 8 Gig of ram is more than adequate if you can find that little in 2 sticks. Get the smallest hard drive or SSD you can find. You’ll need a monitor, mouse and keyboard for the install but once things are up and running, you can run the box ‘headless’ meaning no monitor, no mouse and no keyboard. The thing will just sit and run 24/7 sipping electricity. Linux boxes are so stable that my record at a client site was 6 years and several months on a single boot. We turned it off because we were running out of disk space. Show me a Windows box that can stay stable for 6 years without a reboot.

    Download a flavor of Linux. I prefer Ubuntu 18 or the most recent flavor of Fedora. Follow the instructions to explode the download onto a USB stick. Boot the box and via the BIOS force it to read the USB stick instead of the norm which would be a drive. Once the Linux install procedure starts, you’ll have to follow the prompts for information to create a bootable Linux O/S on the drive/SSD. There’s lots to know here.

    You’ll need to know things about your Internet connection like do you have a static or dynamic IP from your ISP as that will be your ‘Public’ interface. You’ll have to make up a name for the box as that will be the ‘hostname’. Then you should use 192.168.something.something as the IP address of the private side NIC. A firewall application will move traffic according to rules between the Public and Private NIC’s. The ‘something’ referenced previously is any number from 1-254. Just pick some numbers you like, eg 192.168.37.42 or 192.168.216.197 or 192.168.9.13 or … you get the idea. For a network mask, state: 255.255.255.0 .

    Once the install is over, remove the USB stick and bounce the box. That’s trade jargon for reboot the machine. A Linux Operating environment should show up. First thing is to install all the available patches for the O/S. The download could be months old and Linux is updated frequently (but painlessly), so get all the patches applied to get it up to date. After the update finishes, bounce the box to load up the new software components.

    Here’s where things get tricky for a newby. You’ll need to set up masquerading and a firewall application. Your personal machine/Mac/Windows/Linux/refrigerator/etc will be cable connected to the private NIC. Your Internet cable will be connected to the Public NIC.

    If you insist on WiFi, cable connect a WiFi access point or other gadget to the Private NIC and it should offer a DHCP service so your personal machine can get an IP address from it. These WiFi gadgets have varying capabilities and service offerings, so I can’t give you any more info on WiFi except to say I don’t like it as it’s a security hole. If you have a smart neighbor he will be surfing on your Internet connection in no time and might attack you ON YOUR PRIVATE SIDE AVOIDING THE FIREWALL ENTIRELY because the WiFi is on your private side.

    If you have more than one personal machine to connect to the Private side, either do it thru the WiFi or a small Ethernet switch where the switch is connected to the Private NIC and your boxes are connected to the switch. I prefer hard coded IP addresses instead of DHCP leases and then use those firm addresses and their MAC equivalents to tell the firewall what addresses are valid on the private network.

    Good luck.

    • Replies: @peterAUS
    Don't get me wrong, but......I mean.......are you taking a piss here?
    Please.

    Especially with:


    You’ll need to set up masquerading and a firewall application.
     
    The guy did ask nicely.

    I wrote a page as a comment, read it, and trashed it.

    My only advice to the guy: find a pro you trust and have him/her do the work.
    More money and expertise....more security.
    In his case, never above script kiddies.

  • @RoatanBill
    The physical aspects of how you get your Internet connection don't matter much. Be it wired or wireless makes little difference. Once you have a connection, your box is visible to the entire world via it's IP address. Anyone can interrogate your box to discover which ports (services) are open (advertised).
    Most people have no idea how communications actually work between machines. The average person has never heard of SSH, FTP, SMTP, etc and what they offer and represent. Operating systems that are promiscuous by design, like Windows and Mac, to be 'user friendly' are thus insecure by design. Later version of those operating systems incorporated rudimentary changes to offer better security, but those are just patches atop a system that was originally not designed with security in mind.
    Layers of security are the best approach. Your Internet connection should go to a stringent firewall that sits between your computer and the outside world. That firewall is your first line of defense. Think of it as a heavy door between you and an attacker. The more doors separating you from the attacker the better. Breaking down one door leads to another.
    Realistically, most people don't have a true firewall. They pretend that starting a firewall application on their one and only machine is equivalent to having a real firewall. That's simply not true. Most people also don't have the knowledge to write the rules for a firewall, and even if they did, their desire for a user friendly operating environment usually means they'll drill logical holes into their firewall to allow them the ease to do things without too much hassle.
    Linux was designed from the ground up as a secure platform. That's why the vast majority of Internet servers are Linux boxes. People running Linux work stations for their personal computing are those folks that have a native desire to understand how the tech works and not just that it does work. Windows and Mac were designed for people who wanted to stay ignorant of how the tech worked as long as it did work. Sadly, the history of security issues with Windows especially is very long. Mac has done a better job. In general, the older your operating system is, the weaker is its security capabilities even if turned on.

    Thanks for your respectful reply. It’s infinitely preferable to gratuitous sarcasm when I am earnestly asking for help in improving my security/privacy.

    That said, do you have any specific recommendations in the way of modems, firewalls for Macs – i.e., brand names, or links to products which will add layers of security?

    Thanks again.

  • I was responding to an individual that typically doesn’t get hacked by a gov’t entity.

    That’s debatable. I am sure that some people from “alt-right” spectrum could get on the “monitoring list”. In time more and more.

    Corporations and gov’t entities get hacked by experts working for gov’ts and corporations ….

    Yes.

    When I hear of utilities being hacked I have to wonder why their command and control systems are Internet connected and accessible.
    Decades ago I worked for Con Ed in New York and it supplied reliable electricity to 8.2 million people before there was an Internet. There’s no reason I can think of to connect sensitive industrial processes to the net. There should be no way for a ‘script kiddie’ to even Ping a nuclear site much less sniff out open ports, for example.

    Agree.
    The answer, well: management. Higher they are in the pyramid of power less they know/care about “tech”. It’s all about money (cutting costs and outsourcing) and corporate politics.

    The IOT is a hackers dream come true. Your refrigerator will be used to compromise your laptop, etc.

    Yes.

    Corporations and gov’ts purchase computers and leave their USB ports available so a disgruntled employee can internally steal sensitive information; no Internet required. They allow all outbound traffic so a knowledgeable individual can FTP the corporate database to a competitor. These geniuses provide DHCP and WiFi access to any smartphone, Raspberry Pi, laptop, etc to get a connection. If you leave your front door unlocked and get robbed it’s your fault as much as it is the thief’s.

    Yep.

    I never set up DHCP or WiFi for clients. I wanted to know of every MAC address on the network and who was operating it. I installed firewalls at department level so departments were restricted in what they could do internally. All web surfing went through a proxy server and all accesses recorded and restricted to legitimate sites. No one was porn surfing or otherwise goofing off without it being noted on reports. All email in and out was recorded at the server level and only legitimate servers could send and receive. I even used TMDA to get rid of 99% of SPAM that chokes typical email systems.

    I hear you.

    But I’m old school and retired now.

    You probably are. Got you wrong then. Thought you were one of the usual mid-thirties Linux fanatics.
    Apologies.

    5G, IOT, trash operating systems, municipal level Internet access (gov’t snooping) and new laws to make encryption illegal will eventually kill the Internet Golden Goose. And the ‘not so intelligent’ will call on gov’t to do something. There’s no hope.

    I hear you.
    Although, I see it in a worse light. Surveillance state. Panopticon.

    Please note I didn’t use that ‘S’ work you dislike.

    You know, if you are an old school retired tech, I don’t mind it. Understand perfectly.
    I started my “tech” part with punched cards and mainframes, in the military. A decent career in that “world” I guess, and some years in/around civilian “tech world” afterwards. Semi-retired now but, of course, keeping in touch with both. Even get some work in the later, here and there just to keep sharp.
    Or..hehe…so I say. We don’t want to make the “monitors” work that easy.

  • @peterAUS
    I'll bait. Try to keep this "chat" above the level seen on all "tech forums".

    ....the average person in the US has an IQ of 99. Frankly, that’s....... why the political class can get away with so much rubbish.
     
    You are onto something here for sure.

    That vast majority owns Windows due to force of habit, lack of desire to understand alternatives, etc.
     

    .....Apple became a walled garden that I prefer to refer to as a totalitarian operating system environment.
     
    True.

    For Windows, the result has been .....the vast majority of exploits written specifically because ....it represents the largest pool of....machines on the planet.
     

    ..Mac fared better because they represent a sliver of a market compared to Windows.
     
    Yes.

    These days, robots hunt for exploitable machines to produce a target list for the really smart and evil hackers to concentrate on.

    Got it.
    You talk about protecting from a non-Government/non-Government sponsored player.
    I talk about protecting from a Government-level/sponsored player.

    So, yes, against malicious individuals and non-Government related players the below works:


    The trick is to stay off the list. Penetration testing starts by identifying the operating system and version of a target usually using a Linux box programmed to roam the Internet looking for soft targets. When a Linux box is encountered, it is more often than not bypassed because the number of exploits is limited, Linux users patch their systems regularly because it’s so painless and easy without any fear of a bricked box and because the O/S is simply more difficult to hack. Windows and Mac are easier targets due to poor design and the hackers human nature wanting to do as little as possible for the most gain.
     
    Back to practicalities.
    For people posting on sites like this the potential penetrator/exploiter of interest, in my book, is Government or Government-sponsored player. Not necessarily the country where the author/poster is. Israel. China. Iran. Russia.Germany. Whatever.
    My point is: against those players the only way to protect own privacy and/or data is NOT to connect to the Internet.
    I could harden my setups and execute SOPs which will protect me from them, for example. The point is, by doing that would trigger red flags in "Five Eyes". The local branch of that outfit could start getting interested in me. And....hehe...I just don't think it would be good for me. I mean, they can, with ease, put anything they want on my network (even by breaking and entering) and have me processed by a domestic court. Etc.
    If THIS guy can get that treatment, no need to say anything more.
    https://www.thesun.co.uk/archives/news/918580/ex-sas-soldiers-child-sex-crimes/
    And they can do even worse.

    I was responding to an individual that typically doesn’t get hacked by a gov’t entity.

    Corporations and gov’t entities get hacked by experts working for gov’ts and corporations to steal intellectual property or to plant fraudulent ‘evidence’ that is later ‘discovered’ for prosecution purposes. It’s like a dirty cop dropping a bag of dope in a car during a traffic stop and then arresting the innocent driver that then has a hard time convincing a jury of his innocence because a prosecutor can convince a jury to convict a ham sandwich. That’s, again, due to juries made up of average intelligence people.

    When I hear of utilities being hacked I have to wonder why their command and control systems are Internet connected and accessible. Decades ago I worked for Con Ed in New York and it supplied reliable electricity to 8.2 million people before there was an Internet. There’s no reason I can think of to connect sensitive industrial processes to the net. There should be no way for a ‘script kiddie’ to even Ping a nuclear site much less sniff out open ports, for example. The IOT is a hackers dream come true. Your refrigerator will be used to compromise your laptop, etc.

    Corporations and gov’ts purchase computers and leave their USB ports available so a disgruntled employee can internally steal sensitive information; no Internet required. They allow all outbound traffic so a knowledgeable individual can FTP the corporate database to a competitor. These geniuses provide DHCP and WiFi access to any smartphone, Raspberry Pi, laptop, etc to get a connection. If you leave your front door unlocked and get robbed it’s your fault as much as it is the thief’s.

    I never set up DHCP or WiFi for clients. I wanted to know of every MAC address on the network and who was operating it. I installed firewalls at department level so departments were restricted in what they could do internally. All web surfing went through a proxy server and all accesses recorded and restricted to legitimate sites. No one was porn surfing or otherwise goofing off without it being noted on reports. All email in and out was recorded at the server level and only legitimate servers could send and receive. I even used TMDA to get rid of 99% of SPAM that chokes typical email systems.

    But I’m old school and retired now. 5G, IOT, trash operating systems, municipal level Internet access (gov’t snooping) and new laws to make encryption illegal will eventually kill the Internet Golden Goose. And the ‘not so intelligent’ will call on gov’t to do something. There’s no hope.

    Please note I didn’t use that ‘S’ work you dislike.

  • @RoatanBill
    Stating the truth is sometimes unpleasant, but it's still the truth. From what I've read, the average person in the US has an IQ of 99. Frankly, that's pretty stupid and is why the political class can get away with so much rubbish.

    That vast majority owns Windows due to force of habit, lack of desire to understand alternatives, etc. Windows won the operating system battle due to slick marketing, being there at the start of the PC revolution with DOS, having 3rd party software vendors write apps to their convoluted API (Applications Programming Interface) and the 'Microsoft Tax' that the hardware vendors instituted that forced a Windows purchase with every computer sold. With Windows pre-installed, not many people spent the time and mental energy to replace it. Apple went after the artsy folks with slick applications tuned for them. Slowly, Apple became a walled garden that I prefer to refer to as a totalitarian operating system environment. I wouldn't own an Apple product if they paid me.

    For Windows, the result has been decades of blue screens, botched O/S upgrades, countless reboots to install anything and the vast majority of exploits written specifically because their security is so weak and because it represents the largest pool of poorly protected machines on the planet. Windows is to computers what a hollow core door is to a vault. Mac fared better because they represent a sliver of a market compared to Windows.

    These days, robots hunt for exploitable machines to produce a target list for the really smart and evil hackers to concentrate on. The trick is to stay off the list. Penetration testing starts by identifying the operating system and version of a target usually using a Linux box programmed to roam the Internet looking for soft targets. When a Linux box is encountered, it is more often than not bypassed because the number of exploits is limited, Linux users patch their systems regularly because it's so painless and easy without any fear of a bricked box and because the O/S is simply more difficult to hack. Windows and Mac are easier targets due to poor design and the hackers human nature wanting to do as little as possible for the most gain.

    I’ll bait. Try to keep this “chat” above the level seen on all “tech forums”.

    ….the average person in the US has an IQ of 99. Frankly, that’s……. why the political class can get away with so much rubbish.

    You are onto something here for sure.

    That vast majority owns Windows due to force of habit, lack of desire to understand alternatives, etc.

    …..Apple became a walled garden that I prefer to refer to as a totalitarian operating system environment.

    True.

    For Windows, the result has been …..the vast majority of exploits written specifically because ….it represents the largest pool of….machines on the planet.

    ..Mac fared better because they represent a sliver of a market compared to Windows.

    Yes.

    These days, robots hunt for exploitable machines to produce a target list for the really smart and evil hackers to concentrate on.

    Got it.
    You talk about protecting from a non-Government/non-Government sponsored player.
    I talk about protecting from a Government-level/sponsored player.

    So, yes, against malicious individuals and non-Government related players the below works:

    The trick is to stay off the list. Penetration testing starts by identifying the operating system and version of a target usually using a Linux box programmed to roam the Internet looking for soft targets. When a Linux box is encountered, it is more often than not bypassed because the number of exploits is limited, Linux users patch their systems regularly because it’s so painless and easy without any fear of a bricked box and because the O/S is simply more difficult to hack. Windows and Mac are easier targets due to poor design and the hackers human nature wanting to do as little as possible for the most gain.

    Back to practicalities.
    For people posting on sites like this the potential penetrator/exploiter of interest, in my book, is Government or Government-sponsored player. Not necessarily the country where the author/poster is. Israel. China. Iran. Russia.Germany. Whatever.
    My point is: against those players the only way to protect own privacy and/or data is NOT to connect to the Internet.
    I could harden my setups and execute SOPs which will protect me from them, for example. The point is, by doing that would trigger red flags in “Five Eyes”. The local branch of that outfit could start getting interested in me. And….hehe…I just don’t think it would be good for me. I mean, they can, with ease, put anything they want on my network (even by breaking and entering) and have me processed by a domestic court. Etc.
    If THIS guy can get that treatment, no need to say anything more.
    https://www.thesun.co.uk/archives/news/918580/ex-sas-soldiers-child-sex-crimes/
    And they can do even worse.

    • Replies: @RoatanBill
    I was responding to an individual that typically doesn't get hacked by a gov't entity.

    Corporations and gov't entities get hacked by experts working for gov'ts and corporations to steal intellectual property or to plant fraudulent 'evidence' that is later 'discovered' for prosecution purposes. It's like a dirty cop dropping a bag of dope in a car during a traffic stop and then arresting the innocent driver that then has a hard time convincing a jury of his innocence because a prosecutor can convince a jury to convict a ham sandwich. That's, again, due to juries made up of average intelligence people.

    When I hear of utilities being hacked I have to wonder why their command and control systems are Internet connected and accessible. Decades ago I worked for Con Ed in New York and it supplied reliable electricity to 8.2 million people before there was an Internet. There's no reason I can think of to connect sensitive industrial processes to the net. There should be no way for a 'script kiddie' to even Ping a nuclear site much less sniff out open ports, for example. The IOT is a hackers dream come true. Your refrigerator will be used to compromise your laptop, etc.

    Corporations and gov'ts purchase computers and leave their USB ports available so a disgruntled employee can internally steal sensitive information; no Internet required. They allow all outbound traffic so a knowledgeable individual can FTP the corporate database to a competitor. These geniuses provide DHCP and WiFi access to any smartphone, Raspberry Pi, laptop, etc to get a connection. If you leave your front door unlocked and get robbed it's your fault as much as it is the thief's.

    I never set up DHCP or WiFi for clients. I wanted to know of every MAC address on the network and who was operating it. I installed firewalls at department level so departments were restricted in what they could do internally. All web surfing went through a proxy server and all accesses recorded and restricted to legitimate sites. No one was porn surfing or otherwise goofing off without it being noted on reports. All email in and out was recorded at the server level and only legitimate servers could send and receive. I even used TMDA to get rid of 99% of SPAM that chokes typical email systems.

    But I'm old school and retired now. 5G, IOT, trash operating systems, municipal level Internet access (gov't snooping) and new laws to make encryption illegal will eventually kill the Internet Golden Goose. And the 'not so intelligent' will call on gov't to do something. There's no hope.

    Please note I didn't use that 'S' work you dislike.
  • Stating the truth is sometimes unpleasant, but it’s still the truth. From what I’ve read, the average person in the US has an IQ of 99. Frankly, that’s pretty stupid and is why the political class can get away with so much rubbish.

    That vast majority owns Windows due to force of habit, lack of desire to understand alternatives, etc. Windows won the operating system battle due to slick marketing, being there at the start of the PC revolution with DOS, having 3rd party software vendors write apps to their convoluted API (Applications Programming Interface) and the ‘Microsoft Tax’ that the hardware vendors instituted that forced a Windows purchase with every computer sold. With Windows pre-installed, not many people spent the time and mental energy to replace it. Apple went after the artsy folks with slick applications tuned for them. Slowly, Apple became a walled garden that I prefer to refer to as a totalitarian operating system environment. I wouldn’t own an Apple product if they paid me.

    For Windows, the result has been decades of blue screens, botched O/S upgrades, countless reboots to install anything and the vast majority of exploits written specifically because their security is so weak and because it represents the largest pool of poorly protected machines on the planet. Windows is to computers what a hollow core door is to a vault. Mac fared better because they represent a sliver of a market compared to Windows.

    These days, robots hunt for exploitable machines to produce a target list for the really smart and evil hackers to concentrate on. The trick is to stay off the list. Penetration testing starts by identifying the operating system and version of a target usually using a Linux box programmed to roam the Internet looking for soft targets. When a Linux box is encountered, it is more often than not bypassed because the number of exploits is limited, Linux users patch their systems regularly because it’s so painless and easy without any fear of a bricked box and because the O/S is simply more difficult to hack. Windows and Mac are easier targets due to poor design and the hackers human nature wanting to do as little as possible for the most gain.

    • Replies: @peterAUS
    I'll bait. Try to keep this "chat" above the level seen on all "tech forums".

    ....the average person in the US has an IQ of 99. Frankly, that’s....... why the political class can get away with so much rubbish.
     
    You are onto something here for sure.

    That vast majority owns Windows due to force of habit, lack of desire to understand alternatives, etc.
     

    .....Apple became a walled garden that I prefer to refer to as a totalitarian operating system environment.
     
    True.

    For Windows, the result has been .....the vast majority of exploits written specifically because ....it represents the largest pool of....machines on the planet.
     

    ..Mac fared better because they represent a sliver of a market compared to Windows.
     
    Yes.

    These days, robots hunt for exploitable machines to produce a target list for the really smart and evil hackers to concentrate on.

    Got it.
    You talk about protecting from a non-Government/non-Government sponsored player.
    I talk about protecting from a Government-level/sponsored player.

    So, yes, against malicious individuals and non-Government related players the below works:


    The trick is to stay off the list. Penetration testing starts by identifying the operating system and version of a target usually using a Linux box programmed to roam the Internet looking for soft targets. When a Linux box is encountered, it is more often than not bypassed because the number of exploits is limited, Linux users patch their systems regularly because it’s so painless and easy without any fear of a bricked box and because the O/S is simply more difficult to hack. Windows and Mac are easier targets due to poor design and the hackers human nature wanting to do as little as possible for the most gain.
     
    Back to practicalities.
    For people posting on sites like this the potential penetrator/exploiter of interest, in my book, is Government or Government-sponsored player. Not necessarily the country where the author/poster is. Israel. China. Iran. Russia.Germany. Whatever.
    My point is: against those players the only way to protect own privacy and/or data is NOT to connect to the Internet.
    I could harden my setups and execute SOPs which will protect me from them, for example. The point is, by doing that would trigger red flags in "Five Eyes". The local branch of that outfit could start getting interested in me. And....hehe...I just don't think it would be good for me. I mean, they can, with ease, put anything they want on my network (even by breaking and entering) and have me processed by a domestic court. Etc.
    If THIS guy can get that treatment, no need to say anything more.
    https://www.thesun.co.uk/archives/news/918580/ex-sas-soldiers-child-sex-crimes/
    And they can do even worse.
  • Maybe interesting:

  • @RoatanBill
    The physical aspects of how you get your Internet connection don't matter much. Be it wired or wireless makes little difference. Once you have a connection, your box is visible to the entire world via it's IP address. Anyone can interrogate your box to discover which ports (services) are open (advertised).
    Most people have no idea how communications actually work between machines. The average person has never heard of SSH, FTP, SMTP, etc and what they offer and represent. Operating systems that are promiscuous by design, like Windows and Mac, to be 'user friendly' are thus insecure by design. Later version of those operating systems incorporated rudimentary changes to offer better security, but those are just patches atop a system that was originally not designed with security in mind.
    Layers of security are the best approach. Your Internet connection should go to a stringent firewall that sits between your computer and the outside world. That firewall is your first line of defense. Think of it as a heavy door between you and an attacker. The more doors separating you from the attacker the better. Breaking down one door leads to another.
    Realistically, most people don't have a true firewall. They pretend that starting a firewall application on their one and only machine is equivalent to having a real firewall. That's simply not true. Most people also don't have the knowledge to write the rules for a firewall, and even if they did, their desire for a user friendly operating environment usually means they'll drill logical holes into their firewall to allow them the ease to do things without too much hassle.
    Linux was designed from the ground up as a secure platform. That's why the vast majority of Internet servers are Linux boxes. People running Linux work stations for their personal computing are those folks that have a native desire to understand how the tech works and not just that it does work. Windows and Mac were designed for people who wanted to stay ignorant of how the tech worked as long as it did work. Sadly, the history of security issues with Windows especially is very long. Mac has done a better job. In general, the older your operating system is, the weaker is its security capabilities even if turned on.

    Maybe I stand corrected, a bit.
    You can add some value to the topic when dispensing with …ahm….adjectives and attributes of the derogative nature.

    Now, I disagree with some paragraphs in the comment but no way I am going to start sparring here re “tech”.

    What is interesting in the comments section, so far, is that the person you replied to probably read both your and my comments, and choose yours.
    Could be my style, but I doubt it.
    I think it was, more likely, wishful thinking.

    Now, a little food for thought for a tiny minority reading this which understands a bit or two about tech security.
    When the majority of people have their systems so easily penetrated and, if deemed prudent, exploited, what does it make of you/us who can have our systems hardened up?
    Hardened up even to a point of no penetration, let alone exploit?
    What could happen next?
    “They” give up?
    Or, they try harder, using other methods?

    Just a thought.

  • @95Theses
    Thanks for this very revealing (not to mention disconcerting) post.

    But it's got me wondering. I'm on an iMac desktop which I purchased in mid-2011. It's the last year a DVD/CD player was incorporated into the unit. Also, I still use a landline (AT&T – but not U-verse) and only a wired modem. From what you've written it appears I'm on the safe side, though I would welcome any additional security – anything reasonably priced for someone of meager means, now that I am retired.

    Question: given my setup, is it advisable to add more layers of security, and if so, do you have any specific recommendations? I would really appreciate any suggestions.

    Thanks again!

    95Theses

    ……From what you’ve written it appears I’m on the safe side….

    Oh my.
    Impressive. I do mean that.

  • @95Theses
    Thanks for this very revealing (not to mention disconcerting) post.

    But it's got me wondering. I'm on an iMac desktop which I purchased in mid-2011. It's the last year a DVD/CD player was incorporated into the unit. Also, I still use a landline (AT&T – but not U-verse) and only a wired modem. From what you've written it appears I'm on the safe side, though I would welcome any additional security – anything reasonably priced for someone of meager means, now that I am retired.

    Question: given my setup, is it advisable to add more layers of security, and if so, do you have any specific recommendations? I would really appreciate any suggestions.

    Thanks again!

    95Theses

    The physical aspects of how you get your Internet connection don’t matter much. Be it wired or wireless makes little difference. Once you have a connection, your box is visible to the entire world via it’s IP address. Anyone can interrogate your box to discover which ports (services) are open (advertised).
    Most people have no idea how communications actually work between machines. The average person has never heard of SSH, FTP, SMTP, etc and what they offer and represent. Operating systems that are promiscuous by design, like Windows and Mac, to be ‘user friendly’ are thus insecure by design. Later version of those operating systems incorporated rudimentary changes to offer better security, but those are just patches atop a system that was originally not designed with security in mind.
    Layers of security are the best approach. Your Internet connection should go to a stringent firewall that sits between your computer and the outside world. That firewall is your first line of defense. Think of it as a heavy door between you and an attacker. The more doors separating you from the attacker the better. Breaking down one door leads to another.
    Realistically, most people don’t have a true firewall. They pretend that starting a firewall application on their one and only machine is equivalent to having a real firewall. That’s simply not true. Most people also don’t have the knowledge to write the rules for a firewall, and even if they did, their desire for a user friendly operating environment usually means they’ll drill logical holes into their firewall to allow them the ease to do things without too much hassle.
    Linux was designed from the ground up as a secure platform. That’s why the vast majority of Internet servers are Linux boxes. People running Linux work stations for their personal computing are those folks that have a native desire to understand how the tech works and not just that it does work. Windows and Mac were designed for people who wanted to stay ignorant of how the tech worked as long as it did work. Sadly, the history of security issues with Windows especially is very long. Mac has done a better job. In general, the older your operating system is, the weaker is its security capabilities even if turned on.

    • Replies: @peterAUS
    Maybe I stand corrected, a bit.
    You can add some value to the topic when dispensing with ...ahm....adjectives and attributes of the derogative nature.

    Now, I disagree with some paragraphs in the comment but no way I am going to start sparring here re "tech".

    What is interesting in the comments section, so far, is that the person you replied to probably read both your and my comments, and choose yours.
    Could be my style, but I doubt it.
    I think it was, more likely, wishful thinking.

    Now, a little food for thought for a tiny minority reading this which understands a bit or two about tech security.
    When the majority of people have their systems so easily penetrated and, if deemed prudent, exploited, what does it make of you/us who can have our systems hardened up?
    Hardened up even to a point of no penetration, let alone exploit?
    What could happen next?
    "They" give up?
    Or, they try harder, using other methods?

    Just a thought.

    , @95Theses
    Thanks for your respectful reply. It’s infinitely preferable to gratuitous sarcasm when I am earnestly asking for help in improving my security/privacy.

    That said, do you have any specific recommendations in the way of modems, firewalls for Macs – i.e., brand names, or links to products which will add layers of security?

    Thanks again.
  • @RoatanBill
    Don't put words into my mouth so you can build a straw man. I never claimed that Linux was invincible as that would be stupid. When comparing the major operating systems, Windows is at the very bottom of the heap for security. Mac is a nit, so who cares? Linux is head and shoulders above all the possible operating systems a normal person or corporation might want to use.

    The average person has an IQ of 100. Pretty dumb. That person will use a garbage operating system like Windows with little regard for security until the lack of security bites them. Corporations use Windows because management is primarily made up of average IQ people that are not interested in security; they want bells and whistles, ease of use, shiny sparkly BS.

    The recent ransom payoffs by municipalities is evidence that their systems are wide open to hackers.

    I'm a retired white hat hacker. I installed a very customized firewall for a major Dallas area defense contractor's employee recreation/gym facility. As soon as I plugged it in the logs started growing. I though I messed up. I investigated only to discover the huge volume of traffic coming in from foreign countries on protocols that scream HACK. I reported this to management and they told me not to mention it further. That firewall stayed in place and shitcanned the traffic, but no one was interested in reviewing what systems those attackers had access to via their compromised network before the firewall.

    At another site, I got a contract to attempt to break into a corporate network. Long story short, I was in in a few minutes and left a message on one of their servers. Next day, I got call from the corporate offices to show up for a meeting that afternoon. When I explained that their very expensive hardware based firewall was as clear as glass to ALL traffic because their IT staff had never written any rules, the HMFIC fired 8 people on the spot in my presence.

    You can't buy canned security. You have to work at it and monitor what's going on. With Windows, you had better put a Linux firewall in front of it because Windows security always has been trash.

    Thanks for this very revealing (not to mention disconcerting) post.

    But it’s got me wondering. I’m on an iMac desktop which I purchased in mid-2011. It’s the last year a DVD/CD player was incorporated into the unit. Also, I still use a landline (AT&T – but not U-verse) and only a wired modem. From what you’ve written it appears I’m on the safe side, though I would welcome any additional security – anything reasonably priced for someone of meager means, now that I am retired.

    Question: given my setup, is it advisable to add more layers of security, and if so, do you have any specific recommendations? I would really appreciate any suggestions.

    Thanks again!

    95Theses

    • Replies: @RoatanBill
    The physical aspects of how you get your Internet connection don't matter much. Be it wired or wireless makes little difference. Once you have a connection, your box is visible to the entire world via it's IP address. Anyone can interrogate your box to discover which ports (services) are open (advertised).
    Most people have no idea how communications actually work between machines. The average person has never heard of SSH, FTP, SMTP, etc and what they offer and represent. Operating systems that are promiscuous by design, like Windows and Mac, to be 'user friendly' are thus insecure by design. Later version of those operating systems incorporated rudimentary changes to offer better security, but those are just patches atop a system that was originally not designed with security in mind.
    Layers of security are the best approach. Your Internet connection should go to a stringent firewall that sits between your computer and the outside world. That firewall is your first line of defense. Think of it as a heavy door between you and an attacker. The more doors separating you from the attacker the better. Breaking down one door leads to another.
    Realistically, most people don't have a true firewall. They pretend that starting a firewall application on their one and only machine is equivalent to having a real firewall. That's simply not true. Most people also don't have the knowledge to write the rules for a firewall, and even if they did, their desire for a user friendly operating environment usually means they'll drill logical holes into their firewall to allow them the ease to do things without too much hassle.
    Linux was designed from the ground up as a secure platform. That's why the vast majority of Internet servers are Linux boxes. People running Linux work stations for their personal computing are those folks that have a native desire to understand how the tech works and not just that it does work. Windows and Mac were designed for people who wanted to stay ignorant of how the tech worked as long as it did work. Sadly, the history of security issues with Windows especially is very long. Mac has done a better job. In general, the older your operating system is, the weaker is its security capabilities even if turned on.
    , @peterAUS

    ......From what you’ve written it appears I’m on the safe side....
     
    Oh my.
    Impressive. I do mean that.
  • @RoatanBill
    Don't put words into my mouth so you can build a straw man. I never claimed that Linux was invincible as that would be stupid. When comparing the major operating systems, Windows is at the very bottom of the heap for security. Mac is a nit, so who cares? Linux is head and shoulders above all the possible operating systems a normal person or corporation might want to use.

    The average person has an IQ of 100. Pretty dumb. That person will use a garbage operating system like Windows with little regard for security until the lack of security bites them. Corporations use Windows because management is primarily made up of average IQ people that are not interested in security; they want bells and whistles, ease of use, shiny sparkly BS.

    The recent ransom payoffs by municipalities is evidence that their systems are wide open to hackers.

    I'm a retired white hat hacker. I installed a very customized firewall for a major Dallas area defense contractor's employee recreation/gym facility. As soon as I plugged it in the logs started growing. I though I messed up. I investigated only to discover the huge volume of traffic coming in from foreign countries on protocols that scream HACK. I reported this to management and they told me not to mention it further. That firewall stayed in place and shitcanned the traffic, but no one was interested in reviewing what systems those attackers had access to via their compromised network before the firewall.

    At another site, I got a contract to attempt to break into a corporate network. Long story short, I was in in a few minutes and left a message on one of their servers. Next day, I got call from the corporate offices to show up for a meeting that afternoon. When I explained that their very expensive hardware based firewall was as clear as glass to ALL traffic because their IT staff had never written any rules, the HMFIC fired 8 people on the spot in my presence.

    You can't buy canned security. You have to work at it and monitor what's going on. With Windows, you had better put a Linux firewall in front of it because Windows security always has been trash.

    Duh. Who cares.

  • @RoatanBill
    Any competent programmer can write an encryption algorithm that no supercomputer can decrypt. All it takes is imagination. The problem with that code, however, is that it's unique to the parties that agree beforehand to use it and therefore does not have the ability to function between non predetermined contacts. I suspect that type of encryption is used all the time by criminal organizations and gov't, but I repeat myself.

    As for breaking into systems to listen in on every keystroke, that does exist and is made possible by people dumb enough to use the Windows operating system and their joke of a firewall. Security and robustness is why the entire Internet runs on Linux. If people want security, it's available, but you actually have to know something about computers and security to use it. Therefore the artsy people who can't balance a checkbook prefer an Apple or Microsoft product. It's the 'don't know anything technical and don't want to know anything technical' people that are the political class, the entertainment industry, media, finance, etc that run the world.

    people dumb enough to use the Windows operating system

    Stopped reading there. You are not a serious person.

  • @Bill Jones
    John Whitehead is probably the countries leading chronicler of the States crimes in this area
    https://www.rutherford.org/

    Yeah. Whitehead is good.

    A Government of Wolves: The Emerging American Police State

  • @peterAUS
    Mr Author I take you want to help here and have to dumb down the message for the target audience. Appreciated, but you are fundamentally wrong.

    As far as online privacy there is one, and really, just ONE rule:
    There can be none.

    Nothing "tech" any of us can do can make the real difference.
    If "they" want to snoop on you they shall.

    The only, ONLY, way not to get snooped is not to connect to anything. Not even your own WAP.

    Simple as that.

    Here is a scenario for you:
    You do use encryption. They compromise your machine so they intercept keys input before the encryption process.
    You know:key press->keyboard controller-bus->chipset->buffer->CPU=>timer trigger->switch context to encripton code->read the buffer->encrypt the data there=====>
    Yes, yes, I know, but let's not get too complicated. 90% of people reading this don't get even that.

    And after decryption of incoming data has been completed anwhere from that buffer to the actual analog hardware on display.

    Makes sense?

    Doesn't' matter if it doesn't. Just stick to the only rule that matters.
    There.......is...........no..........online..........privacy........outside............of.....LAN. Excluding WLAN. Just wires within your local area network.

    Now, if they are really onto you even that won't matter much. They'll "bug" your house.
    And if they can't they ask you in person. Picture THAT.

    Now, of course, it's possible to maintain privacy. But, that goes way above and beyond encryption, tech-related laws etc. It's an ever-evolving mix of tech, PROCEDURES, and vigilance. Hard and tricky game.
    Very rare people can do it and only up to the point. Nobody on this Webzine I am sure.
    Me, just too lazy. And, of course, not keen to tempt the knock at the door. Or worse.

    Because, at the end of the game, there are "snatch squads" and "rendition".
    Just keep that in mind. If you want, of course.

    Well said.

  • @Lot
    That is a failed bill from the previous Congress. You see the 2017-18 up top?

    PG claim is:

    “Congress is considering bills that will make criticism of Israel a crime”

    I say he’s either intentionally lying or so senile he lacks the most basic knowledge of the topic he obsesses his whole life on. Pretty easy to prove me wrong. Please show me where “Congress is considering bills that will make criticism of Israel a crime”

    It’s OK though, I can see how a Russian could be confused by this. Here’s the truth: in America we love both our freedom of speech, and as the New Zion we also love the Original.

    Why say he is intentionally lying or senile? If Congress has considered a bill, yet that bill failed, which you are not disputing, then Congress is considering such bills.

    And, knowing Congress, they will introduce another in which all the parties involved get to more fairly distribute the plunder amongst themselves and figure out how “sell it” to the people since this is always the sticking point for bills.

  • @Lot
    “Congress is considering bills that will make criticism of Israel a crime”

    False.

    “the Constitution of the United States itself has even been publicly described by the president as ‘archaic’ and ‘a bad thing for the country.’ ”

    This one is also false (the cited “independent” article even had many commentators calling it out as fake news). Seems that some in the media get a kick out of fomenting reader anger over things that did not actually happen.

  • @Sick of Orcs
    osama made The Beast attack its own citizens.

    osama won.

    And “Osama” is the government itself anyway.

    • Agree: Sick of Orcs
  • @Jim bob Lassiter
    All true to one lesser or greater extent or the other. However, the root cause of unpleasant airline travel is all the low IQ uncultured rabble of the world who can now travel by plane or get a job at the airport.

    Imagine have to sit next to Sheila Jackson Lee, Fareeq Abdula Abkar, or even being in the same passenger screening line with that family from Disneyland. (with them getting waved through by TSA and you getting shaken down like a cocaine smuggler)

    Yea, verily yea!

    I have not traveled via commercial airlines in four years, due to an extra high-radiation treatment then while my wife was being groped by dykes. We were both “pre-check”. I have no intention of breaking that streak until TSA is abolished. In other words, never.

    Meanwhile–in the stopped clock dept.–congressperson Ilhan Omar has proposed to abolish DHS outright. Send me the petition asap!

  • Lot says:
    @Andrei Martyanov

    False.
     
    https://www.congress.gov/bill/115th-congress/house-bill/1697/text

    Excerpt:


    (3) POLITICALLY MOTIVATED.—The term “politically motivated” means actions to impede or constrain commerce with Israel that are intended to coerce political action from or impose policy positions on Israel.
     
    The bill is about opposing those "politically motivated" "actions". By actions, of course, a lot of things could be (mis)construed as. Especially by armies of Israeli-first lawyers. It is also funny against the background of the US sanctioning the rest of the world to the left and to the right. For people having a revulsion towards US Congress casuistry (that is while being totally in the pockets of US Israeli-firstres), the video of the 23 standing ovations by US "servants of people" to the most trivial bromides about "democracy" and US-Israeli "alliance" by Bibi could be a good insight into the mechanism of decomposition of American Republic due to its utter corruption with active participation of Israeli lobbies in the US.

    That is a failed bill from the previous Congress. You see the 2017-18 up top?

    PG claim is:

    “Congress is considering bills that will make criticism of Israel a crime”

    I say he’s either intentionally lying or so senile he lacks the most basic knowledge of the topic he obsesses his whole life on. Pretty easy to prove me wrong. Please show me where “Congress is considering bills that will make criticism of Israel a crime”

    It’s OK though, I can see how a Russian could be confused by this. Here’s the truth: in America we love both our freedom of speech, and as the New Zion we also love the Original.

    • Replies: @OEMIKITLOB
    Why say he is intentionally lying or senile? If Congress has considered a bill, yet that bill failed, which you are not disputing, then Congress is considering such bills.

    And, knowing Congress, they will introduce another in which all the parties involved get to more fairly distribute the plunder amongst themselves and figure out how "sell it" to the people since this is always the sticking point for bills.
  • …build a straw man.

    …that would be stupid.

    …The average person has an IQ of 100. Pretty dumb. That person will use a garbage

    …. management is primarily made up of average IQ people

    ..I’m a retired white hat hacker.

    … shitcanned the traffic.

    …firewall was as clear as glass to ALL traffic because their IT staff had never written any rules..

    …Windows security always has been trash…

    Moving on.

  • @peterAUS

    As for breaking into systems to listen in on every keystroke, that does exist and is made possible by people dumb enough to use the Windows operating system and their joke of a firewall.
     
    You believe that running ANY version of UNIX-like OS will prevent that type of exploit?
    O.K.

    And, more, I guess that UNIX like system calls get executed by firmware running on top of digital electronics hardware. Two additional layers where "they" can put whatever they want. Even in the factory.

    Speaking of the former a question for somebody, perhaps:
    Had a chat with a friend who is a network security specialist (firewalls and such) over the weekend. We got into a chat re:"O.K. I know they can compromise my systems. To exploit it properly they'd need to send some data back to somewhere. Now.....what piece of hardware/software can we put somewhere from our machine NIC to the router to see, recognize, that traffic".
    I mean, at the end of the day it must be an Ethernet (I guess for 99,99 % of people) frame.
    We decided it's possible but requires just too much work...hehe...
    But, then again, both of us aren't THAT good in this game. Maybe somebody here is. So, what would you suggest we could do and which doesn't require a lot of work, even on a daily basis?
    Just to recognize the exploit communicating with the outside world.

    As for the later:
    With the current level of integration, can any non-major Government player, with certainty, recognize what electronics on the chip does?
    Say: this is Control Unit; this is Floating Point unit; this is....I don't know. Let's do some tests and see what THIS part of the chip does. Possible?
    Hehe...I remember the days of old PDP types when you could trace any signal and know exactly what "this" piece of digital electronics does. Not so sure it's even possible anymore today.
    Bottom line, easy to put, I guess, some "proprietary" hardware backdoor type.
    Anyone?

    Don’t put words into my mouth so you can build a straw man. I never claimed that Linux was invincible as that would be stupid. When comparing the major operating systems, Windows is at the very bottom of the heap for security. Mac is a nit, so who cares? Linux is head and shoulders above all the possible operating systems a normal person or corporation might want to use.

    The average person has an IQ of 100. Pretty dumb. That person will use a garbage operating system like Windows with little regard for security until the lack of security bites them. Corporations use Windows because management is primarily made up of average IQ people that are not interested in security; they want bells and whistles, ease of use, shiny sparkly BS.

    The recent ransom payoffs by municipalities is evidence that their systems are wide open to hackers.

    I’m a retired white hat hacker. I installed a very customized firewall for a major Dallas area defense contractor’s employee recreation/gym facility. As soon as I plugged it in the logs started growing. I though I messed up. I investigated only to discover the huge volume of traffic coming in from foreign countries on protocols that scream HACK. I reported this to management and they told me not to mention it further. That firewall stayed in place and shitcanned the traffic, but no one was interested in reviewing what systems those attackers had access to via their compromised network before the firewall.

    At another site, I got a contract to attempt to break into a corporate network. Long story short, I was in in a few minutes and left a message on one of their servers. Next day, I got call from the corporate offices to show up for a meeting that afternoon. When I explained that their very expensive hardware based firewall was as clear as glass to ALL traffic because their IT staff had never written any rules, the HMFIC fired 8 people on the spot in my presence.

    You can’t buy canned security. You have to work at it and monitor what’s going on. With Windows, you had better put a Linux firewall in front of it because Windows security always has been trash.

    • Replies: @Johnny Rico
    Duh. Who cares.
    , @95Theses
    Thanks for this very revealing (not to mention disconcerting) post.

    But it's got me wondering. I'm on an iMac desktop which I purchased in mid-2011. It's the last year a DVD/CD player was incorporated into the unit. Also, I still use a landline (AT&T – but not U-verse) and only a wired modem. From what you've written it appears I'm on the safe side, though I would welcome any additional security – anything reasonably priced for someone of meager means, now that I am retired.

    Question: given my setup, is it advisable to add more layers of security, and if so, do you have any specific recommendations? I would really appreciate any suggestions.

    Thanks again!

    95Theses
  • @Barzini
    Regimes often get more oppressive in their last stages. The reason for this is that when more and more people realize that the regime is corrupt, the many good people that were once part of the regime start dropping out one by one. After a period of many years, the regime reaches a point where all the good people have departed and there is no one left except bad people. Once this point is reached, there are no longer any good people to restrain the bad people who are now running everything. So the regime becomes increasingly vicious and evil.

    The reason for this is that when more and more people realize that the regime is corrupt, the many good people that were once part of the regime start dropping out one by one. After a period of many years, the regime reaches a point where all the good people have departed and there is no one left except bad people.

    Very good observation, it also coincides with my own (not really, Tolstoy already sort of got it) theory of the high density of the ass-holes in political space, and the United States political space certainly reached toxic density (I would say between 0.7 and 1.2 asshole per cubic meter of D.C. space) some time in 2003-2005. I am not being facetious; OK, just teeny-weeny bit and yes, your observation is spot on.

  • Regimes often get more oppressive in their last stages. The reason for this is that when more and more people realize that the regime is corrupt, the many good people that were once part of the regime start dropping out one by one. After a period of many years, the regime reaches a point where all the good people have departed and there is no one left except bad people. Once this point is reached, there are no longer any good people to restrain the bad people who are now running everything. So the regime becomes increasingly vicious and evil.

    • Replies: @Andrei Martyanov

    The reason for this is that when more and more people realize that the regime is corrupt, the many good people that were once part of the regime start dropping out one by one. After a period of many years, the regime reaches a point where all the good people have departed and there is no one left except bad people.
     
    Very good observation, it also coincides with my own (not really, Tolstoy already sort of got it) theory of the high density of the ass-holes in political space, and the United States political space certainly reached toxic density (I would say between 0.7 and 1.2 asshole per cubic meter of D.C. space) some time in 2003-2005. I am not being facetious; OK, just teeny-weeny bit and yes, your observation is spot on.
  • @RoatanBill
    Any competent programmer can write an encryption algorithm that no supercomputer can decrypt. All it takes is imagination. The problem with that code, however, is that it's unique to the parties that agree beforehand to use it and therefore does not have the ability to function between non predetermined contacts. I suspect that type of encryption is used all the time by criminal organizations and gov't, but I repeat myself.

    As for breaking into systems to listen in on every keystroke, that does exist and is made possible by people dumb enough to use the Windows operating system and their joke of a firewall. Security and robustness is why the entire Internet runs on Linux. If people want security, it's available, but you actually have to know something about computers and security to use it. Therefore the artsy people who can't balance a checkbook prefer an Apple or Microsoft product. It's the 'don't know anything technical and don't want to know anything technical' people that are the political class, the entertainment industry, media, finance, etc that run the world.

    As for breaking into systems to listen in on every keystroke, that does exist and is made possible by people dumb enough to use the Windows operating system and their joke of a firewall.

    You believe that running ANY version of UNIX-like OS will prevent that type of exploit?
    O.K.

    And, more, I guess that UNIX like system calls get executed by firmware running on top of digital electronics hardware. Two additional layers where “they” can put whatever they want. Even in the factory.

    Speaking of the former a question for somebody, perhaps:
    Had a chat with a friend who is a network security specialist (firewalls and such) over the weekend. We got into a chat re:”O.K. I know they can compromise my systems. To exploit it properly they’d need to send some data back to somewhere. Now…..what piece of hardware/software can we put somewhere from our machine NIC to the router to see, recognize, that traffic”.
    I mean, at the end of the day it must be an Ethernet (I guess for 99,99 % of people) frame.
    We decided it’s possible but requires just too much work…hehe…
    But, then again, both of us aren’t THAT good in this game. Maybe somebody here is. So, what would you suggest we could do and which doesn’t require a lot of work, even on a daily basis?
    Just to recognize the exploit communicating with the outside world.

    As for the later:
    With the current level of integration, can any non-major Government player, with certainty, recognize what electronics on the chip does?
    Say: this is Control Unit; this is Floating Point unit; this is….I don’t know. Let’s do some tests and see what THIS part of the chip does. Possible?
    Hehe…I remember the days of old PDP types when you could trace any signal and know exactly what “this” piece of digital electronics does. Not so sure it’s even possible anymore today.
    Bottom line, easy to put, I guess, some “proprietary” hardware backdoor type.
    Anyone?

    • Replies: @RoatanBill
    Don't put words into my mouth so you can build a straw man. I never claimed that Linux was invincible as that would be stupid. When comparing the major operating systems, Windows is at the very bottom of the heap for security. Mac is a nit, so who cares? Linux is head and shoulders above all the possible operating systems a normal person or corporation might want to use.

    The average person has an IQ of 100. Pretty dumb. That person will use a garbage operating system like Windows with little regard for security until the lack of security bites them. Corporations use Windows because management is primarily made up of average IQ people that are not interested in security; they want bells and whistles, ease of use, shiny sparkly BS.

    The recent ransom payoffs by municipalities is evidence that their systems are wide open to hackers.

    I'm a retired white hat hacker. I installed a very customized firewall for a major Dallas area defense contractor's employee recreation/gym facility. As soon as I plugged it in the logs started growing. I though I messed up. I investigated only to discover the huge volume of traffic coming in from foreign countries on protocols that scream HACK. I reported this to management and they told me not to mention it further. That firewall stayed in place and shitcanned the traffic, but no one was interested in reviewing what systems those attackers had access to via their compromised network before the firewall.

    At another site, I got a contract to attempt to break into a corporate network. Long story short, I was in in a few minutes and left a message on one of their servers. Next day, I got call from the corporate offices to show up for a meeting that afternoon. When I explained that their very expensive hardware based firewall was as clear as glass to ALL traffic because their IT staff had never written any rules, the HMFIC fired 8 people on the spot in my presence.

    You can't buy canned security. You have to work at it and monitor what's going on. With Windows, you had better put a Linux firewall in front of it because Windows security always has been trash.
  • @Lot
    “Congress is considering bills that will make criticism of Israel a crime”

    False.

    False.

    https://www.congress.gov/bill/115th-congress/house-bill/1697/text

    Excerpt:

    (3) POLITICALLY MOTIVATED.—The term “politically motivated” means actions to impede or constrain commerce with Israel that are intended to coerce political action from or impose policy positions on Israel.

    The bill is about opposing those “politically motivated” “actions”. By actions, of course, a lot of things could be (mis)construed as. Especially by armies of Israeli-first lawyers. It is also funny against the background of the US sanctioning the rest of the world to the left and to the right. For people having a revulsion towards US Congress casuistry (that is while being totally in the pockets of US Israeli-firstres), the video of the 23 standing ovations by US “servants of people” to the most trivial bromides about “democracy” and US-Israeli “alliance” by Bibi could be a good insight into the mechanism of decomposition of American Republic due to its utter corruption with active participation of Israeli lobbies in the US.

    • Replies: @Lot
    That is a failed bill from the previous Congress. You see the 2017-18 up top?

    PG claim is:

    “Congress is considering bills that will make criticism of Israel a crime”

    I say he’s either intentionally lying or so senile he lacks the most basic knowledge of the topic he obsesses his whole life on. Pretty easy to prove me wrong. Please show me where “Congress is considering bills that will make criticism of Israel a crime”

    It’s OK though, I can see how a Russian could be confused by this. Here’s the truth: in America we love both our freedom of speech, and as the New Zion we also love the Original.
  • @Carroll Price
    ...and all based on the transparent lie of 9/11. But I wouldn't grieve too much over stupid Americans who, instead of protesting, rather enjoy their captivity.

    You’re right. We seem to enjoy it. It makes us feel like we are part of this righteous war against some implacable foe. SMH

  • I say the boomer cuckservatives and the boomer commies have destroyed this country worse then if china and russia invaded from the east and west coast. the strangulation of tons of regulations the loss of liberty the EPA NSA TSA homoland security multi trillion dollar police /spying state multi trillion dollar wars for israel homo marriage tranny rights . the “greatest” generation started the ball rolling in early to mid 60’s with civil rights voting rights then the worst immigration reform act. then passed the whole pile of shit to the doomers

  • Any competent programmer can write an encryption algorithm that no supercomputer can decrypt. All it takes is imagination. The problem with that code, however, is that it’s unique to the parties that agree beforehand to use it and therefore does not have the ability to function between non predetermined contacts. I suspect that type of encryption is used all the time by criminal organizations and gov’t, but I repeat myself.

    As for breaking into systems to listen in on every keystroke, that does exist and is made possible by people dumb enough to use the Windows operating system and their joke of a firewall. Security and robustness is why the entire Internet runs on Linux. If people want security, it’s available, but you actually have to know something about computers and security to use it. Therefore the artsy people who can’t balance a checkbook prefer an Apple or Microsoft product. It’s the ‘don’t know anything technical and don’t want to know anything technical’ people that are the political class, the entertainment industry, media, finance, etc that run the world.

    • Replies: @peterAUS

    As for breaking into systems to listen in on every keystroke, that does exist and is made possible by people dumb enough to use the Windows operating system and their joke of a firewall.
     
    You believe that running ANY version of UNIX-like OS will prevent that type of exploit?
    O.K.

    And, more, I guess that UNIX like system calls get executed by firmware running on top of digital electronics hardware. Two additional layers where "they" can put whatever they want. Even in the factory.

    Speaking of the former a question for somebody, perhaps:
    Had a chat with a friend who is a network security specialist (firewalls and such) over the weekend. We got into a chat re:"O.K. I know they can compromise my systems. To exploit it properly they'd need to send some data back to somewhere. Now.....what piece of hardware/software can we put somewhere from our machine NIC to the router to see, recognize, that traffic".
    I mean, at the end of the day it must be an Ethernet (I guess for 99,99 % of people) frame.
    We decided it's possible but requires just too much work...hehe...
    But, then again, both of us aren't THAT good in this game. Maybe somebody here is. So, what would you suggest we could do and which doesn't require a lot of work, even on a daily basis?
    Just to recognize the exploit communicating with the outside world.

    As for the later:
    With the current level of integration, can any non-major Government player, with certainty, recognize what electronics on the chip does?
    Say: this is Control Unit; this is Floating Point unit; this is....I don't know. Let's do some tests and see what THIS part of the chip does. Possible?
    Hehe...I remember the days of old PDP types when you could trace any signal and know exactly what "this" piece of digital electronics does. Not so sure it's even possible anymore today.
    Bottom line, easy to put, I guess, some "proprietary" hardware backdoor type.
    Anyone?
    , @Johnny Rico

    people dumb enough to use the Windows operating system
     
    Stopped reading there. You are not a serious person.
  • …and all based on the transparent lie of 9/11. But I wouldn’t grieve too much over stupid Americans who, instead of protesting, rather enjoy their captivity.

    • Replies: @Low Voltage
    You're right. We seem to enjoy it. It makes us feel like we are part of this righteous war against some implacable foe. SMH
  • anonymous[340] • Disclaimer says:
    @Jim bob Lassiter
    How would you like to fly seated next to this thing? Or be its patient?

    https://www.nytimes.com/2019/07/10/us/black-woman-american-airlines-cover-up.html?smid=nytcore-ios-share

    Please post this stuff under Mr. Derbyshire’s and other racebaiters’ columns.

    It’s apparent that you’re trying to distract or discredit here.

  • @Lot
    “Congress is considering bills that will make criticism of Israel a crime”

    False.

    “Congress is considering bills that will make criticism of Israel a crime”

    False.

    You mean it’s already a done deal?

  • Given the US government’s successful & unquenchable appetite to destroy citizens’ constitutional rights, it simply amazes me that other nations still debate, in all seriousness, the relative virtues of a written bill of rights.

  • There used to be intelligence directives that ruled out “reading the mail” (voice, e-whatever) once it could be determined to have no national security value, but google probably demonstrated that serious money could be made by mining all that previously out-of-bounds traffic, which is why all the post 11 September legislation quietly over-ruled earlier prohibitions. Even with statutory cover for a wider array of previously probited practises, the spooks were cheating to get past any prohibitions that still remained.

  • @Justvisiting
    Since I retired I am often asked if I like to travel:

    My response--in a private jet with no airport security screening--yes. Cramped like a sardine and treated like one by airport security--ah no thanks.

    Since I retired I am often asked if I like to travel:

    My response–in a private jet with no airport security screening–yes. Cramped like a sardine and treated like one by airport security–ah no thanks.

    There actually is screening in Executive terminals, but in most it is minimal and the persons doing it seem almost to be embarassed to do it.

    On one flight from a small airport with, for god knows what reason, “airport-terminal style” security, when they came across and objected to our liquids, I said the magic words, “I’m the pilot in command; I authorise these.” Then they came across my tac-knife and objected to it, and I chanted the magic words, “It’s safety equipment … as pilot in command, I authorise it.” Since they were driving us directly to the aircraft on the ramp, they didn’t put up much of a fight, though their driver did pull the luggage hatch down on my shoulder as we were unloading our baggage.

  • @Lot
    “Congress is considering bills that will make criticism of Israel a crime”

    False.

    Phil is right.

  • @Jim bob Lassiter
    How would you like to fly seated next to this thing? Or be its patient?

    https://www.nytimes.com/2019/07/10/us/black-woman-american-airlines-cover-up.html?smid=nytcore-ios-share

    I think I wouldn’t mind since odds are she’s a better human being than you. I’m sure you’d present yourself as a pleasant fellow to rub elbows with in the next passenger seat, but I’d hate to risk catching the perception distorting virus embedded in your cortex.

  • “Congress is considering bills that will make criticism of Israel a crime”

    False.

    • Replies: @Fran Macadam
    Phil is right.
    , @Jacques Sheete


    “Congress is considering bills that will make criticism of Israel a crime”
     
    False.
     
    You mean it's already a done deal?
    , @Andrei Martyanov

    False.
     
    https://www.congress.gov/bill/115th-congress/house-bill/1697/text

    Excerpt:


    (3) POLITICALLY MOTIVATED.—The term “politically motivated” means actions to impede or constrain commerce with Israel that are intended to coerce political action from or impose policy positions on Israel.
     
    The bill is about opposing those "politically motivated" "actions". By actions, of course, a lot of things could be (mis)construed as. Especially by armies of Israeli-first lawyers. It is also funny against the background of the US sanctioning the rest of the world to the left and to the right. For people having a revulsion towards US Congress casuistry (that is while being totally in the pockets of US Israeli-firstres), the video of the 23 standing ovations by US "servants of people" to the most trivial bromides about "democracy" and US-Israeli "alliance" by Bibi could be a good insight into the mechanism of decomposition of American Republic due to its utter corruption with active participation of Israeli lobbies in the US.
    , @Albeit
    "the Constitution of the United States itself has even been publicly described by the president as 'archaic' and 'a bad thing for the country.' "

    This one is also false (the cited "independent" article even had many commentators calling it out as fake news). Seems that some in the media get a kick out of fomenting reader anger over things that did not actually happen.
  • @Justvisiting
    Since I retired I am often asked if I like to travel:

    My response--in a private jet with no airport security screening--yes. Cramped like a sardine and treated like one by airport security--ah no thanks.

    How would you like to fly seated next to this thing? Or be its patient?

    https://www.nytimes.com/2019/07/10/us/black-woman-american-airlines-cover-up.html?smid=nytcore-ios-share

    • Replies: @reverse-engineered
    I think I wouldn't mind since odds are she's a better human being than you. I'm sure you'd present yourself as a pleasant fellow to rub elbows with in the next passenger seat, but I'd hate to risk catching the perception distorting virus embedded in your cortex.
    , @anonymous
    Please post this stuff under Mr. Derbyshire's and other racebaiters' columns.

    It's apparent that you're trying to distract or discredit here.
  • John Whitehead is probably the countries leading chronicler of the States crimes in this area
    https://www.rutherford.org/

    • Replies: @95Theses
    Yeah. Whitehead is good.

    A Government of Wolves: The Emerging American Police State

    https://smile.amazon.com/Government-Wolves-Emerging-American-Police/dp/1590794664

  • Mr Author I take you want to help here and have to dumb down the message for the target audience. Appreciated, but you are fundamentally wrong.

    As far as online privacy there is one, and really, just ONE rule:
    There can be none.

    Nothing “tech” any of us can do can make the real difference.
    If “they” want to snoop on you they shall.

    The only, ONLY, way not to get snooped is not to connect to anything. Not even your own WAP.

    Simple as that.

    Here is a scenario for you:
    You do use encryption. They compromise your machine so they intercept keys input before the encryption process.
    You know:key press->keyboard controller-bus->chipset->buffer->CPU=>timer trigger->switch context to encripton code->read the buffer->encrypt the data there=====>
    Yes, yes, I know, but let’s not get too complicated. 90% of people reading this don’t get even that.

    And after decryption of incoming data has been completed anwhere from that buffer to the actual analog hardware on display.

    Makes sense?

    Doesn’t’ matter if it doesn’t. Just stick to the only rule that matters.
    There…….is………..no……….online……….privacy……..outside…………of…..LAN. Excluding WLAN. Just wires within your local area network.

    Now, if they are really onto you even that won’t matter much. They’ll “bug” your house.
    And if they can’t they ask you in person. Picture THAT.

    Now, of course, it’s possible to maintain privacy. But, that goes way above and beyond encryption, tech-related laws etc. It’s an ever-evolving mix of tech, PROCEDURES, and vigilance. Hard and tricky game.
    Very rare people can do it and only up to the point. Nobody on this Webzine I am sure.
    Me, just too lazy. And, of course, not keen to tempt the knock at the door. Or worse.

    Because, at the end of the game, there are “snatch squads” and “rendition”.
    Just keep that in mind. If you want, of course.

    • Replies: @Johnny Rico
    Well said.
  • osama made The Beast attack its own citizens.

    osama won.

    • Replies: @joe2.5
    And "Osama" is the government itself anyway.
  • @Jim bob Lassiter
    All true to one lesser or greater extent or the other. However, the root cause of unpleasant airline travel is all the low IQ uncultured rabble of the world who can now travel by plane or get a job at the airport.

    Imagine have to sit next to Sheila Jackson Lee, Fareeq Abdula Abkar, or even being in the same passenger screening line with that family from Disneyland. (with them getting waved through by TSA and you getting shaken down like a cocaine smuggler)

    Since I retired I am often asked if I like to travel:

    My response–in a private jet with no airport security screening–yes. Cramped like a sardine and treated like one by airport security–ah no thanks.

    • Agree: RVBlake
    • Replies: @Jim bob Lassiter
    How would you like to fly seated next to this thing? Or be its patient?

    https://www.nytimes.com/2019/07/10/us/black-woman-american-airlines-cover-up.html?smid=nytcore-ios-share
    , @The Alarmist

    Since I retired I am often asked if I like to travel:

    My response–in a private jet with no airport security screening–yes. Cramped like a sardine and treated like one by airport security–ah no thanks.

     

    There actually is screening in Executive terminals, but in most it is minimal and the persons doing it seem almost to be embarassed to do it.

    On one flight from a small airport with, for god knows what reason, "airport-terminal style" security, when they came across and objected to our liquids, I said the magic words, "I'm the pilot in command; I authorise these." Then they came across my tac-knife and objected to it, and I chanted the magic words, "It's safety equipment ... as pilot in command, I authorise it." Since they were driving us directly to the aircraft on the ramp, they didn't put up much of a fight, though their driver did pull the luggage hatch down on my shoulder as we were unloading our baggage.
  • All true to one lesser or greater extent or the other. However, the root cause of unpleasant airline travel is all the low IQ uncultured rabble of the world who can now travel by plane or get a job at the airport.

    Imagine have to sit next to Sheila Jackson Lee, Fareeq Abdula Abkar, or even being in the same passenger screening line with that family from Disneyland. (with them getting waved through by TSA and you getting shaken down like a cocaine smuggler)

    • Replies: @Justvisiting
    Since I retired I am often asked if I like to travel:

    My response--in a private jet with no airport security screening--yes. Cramped like a sardine and treated like one by airport security--ah no thanks.
    , @Marcus Aurelius Tarkus
    Yea, verily yea!

    I have not traveled via commercial airlines in four years, due to an extra high-radiation treatment then while my wife was being groped by dykes. We were both "pre-check". I have no intention of breaking that streak until TSA is abolished. In other words, never.

    Meanwhile--in the stopped clock dept.--congressperson Ilhan Omar has proposed to abolish DHS outright. Send me the petition asap!
  • Last week, the House of Representatives voted in favor of a Labor, Health and Human Services, and Education appropriations bill amendment to repeal the prohibition on the use of federal funds to create a “unique patient identifier.” Unless this prohibition, which I originally sponsored in 1998, is reinstated, the federal government will have the authority...
  • Whose fault is it that, until now, doctors made it extremely difficult for patients and insurances to take their business elsewhere? If American doctors would have had patient’s freedom at heart, getting the records to the patients, before they walk out the office door, in a format that could be useful if they decide to switch providers, would have been the default. Instead, it is a chore that takes money and time. Patient’s records are being held hostage by the “carers”, much like their performance data, and even their fees, because American physicians don’t like open competition. Long story short, they can’t compete.

    It’s even more impressive when you consider how filthy rich are the American physicians. Their salaries cost as much as the salaries of everyone else combined (nurses + janitors + administrators + management). Obviously, the nurses and the janitors couldn’t care less if you went to a different hospital, and don’t have the means to support portable, private EHR. Doctors do have the means, but their biggest financial concerns are the acquisition of more expensive cars and younger wives.

    Yes, we can talk about surveillance as long as you want, even though Google and Facebook scripts, loaded by unz.com on the side, by default, make sure I have no privacy while typing. This is not about privacy. If anything, it will make the patient more free, allowing them to go to a different doctor more easily. That is so sad!

    • Disagree: Achmed E. Newman, Cloudbuster
  • This process of consolidating all personal information in one place is advancing on other fronts and is quite far along. This is the entire real purpose of the enhanced driver’s licenses, a virtual national identity card. This is also the reason why Obamacare mandated that health records be digitized. Eventually it will all be there in the chip implanted in your wrist granting access to everything there is to know about you, biometric data, medical records, criminal history, your grades in elementary school, your purchases, your parking tickets, your comments on articles.

  • @Cloudbuster
    This is pointless. As if all your medical information isn't tied directly to your Social Security number, anyway. A number of years ago, a hospital refused to treat my then juvenile son unless we supplied his social security number. All your medical records are linked to it.

    Unless you tell the hospital or the clinic “Lo siento, pero no tengo un social.”

    • Agree: Cloudbuster
  • This is pointless. As if all your medical information isn’t tied directly to your Social Security number, anyway. A number of years ago, a hospital refused to treat my then juvenile son unless we supplied his social security number. All your medical records are linked to it.

    • Replies: @Jim bob Lassiter
    Unless you tell the hospital or the clinic "Lo siento, pero no tengo un social."
  • Unfortunately medicine has become another corporate big business, with similar efficiencies for the average person as Wall Street’s. That is, more for them, less for everyone else, as by Adam Smith’s Vile Maxim.

  • British goon cops acting at the request of the United States government entered Ecuador's embassy in London, dragged out WikiLeaks founder Julian Assange and prepared to ship him across the pond. After this event last month, most of the mainstream media reacted with spiteful glee about Assange's predicament and relief that the Department of Justice...
  • “Because traditional journalistic activity does not extend to helping a source break a code to gain illicit access to a classified network, the charge appeared to be an attempt by prosecutors to sidestep the potential First Amendment minefield of treating the act of publishing information as a crime,” reported a pleased New York Times.

    But of course. No one broke any codes or gained access to any computer networks in exposing, say, the Pentagon Papers for instance. Nothing remotely similar. Move along now.

  • I have followed China’s development, its stunning advance in forty years from impoverished Third World to a huge economy, its rapid scientific progress. Coming from nowhere it now runs neck and neck with the US in supercomputes, does world-class work in genetic engineering and genomics (the Beijing Genomics Institute), quantum computing and quantum radar, in...
  • Dear Fred:

    It’s great that you not only travel to China, but also know so much about China and Chinese culture.
    But just don’t mention Mousey Dung, or you may have a new occupation with pickax and wheelbarrow in a punishment mine (just kidding (!?)

  • Hard as it is to believe, airline travel recently became even more unpleasant. Transportation Security Administration (TSA) employees being required to work without pay for the duration of the government shutdown resulted in many TSA workers calling in sick. The outbreak of “shutdown flu” among TSA employees forced some large airports to restrict the number...
  • Abolish the TSA and grind it into dust. The flying public is now subject to a level of intrusiveness that would have shocked even Stalin and horrified Hitler.

    The real, occult purpose of the TSA has nothing to do with safety. It is really about conditioning the American people to take orders, and to participate in government mandated rituals, like the requirement to remove one’s shoes. Why? Do we, like Moses, enter holy ground when we enter TSA territory? Because one single individual (out of the 7 billion inhabitants of this earth) made a lame attempt to ignite his shoes, hundreds of millions of airline passengers had to remove their footwear. How monumentally stupid is that? What about Chertoff’s cancer machines/radiation scanners? Yes, exposing people to potentially deadly radiation is keeping them safe. Of course.

    Yet, there is no shortage of blubbering, obese (both mentally and physically) sheeple who actually believe this is about “keeping us safe.”

    I would like to think that the vast majority of the American people would prefer to live with a highly improbable risk as opposed to being treated like criminal cattle, but I am harassed with doubts about that.

    • Agree: Achmed E. Newman
  • I agree totally that it’s time to abolish the TSA. Some of them take their jobs and themselves far too seriously. When I was flying out of Chicago last November a black TSA agent that resembled William the Refrigerator Perry was walking around barking orders at everyone in ebonics. Then I was mildly upbraided by another Napoleonic negro for not disclosing that I had a Kleenex in my pocket (I forgot).

    Some of the other TSA people looked like they were on work release from the Cook County jail.

    But the libertarian claim that the airlines can provide security that is both better and less intrusive and cheaper all at the same time is more libertarian wishful thinking. The airline industry is pretty cutthroat and will cut corners on security by hiring low quality people at low pay so they can offer cheaper fares and not cut into their profits. This wouldn’t be a problem in a nation that is 80% white with some blacks and hispanics but not with Muslims and the rest of the third world.

    The airport security debate circles back to the fatal racial diversity that (((they))) have imposed on us from above and to a lesser extent our foreign policy that provides the impetus for some Muslims to commit acts of violence against Americans and American targets.

  • @Anonymous
    Whenever you think of turning something over to the government, ask yourself one question "How is the National Do Not Call Registry working for me?"

    We’re actually lucky, #724, that the US government IS as incompetent as it is. Even with that Do Not Call Registry, did you feel like the government would be very discreet with your phone information and never, ever put any information in a database besides those numbers you don’t want to hear from? Why give the US Gov’t your phone #? Make it at least a little bit harder for them, having to get ahold of the NSA.

  • Whenever you think of turning something over to the government, ask yourself one question “How is the National Do Not Call Registry working for me?”

    • Replies: @Achmed E. Newman
    We're actually lucky, #724, that the US government IS as incompetent as it is. Even with that Do Not Call Registry, did you feel like the government would be very discreet with your phone information and never, ever put any information in a database besides those numbers you don't want to hear from? Why give the US Gov't your phone #? Make it at least a little bit harder for them, having to get ahold of the NSA.
  • @Colin Wright
    The worst thing about TSA is that the uncertainty over how long you'll have to wait in line contributes to the increasingly absurd lengths of time you have to allow to make sure you get on your flight.

    Adding up all the man hours wasted in this way makes one realize the true cost of it all. At some point now a good decade back, the actual losses on 9/11 ceased to be the bulk of the expense, either financially or in terms of human life. How much longer is all this going to go on?

    That’s an excellent point, Colin. You may end up 1 hour early at the gate for 75% of your trips, just due to making sure you didn’t miss those 25%, that you would have. If you add in the stress – for most just the worry about the flight, but for the real Americans the anger at the whole idea of being subjected to unreasonable searches and seizures*, you would find that this is probably killing as many or more people a year as died on that day.

    I’d say:

    – For a one leg flight, any trip less than 250 miles is probably better done by car.
    – For a two leg flight, any trip less than 400 miles is probably better done by car.

    .

    Not to mention physical seizures later on due to the loss of ones medication at the check-point ;-}

  • Hey, it keeps otherwise dangerous people off the streets. Oh, wait … I forgot about the VIPR teams harassing motorists at rest stops.

  • The worst thing about TSA is that the uncertainty over how long you’ll have to wait in line contributes to the increasingly absurd lengths of time you have to allow to make sure you get on your flight.

    Adding up all the man hours wasted in this way makes one realize the true cost of it all. At some point now a good decade back, the actual losses on 9/11 ceased to be the bulk of the expense, either financially or in terms of human life. How much longer is all this going to go on?

    • Replies: @Achmed E. Newman
    That's an excellent point, Colin. You may end up 1 hour early at the gate for 75% of your trips, just due to making sure you didn't miss those 25%, that you would have. If you add in the stress - for most just the worry about the flight, but for the real Americans the anger at the whole idea of being subjected to unreasonable searches and seizures*, you would find that this is probably killing as many or more people a year as died on that day.

    I'd say:

    - For a one leg flight, any trip less than 250 miles is probably better done by car.
    - For a two leg flight, any trip less than 400 miles is probably better done by car.

    .

    Not to mention physical seizures later on due to the loss of ones medication at the check-point ;-}
  • To this discussion of government employees, I will add a remembrance of January 13, 1982. Lenny Skutnik, of the govt budget office. Into the icy Potomac he swam, to make the rescue, while others watched. The Air Florida crash. Mr. Reagan honored Lenny at the SOTU, the first SOTU honoree. There is a Youtube of Mr. Reagan and Lenny. Modest, humble Lenny was awarded the very rare Coast Guard Gold Lifesaving Medal. God bless Lenny, and the spirit of his action.

  • I’ve got nothing to argue specifically with Ron Paul’s good comments here on private industry vs. Feral Gov’t in this regard. I don’t think Dr. Paul was ready to go all the way with this, in that he didn’t mention the simple truth regarding weapons and airplanes:

    The bad guys can always bring weapons of some sort. It’d be wise for the good guys (the 99.9999%) to be ready for that. Let me put it this way – there would be no column here, nor comments under it, nor TSA, nor Motherland Security Depts, if just ONE guy, ONE guy, on each of those planes on 9/11/01* had been carrying a handgun. Sure, the flights were 1/2 empty, as I recall, but that still means only 1% or so.

    The American government has learned nothing, as 17 years later, people are still being disarmed at the entrance of airports. Maybe “learned nothing” is really not the explanation. In reality I don’t think any of the elites cares about, or wants Americans to actually be able to defend themselves. It’s not in the plan. Motherland Security is.

    Some thoughts to go alone with this Ron Paul post, from Peak Stupidity called 16 Years of Spreading Democracy – They still hate us for our freedoms(?), on the 16th anniversary of 9/11.

    .

    * I’m just riding on the official Gov’t story here. This is not a Ron Unz 5,000 word, 1000-comment post here, and it’s neither the time nor place for that whole discussion.

  • TSA workers strategically lack common sense when assessing threats. They target the weakest, most helpless people because it’s easy, much easier than confronting the young, strappin’ males who might be able to give them some resistance, possibly accusing them of racism, aggressively, in a foreign language. This caused them to famously target an elderly, white, former professional in a wheel-chair, humiliating her by forcing her to take off her Depends.

    That said, TSA workers got their jobs due to the woefully lax and extremely underpaid temp / contract workers that private industry employed to screen the 9/11 terrorists. They were hired to save a buck. There are some hard workers in America’s many low-wage / temp / churn jobs who get nothing but abuse for their hard work except from grateful customers, but when employers cheap out, they often get what they pay for except in government work, where they often get less than they pay for. It is stupid to cheap out on safety.

    But cheaper, more accessible air travel facilitates the globalist economy, wherein almost all of the rewards accrue to the top 20%. If elites are burdened by TSA or any other aspect of air travel, you can’t prove it by their actions. They are constantly trundling around the globe via the friendly or un-friendly skies, seeking business opportunities abroad, but they create so few jobs in the USA that the average employed person works part time at 34 hours per week, meaning half of all employed citizens and noncitizens in the USA work even fewer part-time hours, mostly at low-as-you-go wages.

    Set aside the fake environmentalists, separating out their recyclables like all of the other good yuppies, the dual-earner couples on their 8th excused 2-week vacation for busy-working parents per year. Much of their travel is the carbon-foot-print-heavy type, the type that requires large amounts of jet fuel to go between continents for “work” and on every holiday, like the upscale mommy at the store explaining in a loud voice that her family chose to go on a 3-day jaunt to Barcelona for Christmas ‘cause her toddler had developed a taste for European architecture.

  • I agree about TSA. And I will elaborate upon Disclaimer’s migration comments because there is a connection. Burgos of Harvard has written: We wanted workers, but we got people. Here in California, I see a replacement culture that is not only less proficient and less conscientious, but also, less polite. Both the TSA culture and the migrant culture are often supercilious, sanctimonious, and grave. They do not accept smiles. The Ivy League has spoken on this; they prefer thugginess and funkiness, and reject decency. All if this can be contagious. Eliminate TSA. Thc TSA people can find work at DMV or at medical front offices.

  • anonymous[191] • Disclaimer says:

    Trump should get rid of the TSA and Homeland Security. There was no problem with security agencies we had before 911 and they were effective in what they were doing. After 911, the US government used it as an excuse to turn the US into a police state. The excessive government powers that we have suffered under for the past 18 years need to go and we need to return to sanity. Rather than this stupid wall which will never be effective (even if built) we should concentrate on instant deportations and a zero tolerance policy on illegal immigrants. Once it got back to potential illegals that the US government meant business, there would be far fewer trying to get in. If a wall is built, ways will be found how to get around it, like coming across the northern border which is 5000 miles long and not 1500 like our southern border. Another problem that needs to be addressed is, why are these people coming here? Our government should try to promote ways of creating wealth in the countries where the economic refugees are coming from by sponsoring governments that have business-friendly policies that invite foreign investment and create jobs. Many third-world countries suffer from what I call the “Philippine syndrome”, where a few powerful crony-capitalists control almost all of the productive industry in a country. Nothing can get done without mountains of red tape and the greasing of palms all around. If the Philippines had the economic freedom of Taiwan, they would’ve also become an “Asian Tiger” with a high standard of living instead of being 125th in the world. The same goes for many Latin American countries. Costa Rica and Panama are shining examples.

  • The Democratic Party has made a strategic decision to bypass candidates from its progressive wing and recruit former members of the military and intelligence agencies to compete with Republicans in the upcoming midterm elections. The shift away from liberal politicians to center-right government agents and military personnel is part of a broader plan to rebuild...
  • @Reg Cæsar

    They will never care about 3rd world villagers getting bombed
     
    They're the ones doing the bombing.

    https://clickamericana.com/wp-content/uploads/Abilene-Reporter-News-August-7-1945-1200x520.jpg

    In an amoral era under a virtue-signaling mask, it is interesting how the justification for war, or other major defensive measure, has shifted from what is necessary to defend the American people from invasion to what is necessary to protect the profiteering of the 1% donor class and the lucrative side gigs of our six-figure, globetrotting, professional-meddler political class.

    If the Japanese had not bombed Pearl Harbor, we would never have gone to war with them. It is apples and organes to compare a defensive response to a mass-murdering attack on American soil to the endless, costly interventionism in umpteen Third World nations that today’s corrupt Uniparty politicians pursue.

    Whereas the Japanese became our allies after a justified defensive war, the neoconservative interventionism of today only stokes hatred of the USA. It might boost profits for a few 1%ers, managing to capitalize on the mechanics of war, but for the bottom 80% of wage earners in the USA it just means competing for part-time / temp / churn jobs with more welfare-eligible legal migrants who—along with carvans full of womb-productive / welfare-eligible illegal migrants—drive wages down for underemployed US citizens in a quickly automating labor market.

    Migrants do this by having one instant-citizen kid after another to increase their monthly welfare allotment in the hundreds and their refundable child tax credit allotment to the max of $6,431, thereby enabling them to undercut Americans by working for less pay than non-welfare-eligible citizens can afford to accept while keeping a roof over their heads.

    Democrats want to keep up these senseless wars—even in parts of the world where we get no economic benefit whatsoever, and even at the cost of American lives and the lives of foreigners who have not attacked us—while claiming the moral high ground. They want to do this stuff that has nothing to do with defending their country from invasion, but do not want to use US troops to man their own country’s southern border. Nor do they want to put the US corporations with military-support expertise to good use, actually serving US interests by building the defensive Trump Wall.

    You can keep the moral high ground when your party is run by people with some moral grounding, like FDR, Truman and JFK.

    Your party can’t climb on the moral high horse when the greedy leadership is just interested in the following:

    1) padding their own pockets with money from globe-trotting speechmaking adventures, etc.;

    2) padding their pockets with lobbyist money from offshoring and / or wage-slave-staffed US-owned multinationals that show contempt for underemployed American job seekers;

    3) making sure they keep their $174k jobs by keeping voter rolls stacked with block-voting groups—group-loyalty voting blocks gained not based on making logical arguments to immigrants as voting individuals, but by pandering to them based on racial loyalty.

    Democrats are ready to go to war anywhere, anytime, as long as the people in question aren’t invading their own country. They are willing to do it due to the lucrative pocketbook fallout for a few politicians and corporations. Yet, war-ready Democratic leaders refuse to defend the southern border in their own country from the yearly, resource-draining, mass-scale, wage-eroding invasion of illegal immigration. They don’t see any money in the Trump Wall for themselves or their donors. They don’t see any readymade votes in it for Democrats.

  • I have followed China’s development, its stunning advance in forty years from impoverished Third World to a huge economy, its rapid scientific progress. Coming from nowhere it now runs neck and neck with the US in supercomputes, does world-class work in genetic engineering and genomics (the Beijing Genomics Institute), quantum computing and quantum radar, in...
  • It is very easy to explain why this type of technology exchange takes place. It is called NEOLIBERAL GLOBALIZATION and the E.U. is a big part of it. It only benefits the super-elites

  • I agree overall with the comparison. However, I see that the author shows a bias against the US. It seems he believes that China is more virtuous and its policies are more in touch with Chinese people than what exists in the US. Unfortunately he does not see the elephant in the room staring at all of us. It is Called NEOLIBERAL GLOBALIZATION and both nations are a big part of it. Both nations are ruled by an OLIGARCHY and CLEPTOCRACY of an elite cabal that do not care about their people. Both nations more or less have implemented a system of COLLECTIVISM that benefits a small group of elites. All this talk about trade war, etc, is a distraction. The real threat to the US deep state is RUSSIA not CHINA. That is why the powerful transnational US corporations are still doing great business in China with their sweatshop factory cities there, and the Chinese elite are happy with the arrangement, making sure the Chinese masses are kept under control with breadcrumbs while the super elites are reaping 99% of the profits.

  • @marylou
    I keep hearing/seeing China and fast trains.
    Nobody cares that they got that from Germany. I have no idea why Germans would give them a fast train and the know how, but that is what they did. Now the Chinese can peddle fast trains and Germany can look at the moon.

    I have no idea why Germans would give them a fast train and the know how, but that is what they did.

    Usually, a fair amount of money is exchanged in these types of knowledge transfers, so…

    Peace.

  • @marylou
    I keep hearing/seeing China and fast trains.
    Nobody cares that they got that from Germany. I have no idea why Germans would give them a fast train and the know how, but that is what they did. Now the Chinese can peddle fast trains and Germany can look at the moon.

    It’s not JUST German tech, though.

    Chinese-built trains are the best parts of German, Japanese and French technology, combined and optimized.

    Then manufactured with the usual China “economies of scale” (make a whole lot, cost per item goes down, same with anything else).

    So they make them pretty cheap, but pretty good.

  • @Franz
    Many tried to warn the weenies what would happen while our industries were "donated" to China and got hosed for their trouble. Pat Buchanan's troubles actually started when he wrote The Great Betrayal, even if they took a little extra time to pull his syndicated column down.

    Did you know about a World War II-era Kaiser steel mill once in California, that was cut up in blocks like a model kit and shipped in its entirety to China?

    It happened right out in the open, under Daddy Bush, and everyone who complained became an unperson, Orwell-style. Nobody dared object to the glories of free trade. And the Chinese in California said it was doing so because they had a multi-million ton Plan to fill, and it was almost the 21st century.

    China is now taking the wealth their nation is creating with stuff developed in Europe, Britain, and the United States. The hole in the donut is they could have done all that under license and we could have kept on with, and even improved our industrial base.

    But in fact our leaders had Gender Reassignment in mind for the 21st century, not actual productive work that truly builds nations. The Impoverishment of Nations is well known: Send the real work out, keep the barbarians inside well-fed, sharp-clawed, and morally depraved.

    I keep hearing/seeing China and fast trains.
    Nobody cares that they got that from Germany. I have no idea why Germans would give them a fast train and the know how, but that is what they did. Now the Chinese can peddle fast trains and Germany can look at the moon.

    • Replies: @myself
    It's not JUST German tech, though.

    Chinese-built trains are the best parts of German, Japanese and French technology, combined and optimized.

    Then manufactured with the usual China "economies of scale" (make a whole lot, cost per item goes down, same with anything else).

    So they make them pretty cheap, but pretty good.
    , @Talha

    I have no idea why Germans would give them a fast train and the know how, but that is what they did.
     
    Usually, a fair amount of money is exchanged in these types of knowledge transfers, so...

    Peace.

  • @Jason Liu
    Great, but kinda pedestrian. Lemme use this platform to point out China's flaws from a Chinese perspective.

    Chinese society and Chinese people are too arrogant, materialistic, and hypersensitive to criticism.

    This is a huge problem. One, it alienates pretty much anyone who becomes familiar with China. Two, it leads to mistake after mistake when no criticism is offered to correct them in time. Three, it causes society to view things overly in terms of money, falling behind in all other aspects. Nobody cares how much rich or strong you are if you're a crass, materialistic asshole. They'll hate you.

    All societies have these issues, few are as bad as China. There are Chinese reading this right now and getting angry and ready to call me a traitor, demonstrating my point exactly.

    A wise dictator is great for the country, but Xi is not wise. He is a stubborn old man stuck in the past who is clearly not listening to advisers. He has overplayed his hand, confronted the US 10~20 years too early, damaged China's image out of some paranoid fear of Uyghurs, and absolutely failed at making friends with our East Asian neighbors, instead driving them further into the arms of the Americans.

    China does not need more repression right now, it needs to slowly liberalize to keep the economy growing and competitive. I'm not talking about western style "open society" bullshit, traitors like multiculturalists and feminists should always be persecuted. But the heavy-handed censorship, monitoring of everyday citizens is completely unnecessary. If China does not develop a culture of trust, and genuine, non-money based curiosity, it will not have the social structure to overcome the west.

    Outside of trade and money-related issues, the Chinese citizenry is woefully ignorant of the outside world. There is no widespread understanding of foreign cultures and ideologies, how they might threaten us, how to defend against them, or how to work around them. An overwrought sense of nationalism emphasizes Chinese victimhood to the point of absurdity, squandering any sympathy onlookers might have, and actually causes some to turn 180 and hate China instead.

    Angry, condescending attitudes towards our neighbors, especially Japan, severely cripple China's ability to be a world player. Without a network of like-minded friends (actual friends, not trade partners), China will never be able to match the western alliance. It is not just America we have to overcome, but an entire bloc of nations. I don't care how much people hate our neighbors, China must extend the olive branch, present a sincere face of benevolence, and not act like the big guy with a fragile ego. Racially and culturally similar East Asians are the best candidates for long-term friendship, it is wrong to forsake them under the assumption that all we need is Russia or Pakistan.

    Despite the trade war, I'm not worried about China's economy, infrastructure, political system, or innate ability. These are our strengths. I have no love for liberal democracy or western values. But China must change its attitude and the way it interacts with the outside world soon, or face geopolitical disaster.

    Don't overreact to every insult or criticism. Compete in areas that isn't just money or materials. Really understand soft power, and what it takes to be liked around the world. Develop our own appealing ideas and worldview. Listen to well-meaning, nationalistic critics, and change before the world discovers China's ugly side.

    Having been to China several times, I believe I can attest that one of China’s biggest blind spots is its surprisingly intense racism. A Caucasian in Hefei or Guangzhou — supposedly China’s most cosmopolitan city — is seen as an inferior being. We encountered no-white zones just like the old Jim Crow South.

    I laughed and almost blew soda out my nose when I read Fred’s comment that China has good engineering. There is no place in China where the water is safe to drink. In every city where I traveled, I took photos of electric utility infrastructure built so poorly that it’s a miracle it’s working and not on fire. The biggest man made disaster in all of history took place in China (the Banqiao dam failure), and even bigger calamities are being built right now with the Three Gorges Dam and another one that is planned of slightly larger scale. I visited one shop in Kunming where the owners lived in the rear of the building, and a city sewer vent opened into the living quarters.
    It smelled like what you’d expect. The famous White Swan Hotel in Guangzhou had to be shut down and largely rebuilt because the foundations busted to pieces. China’s civil engineering is no good, very bad, and outright sorry as hell. And high speed rail is a waste of money. Jets are faster and cheaper.

    Much to be admired, however, was China’s economic freedom. Any guy can set up on the sidewalk and start selling live eels out of a washtub. Try that in New York City, and you’ll be arrested. You can go to Wal-Mart in China and buy any pharmaceutical you can name without a prescription. We needed a round of Cipro (antibiotic) for food poisoning — because one of our party ate a salad washed in the city water system. The Cipro was over the counter and cost 2 yuan, or about 33 cents in American money. Try THAT in America!

  • The Democratic Party has made a strategic decision to bypass candidates from its progressive wing and recruit former members of the military and intelligence agencies to compete with Republicans in the upcoming midterm elections. The shift away from liberal politicians to center-right government agents and military personnel is part of a broader plan to rebuild...
  • @jilles dykstra
    These two bombs may have saved about twenty million Japanese lives, and one million USA lives:
    Robert J.C. Butow, 'JAPAN'S Decision to Surrender', Stanford, 1954

    Last time I heard that we bombed Japan to save lives okeydoke was back in the 7th grade. It was impossible to believe even then (although top marks in class, and a helpful career-minded shove ahead of the pack, awaited any kid who could manage to buy into said okeydoke. Preferably with a superior smile plastered on their mugs)

  • I have followed China’s development, its stunning advance in forty years from impoverished Third World to a huge economy, its rapid scientific progress. Coming from nowhere it now runs neck and neck with the US in supercomputes, does world-class work in genetic engineering and genomics (the Beijing Genomics Institute), quantum computing and quantum radar, in...
  • anon[499] • Disclaimer says:
    @myself
    Perhaps there is something called "Pan-Siberianism", a concept that pulls in Asian Siberians, Manchurians, Tungus, Mongolians, Asian Turks and Koreans. An interesting concept.

    Careful though, since the Han themselves from earliest times have very strong Siberian/Steppe admixture. And even the Yamato fall into this category of strong admixture.

    The Han, as far as I've read, were an ethnicity that arose in pre-history via a melding of nomad tribes from the steppes, alpine tribes from the Tibetan plateau and farmers from the provinces facing Taiwan. The Japanese "Yamato" are apparently also migrants from mainland Asia with admixture from the steppes.

    So with Pan-Siberianism, you might usefully exclude the Han and the Yamato as being "not of pure prehistoric-Altaic stock".

    A linguistic/geographical clarification: Central Asia starts in Xinjiang, or more precisely WEST of Mongolia. Xinjiang, Kazakhstan, Kyrghizstan, Uzbekistan, Tajikistan, Turkmenistan, Afghanistan, North-East Iran, a large swathe of Pakistan - these are "Central Asia". Mongolia eastward is "East Asia". Russian Siberia is "North Asia".

    Very interesting concept, and I fully admit my general ignorance regarding the genetic origin of the chinese people. Although I am aware that northern chinese people tend to (unsurprisingly) have more siberian admixture than people from the rest of china, which probably explains the well known “volatile” and heated temperament of the northern chinese vis a vis chinese from other regions

    yes, you are absolutely right that my geography wasnt very precise. I was merely using central asian as shorthand to refer to siberian/mongolian descent ethnicities out of convenience, but yeah my nomenclature of choice wasn’t exactly correct.

  • Anon[436] • Disclaimer says:
    @denk
    Post mh370,
    PM Najib declared ,
    Someone is trying to drive a wedge bet Malaysia/China !

    Do you know where's he today ?

    Couldn’t you have stayed in bed a little longer? (Or did you wake up bleary eyed and with fogged brain to utter that?).

    Now give your brain some exercise and see what you can make of the election victory comeback by the 93 year old Mahathir Mohamad and his one time protegé Anwar Ibrahim bearing in mind Mahathir’s notorious antisemitism. Gee whiz, there could have been more involved in the downfall of the massively corrupt Najib than a few alleged comments on the relation of an air crash to Sino-Malaysian relations.

  • Anon[436] • Disclaimer says:
    @Biff

    FWIW
     
    Nothing. Nothing at all.

    The idea that an international flight crew is going to allow one person to take down the whole Clipper is bogus. The people of Cathey Pacific are obviously back on the bottle.

    Why add faulty reasoning to not reading what was said and the ample easily accessible online discussion of the issue? Who said anything about what “an international flight crew” did?

    The excellent Canadian series “Air Crash Investigation” showed how it could be done. Not that it needs more than common sense once you know that the cockpit door can be locked by one person still in there. Do you really think it would be hard for a senior captain to get his First Officer/copilot to leave the cockpit for some reason so that he could be locked out?

  • @anon
    In theory should apply (albeit to a lesser extent due to admixture with the ainu) to the japanese as well. Here is a comment that I found while reading through the comments section of an old unz.com article which articulates my thoughts best about the matter. You might find it interesting as well:

    http://www.unz.com/runz/how-social-darwinism-made-modern-china-248/

    comment #37

    This brazen Jason Liu speaks of his own Chinese, with a few glances to the left and right, and says “East Asians”. It would seem he’s a self-identified “(East) Asian American” proudly invested in this membership, but what he supposes to be a unitary racial entity is in truth a mishmash of unlikes.

    We Koreans are not of the same substance as you. No, I’m afraid we are not one kind. Maybe your crowning point – “In general, East Asians are not nearly as emotional. This is by far the most important thing.” – is your apt judgment of Hans, but with it you make clear your ignorance of the irrepressible and very much Korean capacity for passion, volatility, fanaticism, and ebullience, hates and bitternesses and loves that are not more muted or circumscribed than those of occidentals but often overflow them.

    There is more to the Korean character than the perfect gentleman-scholar and Confucian proper place – there is the rejoicing in brutal stone fights* that up until not too long ago had a government-sanctioned fortnight reserved for them each spring; the ecstasies of shamanic possession and dancing on knives; a reverence for divisions of rank and grades of human worth that not only exceeded those of the Chinese Confucians but largely (in genuine caste, with hereditary aristocrats, huge numbers of born chattel slaves, and ritually polluted untouchables) had their basis in something else entirely. I make no apologies. This is not cause for lamentation but a point of pride.

    The depth of our schizophrenia, how our ruling strata made a cargo cult of outdoing the Chinese in wen, in Chinese formulations of cultured virtue, is obvious to see. We sought to pass ourselves off as crisped to the great maw, to the alimentary state that divided all barbarians into “raw” and “cooked”, and took pride in our score lines. So I am all the more glad for that which is wild, unreasonable, unpragmatic, and uncringing in us. They mean the failure (at least the incompleteness) of Sinitic civilization’s program of human domestication.

    During my time in Central Asia and in particular East Turkistan/Xinjiang, I always found myself somehow much more immediately at home, much more at ease, amongst North and Inner Asians – assorted South Siberians, Mongols, Kyrgyz, Kazakhs, and indeed even the half-Caucasoid Uyghurs of the Tarim oases – than among Han Chinese or any kind of Southeast Asians. There were, in our sensibilities, our potentials for creation, our forms of expression, our instinctive understandings, so many primal congruences – reminders that there is more one way of being Asian, even East Asian, than the Sinitic. These moments would arc into me with an electric twinge, a goring on the Sibero-Scythian prongs of those crowns of buried Silla, a reminder of what could, and would, have been.
     
    What stood out to me about this quote was that I share the same experience as a korean individual upon meeting other people from central asian backgrounds. I indeed feel more similar on a fundamental level to these people than I do to chinese people. I honestly thought I was the only person who felt this way but apparently there are other korean people out there who understand that korean people are but one culture out of many that belong to a larger overarching altaic ethnic and cultural umbrella. I think this is something that is particularly striking to korean americans since by default we automatically clump ourselves in with a default east asian (quasi-sinitic) identity when the truth is that we are quite different than chinese people, however due to the lack of contact most korean americans (even korean people back in korea) have with central asian/mongolian/siberian people we are unable to discover the overarching culture which we really fall closer to and instead just identify with the default east asian (quasi-sinitic) culture even though it is actually an imprecise fit for us.

    Perhaps there is something called “Pan-Siberianism”, a concept that pulls in Asian Siberians, Manchurians, Tungus, Mongolians, Asian Turks and Koreans. An interesting concept.

    Careful though, since the Han themselves from earliest times have very strong Siberian/Steppe admixture. And even the Yamato fall into this category of strong admixture.

    The Han, as far as I’ve read, were an ethnicity that arose in pre-history via a melding of nomad tribes from the steppes, alpine tribes from the Tibetan plateau and farmers from the provinces facing Taiwan. The Japanese “Yamato” are apparently also migrants from mainland Asia with admixture from the steppes.

    So with Pan-Siberianism, you might usefully exclude the Han and the Yamato as being “not of pure prehistoric-Altaic stock”.

    A linguistic/geographical clarification: Central Asia starts in Xinjiang, or more precisely WEST of Mongolia. Xinjiang, Kazakhstan, Kyrghizstan, Uzbekistan, Tajikistan, Turkmenistan, Afghanistan, North-East Iran, a large swathe of Pakistan – these are “Central Asia”. Mongolia eastward is “East Asia”. Russian Siberia is “North Asia”.

    • Replies: @anon
    Very interesting concept, and I fully admit my general ignorance regarding the genetic origin of the chinese people. Although I am aware that northern chinese people tend to (unsurprisingly) have more siberian admixture than people from the rest of china, which probably explains the well known "volatile" and heated temperament of the northern chinese vis a vis chinese from other regions

    yes, you are absolutely right that my geography wasnt very precise. I was merely using central asian as shorthand to refer to siberian/mongolian descent ethnicities out of convenience, but yeah my nomenclature of choice wasn't exactly correct.
  • @Biff

    FWIW
     
    Nothing. Nothing at all.

    The idea that an international flight crew is going to allow one person to take down the whole Clipper is bogus. The people of Cathey Pacific are obviously back on the bottle.

    Post mh370,
    PM Najib declared ,
    Someone is trying to drive a wedge bet Malaysia/China !

    Do you know where’s he today ?

    • Replies: @Anon
    Couldn't you have stayed in bed a little longer? (Or did you wake up bleary eyed and with fogged brain to utter that?).

    Now give your brain some exercise and see what you can make of the election victory comeback by the 93 year old Mahathir Mohamad and his one time protegé Anwar Ibrahim bearing in mind Mahathir's notorious antisemitism. Gee whiz, there could have been more involved in the downfall of the massively corrupt Najib than a few alleged comments on the relation of an air crash to Sino-Malaysian relations.
  • @Che Guava
    ZG, does that mean zero gravity?

    Supposing not, having not kept up with all netspeak in recent years (can usually work most out), and never being expert in or user of CB, I do not know the term.

    Sorry,

    ZG = zhou gong, the god of dreams in Chinese folk lore,
    meaning its past my bed time,

  • anon[499] • Disclaimer says:
    @anon
    That's interesting. What about Japanese? I know for certain Chinese are not related to the altaic. Most Chinese I see, even north Chinese, look like Vietnamese with lighter skin.

    In theory should apply (albeit to a lesser extent due to admixture with the ainu) to the japanese as well. Here is a comment that I found while reading through the comments section of an old unz.com article which articulates my thoughts best about the matter. You might find it interesting as well:

    http://www.unz.com/runz/how-social-darwinism-made-modern-china-248/

    comment #37

    This brazen Jason Liu speaks of his own Chinese, with a few glances to the left and right, and says “East Asians”. It would seem he’s a self-identified “(East) Asian American” proudly invested in this membership, but what he supposes to be a unitary racial entity is in truth a mishmash of unlikes.

    We Koreans are not of the same substance as you. No, I’m afraid we are not one kind. Maybe your crowning point – “In general, East Asians are not nearly as emotional. This is by far the most important thing.” – is your apt judgment of Hans, but with it you make clear your ignorance of the irrepressible and very much Korean capacity for passion, volatility, fanaticism, and ebullience, hates and bitternesses and loves that are not more muted or circumscribed than those of occidentals but often overflow them.

    There is more to the Korean character than the perfect gentleman-scholar and Confucian proper place – there is the rejoicing in brutal stone fights* that up until not too long ago had a government-sanctioned fortnight reserved for them each spring; the ecstasies of shamanic possession and dancing on knives; a reverence for divisions of rank and grades of human worth that not only exceeded those of the Chinese Confucians but largely (in genuine caste, with hereditary aristocrats, huge numbers of born chattel slaves, and ritually polluted untouchables) had their basis in something else entirely. I make no apologies. This is not cause for lamentation but a point of pride.

    The depth of our schizophrenia, how our ruling strata made a cargo cult of outdoing the Chinese in wen, in Chinese formulations of cultured virtue, is obvious to see. We sought to pass ourselves off as crisped to the great maw, to the alimentary state that divided all barbarians into “raw” and “cooked”, and took pride in our score lines. So I am all the more glad for that which is wild, unreasonable, unpragmatic, and uncringing in us. They mean the failure (at least the incompleteness) of Sinitic civilization’s program of human domestication.

    During my time in Central Asia and in particular East Turkistan/Xinjiang, I always found myself somehow much more immediately at home, much more at ease, amongst North and Inner Asians – assorted South Siberians, Mongols, Kyrgyz, Kazakhs, and indeed even the half-Caucasoid Uyghurs of the Tarim oases – than among Han Chinese or any kind of Southeast Asians. There were, in our sensibilities, our potentials for creation, our forms of expression, our instinctive understandings, so many primal congruences – reminders that there is more one way of being Asian, even East Asian, than the Sinitic. These moments would arc into me with an electric twinge, a goring on the Sibero-Scythian prongs of those crowns of buried Silla, a reminder of what could, and would, have been.

    What stood out to me about this quote was that I share the same experience as a korean individual upon meeting other people from central asian backgrounds. I indeed feel more similar on a fundamental level to these people than I do to chinese people. I honestly thought I was the only person who felt this way but apparently there are other korean people out there who understand that korean people are but one culture out of many that belong to a larger overarching altaic ethnic and cultural umbrella. I think this is something that is particularly striking to korean americans since by default we automatically clump ourselves in with a default east asian (quasi-sinitic) identity when the truth is that we are quite different than chinese people, however due to the lack of contact most korean americans (even korean people back in korea) have with central asian/mongolian/siberian people we are unable to discover the overarching culture which we really fall closer to and instead just identify with the default east asian (quasi-sinitic) culture even though it is actually an imprecise fit for us.

    • Replies: @myself
    Perhaps there is something called "Pan-Siberianism", a concept that pulls in Asian Siberians, Manchurians, Tungus, Mongolians, Asian Turks and Koreans. An interesting concept.

    Careful though, since the Han themselves from earliest times have very strong Siberian/Steppe admixture. And even the Yamato fall into this category of strong admixture.

    The Han, as far as I've read, were an ethnicity that arose in pre-history via a melding of nomad tribes from the steppes, alpine tribes from the Tibetan plateau and farmers from the provinces facing Taiwan. The Japanese "Yamato" are apparently also migrants from mainland Asia with admixture from the steppes.

    So with Pan-Siberianism, you might usefully exclude the Han and the Yamato as being "not of pure prehistoric-Altaic stock".

    A linguistic/geographical clarification: Central Asia starts in Xinjiang, or more precisely WEST of Mongolia. Xinjiang, Kazakhstan, Kyrghizstan, Uzbekistan, Tajikistan, Turkmenistan, Afghanistan, North-East Iran, a large swathe of Pakistan - these are "Central Asia". Mongolia eastward is "East Asia". Russian Siberia is "North Asia".
  • @Anon
    Your sloppy grammar and diction looks like a fair measure of your sloppy thinking. If your "over the past few years" had been "over the previous few years" it might at least have conveyed a sensible meaning. But it is your "The moment I heard.... *my first thought was*..... *it must be a black op* conveying a certainty no government has managed and which has been almost totally at odds with actual evidence that truly marks you as a frivolous troll.

    FWIW a Cathay Pacific pilot friend, now, four and a half years later, says the professional consensus is that it was a murder-suicide by the Captain. Whose black-op would that be?

    FWIW

    Nothing. Nothing at all.

    The idea that an international flight crew is going to allow one person to take down the whole Clipper is bogus. The people of Cathey Pacific are obviously back on the bottle.

    • Replies: @denk
    Post mh370,
    PM Najib declared ,
    Someone is trying to drive a wedge bet Malaysia/China !

    Do you know where's he today ?
    , @Anon
    Why add faulty reasoning to not reading what was said and the ample easily accessible online discussion of the issue? Who said anything about what "an international flight crew" did?

    The excellent Canadian series "Air Crash Investigation" showed how it could be done. Not that it needs more than common sense once you know that the cockpit door can be locked by one person still in there. Do you really think it would be hard for a senior captain to get his First Officer/copilot to leave the cockpit for some reason so that he could be locked out?

  • I have heard experts say that we do not have enough translated literature on Asian art in the West—not on Chinese art, not on Japanese art, not on any of it, even though Japanese art had a huge impact on the Impressionists and their forerunners, with Manet including a rendering of a Japanese print in one of his famous portraits, the one of Emile Zola.

    Japanese art is so different from Chinese art. From what I know about traditional Chinese art, it is much more athletic than traditional European art. They do not regard complex, methodical layering, resulting in illusionistic effects, like depth and volumetric form, as necessary for a successful painting. Traditional Chinese paintings do not appear to reproduce the effects of a directional light source. All great artists in all timeframes are concerned with formal aspects, like color schemes and strong composition, but the great, traditional Chinese artists were expected to work quickly and precisely, getting it done in one stroke, like some modernists in the West who regard that approach as requiring greater mastery.

    It is apples and oranges; one type of artistic greatness does not exclude another.

    There is also the Chinese applied art tradition, including the fine porcelain that they exported to the West hundreds of years ago. The inventors of paper, ink and the first durable porcelain, this is not the first exporting-culture rodeo for the Chinese.

    It is the first time that an America Last leadership class, interested mostly in increasing their own fortunes, have exported the hard-won American middle class to China.

    I am not sure about the current Chinese building spree. In the 16th and 17th centuries, the Chinese were exporting like crazy—even custom manufacturing—to fulfill the demands of European aristocrats for their kaolin-clay-based porcelain. They did it until Westerners finally discovered their manufacturing secret. But that was what economists might call an organic market, springing up naturally out of supply and demand, whereas some say that, along with an Orwellian surveillance state, today’s Chinese .gov is creating uninhabited ghost towns, just to keep underemployment among males down, preventing social strife, rioting, etc. If I understand correctly, many of the loans are not backed up with enough collateral, and the Chinese government’s bank just creates money out of thin air, like the Fed.

  • Anon[129] • Disclaimer says:
    @someone
    Listen dimwit, why don't you read up on the Opium Wars and the related Indian Sepoy Rebellion which took place between the two Opium Wars? Then let's see if your non-point about colonialism still stands?

    As far as I know, The British used their superior military to impose "free trade" at gunpoint. In this case, free trade refers to monopoly prices on an addictive drug. And don't go all libertarian either, cause the British had the wisdom to ban opium in their own nation.

    You could make the assertion that the USian empire never colonized the Latin American banana republics--With your piss poor logic you'd be right. It just overthrew anyone it suspected of economic nationalism and replaced them with a pliant comprador class.

    Thank you for saving me from wasting my time by reading you in future. It is quite a feat to encapsulate in one post the evidence of your being ill educated, ill mannered, inattentive to what others write and, as to cognitive/analytical abilities definitely high on the Dunning-Kruger Syndrome.

  • @Wizard of Oz
    You are one of many on UR thresds who uses "colonization" and its cognates in a loose way that sometimes makes it unclear what is being asserted and always weakens the argument.

    Colonies were originally Greek settlements around the Mediterranean or Black Sea which allowed a group of immigrant Greeks to work and trade and enjoy autonomy. That meaning fairly accurately describes English and French settlement and colonization in the New World and in Australasia. The word doesn't need much stretching to cover Kenya where there were white farmers, Malaya with its rubber plantations or Fiji where the working colonists were mostly Indian. But to attribute Cjina's problems, even its backwardness compared to Japan, to colonization is bizarre. Concessions in Shanghai, and separate rule of the once insignificant Hong Kong could only have been advantageous for a country which hadn't been messed up by ccourt Mandarins, feckless Emperors and war lordism.

    In India's case imperialism is a much better term than colonialism to convey useful ideas.

    Listen dimwit, why don’t you read up on the Opium Wars and the related Indian Sepoy Rebellion which took place between the two Opium Wars? Then let’s see if your non-point about colonialism still stands?

    As far as I know, The British used their superior military to impose “free trade” at gunpoint. In this case, free trade refers to monopoly prices on an addictive drug. And don’t go all libertarian either, cause the British had the wisdom to ban opium in their own nation.

    You could make the assertion that the USian empire never colonized the Latin American banana republics–With your piss poor logic you’d be right. It just overthrew anyone it suspected of economic nationalism and replaced them with a pliant comprador class.

    • Replies: @Anon
    Thank you for saving me from wasting my time by reading you in future. It is quite a feat to encapsulate in one post the evidence of your being ill educated, ill mannered, inattentive to what others write and, as to cognitive/analytical abilities definitely high on the Dunning-Kruger Syndrome.
  • @Jason Liu
    Great, but kinda pedestrian. Lemme use this platform to point out China's flaws from a Chinese perspective.

    Chinese society and Chinese people are too arrogant, materialistic, and hypersensitive to criticism.

    This is a huge problem. One, it alienates pretty much anyone who becomes familiar with China. Two, it leads to mistake after mistake when no criticism is offered to correct them in time. Three, it causes society to view things overly in terms of money, falling behind in all other aspects. Nobody cares how much rich or strong you are if you're a crass, materialistic asshole. They'll hate you.

    All societies have these issues, few are as bad as China. There are Chinese reading this right now and getting angry and ready to call me a traitor, demonstrating my point exactly.

    A wise dictator is great for the country, but Xi is not wise. He is a stubborn old man stuck in the past who is clearly not listening to advisers. He has overplayed his hand, confronted the US 10~20 years too early, damaged China's image out of some paranoid fear of Uyghurs, and absolutely failed at making friends with our East Asian neighbors, instead driving them further into the arms of the Americans.

    China does not need more repression right now, it needs to slowly liberalize to keep the economy growing and competitive. I'm not talking about western style "open society" bullshit, traitors like multiculturalists and feminists should always be persecuted. But the heavy-handed censorship, monitoring of everyday citizens is completely unnecessary. If China does not develop a culture of trust, and genuine, non-money based curiosity, it will not have the social structure to overcome the west.

    Outside of trade and money-related issues, the Chinese citizenry is woefully ignorant of the outside world. There is no widespread understanding of foreign cultures and ideologies, how they might threaten us, how to defend against them, or how to work around them. An overwrought sense of nationalism emphasizes Chinese victimhood to the point of absurdity, squandering any sympathy onlookers might have, and actually causes some to turn 180 and hate China instead.

    Angry, condescending attitudes towards our neighbors, especially Japan, severely cripple China's ability to be a world player. Without a network of like-minded friends (actual friends, not trade partners), China will never be able to match the western alliance. It is not just America we have to overcome, but an entire bloc of nations. I don't care how much people hate our neighbors, China must extend the olive branch, present a sincere face of benevolence, and not act like the big guy with a fragile ego. Racially and culturally similar East Asians are the best candidates for long-term friendship, it is wrong to forsake them under the assumption that all we need is Russia or Pakistan.

    Despite the trade war, I'm not worried about China's economy, infrastructure, political system, or innate ability. These are our strengths. I have no love for liberal democracy or western values. But China must change its attitude and the way it interacts with the outside world soon, or face geopolitical disaster.

    Don't overreact to every insult or criticism. Compete in areas that isn't just money or materials. Really understand soft power, and what it takes to be liked around the world. Develop our own appealing ideas and worldview. Listen to well-meaning, nationalistic critics, and change before the world discovers China's ugly side.

    He has overplayed his hand, confronted the US 10~20 years too early,

    I doubt the confrontation was at Xi’s initiation. The CIA has good people watching China’s rise.

  • @denk
    I read,
    but on to ZG now :-)

    ZG, does that mean zero gravity?

    Supposing not, having not kept up with all netspeak in recent years (can usually work most out), and never being expert in or user of CB, I do not know the term.

    • Replies: @denk
    Sorry,

    ZG = zhou gong, the god of dreams in Chinese folk lore,
    meaning its past my bed time,
  • @gmachine1729
    Sorry but not going to watch that video, sounds like bullshit to me. There's a lot of variance in how whites are viewed by Chinese locals.

    And LOL, there are very few whites in China, and much fewer in seriously high level jobs. You can't really do anything in China without knowing the language and having connections within the system. My guess is that most of the whites in China live in their little expat bubble, mostly working for non-Chinese companies in China. That's basically like not even being in China. Just like Chinese in America in their academia/STEM bubble where they seldom have to interact in a non-trivial way with Americans, where at least half the people are foreigners.

    Fair enough, and my sense is much closer to yours than the Chinese people interviewed in that video.

    The people who made that video are themselves Asian and have no agenda – so at least it does seem likely many Chinese do not well understand the position of whites in China, as perhaps many white Americans don’t really understand the nuances of the Asian position in the US (they see only that Asians are doing great in tech jobs, and not that they massively underperform their credentials and energy investment and rarely make it to the top) – and thus may not understand bitterness and anger of someone like you.

  • @myself

    so extreme was its persistence in not fulfilling its commitments
     
    Correct regarding ZTE. Possibly not applicable in regards to Huawei.

    The burden is now to prove that Huawei is guilty of selling actual American-manufactured components to Iran, not merely Huawei products derived/copied from the U.S.

    Huawei, in addiction to its own large R&D, probably uses tech from Taiwan, S. Korea, Japan, Germany, the U.S., a host of other countries, and indeed even other Chinese competitors like ZTE or Xiaomi.

    In fact, any Huawei product, or any product from anyone, is likely an optimized hybrid-synergy of many technologies from many sources. That's simply the modern, inter-connected supply chain in action.

    Exactly who is to way that a certain process or technique could only have come from the United States?

    So it seems we have quite the legal task ahead of us, and the case for violating an agreement not to sell U.S. technology to Iran seems weak indeed.

    As to violating U.S. sanctions on Iran - it goes without saying that's not even a thing for non-Americans.

    For my part, I wonder if we haven't overplayed our hand - does the Huawei agreement give us the right to actually extradite employees? Fining the Huawei corporation and denying them American technology, that is one thing. The ZTE treatment, if you will.

    But arresting and trying employees, aka actual PEOPLE - well, that crosses a very ugly line.

    Its hard to say this early how strong the case is – if it turns out to be very weak, you may have a good point. Time will tell – let’s also remember that information on the arrest is being withheld on request of Meng.

    China operates in Iran all the time with the full knowledge of the US – that isn’t the issue, I agree.

    The way this was being perceived by many was that the arrest was simply about Huawei operating in Iran – I agree that would be an insane escalation on the part of the US, an act of pure bullying.

    I don’t know the details – perhaps it wasn’t feasible to deal with Huawaei the way ZTE was dealt with? Perhaps HW is no longer dependent on US technology and is selling previously acquired tech with a sense of impunity….or maybe for some other reason it wasn’t feasible.

    I can certainly imagine scenarios where an arrest may have seemed necessary.

    My original point was really only to correct the misperception that this is in response to HW simply doing business in Iran and point out that, based on what we know now, this arrest may well be a rational and measured response.

    Whether it is that, we will only know as the details of this complex case emerge.

  • @anon
    korean people and central asian, mongolian etc people are closely genetically related. We are all part of the altaic culture, this is why its not uncommon to see mongolians, kazakh, kalmyk etc who look vaguely korean and vice versa.

    That’s interesting. What about Japanese? I know for certain Chinese are not related to the altaic. Most Chinese I see, even north Chinese, look like Vietnamese with lighter skin.

    • Replies: @anon
    In theory should apply (albeit to a lesser extent due to admixture with the ainu) to the japanese as well. Here is a comment that I found while reading through the comments section of an old unz.com article which articulates my thoughts best about the matter. You might find it interesting as well:

    http://www.unz.com/runz/how-social-darwinism-made-modern-china-248/

    comment #37

    This brazen Jason Liu speaks of his own Chinese, with a few glances to the left and right, and says “East Asians”. It would seem he’s a self-identified “(East) Asian American” proudly invested in this membership, but what he supposes to be a unitary racial entity is in truth a mishmash of unlikes.

    We Koreans are not of the same substance as you. No, I’m afraid we are not one kind. Maybe your crowning point – “In general, East Asians are not nearly as emotional. This is by far the most important thing.” – is your apt judgment of Hans, but with it you make clear your ignorance of the irrepressible and very much Korean capacity for passion, volatility, fanaticism, and ebullience, hates and bitternesses and loves that are not more muted or circumscribed than those of occidentals but often overflow them.

    There is more to the Korean character than the perfect gentleman-scholar and Confucian proper place – there is the rejoicing in brutal stone fights* that up until not too long ago had a government-sanctioned fortnight reserved for them each spring; the ecstasies of shamanic possession and dancing on knives; a reverence for divisions of rank and grades of human worth that not only exceeded those of the Chinese Confucians but largely (in genuine caste, with hereditary aristocrats, huge numbers of born chattel slaves, and ritually polluted untouchables) had their basis in something else entirely. I make no apologies. This is not cause for lamentation but a point of pride.

    The depth of our schizophrenia, how our ruling strata made a cargo cult of outdoing the Chinese in wen, in Chinese formulations of cultured virtue, is obvious to see. We sought to pass ourselves off as crisped to the great maw, to the alimentary state that divided all barbarians into “raw” and “cooked”, and took pride in our score lines. So I am all the more glad for that which is wild, unreasonable, unpragmatic, and uncringing in us. They mean the failure (at least the incompleteness) of Sinitic civilization’s program of human domestication.

    During my time in Central Asia and in particular East Turkistan/Xinjiang, I always found myself somehow much more immediately at home, much more at ease, amongst North and Inner Asians – assorted South Siberians, Mongols, Kyrgyz, Kazakhs, and indeed even the half-Caucasoid Uyghurs of the Tarim oases – than among Han Chinese or any kind of Southeast Asians. There were, in our sensibilities, our potentials for creation, our forms of expression, our instinctive understandings, so many primal congruences – reminders that there is more one way of being Asian, even East Asian, than the Sinitic. These moments would arc into me with an electric twinge, a goring on the Sibero-Scythian prongs of those crowns of buried Silla, a reminder of what could, and would, have been.
     
    What stood out to me about this quote was that I share the same experience as a korean individual upon meeting other people from central asian backgrounds. I indeed feel more similar on a fundamental level to these people than I do to chinese people. I honestly thought I was the only person who felt this way but apparently there are other korean people out there who understand that korean people are but one culture out of many that belong to a larger overarching altaic ethnic and cultural umbrella. I think this is something that is particularly striking to korean americans since by default we automatically clump ourselves in with a default east asian (quasi-sinitic) identity when the truth is that we are quite different than chinese people, however due to the lack of contact most korean americans (even korean people back in korea) have with central asian/mongolian/siberian people we are unable to discover the overarching culture which we really fall closer to and instead just identify with the default east asian (quasi-sinitic) culture even though it is actually an imprecise fit for us.
  • @anon
    Wow I didn't know there were Koreans in Kazakhstan. But I think they actually thought I was Kazakh. I've seen plenty of actual Koreans from South Korea and I look pretty damn different from them, and I'm not talking about just clothes and hairstyle etc.

    korean people and central asian, mongolian etc people are closely genetically related. We are all part of the altaic culture, this is why its not uncommon to see mongolians, kazakh, kalmyk etc who look vaguely korean and vice versa.

    • Replies: @anon
    That's interesting. What about Japanese? I know for certain Chinese are not related to the altaic. Most Chinese I see, even north Chinese, look like Vietnamese with lighter skin.
  • @AaronB
    https://www.google.com/search?q=asian+boss+what+do+chinese+think/of+white+foreigners&client=ms-android-asus-wypm&prmd=vni&source=lnms&tbm=vid&sa=X&ved=2ahUKEwizrIzowIvfAhVjTd8KHdo7DMYQ_AUoAXoECAwQAQ&biw=360&bih=560

    Interesting. According to that first video, there is a widespread perception among Chinese people that whites are preferred for high level jobs in China.

    I was quite surprised at that, as my impression was closer to yours. I wonder who is correct - if it's you, you need to educate your poor compatriots who may be suffering under unnecessary misapprehensions.

    I was impressed by how realistic the Chinese interviewed were - for instance, they quite candidly admitted that white people have much better facial features and were better looking.

    What struck me also is that the Chinese associate white people with being better educated...! It seems almost a reversal from perceptions in the US...

    I think overall Chinese in China have enough self esteem to be realistic about their shortcomings and others superior points - it does not matter to them as overall they are doing well, and in their own place. And this is a good thing.

    In another video from them, there is a Chinese guy who lived in America and says it was humiliating and terrible for Chinese in the US - I was wondering if it was you :)

    I do think America isn't the place for highly ambitious Chinese - they will be competing against the most ambitious whites - really the last remaining ambitious whites - and illusions about their abilities are likely to be shattered.

    I do know that a large number of Chinese in America suffer from serious unstable ego issues - I don't get along with most Chinese in America, whereas I get along really well with Chinese in Asia, of whatever stripe, and its because Chinese in Asia are in their own element and thus far less insecure.

    Nevertheless, the world needs to understand that China right now is going through an unstable ego phase, and Chinese are more likely than other groups now to be insecure, have a chip on their shoulder, etc. This is normal and happens to everyone - the Japanese in the early 20th century, the Germans, the Americans, etc.

    Sorry but not going to watch that video, sounds like bullshit to me. There’s a lot of variance in how whites are viewed by Chinese locals.

    And LOL, there are very few whites in China, and much fewer in seriously high level jobs. You can’t really do anything in China without knowing the language and having connections within the system. My guess is that most of the whites in China live in their little expat bubble, mostly working for non-Chinese companies in China. That’s basically like not even being in China. Just like Chinese in America in their academia/STEM bubble where they seldom have to interact in a non-trivial way with Americans, where at least half the people are foreigners.

    • Replies: @AaronB
    Fair enough, and my sense is much closer to yours than the Chinese people interviewed in that video.

    The people who made that video are themselves Asian and have no agenda - so at least it does seem likely many Chinese do not well understand the position of whites in China, as perhaps many white Americans don't really understand the nuances of the Asian position in the US (they see only that Asians are doing great in tech jobs, and not that they massively underperform their credentials and energy investment and rarely make it to the top) - and thus may not understand bitterness and anger of someone like you.

  • Anon[129] • Disclaimer says:
    @denk
    The moment I heard of a Malaysian airliner the mh370 'disappearance' with 250 cHINESE passengers aboard, my first thought was...
    it must be a black op.

    But Who's the likely culprit ?
    Cui BOno ?

    Here's a clue...
    'Located on the geostrategic Malacca Strait, Malaysia is a predominantly Muslim oil-producing nation with a "Look East" policy allying itself with Japan and China. Last year the Malaysian and Chinese governments established an economic alliance, which includes Asian access to world oil reserves. In the eyes of Washington and its allies, these are sufficient grounds to treat Kuala Lumpur as an adversary.

    Even though the Malaysian police force has cooperated closely with the US Embassy in the war on terror, which led to arrests of top-ranking Al Qaeda-linked terrorists, that is not good enough. The late Moammar Gaddhafi of Libya and Syrian President Bashar al-Assad also aided Washington in post-911 anti-terrorism, and look where it got them. It is not enough to be a friend of America. For a leader to survive, he must be a groveling yes-man, a political slave - and never mind America's long-forgotten principles of sovereignty or self-determination.

    Warnings from Washington were repeatedly given to Malaysia over the past few years. In late August 2013, Defense Secretary Chuck Hagel flew to Kuala Lumpur last year to pressure the Defence Ministry to cooperated with the strategic pivot through joint naval-and-air exercises directed against Chinese forces in the Malaysian-claimed islets in the Spratley group. These spits of rock and sand located off of Sabah, the Malaysian state in northwest Borneo, have names longer than their diameters, for instance, Investigator Reef and Mariveles Reef.

    https://rense.com/general96/mh370.html

    Many 'conspiracy theorists' pointed to Diego Garcia, I think its very plausible.

    Your sloppy grammar and diction looks like a fair measure of your sloppy thinking. If your “over the past few years” had been “over the previous few years” it might at least have conveyed a sensible meaning. But it is your “The moment I heard…. *my first thought was*….. *it must be a black op* conveying a certainty no government has managed and which has been almost totally at odds with actual evidence that truly marks you as a frivolous troll.

    FWIW a Cathay Pacific pilot friend, now, four and a half years later, says the professional consensus is that it was a murder-suicide by the Captain. Whose black-op would that be?

    • Replies: @Biff

    FWIW
     
    Nothing. Nothing at all.

    The idea that an international flight crew is going to allow one person to take down the whole Clipper is bogus. The people of Cathey Pacific are obviously back on the bottle.
  • @By-tor
    The title of that book cleverly implies that famine was Mao's goal when it was not. The USA's attitude was to sanction China in the 1960's when the Americans could have sold them grain for cash. Instead, the US psychos, still sore from being denied a 'military victory' in Korea ( despite the US killing of 20% of North Korea's population by aerial bombing ), forced the Aussies and Canadians to curtail the shipments of grains.

    I don’t think any jury of the literate would agree that Mao’s goal or purpose was implied by the title “Mao’s Great Famine” and I suggest to you that it is simply accusing him of being the person most responsible for the bad decisions which caused the famine. It seems to be true also that the author found plenty of evidence of Mao’s callousness though you can never be sure that expressions regarded by most as callous weren’t calculated to have some not so obvious effects, as well as maybe even covering up real angst on the part of the person appearing to be heartless.

    As to America’s (alleged) deliberate obstruction of attempts to relieve famine the reasons are likely to be more complicated than childish resentment at having been driven back to the 38th Parallel and stalemate in Korea. The advertising of the consequences of messing with America is a more plausible motive. As to the (alleged) embargo it is worth considering it in the context of blockades like that against Germany in WW1 and the German’s U boat warfare against Britain’s food imports in both Work Wars. There was after all a serious Cold War. Not that I am making a case for or against.

  • @AaronB
    ZTE was sanctioned and now even has to have its board vetted by the US - which seems to me like an unprecedented humiliation for a foreign nation - so extreme was its persistence in not fulfilling its commitments.

    Nevertheless, this was apparently not sufficient to deter Huawei. This arrest is a necessary escalation.

    It should also be noted that for some time China has been arresting or detaining citizens of Western countries, and for far more trivial reasons - albeit usually of Chinese ethnicity. It was really only a matter of time until other countries followed suit.

    China has a massive sense of grievance - and a sense of grievance often leads to reactive bullying - people with a strong sense of grievance aggress against others while framing it as justice.

    I'm not rooting for America, but I also don't make the mistake of thinking the opposition to America is necessarily good.

    so extreme was its persistence in not fulfilling its commitments

    Correct regarding ZTE. Possibly not applicable in regards to Huawei.

    The burden is now to prove that Huawei is guilty of selling actual American-manufactured components to Iran, not merely Huawei products derived/copied from the U.S.

    Huawei, in addiction to its own large R&D, probably uses tech from Taiwan, S. Korea, Japan, Germany, the U.S., a host of other countries, and indeed even other Chinese competitors like ZTE or Xiaomi.

    In fact, any Huawei product, or any product from anyone, is likely an optimized hybrid-synergy of many technologies from many sources. That’s simply the modern, inter-connected supply chain in action.

    Exactly who is to way that a certain process or technique could only have come from the United States?

    So it seems we have quite the legal task ahead of us, and the case for violating an agreement not to sell U.S. technology to Iran seems weak indeed.

    As to violating U.S. sanctions on Iran – it goes without saying that’s not even a thing for non-Americans.

    For my part, I wonder if we haven’t overplayed our hand – does the Huawei agreement give us the right to actually extradite employees? Fining the Huawei corporation and denying them American technology, that is one thing. The ZTE treatment, if you will.

    But arresting and trying employees, aka actual PEOPLE – well, that crosses a very ugly line.

    • Replies: @AaronB
    Its hard to say this early how strong the case is - if it turns out to be very weak, you may have a good point. Time will tell - let's also remember that information on the arrest is being withheld on request of Meng.

    China operates in Iran all the time with the full knowledge of the US - that isn't the issue, I agree.

    The way this was being perceived by many was that the arrest was simply about Huawei operating in Iran - I agree that would be an insane escalation on the part of the US, an act of pure bullying.

    I don't know the details - perhaps it wasn't feasible to deal with Huawaei the way ZTE was dealt with? Perhaps HW is no longer dependent on US technology and is selling previously acquired tech with a sense of impunity....or maybe for some other reason it wasn't feasible.

    I can certainly imagine scenarios where an arrest may have seemed necessary.

    My original point was really only to correct the misperception that this is in response to HW simply doing business in Iran and point out that, based on what we know now, this arrest may well be a rational and measured response.

    Whether it is that, we will only know as the details of this complex case emerge.
  • @someone
    I get similar vibes from my own experiences with the people in China. Despite the Cultural Revolution and the Great Leap Forward, Mao was the one who finally stopped 150 years of colonization and lawlessness.

    Deng may have been practical, but he also cut the social safety net with the "efficiency" rationalization.

    Despite the obvious negative consequences of the Great Leap Forward and Cultural Revolution, ordinary Chinese today are at least skeptical of their masters, and are quick to point out injustice. Sure beats the hordes of de-politicized and/or gullible Americans who cling to religious or ethnic identity, and project their disillusionment against irrelevant scapegoats.

    Mao's regressive period was 10 years or so. The Neoliberal/Reagan/Thatcher/Pinochet/Ayn Rand/Milton Friedman revolution in the US and its vassals has been going on for 40+ years and is more damaging because it's been so insidious, with legions of sellout journalists/politicians/academics praising an oligarchic system as some rational outcome of Social Darwinism.

    You are one of many on UR thresds who uses “colonization” and its cognates in a loose way that sometimes makes it unclear what is being asserted and always weakens the argument.

    Colonies were originally Greek settlements around the Mediterranean or Black Sea which allowed a group of immigrant Greeks to work and trade and enjoy autonomy. That meaning fairly accurately describes English and French settlement and colonization in the New World and in Australasia. The word doesn’t need much stretching to cover Kenya where there were white farmers, Malaya with its rubber plantations or Fiji where the working colonists were mostly Indian. But to attribute Cjina’s problems, even its backwardness compared to Japan, to colonization is bizarre. Concessions in Shanghai, and separate rule of the once insignificant Hong Kong could only have been advantageous for a country which hadn’t been messed up by ccourt Mandarins, feckless Emperors and war lordism.

    In India’s case imperialism is a much better term than colonialism to convey useful ideas.

    • Replies: @someone
    Listen dimwit, why don't you read up on the Opium Wars and the related Indian Sepoy Rebellion which took place between the two Opium Wars? Then let's see if your non-point about colonialism still stands?

    As far as I know, The British used their superior military to impose "free trade" at gunpoint. In this case, free trade refers to monopoly prices on an addictive drug. And don't go all libertarian either, cause the British had the wisdom to ban opium in their own nation.

    You could make the assertion that the USian empire never colonized the Latin American banana republics--With your piss poor logic you'd be right. It just overthrew anyone it suspected of economic nationalism and replaced them with a pliant comprador class.
  • By-tor [AKA "Jesse James"] says:
    @Wizard of Oz
    What do you mske of this?

    https://www.newstatesman.com/books/2010/09/mao-china-famine-western

    It is a while since I read a series of articles and reviews which left me satisfied, at the time, that Mao's callous attitude to mass Chinese deaths had been thoroughly researched and established. The articl I link reminds one too of the absurd and counterproductive campaign to kill sparrows.

    I see Frank Dikötter's thoroughly researched "Mao's Great Famine" was published in 2010. Has anything since displaced it as the leading authority it was then predicted to become?

    The title of that book cleverly implies that famine was Mao’s goal when it was not. The USA’s attitude was to sanction China in the 1960’s when the Americans could have sold them grain for cash. Instead, the US psychos, still sore from being denied a ‘military victory’ in Korea ( despite the US killing of 20% of North Korea’s population by aerial bombing ), forced the Aussies and Canadians to curtail the shipments of grains.

    • Replies: @Wizard of Oz
    I don't think any jury of the literate would agree that Mao's goal or purpose was implied by the title "Mao's Great Famine" and I suggest to you that it is simply accusing him of being the person most responsible for the bad decisions which caused the famine. It seems to be true also that the author found plenty of evidence of Mao's callousness though you can never be sure that expressions regarded by most as callous weren't calculated to have some not so obvious effects, as well as maybe even covering up real angst on the part of the person appearing to be heartless.

    As to America's (alleged) deliberate obstruction of attempts to relieve famine the reasons are likely to be more complicated than childish resentment at having been driven back to the 38th Parallel and stalemate in Korea. The advertising of the consequences of messing with America is a more plausible motive. As to the (alleged) embargo it is worth considering it in the context of blockades like that against Germany in WW1 and the German's U boat warfare against Britain's food imports in both Work Wars. There was after all a serious Cold War. Not that I am making a case for or against.
  • @Biff
    Regarding your link, the minute I heard MH370 went missing I immediately thought of Diego Garcia.
    What are the chances?

    The moment I heard of a Malaysian airliner the mh370 ‘disappearance’ with 250 cHINESE passengers aboard, my first thought was…
    it must be a black op.

    But Who’s the likely culprit ?
    Cui BOno ?

    Here’s a clue…
    ‘Located on the geostrategic Malacca Strait, Malaysia is a predominantly Muslim oil-producing nation with a “Look East” policy allying itself with Japan and China. Last year the Malaysian and Chinese governments established an economic alliance, which includes Asian access to world oil reserves. In the eyes of Washington and its allies, these are sufficient grounds to treat Kuala Lumpur as an adversary.

    Even though the Malaysian police force has cooperated closely with the US Embassy in the war on terror, which led to arrests of top-ranking Al Qaeda-linked terrorists, that is not good enough. The late Moammar Gaddhafi of Libya and Syrian President Bashar al-Assad also aided Washington in post-911 anti-terrorism, and look where it got them. It is not enough to be a friend of America. For a leader to survive, he must be a groveling yes-man, a political slave – and never mind America’s long-forgotten principles of sovereignty or self-determination.

    Warnings from Washington were repeatedly given to Malaysia over the past few years. In late August 2013, Defense Secretary Chuck Hagel flew to Kuala Lumpur last year to pressure the Defence Ministry to cooperated with the strategic pivot through joint naval-and-air exercises directed against Chinese forces in the Malaysian-claimed islets in the Spratley group. These spits of rock and sand located off of Sabah, the Malaysian state in northwest Borneo, have names longer than their diameters, for instance, Investigator Reef and Mariveles Reef.

    https://rense.com/general96/mh370.html

    Many ‘conspiracy theorists’ pointed to Diego Garcia, I think its very plausible.

    • Replies: @Anon
    Your sloppy grammar and diction looks like a fair measure of your sloppy thinking. If your "over the past few years" had been "over the previous few years" it might at least have conveyed a sensible meaning. But it is your "The moment I heard.... *my first thought was*..... *it must be a black op* conveying a certainty no government has managed and which has been almost totally at odds with actual evidence that truly marks you as a frivolous troll.

    FWIW a Cathay Pacific pilot friend, now, four and a half years later, says the professional consensus is that it was a murder-suicide by the Captain. Whose black-op would that be?
  • @myself

    Arresting the Huawei official on suspicion of selling American technology to Iran seems like a perfectly reasonable course of action, and not at all extreme.
     
    No specific reasons were given as to the arrest in the jurisdiction of Canada, so we cannot know at this time what the charges are. We do know that she was arrested on Canadian soil, by Canadian authorities, at the request of the United States.

    Indeed, the only charge that is even feasible is the selling of "American technology" to Iran.

    It cannot by any stretch of the imagination be "having business dealings with Iran in spite of American sanctions". The steps we have taken against Iran have no international support, and therefore do not carry the "force" of international law - meaning other sovereign nations (and their nationals) are breaking no laws when they do business with Iran.

    On the point of sales of "American technology" to Iran, I submit that it will be quite (or even very) difficult to prove that any given technology or process can only have originated in only one particular source, given that most major technology vendors conduct their own R&D, and while incorporating features from other companies' technologies, modify and tweak the final product sufficiently such that they can call them their own.

    The Huawei products sold to Iran would practically have to have been manufactured in facilities in the United States and then exported to China, and then sold in totally unaltered form to Iran! UNLIKELY.

    On top of that, any such product presented as evidence in court can simply be denied to have been sold to Iran by the defendant, and any documentation can simply be painted as fake. Eyewitness testimony as evidence? Don't even go there.

    There's also the angle of what exactly were the stipulations of the deal between Huawei and the (U.S.) government? IF (big IF) Huawei as an entity were even found guilty of wrong-doing, are the penalties specified to include arrest and charging of particular persons?

    Why not sanction Huawei itself, a la ZTE, and/or put out an international arrest warrant for the CEO of Huawei himself, instead of arresting the Chief Financial Officer? It would seem that a finance executive would have little to do with the covert supplying of products, but say, an operations executive would - so why the arrest of the CFO, Meng Wanzhou?

    There are implications to all this into which I will not go right now, but currently we're not looking too good.

    ZTE was sanctioned and now even has to have its board vetted by the US – which seems to me like an unprecedented humiliation for a foreign nation – so extreme was its persistence in not fulfilling its commitments.

    Nevertheless, this was apparently not sufficient to deter Huawei. This arrest is a necessary escalation.

    It should also be noted that for some time China has been arresting or detaining citizens of Western countries, and for far more trivial reasons – albeit usually of Chinese ethnicity. It was really only a matter of time until other countries followed suit.

    China has a massive sense of grievance – and a sense of grievance often leads to reactive bullying – people with a strong sense of grievance aggress against others while framing it as justice.

    I’m not rooting for America, but I also don’t make the mistake of thinking the opposition to America is necessarily good.

    • Agree: RadicalCenter
    • Replies: @myself

    so extreme was its persistence in not fulfilling its commitments
     
    Correct regarding ZTE. Possibly not applicable in regards to Huawei.

    The burden is now to prove that Huawei is guilty of selling actual American-manufactured components to Iran, not merely Huawei products derived/copied from the U.S.

    Huawei, in addiction to its own large R&D, probably uses tech from Taiwan, S. Korea, Japan, Germany, the U.S., a host of other countries, and indeed even other Chinese competitors like ZTE or Xiaomi.

    In fact, any Huawei product, or any product from anyone, is likely an optimized hybrid-synergy of many technologies from many sources. That's simply the modern, inter-connected supply chain in action.

    Exactly who is to way that a certain process or technique could only have come from the United States?

    So it seems we have quite the legal task ahead of us, and the case for violating an agreement not to sell U.S. technology to Iran seems weak indeed.

    As to violating U.S. sanctions on Iran - it goes without saying that's not even a thing for non-Americans.

    For my part, I wonder if we haven't overplayed our hand - does the Huawei agreement give us the right to actually extradite employees? Fining the Huawei corporation and denying them American technology, that is one thing. The ZTE treatment, if you will.

    But arresting and trying employees, aka actual PEOPLE - well, that crosses a very ugly line.