Covid-19 Mole

Hmmm, 32 days until The Presidential election and now, after nine months, The President contracts the virus. This smells of a mole in the midst of the inner circle of The White House so bad that anyone of an I.Q. over eight can’t deny it. This is not conspiracy theory speculation.

Wake up, Trump security team! Someone in the inner circle of The Trump re-election team has deliberately spread this virus. Ronna McDaniel, Hope Hicks, and several others, simultaneously test positive?! Odd, isn’t it and why not two months ago, one month ago; why not just one month before probably one of, if not the most, significant election in decades.

 The Liberal Left is so close to turning this country into a Socialist Utopia, they can almost  taste it. I’m totally adverse to “Contact Tracing”, but in this case, a criminal attempt on President Trump’s life, and others, has been deliberately perpetrated. Anyone that seems to be out of place, a campaign crony, new security hire, perhaps, even the pilot on the airborne transport, a driver, perhaps, I suggest that no stone be left unturned. Once found, the perpetrator needs to be charged with 1st degree attempted murder.

Contangions From China

The thing about China is that they develop very little of their own product and technology. Most of what they build, manufacture, or develop comes from stolen Intellectual Property. The problem with this is that while reverse engineering these ideas, the Chinese cut certain corners in the development phase.

 Often, inferior materials are used to manufacture whatever it is, so that it can be developed both rapidly and inexpensively. Most Americans are well aware of the staunch difference between an American made product, and a similar one that is made in China. One can just imagine the big difference between a product that the Chinese make for export as to the one made for domestic use in China.

My point is this that all these viruses that keep “escaping” from China are being developed from stolen intellectual property. The process is then to reverse engineer the information to develop whatever is in the encrypted file that they’ve managed to obtain. Rather, however, than use the exact specifications for the thing, they substitute with Chinese quality specs. This is why the system, at some point inevitably breaks down and something goes wrong. An exact standard to develop and contain these contagions is not followed, either for cost effectiveness, lack of adequately trained personnel, or unavailability of quality materials needed for the project.