You are on page 1of 4

The Nuclear Bible: The End of the Internet

Intro: The biggest thorn in the side of the Globalists is the internet and there are now rumors that the world may be in the process of
going to Internet 2, a highly controlled internet with Chinese style censorship. In 2009, Jay Rockefeller, stated that The internet never should have been invented (YouTube, 2009). On January 15th, 2010, Paul Joseph Watson reported that the controversy surrounding White House information czar and Harvard Professor Cass Sunsteins blueprint for the government to infiltrate political activist groups has deepened, with the revelation that in the same 2008 dossier he also called for the government to tax or even ban outright political opinions of which it disapproved. Sunstein was appointed by President Obama to head up the Office of Information and Regulatory Affairs, an agency within the Executive Office of the President. On page 14 of Sunsteins January 2008 white paper entitled Conspiracy Theories, the man who is now Obamas head of information technology in the White House proposed that each of the following measures will have a place under imaginable conditions according to the strategy detailed in the essay. Government might ban conspiracy theorizing. (most of which occurs online) Government might impose some kind of tax, financial or otherwise, on those who disseminate such theories (which would most likely be levied based on online behavior)

Watson went on to state, Thats right, Obamas information czar wants to tax or ban outright, as in make illegal, political opinions that the government doesnt approve of (Watson, 2010). These statements shows the distain for the internet by the powers that be, because more and more people worldwide are tuning out of the mainstream media and onto the internet for their news and information, due to the corporate medias unwillingness to spe ak the truth about a number of issues, particularly, the North American Union, the New World Order, WMDs, 9/11 Truth, vaccines, and countless other topics. Should China be implicated in a Cyber Attack of some sort that enables the nuclear terrorism on F ebruary 7, 2010, or in the near future, we can say goodbye to the free internet as we know it. Date: May 26, 2010 Source: PC World, IDG News, Grant Gross Title/Headline: US Needs Plan For Online Terrorism Recruiting, Expert Says Abstract: The U.S. government lacks a plan to counter terrorist recruiting efforts online, even though such efforts by jihad groups are growing, one terrorism expert told U.S. lawmakers. The U.S. government doesn't make an effort to engage with people who may be open to terrorist recruiting efforts and dissuade them from joining, Bruce Hoffman, a professor in the School of Foreign Service at Georgetown University, told lawmakers Wednesday. The U.K. government has a program that works with local communities to identify possible targets for terrorism recruiting, said Hoffman, a former scholar in residence at the U.S. Central Intelligence Agency. "Very clearly, our adversaries have a communications strategy," Hoffman told a subcommittee of the House of Representatives Homeland Security Committee. "Lamentably, we don't." Instead of on-the-ground programs working with potential targets of terrorism recruiting, U.S. agencies have, in some cases, tried to control terrorism communications on the Internet, Hoffman said. "We shouldn't be censoring the Internet," he said. "I think the problem is we default toward these very intrusive approaches." While most witnesses at the hearing agreed that the U.S. government shouldn't be censoring Web sites linked to terrorism , John Philip Mudd , a senior research fellow at the Counterterrorism Strategy Initiative at the New America Foundation, suggested that taking down terrorism recruiting Web sites may be helpful. Internet service providers should have protection from lawsuits if they take down terrorism-related Web sites, said Mudd, a former counterterrorism official with the CIA and the U.S. Federal Bureau of Investigation. " We're not going to stop Internet recruitment and radicalization," he said. "We can work on it, we can chip away at it, but it's not going to stop." Members of the subcommittee decried the ability of terrorists to recruit followers online, but several lawmakers also said they want to be careful that the U.S. government doesn't trample on free speech rights when it tries to counter terrorism recruiting activity online. There's an active debate in the U.S. security community about whether law enforcement agencies should attempt to take down Web sites recruiting terrorists, but by taking down sites, investigators could lose valuable information, said Representative Michael McCaul , a Texas Republican. Mudd seemed to disagree. Keeping terrorism Web sites online may give investigators short-term gains, he said. "But in general, I'd say, make sure they can't spread the ideology, because that's spreading the revolution," he said. The U.S. government has, at times, been too heavy-handed in its antiterrorism efforts, but there's also a proliferation of terrorism recruiting materials online, McCaul said. More than 5,000 Jihadist Web sites and discussion forums are online, he said. "I don't think anyone here disputes that the terrorists are successfully using the Internet to help spread their message," he said. "Terrorists once had to travel to terror camps in Pakistan to receive indoctrination and training. Now, aspiring terrorists only need to open their laptop and connect to the Internet." Representatives of the American Civil Liberties Union (ACLU) and the Center for Democracy and Technology said that U.S. courts have established clear rules for when it's appropriate for government law enforcement agents to take away free speech rights. A 1969 Supreme Court case established that subversive speech was protected by the First Amendment to the U.S. Constitution unless it incited "imminent lawless action," said Anthony Romero , the ACLU's executive director. In many cases,

terrorism Web sites don't rise to that level, Romero suggested. While several lawmakers expressed concerns about terrorism recruiting online, Brian Jenkins , a senior advisor at research and analysis firm The RAND Corp., suggested that terrorism recruiting efforts in the U.S. since the Sept. 11, 2001, attacks have been limited. RAND found that only about 125 people in the U.S. were recruited to terrorism groups between Sept. 11, 2001, and 2009, he said. "There are veins of extremism, there are handfuls of hotheads, but no apparent deep reservoir from which Al-Qaeda can recruit," he said. Terrorists have gotten to the implementation stage in only three plots, including a failed car bombing in New York City May 1, in the U.S. since Sept. 11, Jenkins said. An online recruitment campaign is"producing very few active terrorists," Jenkins added. "The number of English language Web sites vastly exceeds the number of terrorists it has produced. As a marketing effort, it would be judged a failure (Gross, 2010).

Date: June 22, 2010 Source: National Geographic Title/Headline: Electronic Amageddon Abstract: A nuclear warhead will detonate high above the earths surfaceOne of the most wired nations [America] in the world will go dark Dr. Vincent Peter Pry (CIA) It would change the game. It would change the world order. What do future presidents need to know about existential dangers this country could face? Explorer investigates the science behind the dangers of a high-altitude electromagnetic pulse, or HEMP. Picture an instantaneous deathblow to the vital engines that power our society, delivered by a nuclear weapon designed not to kill humans but to attack electronics. What could happen if an electromagnetic pulse surged to earth, crippling every aspect of modern societys infrastructure? Explore what could happen when a high altitude electromagnetic pulse (HEMP) occurs and cripples our electrical grid. Apparently, the Globalists are considering detonating an EMP, which would basically take America back to the Stone Age. This would disrupt any and all communication abilities for Americans trying to resist the post-nuclear agenda. Date: July 13, 2010 Source: CBS News Title/Headline: Thousands Of Laptops Stolen During 9-hour Heist Abstract: Thousands of laptops have been stolen from the Florida office of a private contractor for the U.S. military's Special Operations Command. Surveillance cameras caught up to seven people loading the computers into two trucks for nine hours. U.S. Special Operations Command coordinates the activities of elite units from the Army, Navy, Air Force and Marines. A spokeswoman said Tuesday that none of the stolen laptops contained military information or software. The Virginia-based company iGov was awarded a $450 million contract earlier this year to supply mobile technology services linking special operations troops worldwide. A company executive says iGov is cooperating with authorities and the March 6 break-in at its Tampa facility remains under investigation (CBS News, 2010). This theft will likely be used as the alleged gateway for the nuclear terrorists past U.S. security. Date: July 19, 2010 Source: Fox News Title/Headline: FBI Warning Of Al Qaeda Hit Lists, Bomb-Making Tips Led To Shutdown Of Blogging Site Abstract: A popular website that hosted more than 70,000 bloggers was shut down suddenly last week after the FBI informed its chief technology officer that the site contained hit lists, bomb-making documents and links to Al Qaeda materials, it was reported on Monday. When the WordPress platform Blogetery.com went dead, the initial explanation from the site's host, Burst.net, was that a lawenforcement agency had ordered it to shut down, citing a history of abuse. The explanation caused a wave of conspiracy theories in the blogosphere. But according to a report on CNET Monday, Burst.net shut down Blogetery.com when it became spooked by a letter from the FBI, in which the bureau detailed the presence of terrorist materials among the blog posts. Burst.net CTO Joe Marr explained that the FBI contacted them with a request for voluntary emergency disclosure of information, bringing to their attention that terrorist material presenting a threat to the lives of Americans was found on a server Burst.net hosted. FBI agents said they wanted specific, immediate information about the people who posted the material. Paul Bresson, unit chief for the FBI's national press office, wrote in an email to FoxNews.com Monday that Burst.net shut down the website on its own. " We did not make a request to shut down a website," Bresson wrote. Burst.net executives and public relations staffers were not available for comment; answering machines at the office appeared to be disconnected. Bloggers had been theorizing for days about the shutdown, mostly speculating about conspiracies and antipiracy movements. File-sharing news site TorrentFreak claimed it was most likely the work of anti-piracy authorities. The site speculated that it could be part of a new initiative called "Operation: In Our Sites," designed to crack down on Internet piracy and counterfeiting under the authority of Vice President Joe Biden and U.S. Intellectual Property Enforcement Coordinator Victoria Espinel. "Operation: In Our Sites" has already targeted numerous sites including TVShack.net, Movies-Links.TV, FilesPump.com, Now-Movies.com, PlanetMoviez.com, ThePirateCity.org, ZML.com, NinjaVideo.net and NinjaThis.net. Others wondered whether

this was a step by the government to assert control over the Web. Just weeks ago, a plan giving the President emergency power to turn off the Internet was approved by the Senate. The reality turns out to be much more serious. A representative for Burst.net said the company had offered Blogetery's operator his money back, but that "should be the least of his concerns." Simply put: We cannot give him his data nor can we provide any other details," the representative said. "By stating this, most would recognize that something serious is afoot (Fox News, 2010).

Date: October 6, 2010 Source: San Diego State University, Gina Jacobs Title/Headline: Mapping Cyberspace Abstract: A $1.3 million grant from the National Science Foundation will help SDSU researchers create new ways to analyze the spread of information and ideas on the Internet. The multidisciplinary cyber-infrastructure innovation project will map cyberspace by tracking the flow of information and monitoring its movement on the Internet. The spread of ideas in the age of the Internet is a double-edged sword; it can enhance our collective welfare, as well as produce forces that can destabilize the world, said MingHsiang Tsou, associate professor of geography and the projects lead investigator. This project aims at understanding the process by which the impact of co-related events or ideas disperse throughout the world over time and space. The project seeks to map both the geography and the chronology of ideas over cyberspace, as the ripples of information radiate outward from a given event epicenter. By mapping and analyzing such ripples, researchers hope to better understand the role of new media in biasing, accelerating, impeding or otherwise influencing personal, social and political uses of such information. Tracking Terrorist Ideas Online: One application of the project will be to track terrorist and extremist ideas on the web to see where the information originates and how it spreads. As an example, the news of an obscure preachers intention to burn the Koran spread like wildfire in various media throughout much of the world in general, and in the Islamic world in particular. This singular announcement by a solitary person touched off violent protests that took the lives of many and threatened further escalation of tensions and rifts between the West and the Islamic world, said Dipak Gupta, co-investigator on the project and professor of international security and conflict resolution. This episode illustrates the potential of relatively isolated events for destabilizing the world in unforeseen ways and with far-reaching consequences. By identifying the path of information online, researchers hope to learn what makes a place more prone to the spread of any particular idea. In addition to terrorist ideas, the project also seeks to establish ways to map the spread of information on other ongoing topics, such as epidemics and global climate change, and other event-based topics, such as wildfires, earthquakes and hurricanes. Diffusion of Information: Understanding information diffusion and acquisitione.g., searching, sendingpatterns in response to such disasters and epidemics may significantly facilitate intervention responses, and eventually, prevention responses, Tsou said. The first phase of the project will develop basic language analysis tools creating semantic maps words, phrases and patterns of language usewhich characterize the seed sites in the spread of ideas. Using these maps to guide web searches will provide a detailed picture of how seed sites are reporting an event. By using this linguistic framework, a sophisticated web search will indicate how these seed sites and their social networks of users are reporting an event and influencing each other. In the second phase of the project, researchers will collect data on the spread of words, phrases and patterns of language use on websites over time and space. By mapping these sites on a world map, visualization will show how the ideas are spreading. In the third phase of the project, statistical analyses will seek to understand the reasons for a particular course along which an idea spreads. In other words, potential factors that cause susceptibility to and immunity from a particular set of ideas will be identified. This project will continue for four years, collecting and analy zing data, and developing a theoretical structure on the spread of ideas. Understanding 'Collective Thinking': This project will help us to better understand the collective thinking of human beings and minimize misunderstandings between different groups and people, Tsou said. Mapping Cyberspace to Realspace: Visualizing and Understanding Spatiotemporal Dynamics of Global Diffusion of Ideas and the Semantic Web was funded for four years starting Oct. 1 (Jacobs, 2010). Date: April 20, 2010 Source: Sacramento Press, Hal Silliman Title/Headline: CIA Director Tells Cap-To-Cap Delegates: Cyber Attack Could Be Next Pearl Harbor Abstract: Central Intelligence Agency director Leon Panetta told 300 Sacramento Metro Chamber Cap-to-Cap delegates that the next Pearl Harbor is likely to be an attack on the United States power, financial, military and other Internet systems . Panetta addressed the Sacramento delegation that includes 43 elected officials and hundreds of business and civic leaders who are in Washington D.C. for the annual program that advocates for the regions most pressing policy issues. He spoke on Monday, April 19, during the Cap -toCap opening breakfast. Cyber terrorism is a new area of concern for the CIA, Panetta said. The United States faces thousands of cyber attacks daily on its Internet networks. The attacks are originating in Russia, China, Iran and from even hackers. The next

Pearl Harbor is likely to be a cyber attacking going after our gridand that can literally cripple this country, Panetta said. This is a whole new area of threat. But cyber terrorism is just one of four primary missions for Panetta, who took over directing th e CIA last year after appointment by President Obama. The CIA is also focusing on counter-terrorism, reducing the proliferation of weapons of mass destruction and fighting narcotics trafficking. Al Qaeda is becoming a viscous target, and as CIA and military operations tamp it down in Pakistan, Afghanistan and Iraq, the terrorist elements are moving to places like Somalia, Yemen and North Africa as well changing its tactics, he said. The presidents directionis we must dismantle and destroy Al Qaeda and its known elements, he said. Its a fundamental mission.The primary effort takes place in Pakistan and tribal areas. We are now focused on Afghanistan and have increased our presence there. Meanwhile, CIA is working to help Iraqis fight Al Qaeda. Even as our military draws down in Iraq, well keep our presence thereto provide intelligence to the Iraqis so they can secure their own country. Worrisome, he added, is how Al Qaeda is coming at us in other ways. These include using individuals who have clean records and are not being tracked; individuals who are already in the U.S.A. and in contact with Al Qaeda; and individuals who decided to selfradicalize and are easily and quickly recruited as terrorists. Previously, Panetta served as a congressional r epresentative from the Monterey area, rising to the House Budget committee chair, and then latter as President Clintons Director of the Office of Management and Budget. Ive spent most of my life on budget issues, he said, noting the work we did eventu ally produced a balanced budget for the country. When hes asked why he took on the job at the CIA, he told the group, Because considering the size of the federal deficit, Id rather fight Al Qaeda (Silliman, 2010). Date: January 9, 2011 Source: Huffington Post, Craig Kanalley Title/Headline: Facebook Shutting Down Rumor Goes Viral: Site Said To Be Ending March 15, 2011 Abstract: It's not clear how it started, but a ridiculous rumor that Facebook is shutting down is spreading fast on social networks. The hot rumor -- evidenced by Google Trends and gaining traction on Twitter -- says that on March 15, 2011, Facebook will be closing down. Not taking a day off, not undergoing maintenance, but ending entirely. The rumor has led to such frantic tweets as, "Facebook will be shutting down on March 2011? I hope not!" (@MissAyl) and "So the rumor is Facebook is shutting down....please don't jump to twitter & ruin my social networking experience" (@jjelksboss). Facebook users are also concerned. Says one: "Facebook is shutting down on March 15, 2011 for good D: Is there any way we can stop this!?!?" And a group has already started to stop Facebook from shutting down. Ironically, Yahoo announced last month that its "Yahoo Video" will be closing down on the date in question, March 15, 2011, and videos can be seen for the last time on March 14. But that hardly means it's taking the rest of the Internet down with it. Just a day ago, an opinion piece published on CNN said that the recent Goldman Sachs investment was the "beginning of the end" for Facebook. That post went viral with more than 5,000 Facebook "likes" and could be partially to blame for the ensuing panic. Whatever the reason for this rumor, it's safe to say that as a site with more than 500 million users and a $500 million investment from Goldman Sachs recently, Facebook won't be shutting down anytime soon. UPDATE (3:30 p.m. ET): ABC News speculates that the rumor started with this post published Jan. 8 by the satirical Weekly World News. Facebook has yet to officially respond to the rumor. UPDATE (6 p.m. ET): Facebook has officially responded to the rumors with a tweet : "We didn't get the memo about shutting down, so we'll keep working away. We aren't going anywhere; we're just getting started." A company spokesman also dismissed the rumors as "silliness."

Conclusion: If the internet shuts down, there will be so many angry and irate people that a new form of communication will take its
place. That being said, the Internet MUST stay up if there is any chance of changing the world for the better.

You might also like