Random  | Best Random Tools

  • Text That Deletes Itself on Random Scary Internet Conspiracy Theories

    (#8) Text That Deletes Itself

    British author Luke Harding was well into writing The Snowden Files: The Inside Story of the World's Most Wanted Man, when something bizarre happened to his work: it began to erase itself before his very eyes. In an editorial in The Guardian, Harding wrote,

    “The paragraph I had just written began to self-delete. The cursor moved rapidly from the left, gobbling text. I watched my words vanish. When I tried to close my OpenOffice file the keyboard began flashing and bleeping.

    "Over the next few weeks these incidents of remote deletion happened several times. There was no fixed pattern but it tended to occur when I wrote disparagingly of the NSA.”

    Skeptics pointed out a number of holes in Harding’s story, and pointed out that he probably just got his delete key stuck. Or maybe that's what the NSA wants you to think.
  • MonsterMind on Random Scary Internet Conspiracy Theories

    (#5) MonsterMind

    Buried in the disclosures made by NSA whistleblower Edward Snowden was information about an experimental cyber defense system that could autonomously neutralize and retaliate against foreign cyber attacks against the US. Nicknamed MonsterMind, it’s supposedly the project that caused Snowden to make his initial disclosures, as he was disturbed by the idea of a self-regulating system that has no oversight and can fight back against anything that it deems a threat. Theoretically, it could be turned against ordinary citizens, or decide it doesn’t want to do what it’s supposed to do and rain nuclear missiles on all of us. Or something.

    Proponents of the idea believe that a “cyber missile defense system” is exactly what we should be investing in, stopping hack attacks before they happen, rather than playing catch-up and cleaning up the damage.
  • Utah Data Center on Random Scary Internet Conspiracy Theories

    (#2) Utah Data Center

    A gigantic data storage center designed to track everything you do in cyberspace, located in the middle of nowhere with a creepy name and an officially classified mission? Sounds like the stuff of conspiracy theorist nightmares – but it’s a real place. Officially named the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, but better-known as the Utah Data Center, this million square foot complex cost over $2 billion to build, and can store as much as 12 billion gigabytes of information.

    What information does it store? If you believe the Edward Snowden disclosures, everything you do on the Internet and a log of every call you make or receive. Reactions to the sheer size, scope, and creepiness of the Utah Data Center have included protestors flying drones over it and Utah lawmakers proposing bills to cut off its water supply – all activities that are no doubt being logged and stored in the Utah Data Center.

  • The Internet Kill Switch on Random Scary Internet Conspiracy Theories

    (#9) The Internet Kill Switch

    The idea of one single command bringing down the entire Internet has been referenced in both national security and conspiracy theory circles. Language written in the Communications Act of 1934 gives the president the authority to suspend radio and telephone communications in a time of national crisis. Proponents of a “kill switch” for the Internet contend that there might be a time when such a crisis might prompt the shutdown of the Internet.

    Its opponents believe that a power-mad president could activate the kill switch to prevent dissent and nationalize the flow of information – and point to countries like Egypt where the exact same thing has happened. Such a kill switch doesn’t actually exist in the US, despite several years of debate about it.
  • The Great Firewall of China on Random Scary Internet Conspiracy Theories

    (#12) The Great Firewall of China

    China’s Golden Shield Project is an ongoing effort to track, watch, and log everything China’s billion citizens do on the Internet – when it’s not simply blocking them from going where they want. The “Great Firewall of China” prohibits users from doing anything that might “harm national security; disclose state secrets; or injure the interests of the state or society, […] create, replicate, retrieve, or transmit information that incites resistance to the PRC Constitution, laws, or administrative regulations; promote the overthrow of the government or socialist system; undermines national unification; distort the truth, spread rumors, or destroy social order; or provide sexually suggestive material or encourage gambling, violence, or murder.”

    Needless to say, this can be interpreted to be just about anything, leading to an odious amount of censorship.
  • Doxing on Random Scary Internet Conspiracy Theories

    (#6) Doxing

    Personal information, such as addresses, social security numbers and private pictures, is put on the Internet so often that there’s a newly coined word for it: “doxing.” Often done as a way to take revenge, or as a simple prank (for the LOLz, as the kids say), doxing first became a serious issue in 2011 when the hacker group Anonymous put the identifying information of 7,000 law enforcement officers online, as a response to a crackdown on their activities.

    At other times, doxing has been used to identify Ku Klux Klan members, gun owners, prolific Twitter trolls, women in video game development and journalism, and even the formerly anonymous creator of bitcoins. Piss off the wrong person online, so the theory goes, and they’ll dox you.

New Random Displays    Display All By Ranking

About This Tool

There are many conspiracy theories on the Internet, which are spread in the form of blogs, YouTube videos, and other social media. In recent years, in order to curb the terrible influence of conspiracy theories on the Internet, major social media have introduced strict censorship systems to suppress, delete posts and ban titles, and even former US President Trump is not immune.

The rapid development of the Internet has contributed to the emergence of various conspiracy theories, more people spread horror rumors behind the screens. The random tool shares 15 scary conspiracy theories on the Internet that we should notice.

Our data comes from Ranker, If you want to participate in the ranking of items displayed on this page, please click here.

Copyright © 2024 BestRandoms.com All rights reserved.