Save for maybe cat videos, conspiracy theories are the bread and butter of the Internet. But what about conspiracy theories ABOUT the Internet? There are plenty of scary theories floating around conspiracy circles that have major implications for the ever increasingly digital lives we lead. These conspiracies about the Internet, hacking, and other forms of digital crimes will have you seriously considering ditching all your tech gadgets and moving to an isolated cabin in the woods, once and for all.
Whether it's a governmental takeover, massive censorship, Internet-enabled devices being taken over, or giant data storage systems meant to track everything you look at, there are plenty of conspiracies simply about the internet to keep you awake at night - and away from your smartphone. Edward Snowden to high level government officials around the world, plenty of people are worried about these Internet conspiracies, and soon you will be too!These conspiracy theories are all related to cyberspace, data storage, smart phones, and who actually controls the Internet. Be sure to read them on an old desktop that the NSA can't possibly hack into and upvote the scary Internet theories that have you most frantically clearing your browser history.
Anyone creepy enough and at least somewhat technologically minded could remotely turn on your laptop’s webcam, giving him or her the ability to record you doing whatever you’re doing. A Remote Administration Tool (RAT) can be introduced on a computer through a phishing email or malware, giving a hacker the ability to move items around on your desktop, close what you’re working on, or open your DVD drive.It also gives creeps the ability to watch women working at their computers through their webcams, which they won’t realize are on. RAT-ers conspire to find “slaves” they can hack into, determine which laptops don’t have lights to indicate their webcams are on, and generally say and do creepy stuff. Makes you want to turn your computer off and live in the woods.1,008240Does this worry you?
Utah Data Center
A gigantic data storage center designed to track everything you do in cyberspace, located in the middle of nowhere with a creepy name and an officially classified mission? Sounds like the stuff of conspiracy theorist nightmares – but it’s a real place. Officially named the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, but better-known as the Utah Data Center, this million square foot complex cost over $2 billion to build, and can store as much as 12 billion gigabytes of information.
What information does it store? If you believe the Edward Snowden disclosures, everything you do on the Internet and a log of every call you make or receive. Reactions to the sheer size, scope, and creepiness of the Utah Data Center have included protestors flying drones over it and Utah lawmakers proposing bills to cut off its water supply – all activities that are no doubt being logged and stored in the Utah Data Center.746222Does this worry you?
Personal information, such as addresses, social security numbers and private pictures, is put on the Internet so often that there’s a newly coined word for it: “doxing.” Often done as a way to take revenge, or as a simple prank (for the LOLz, as the kids say), doxing first became a serious issue in 2011 when the hacker group Anonymous put the identifying information of 7,000 law enforcement officers online, as a response to a crackdown on their activities.At other times, doxing has been used to identify Ku Klux Klan members, gun owners, prolific Twitter trolls, women in video game development and journalism, and even the formerly anonymous creator of bitcoins. Piss off the wrong person online, so the theory goes, and they’ll dox you.486137Does this worry you?
Remote Car Hacking
With “the Internet of things” becoming more and more of a reality, it’s not a nightmare scenario for hackers to be able to insert code into the brakes, engine, or locks of an Internet-enabled car and take control of it. According to former White House counter-terrorism head Richard Clarke, “There is reason to believe that intelligence agencies for major powers - including the United States - know how to remotely seize control of a car.”Whether this has ever actually happened is debatable – some conspiracy theorists believe journalist Michael Hastings was “taken out” in one such attack, though evidence doesn’t support it. But clearly there is at least a theoretical, if not an easily achieved, way to use the Internet to take control of a car and make it do things its rightful owner doesn't want it to do.546167Does this worry you?