Save for maybe cat videos, conspiracy theories are the bread and butter of the Internet. But what about conspiracy theories ABOUT the Internet? There are plenty of scary theories floating around conspiracy circles that have major implications for the ever increasingly digital lives we lead. These conspiracies about the Internet, hacking, and other forms of digital crimes will have you seriously considering ditching all your tech gadgets and moving to an isolated cabin in the woods, once and for all.
Whether it's a governmental takeover, massive censorship, Internet-enabled devices being taken over, or giant data storage systems meant to track everything you look at, there are plenty of conspiracies simply about the internet to keep you awake at night - and away from your smartphone. Edward Snowden to high level government officials around the world, plenty of people are worried about these Internet conspiracies, and soon you will be too!These conspiracy theories are all related to cyberspace, data storage, smart phones, and who actually controls the Internet. Be sure to read them on an old desktop that the NSA can't possibly hack into and upvote the scary Internet theories that have you most frantically clearing your browser history.
Anyone creepy enough and at least somewhat technologically minded could remotely turn on your laptop’s webcam, giving him or her the ability to record you doing whatever you’re doing. A Remote Administration Tool (RAT) can be introduced on a computer through a phishing email or malware, giving a hacker the ability to move items around on your desktop, close what you’re working on, or open your DVD drive.It also gives creeps the ability to watch women working at their computers through their webcams, which they won’t realize are on. RAT-ers conspire to find “slaves” they can hack into, determine which laptops don’t have lights to indicate their webcams are on, and generally say and do creepy stuff. Makes you want to turn your computer off and live in the woods.
A gigantic data storage center designed to track everything you do in cyberspace, located in the middle of nowhere with a creepy name and an officially classified mission? Sounds like the stuff of conspiracy theorist nightmares – but it’s a real place. Officially named the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, but better-known as the Utah Data Center, this million square foot complex cost over $2 billion to build, and can store as much as 12 billion gigabytes of information.What information does it store? If you believe the Edward Snowden disclosures, everything you do on the Internet and a log of every call you make or receive. Reactions to the sheer size, scope, and creepiness of the Utah Data Center have included protestors flying drones over it and Utah lawmakers proposing bills to cut off its water supply – all activities that are no doubt being logged and stored in the Utah Data Center.
Buried in the disclosures made by NSA whistleblower Edward Snowden was information about an experimental cyber defense system that could autonomously neutralize and retaliate against foreign cyber attacks against the US. Nicknamed MonsterMind, it’s supposedly the project that caused Snowden to make his initial disclosures, as he was disturbed by the idea of a self-regulating system that has no oversight and can fight back against anything that it deems a threat. Theoretically, it could be turned against ordinary citizens, or decide it doesn’t want to do what it’s supposed to do and rain nuclear missiles on all of us. Or something.Proponents of the idea believe that a “cyber missile defense system” is exactly what we should be investing in, stopping hack attacks before they happen, rather than playing catch-up and cleaning up the damage.
February 2015 brought a chilling revelation from Samsung – that their new, Internet-enabled televisions come with a voice activated system. But in order to get it to work, the TV has to hear whatever you say – and that the information can be recorded and downloaded to a third-party server. This innovation brought to mind the telescreens from 1984, where government officials could watch and listen to the proles, ensuring no thoughtcrimes were committed.Samsung insisted that they weren’t collecting or selling data, and that the TV had an icon that indicated the voice feature had been activated. But it seemed like yet another blow to privacy and information security. It also confirmed that Yakov Smirnoff joke about how “in Soviet Union, TV watches you!”