“A Billion Minutes Ago Jesus Was Alive” and Mega Data

The author of Lazarus Man, Chet Nagle, spoke to the Republican Women of Clifton on March 18, 2015 about “The cyber world and you, and how I learned to rob banks – with a computer.”

The cyber world is a daunting ether space inhabited by bytes, kilobytes, megabytes, terabytes, petabytes, exabytes, and zettabytes (ZB). Each measurement is larger than the previous one by increments of 1,000. It is so huge that one zettabyte can hold almost five quadrillion books of 200 pages each.

According to Nagle’s research, the Internet held 1.2 ZB in 2009, 2.8 ZB in 2012, and it is expected to grow to 40 ZB by 2020. Imagine 1.2 ZB as 75 billion fully loaded 16 GB iPads, stacked 339 miles into the sky.

Trending: The Facts about the Death of Justice Scalia are Quite Suspicious

Humans produce now in two days “more information than was created in all of history up until the year 2003.” Nagle said that “if you had bought the computing power found inside an iPhone 5s in 1991, it would have cost you $3.56 million. A TI-83 calculator’s computing power could have taken astronauts to the moon in 1969.”

take our poll - story continues below

Has Big Tech Gone Too Far Banning the President?(2)

  • Has Big Tech Gone Too Far Banning the President?  

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to Freedom Outpost updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

In the seventies, one computer occupied an entire building. Now, a major international bank needs just five servers, each the size of an ordinary box.

The data is stored in computers, laptops, iPads, tablets, cell phones, external flash drives, servers in schools, businesses, companies, government, and servers in the “cloud.”

The Mother Ship is the NSA Cloud in Utah where water and electricity are plentiful, enabling its global Cloud to exist. They save not just Meta data, they store EVERYTHING of EVERYBODY around the world, citizens and governments. “If it’s on the Internet and it can be picked up with antennas, it’s there,” said Nagle. Even Hillary’s emails are there, he added, “now try to get them out.”

In addition to personal and banking information, addresses, social security numbers, 70 million medical records are stolen, a veritable cash trove of blackmail. If a database can be hacked, the hacker can engage not just in identity theft but also in identity change.

According to wired.com, an entire town in Romania owes its bustling economy to online hackers. “Râmnicu Vâlcea is a town whose business is cybercrime, and business is booming.” The town of 120,000 is known to the cyber world as Hackerville.

The situation is so out of control that the U.S. Embassy and the U.S. Secret Service held a Cybercrime Seminar in Brasov on October 3, 2012, sponsored by American Express, EBay, Microsoft, Western Union, Trustwave, and MoneyGram International, the larger victims of cyber-criminal activity.

Cybernetics, the study of how humans and machines control and communicate information, has been around since 1948, and it is thought to derive from the Greek word “kybernētēs,” meaning pilot, governor (from kybernan to steer, govern).

The cyber world and its data are under attack from many fronts. There is hacking by those malcontents who want to get even with the perceived wrong-doers. There are criminal hackers who want your identity and want to profit financially from access to your information. There is the possibility of EMP attacks from an enemy force such as a country’s government or from natural disasters such as solar flares. Last but not least are cyberwars, nations being the biggest hackers. A case in point is China, which employs hundreds of thousands of young hackers. They placed malware in the New York Times servers as discovered in 2013. Russia used cyber-attack on Estonia in 2007 and “shut the country down, basically.” They used it in 2008 in Georgia. Ukraine and Russia are currently using cyber-attacks on each other on phones, military vehicles, radios, electronics, GPS systems, anything vulnerable, and anything is vulnerable today.

Malware is software with malicious content designed by young computer intellects. Kaspersky Labs see 325,000 new malware attacks daily. Stuxnet attacked the Iranian nuclear centrifuges, probably developed by U.S./Israel. Lizzard Stressor got into routers, using Wi-Fi to access data. Tyupkin in Eastern Europe inserted malware into ATMs. Dark Hotel inserted malware into business travelers’ cell phones, laptops, and tablets. Last but not least, Nagle mentioned Regin & Flame, U.S. cyber-attack programs.

The 228,700 cyber incidents recorded in 2013 more than doubled when compared with the 100,000 incidents recorded in 2009, said Chet Nagle. Today, Homeland Security reports half a million such incidents a day because the computing power has doubled every year and hackers have become more sophisticated.

The Internet is going to be controlled in this country via the innocuous-sounding net neutrality under the guise of “fairness.” It is already controlled in countries like Cuba, China, and North Korea and we know what that does to freedom of speech, thought, and the ability to write and publish.

Ted Cruz (R-Texas) called net neutrality “Obamcare for the Internet,” because the government will determine “internet pricing, terms of service, and the types of products and services that can be delivered, resulting in fewer choices, fewer opportunities, and higher prices for consumers.” John Boehner (R-Ohio) believes it will “destroy innovation and entrepreneurship.”

Don't forget to Like Freedom Outpost on Facebook and Twitter, and follow our friends at RepublicanLegion.com.

Become an insider!

Sign up for the free Freedom Outpost email newsletter, and we'll make sure to keep you in the loop.

Previous Federal Judge Threatens Sanctions Against DOJ for Perjury in Obama Amnesty Case
Next Mark Levin’s “I Accuse” Moment on Hannity Starts a New “National Discussion”

Join the conversation!

We have no tolerance for comments containing violence, racism, profanity, vulgarity, doxing, or discourteous behavior. If a comment is spam, instead of replying to it please click the ∨ icon to the right of the comment, and report it as spam. Thank you for partnering with us to maintain fruitful conversation. If you don't see a commenting section below, please disable your adblocker.

Sorry. No data so far.