If our fragile infrastructure disappeared, there’s still a way to access Wiki and Youtube How-To Videos with the Internet-in-a-Box (IIAB).
Given a few million dollars, a wide range of black-ops specialists, and some coordination in targeted, concentrated attacks, the world as we know it could suffer partial to complete blackouts of power, communications, and most importantly, the Internet.
It Took Less Than 20 Minutes – Metcalf Snipers
On April 16, 2013, in a 19-minute window, 100+ anonymous bullets caused more than $15,000,000 dollars worth of equipment damage to Pacific Gas and Electric Company’s Metcalf transmission substation in Coyote, California, near the border of San Jose. In light of the precision and complete lack of fingerprints on the bullet casings, authorities hypothesized the attack was a professional, insider job.
One flashlight streak signified the beginning of the bulleted sabotage at 1:31 am, followed by the pops and pings from 100+ bullets (formerly .30 Russian Short rounds), and one more streak signaled the end of the attack at 1:50 am.
Seventeen transformers were seriously damaged. Energy grid officials were forced to reroute power from nearby power plants in Silicon Valley. In the investigation, both PG&E and AT&T offered quarter-million-dollar rewards for information leading to the capture and prosecution of the gunmen. Roughly a year later, PG&E budgeted $100,000,000 over three years to upgrade security substations throughout all territories. Regrettably, a year before the attack, in 2012, the National Research Council of the National Academies of Sciences, Engineering, and Medicine published a declassified report prepared in 2007 for the United States Department of Homeland Security that highlighted the vulnerability of the national electric grid from damage to high voltage transformers.
Congressional Research Service , Physical Security of the U.S. Power Grid: High-Voltage Transformer Substations
The IIAB (Internet-in-a-Box)
In the event major portions of the Internet collapse, the Internet-in-a-Box replaces the internet if you have no internet. The device includes software that creates a Wi-Fi hotspot that offers closed platform access.
Rest assured, a single attack on one installation or location would not entail the complete destruction of everything in cyberspace (The Internet).
“The Internet is a vast maze. It is incredibly hard to quantify and sometimes almost impossible to truly navigate. A complex array of machinery, coding, and processing power is needed to run even a single computer, much less the behemoth that is the Internet. Information on the Internet is exchanged through packets of data sent by computers to each other. A file or request for information is divided up into these packets to make the load manageable for the computer to process and the Internet connection it travels over. But when accounting for billions and billions of files, the question arises: where does all this information get stored?
Remember that the Internet is not a singular thing. It is a complex web of interconnected machines spanning the globe. Because of this, data is stored in the hard drives of numerous web servers all over the world. A web server is a computer like any other. In fact, any computer can be converted to a server, hosting and storing data after the conversion. In order to access data not stored on a personal computer, web browsers are needed.”Khursheed Alam Ansari
How Does The Internet Work?
“If you want to stream a YouTube video, you type in YouTube’s web address. This address is processed by your computer and sent, through a rather complex process, out through an Internet router into the “Internet”. Essentially, after the request leaves your router, it bounces from router to router on a path to YouTube’s server. It knows where to go based on a process that links the web address name to its server IP address and MAC address (its Internet and physical location). Once it reaches YouTube’s server, the request to access its website is processed and accepted, with the data necessary to display the page accessed by your computer. If you want to search for a video, this process is repeated. In fact, this process is used for pretty much everything used and accessed on the Internet.”Khursheed Alam Ansari
The Internet is a ubiquitous part of society. Complete destruction of all the knowledge in cyberspace would mean the destruction of both data and access. It would require complete and total erasure of everything uploaded to cyberspace and the dismantling of every computer’s hard drive in the world. Only then, if you have to look up how to fix something on Google, you can’t anymore because everything’s gone.
If you want to text your partner to grab milk on the way home, that’s now impossible.
If you want to charge your phone by paying for kilowattage, you are now S-O-L. Call the company to see what’s happening? The phone has to work first.
What Can You Do with the Internet-in-a-Box (IIAB)?
With the Internet-in-a-box you can set up your own replacement internet at home. Any computer on the network can connect to it to view videos, pull up maps, etc.
This computer has a web server and you have a proper wifi card that can act as a gateway so that now, other computers can now log onto your web server. Other prepared institutions like Wikipedia and Khan Academy, have created their own webservers, complete with their uploads of millions of how-to pages on everything humanity has collected up to the 21st century (pretty handy if you’re a 3rd generation bunker baby).
Now, you can load Wikipedia, Khan Academy, Youtube How-To Videos, Openstreet Maps, WordPress, Moodle, and MDwiki (humanity’s collection of medical data for diagnosing and treating medical conditions).
With a $40 Raspberry Pi, a computer, or NUC, even in the event of a nuclear apocalypse, as long as there are a bunch of computers and humans around, we’re still online (somewhat).
Having been tested in Africa and the Dominican Republic, with the Afripedia Project, along with the Kiwix project that made Wikipedia available on the IIAB, we come away with at least four main takeaway points on the Internet-in-a-Box:
- The crucial interconnectivity of the internet and power in the progression of human civilization is eye-openingly obvious: from the invention of the Internet for CERN scientists to transmit data, to the core wheels that circumvent every financial system in the world.
- Most people, companies, and institutions critical to human survival are not ready for infrastructure collapse. #Metcalf
- In the case of infrastructural collapse, the Internet-in-a-Box maintains compartmentalized security of our useful know-how and factual data.
- In the fortunate case, the world doesn’t go to shit, you’re using your IIAB for all of your homesteading, off-the-grid research inquiries, like how to derust your bunker door and looking for any post-WWIII updates from any surviving neighbors.
The Steps in a Nutshell
- Turn on your Raspberry Pi, computer, or NUC.
- Download Internet-in-a-Box (IIAB) software from download.iiab.io (before the Internet collapses).
- Install the software.
- Add content.
- Customize your Internet-in-a-Box home page.
- You’re Live!
Anyone Can Purchase IIAB Units Directly from: https://internet-in-a-box.org
If you have issues acquiring IIAB hardware, contact [email protected] to let us know if you’d like any help in setting up your Internet-in-a-Box!
How to Install Your Internet-in-a-Box by iiab.net
How to Set Up Your Internet-in-a-Box by Github
- Expert Mode
- Install the Software
- Configure the Server
- Add Content
- Remove Content
- Add Content Manually
HOW TO PUT THE INTERNET IN A BOX
It works without internet — like a community fountain, but for the mind — wirelessly serving anyone nearby with a smartphone, tablet or laptop.