Skip to main content

The American Rage Machine


Atlanta, GA - It used to be when someone got mad about something they heard in the news, they would blurt out their throughly uninformed opinions at the screen, or maybe anyone else who was around and would listen.

We don’t know what is going on. Even in depth reading of the news normally takes a long time to give us a comprehensive understanding the facts of a situation,  and even longer for us to have an informed opinion on it. But of course, waiting till you actually know what on earth is going on before you spout out about it has fallen out of practice with the advent of the greatest misinformer in history since the disappearance of the oracle of Delphi-the internet. And more specifically, the American Rage Machine…Twitter.
Who knew that a venue which only allows 140 characters could lead to misinformation? Twitter is so full of hate, that even the president of the United States has been publicly advised to “get cancer” on there.
That guy that used to be in front of the screen screaming his head off is now on Twitter, with all of that uninformed rage, screaming all sorts of things. Of course, it’s not just Twitter, the entire internet, while an amazing tool, is full of this stuff. But Twitter above all, with its small amount of space, which in itself basically precludes sound, reason arguments, seems to be the place where all of the angry, enraged people whose favorite character died on a show last week or their favorite congressman just did something they didn’t like go to scream at the top of their lungs.
People are told to die on Twitter, and so many curse words are used in arguments I can’t even show screen grabs here. Comedian Bill Maher was told to “die in a fire,” Miss America has been called a member of ISIS, and an Arab, (she's from India) Jonah Hill was told to kill himself, “you unfunny fat piece of trash…die, die, die” Seriously people? What pills must people take to get so angry?

Maybe they think it makes them big and strong to scream out obscenities out powerful people behind an often fake name. Like someone who wears a mask and runs around town lighting fires. I doubt most of these people would ever say the things they say on the internet to someone in person. I guess that's a good thing.

Nobody is going to be connived by these arguments. You probably already knew that. People don't change their opinion because someone uses a racial slur against them or scream, (it happens all the time) "you disgusting idiot, Liberal, go kill yourself!"
Of course, not everyone on Twitter is bad, and there are certainly some who do their level best to be reasoned and informed, but when you don’t even have to use your own name, and when your screaming rant carries just as much weight as anybody else’s screaming rant, well, it becomes all too easy to lose your mind.
People often say that American’s should get a government that is as good as them. If that were true, the government of the average American Twitter user would not look like our often boring but highly dignified senate, it would look like this:

Political argument is important, and so is free speech. But you shouldn’t use it to scream stupid on a crowded internet. And Twitter isn’t, by definition, a place where serious political argument should be done at all, unless you’re willing to send about a thousand tweets in a row.
The Rage Machine is huge, and it crucifies people constantly with a steady stream of misinformation and confusion. Last year, comedian Steven Colbert almost lost his show when the hash tag #cancelColbert began trending because of a false rumor about him that started on Twitter.  Baseball used to be our National Pastime. I think now our National Pastime is rage. We should just stop. After all, tweeting is for the birds.

Andrew C. Abbott

Comments

Popular Posts

Create Your Own Social Networking Site

Create Your Own Social Networking Site JCOW: Ethical Hacking Top 10 reasons to choose Jcow:- 1. Handle more traffic - Clean codes and Dynamic caching can lower the CPU load and  speed up your website. 2 Make your site more interactive - Well designed Jcow applications help you members to connect and communicate with others more effectively. 3 Add questions to the Registration Form - You can add new member fields, which will be displayed to the registration form, profile form, and the member browsing form. 4 Easily share stuff - Within the AJAX sharing Box, your members can publish status,  photos, videos, and blogs. 5 Customize and Extend your Jcow Network - A Jcow network consists of core apps(like "Friends" and "Messages") and optional apps(like "Blogs" and ""Videos"). You can enable/disable optional apps. You can also develop your own apps. 6 Every profile could be Unique - Members can customize their own profile theme and  add music play...

HL7V2.x to HL7V3.0 Translation Issues Details-2

In continuation of my previous post this post lists the other issues associated with HL7 v2.x to HL7v3 translation Conformance Patterns: The other major issue with the transformation of messages is the behavior of application when a particular information exchange takes place. In HL7V3.0 apart from the trigger events and interactions there exists the notion of application role as senders and receivers. The application role is characterized as the entire set of interactions for which the sender and receiver are responsible for transmitting. HL7V3.0 clearly defines the possible interactions and the application behavior associated these interactions in the form of responses for which the sender and receiver needs to adhere to. The differences in messages between V2.x and V3.0 and absence of clear guidance on V2.x regarding application behavior on receipt of message makes the transformation exercise more difficult. Vocabulary: It is a well known fact that 80% of HL7 V2.x message failu...

Hack WiFi Account From Phishing Attack With WifiPhisher

WiFi Phishing Attack With WifiPhisher Tool  Wifiphisher   is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases. From the victim's perspective, the attack makes use in three phases: 1. Victim is being deauthenticated from her access point. Wifiphisher continuously jams all of the target access point's wifi devices within range by sending deauth packets to the client from the access point, to the access point from the client, and to the broadcast address as well. 2. Victim joins a rogue access point. Wifiphisher sniffs the area and copies the target access point's settings. It then creates a rogue wireless access point that is modeled on the target. It also sets up ...