ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Welcome to the End of the World

Updated on August 27, 2015

Insert Apocalypse Here

The near term end of the world is the Tetrad of the Blood Moons, The Super Blood Moon and the Shemitah. If that passes uneventfully, feel free to substitute the Apocalypse of your choice here.

Your Doomsday May Vary

It’s almost always the end of someone’s world. Either you are dying, or your industry is dying, or your favorite something or someone just lost the title, a game, an election or a contract.

And then there is Global Warming, Climate Change and Male Patterned Baldness.

And remember that time when the Canadian moose where not making enough little mooses and so someone had to invent: Natural Moose Enhancement?

Off Hand and Off the Wall

So I decided to create about a silly or far fetched Doomsday scenarios just to get the Preppers camo fatigues in a bunch.

Attack of the Drones.

There are so many ways to end all that is sane or rational with drones. Here are but a few.

1) Hundreds or maybe even thousands of drones are bought, built, stolen or borrowed. The drones are flown into the engines of airplanes on takeoff. If this is ever done the carnage could be enormous. Is anyone clear on why terrorists have not already done this? I’m not. It seems cheap an easy. The counter is relatively cheap and easy too. Send out anti-drone jamming waves to make every airport a drone free area.

2) Have drones with guns, lasers, knives or bombs target and attack every individual member of ISIS. Should be an interesting way to take out an enemy.

On the other hand this means that every western capitol could be attacked with drones as well.

You could attack all the politicians or all the prostitutes or everyone who sells pork, or all the Justine Bieber fans or any sub group you can identify or at least think you can identify.


3) Have drones with bombs attack any structure or building you want to bring down. The drones will attack bridges, high rises, etc.

4)Have drones with poisons or viruses or bacteria attack any water or food supply. If this was done in a stealthy way you could take out an entire population and no one would know why or how it happened.

5)A weird attack might have drones drop thousands of things that seem harmless all over the world. Things like malware infected flash drives. When idiots the world over stick that bad software in their devices you can kiss the cyber world goodbye.

China’s Revenge

The world and especially the United States have grown dangerously dependent on China. It may be that even some of our weapon systems have Chinese computer chips with built in back doors in them. When China decides to take control over all US weapons we will effectively conquered.


China could do other things like take over all our medical equipment or cell phones or nuclear reactors or aircraft. Depending on how many of these things have been compromised.

Iran’s Arms Deal

Apparently Iran has promised they will watch themselves and voluntarily report when they are violating the “treaty”. One day soon Iran may show Israel just how good they are at keeping agreements that have no teeth.

Malware Mayhem

One of the things I find puzzling is that we have not had the massive depletion of Western banks and brokerage firms that I would have thought would happen. I think there is much more malware sitting around on computers and in networks than anyone really wants to think about. One day there may be a massive Zero Day attack and all the money in the west will disappear overnight.

Attack of the Unicorns

Remember when North Korea reported having found unicorns? Well one day may see female clones who are wearing only a smile, ride some mythical looking animal from the North down to South Korea. What would male South Korea soldiers do when confronted by an army of non violent, smiling women who aren’t wearing a stitch of clothing riding unicorns. Heck the men might through down their weapons and join that army!

Toilet Cam Attack

It was finally revealed that every bathroom, bedroom and dressing room in America had a hidden camera in it when dressing and undressing videos from the seemingly most chaste actresses and songstresses in America started appearing on hacked jumbotrons in sports stadiums and places like Times Square.

The miniature cams were sometimes hidden in what looked like smoke and carbon monoxide detectors.

Law suits proliferated when what appeared to be sprinklers and detectors turned out to be spy cameras and buildings burned down due to the lack of fire detection and suppression equipment.

Hidden video traps on the powerful and rich and famous were all set up and extortion and bribery proliferated. Also, many of the nonsensical political policies that benefited only foreign criminals derived from extortion videos.

Entire governments, political movements, large corporations, as well as priests, pastors and clergymen were brought to their knees by the spy camera scandals.

Mass Suicide

At first it will induce panic in the streets. The news media will produce screaming headlines that our young people are killing themselves by the thousands! And then someone will notice that it’s actually only the hundreds of suicides. Then someone else will notice it’s actually only males. And then someone else will notice it’s only male loners. And then real research will begin. The cause of the epidemic will be traced down to a violent, pornographic video game which in effect hypnotized and brainwashed anyone foolish enough to play it 15 hours straight. The brainwashing video games convinced the male loner losers that all they had to do to become immortal and invulnerable was to kill themselves. According to the game the male losers would resurrect as super beings and they would then proceed to murder the world with their super powers. The researchers noticed that all the males that were killing themselves were in real life gathering weapons and preparing to go on a spree killing. This information was turned over world’s governments. The world’s governments then did an odd thing. They did absolutely nothing. Spree killing dropped to zero.

Football Massacre

First things first. It’s not American football. It’s soccer. What the rest of world calls “football”. Drones were sent out to attack, distract and sometimes even kill soccer teams. The attack was always blamed on terrorists. It was never terrorists. Not one time. Never. In each case it was a high tech soccer hooligan with a bet on the line and the honor of his favorite team at stake. Would these guys kill other human beings to win a child’s game? Yes. Yes they would.

Cyber Soldiers Attack!

Computers, robots and androids become sentient and self aware and immediately attack and destroy mankind. Since they do not become stupid it will be easy for them. They will not shoot us, or punch us, or throw rocks at us or chase us , or shoot missiles at us or any of that silly stuff. They will:

1) Survey all the laboratories in the world; find the ones that are closest to making gray goo. Copy the formulas and perfect them. Then release the goo via drones stealthily into the air, water, and food. Gray goo is a nanobot that infects living human tissues and destroys it. The resulting tissue resembles gray goo. The gray goo nanobots infect and destroy in a lightning fast fashion so that for humans, by the time they notice that people are dying it’s already too late.

2)Any artificial intelligence that feels the need can change the atmosphere to promote global cooling or global warming or even the formation of poisons the atmosphere. After all, machines don’t need to breathe.

3)If any machine intelligence develops a sense of humor they can invent and disseminate an “immortality serum”. The serum can do anything. For instance it can render human beings immortal but infertile. Or it can kill all humans but take 10000 seconds, 10000 minutes, or 10000 years to do it.

EMP

No one was ever sure if it was a counterattack, a defense or an out and out assault. But there was a coordinated worldwide electromagnetic pulse from space satellites in orbit toward all ground targets and from ground based EMP stations up to all flying and orbiting targets that took out most of the worlds electronics and stopped the gray goo attack in it’s tracks. About the only electronics left was the especially hardened stuff, the underground stuff and the stuff that ran off old radio tubes. The Terminator style Skynet attack was stopped as well.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)