These are just two examples.He points to examples such as Facebook and what he calls overarching identification, verification and access systems" that are being implemented, to warn about strict control mechanisms that are being developed and implemented right before our eyes, saying it needs to be spoken about before the Internet becomes paralyzed beyond repair.Cyber terrorism is not a new wor