Send Close Add comments: (status displays here)
Got it!  This site "creationpie.org" uses cookies. You consent to this by clicking on "Got it!" or by continuing to use this website.  Note: This appears on each machine/browser from which this site is accessed.
The Great Wall of China
by RS  admin@creationpie.org : 1024 x 640


1. The Great Wall of China

In ancient times, the Great Wall of China was built as a series of forts and walls to protect the northern borders of China from outside invaders. The Great Wall of China was known as the "Ramparts of Magog" in ancient times. The purpose of the wall was to protect China from Magog. Magog is part of the Ezekiel 38 and 39 prophecies.

The wall of China did not work very well on numerous occasions. How did the attack by Genghis Khan (Emperor of the Mongol Empire and China) on Great Wall of China succeed? For reference, this happened about 1200 A.D.

Today, in the security field, there is something known as the "Great Firewall of China" in reference to information security protection on incoming and outgoing data packets.

2. Visibility
Can you see the Great Wall of China from outer space?

3. Visibility
NASA says, "The Great Wall can barely be seen from the Shuttle, so it would not be possible to see it from the Moon with the naked eye." (as of 2007).

The wall can be seen from space if you have a really good camera with magnification, but not by the naked eye.

4. Wall security
How well did the Great Wall of China work as protection from outside invaders?

Note that the Great Wall of China has been improved over the years, but the essential idea was in place in ancient times.

5. Walls
A wall can be built for many purposes. Here are a few. In some cases, both of these are intended. Here are some ways to defeat a wall.

6. Maginot Line
After World War I, the French spent a huge amount of money building a large system of walls and forts called the Maginot Line to protect France from attack from Germany, especially using tanks.

In 1940, the Germans went around the wall by going through the Ardennes Forest, an area thought not passable to tanks (German Panzers). The French were defeated in about 6 weeks.

7. Genghis Kahn
The wall of China did not work very well on numerous occasions. How did the attack by Genghis Khan (Emperor of the Mongol Empire and China) on Great Wall of China succeed? For reference, this happened about 1200 A.D. There is some controversy here (as is usual) but, essentially, Genghis Khan eliminated threats from side areas and then recruited soldiers and guards to his side (bribes, etc.) as he collected inside information to help make a successful attack.

8. Inside attacks
It is well known and estimated in the security field that a large percentage of successful attacks are inside attacks and not attacks from the outside. This threat is often called the "insider threat".

9. Insider threat
One problem that arises is when the group in control, without any check on their power, labels the other side as an "insider threat".

10. Email phish
It can be hard to attack a computer network from the outside, due to firewalls, etc.

An email "phish" is an email that is sent to someone (e.g., employee) on the inside so that if they click on a link, that computer might be taken over and that computer can now access the network from inside which is easier than accessing the network from the outside.

11. Wall access
To get through the Great Wall of China, the guards were bribed (an inside attack).

However in 1215, Genghis Kahn breached the wall very easily, using the irresistible weapon of bribery. In fact, the wall would succumb to bribery on three major occasions when it was breached by Huns, Mongols and Manchus. http://www.netanyahu.org/woefwitofwal.html (as of 1976)

12. James Burke
James Burke, a historical scientist, in his "Connections" and "Day the Universe Changed" series of books and videos, makes the same claim about bribing the guards.

13. Firewalls
Today, in the security field, there is something known as the "Great Firewall of China" in reference to information security protection on incoming and outgoing data packets.

14. Google and China
China might like to control the Internet, but will often settle for getting access records from Google, etc. (noted in 2007). Google's original motto of "Don't be evil" is often questioned.

15. End of page

by RS  admin@creationpie.org : 1024 x 640