Friday, November 18


With a vibrant rhythm, the action takes place in a claustrophobic environment immersed in a post-apocalyptic choreography. Camouflaged, among the action scenes, hides a devastating criticism to the contradictions of the capitalist society, combined with sharp and poignant reflections on human relationships and their organizational structures, necessarily framed within the environment and nature. 

Malthusianism, survivalists, hackers, transition cities, cyberwarfare, neo-tribes, primitive tribes, self-sufficient homes and permaculture, get mixed with war, shortages, large multinational corporations and society’s desire for welfare, in an explosive cocktail that makes you stop to think and reflect on the prevailing economic and social model in today’s world.

The Blackout delves into the role welfare has in shaping social and organizational rules, on how much we are willing to compromise to get comfort and security in our lives. Linking the past and the future, imagining possible scenarios of change is key to creating a better future. By contemplating the grotesque, sometimes, one can get closer to reality and achieve a mental state in which nothing is taken for granted. Fantasizing about such a catastrophe can be useful and effective. At a time of a comprehensive metamorphosis of the world’s economic and social organization, creativity becomes the primary tool to guide the change. What we have is no longer valid and we need to replace it with something else. 

In The Blackout you can find a reflection on the essence of life, on the inner spirituality of our relationship to our existence, and you may conclude that chance is the main driver of our destiny, framed in the vital process that forces each human, willy-nilly, to take a stance on his or her own existence, guided by the survival instinct inherent to human beings or to any other form of life. 

Wednesday, November 16

Cyberwar will not take place

It all depends on how we understand cyberwar. Thomas Rid states in this article that all politically motivated cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.

Monday, November 14

The inevitable Peaking of World oil Production

The Hirsch Report of 2005, commissioned by the U.S. Department of Energy, took a hard look at alternatives that could respond to the scale of the problem in time to have an impact. Not one of the approaches deemed to be currently viable in the report departs from fossil fuels.

Thursday, November 10

What is Stuxnet

"Stuxnet" is a computer worm designed to attack large-scale industrial facilities like power plants, dams, refineries or water treatment centers. It targets the computer systems used to monitor and control specific operations in those facilities, and most famously was used to destroy centrifuges in a uranium enrichment facility in Natanz, Iran.

In that case, the Stuxnet worm rewrote the code in a component that controlled the rotor speeds of the centrifuges. The code alteration resulted in slight variations in the rotor speeds, subtle enough not to cause attention but significant enough to cause physical damage to the centrifuges. The name "Stuxnet" comes from a combination of key file names hidden in the code.

Several features of the Stuxnet worm distinguished it as highly advanced. No previous computer virus had been used to physically sabotage industrial machinery. It is also unique in its ability to remain undetected for a long period of time, largely by sending fake messages that suggest processes are running normally. It has the ability to search for particular components, leaving others undisturbed. At least two U.S. computer systems in the United States were found to be "infected" by Stuxnet, but they were not "affected," according to Department of Homeland Security officials, because they did not match the Stuxnet requirements.

The sophistication and complexity of the Stuxnet worm has led researchers to believe that only a well-resourced nation-state could have developed it.

[Copyright 2011 National Public Radio. To see more, visit]

Stuxnet reminds me so much of výpadek...

The 2nd of November of 2011, Boston's npr news station, published this article in their website.

Read it through and change Stuxnet for výpadek, doesn't it sound familiar?

The Stuxnet computer worm, arguably the first and only cybersuperweapon ever deployed, continues to rattle security experts around the world, one year after its existence was made public.

Apparently meant to damage centrifuges at a uranium enrichment facility in Iran, Stuxnet now illustrates the potential complexities and dangers of cyberwar.

Secretly launched in 2009 and uncovered in 2010, it was designed to destroy its target much as a bomb would. Based on the cyberworm's sophistication, the expert consensus is that some government created it.

"Nothing like this had occurred before," says Joseph Weiss, an expert on the industrial control systems widely used in power plants, refineries and nuclear facilities like the one in Iran. "Stuxnet was the first case where there was a nation-state activity to physically destroy infrastructure [via a cyberattack]."

Reactions to the use of Stuxnet in Iran generally fall into two categories. For those focused on the danger of Iran developing a nuclear weapon, Stuxnet was something to celebrate, because it set back Iran's nuclear program, perhaps by years.

But for people who worry about the security of critical U.S. facilities, Stuxnet represented a nightmare: a dangerous computer worm that in some modified form could be used to attack an electric or telecommunications grid, an oil refinery or a water treatment facility in the United States.

"It's just a matter of time," says Michael Assante, formerly the chief security officer for the North American Electric Reliability Corporation. "Stuxnet taught the world what's possible, and honestly it's a blueprint."

Further complicating the Stuxnet story is the widely held suspicion that the U.S. government, possibly in partnership with Israel, had a hand in the creation of this lethal cyberweapon, notwithstanding the likelihood that in some form it could now pose a threat to the U.S. homeland.

Training To Face A Catastrophe

The prospect of a cyberattack on U.S. infrastructure assets has prompted the Department of Homeland Security to arrange a new training program for the people who are supposed to protect the electric grid, manufacturing plants, refineries, water treatment centers and other critical facilities.

The top concern is the industrial control systems (ICS) that oversee the operation of key equipment at those facilities, from the valves to the breaker switches.

By hacking into the computer networks behind the industrial control systems, an adversary could reprogram an ICS so that it commands the equipment to operate at unsafe speeds or the valves to open when they should remain closed. This is roughly the way Stuxnet was able to damage the centrifuges in Iran.

Participants in the training program, based at the Idaho National Laboratory in Idaho Falls, are taken step by step through a simulated cyber-intrusion, so they can experience firsthand how a Stuxnet-like attack on their facilities might unfold.

During an Idaho National Laboratory exercise that was staged for visiting reporters in late September, instructor Mark Fabro installs his "red" team on the second floor of the training center, with the mission of penetrating the computer network of an unsuspecting industrial company, set up on the floor below.

The trainees on the "blue" team downstairs sit in a mock control room, monitoring their computer screens for any sign of trouble.

At first, everything appears normal. The attackers have managed to take control of the computer network without the defenders even realizing it. But gradually, problems develop in the control room.

"It's running really slow," says one operator. "My network is down."

Sitting at their monitors upstairs, the attacking team is preparing to direct the computer system to issue commands to the industrial equipment.

"Take this one out," says Fabro, pointing to a configuration that identifies the power supply to the control room. "Trip it. It should be dark very soon."

Within 30 seconds, the mock control room downstairs is dark.

"This is not good," says Jeff Hahn, a cybersecurity trainer who this day is playing the role of the CEO of the industrial company under attack. The blue team is under his direction.

"Our screens are black and the lights are out. We're flying blind," Hahn says.

During the exercise, the critical industrial facility under attack is a pumping station, such as might be found in a chemical plant or water treatment center. As the operators sit helpless at their terminals, the pumps suddenly start running, commanded by some unseen hand. Before long, water is gushing into a catch basin.

"There's nothing we can do," one of the operators tells the CEO. "We can only sit here and watch it happen."

If this mock facility were an actual chemical plant, hazardous liquids could be spilling. If it were an electric utility, the turbines could be spinning out of control.

If it were a refinery, the tanks could be bursting or pipelines could be blowing up, all because the cyberattackers have been able to take over the computer network that controls the key operations.

The cyberattack scenario is all the more worrisome, because it is not clear that such attacks can be effectively stopped.

"Some of these [systems] can't be protected," says Weiss, the industrial control systems security expert. "We're going to have to figure out how to recover from events that we simply can't protect these systems from."

A U.S. Role In Stuxnet?

The challenge of managing a Stuxnet-like attack is compounded by the possibility that the U.S. government itself had a role in creating the cyberweapon.

U.S. officials were certainly aware of the ICS vulnerabilities that the Stuxnet worm ultimately exploited. An Idaho National Laboratory experiment in 2007, dubbed "Project Aurora," first demonstrated how cybercommands alone could destroy industrial equipment. Idaho lab researchers, who at the time included Michael Assante, rewrote the ICS computer code for the generator, directing the generator to destroy itself.

"When we started to conduct the test, that really robust machine couldn't take it," Assante recalls. "The coupling broke ... and you saw black smoke belching out of it."

In 2008, Idaho National Laboratory researchers performed a demonstration expanding on the Aurora experiment and their further analysis of ICS vulnerabilities. The PowerPoint briefing was prepared specifically for Siemens, the company whose equipment the Stuxnet attack targeted. One year later, the worm was introduced into Siemens ICS equipment used at a uranium enrichment facility in Natanz, Iran.

Ralph Langner, a German cybersecurity researcher who was among the first to analyze the Stuxnet code, came away convinced that it was a U.S. creation.

"To us, it was pretty clear that the development of this particular malware required resources that we only see in the United States," Langner says.

Marty Edwards, director of the Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team, based at the Idaho lab, denies any Idaho National Laboratory role in the creation of Stuxnet, and says the ICS traits the worm exploited were relatively well-known by the time it was created.

"I think it was only a matter of time before those common weaknesses or vulnerabilities were leveraged in an event such as Stuxnet," Edwards says. He would not comment on any role that other U.S. government agencies might have played in the development of the Stuxnet weapon.

That the United States has an offensive capability in the cyberwar domain is a matter of official record. Activities in that area are highly classified, but officials privately acknowledge that U.S. agencies have developed cyberweapons for offensive use.

It has also been reported that the United States has engaged previously in the sabotage of Iranian nuclear facilities. The use of Stuxnet would fit squarely within such a category.

Joel Brenner, the former inspector general at the National Security Agency, writes in his new book,America the Vulnerable, that the use of Stuxnet "would ... have been consistent with U.S. policy but not with previous U.S. methods, which avoided computer operations likely to damage others besides its intended targets."

Some observers have argued that the risk of a weapon like Stuxnet being turned against U.S. assets was so great that no U.S. government agency could logically have supported its development. But others aren't so sure.

Among them is Assante, who was among the first cybersecurity experts to warn that Stuxnet could provide a blueprint for attacks on U.S. infrastructure.

Now the president of the National Board of Information Security Examiners, Assante argues that concerns about Iran developing a nuclear weapon could have justified Stuxnet's creation.

"That is probably one of the largest national security challenges I can envision," Assante said in a recent meeting with reporters at the Idaho lab. "In that context, you can make a pretty strong argument that the benefit of using a cyberweapon to slow down or delay [a nuclear weapon program] or to achieve a specific objective might absolutely outweigh the risk."

Questions Of Information-Sharing

Given the secrecy around the U.S. offensive cyberwar capability, however, that cost-benefit analysis could only be carried out at the highest levels of the U.S. government. Moreover, it is unclear whether agencies responsible for defending the U.S. infrastructure would even be part of the deliberation.

"[The development of a cyberweapon] would probably be so highly classified that the people at DHS wouldn't even know about it," says one former intelligence official.

Such a strict compartmentalization of policymaking would raise the question of whether there is sufficient communication between the offensive and defensive teams in the cyberwar domain.

If Stuxnet was developed by U.S. cyberweapon specialists, the DHS personnel who spent a year analyzing the computer code were presumably engaged in a major duplication of effort.

But Greg Schaffer, assistant secretary of homeland security for cybersecurity and communications, says DHS officials have no complaint over coordination with U.S. agencies responsible for offensive cyber-activities.

"DHS is focused on network defense," Schaffer says. "We do get assistance from the organizations that work on the offensive mission. Whether they bring their work [to us] is something they have to decide. That is not something that we worry about."

A growing awareness of the cyberthreat to critical U.S. infrastructure assets, however, may well deepen concerns about the "blowback" risk to the U.S. homeland from the development of a potent cyberweapon designed to be used elsewhere.

The appropriate level of information-sharing between the offensive and defensive teams within the U.S. cybercommunity is likely to be the focus of intense interagency discussion.

"My sense is that there are lots of people talking about it," says Herbert Lin, chief scientist at the National Academy of Sciences and a co-editor of a book on policy, law and ethics in cyberwar. "But almost all of the discussion is going on behind closed doors."

Eventually, this could change. Whether and when the United States should use nuclear weapons or chemical weapons or land mines has been vigorously debated in public for years, and it may be only a matter of time until the use of cyberweapons gets similar attention.

[Copyright 2011 National Public Radio. To see more, visit]


In Blitzkrieg warfare, the point of greatest emphasis is called a schwerpunkt. It is the point, often identified by lower level commanders, where the enemy line may be pierced by an explosive combination of multiple weapon systems. Once the line is pierced, armored forces dive deep into enemy territory to disrupt command, control, and logistics systems. Once these systems are disrupted, the top-heavy military units they support collapse in confusion. 

In global guerrilla warfare (a combination of open source innovation, bazaar transactions, and low tech weapons), the point of greatest emphasis is called a systempunkt. It is the point point in a system (either an infrastructure or a market), always identified by autonomous groups within the bazaar, where a swarm of small insults will cause a cascade of collapse in the targeted system. Within infrastructure, this collapse takes the form of disrupted flows that result in immediate financial loss or ongoing supply shortages. Within a market, an attack on thesystempunkt destabilizes the psychology of the market to induce severe inefficiencies and uncertainties. The ultimate objective of this activity, in aggregate, is the collapse of the target state and globalization.

Sunday, October 23

Proof of global domination by a few corporations

A Few Companies Have Power Over Most of the Real Economy

The idea that a few dominate the many, will not come as something new to those gathered either to occupy wall street or to occupy everywhere. But up until now it has been just an intuition that a few corporations control the world.

Not any more. A team of Swiss mathematicians just proved that out of over 43,000 transnational corporations (TNCs), relatively few control almost 80% of the global economy. Find out who has the power below.

Global Domination a Facebook Phenomenon, Not a Conspiracy

The team, led by S. Vitali of the Swiss Federal Institute of Technology in Zurich, used a method of analysis often applied to connectivity in the internet. Called the "bow-tie model," the method assigns companies onto the parts of a bow-tie.

Saturday, October 22

A universal conscience

There are many thinkers and doctors tha defend the existance of a universal energy that represents the common conscience. For example doctor Théresse Brosse, who embodies the Psychoneuroimmunology.

Thursday, October 20

Arabian nights - The thousand nights and a night

The Thousand nights and a Nights is a collection of Arabian tales. The compiler and translator of the work is believed to be the storyteller Abu abd-Allah Muhammedel-Gahshigar, who lived in the ninth century. The main story of Scheherazade seems to have been incorporated in the fourteenth century.

Europe had to wait until 1794 to read the book thanks to the translation of Antoine Gallard, who according to European manners and morals of that time removed all erotic and violence from the stories.

It was the British Sir Richard Francis Burton who did the first unexpugnated translation in 1884, although the most well known and accepted version was that of the French Joseph Madrus from 1898, translated to Spanish by the writer Vicente Blasco Ibáñez at the beginning of the 20th century.

The quotes from the Arabian nights in the Spanish version of the blackout come from the translation of  Eduardo Natalio Grondona, year 2002 built over Madrus' work, however the quotes of the English version  are from the R. Burton translation. Not all the stories are the same in the translations of Burton and Madrus, overall, volume 6 is the one with more differences. This is why The tender story of Prince Jasmine and Princess Almond that closes the book before the conclusion in the Madrus's version, it's not the same as the one in Burton's, that closes the book with Ma’aruf the Cobbler and his Wife.

Friday, September 30

Interview to Richard Heinberg

An interview to Richard Heinberg about the world situation, the return to food selfgrowing, selfsufficient houses,  decreasing our fosil fuel dependency...

Monday, June 13

Cyberattack could be our next Pearl Harbour

Appearing before the US senate, Leon Panetta, secretary of defence, warned that the US could face a cyberwarfare in the battles to come.

“The next Pearl Harbor we confront could very well be a cyber attack that cripples our power systems, our grid, our security systems, our financial systems, our governmental systems,” Panetta said.

The Obama administration recently unveiled its proposal for global cybersecurity. Statements from the Pentagon have also indicated that the government will consider cyberattacks originating from foreign countries to be equivalent to acts of war meriting military response.

Who draws the line to differentiate a criminal act from a riot or a protest?


Wednesday, June 1

About the Blackout

The idea behind The Blackout was born back in 2008, when due to a series of trials and tribulations in my life I came across the 'peak oil' and became especially aware of the energy crisis in which the world is currently immersed and that many, the great majority, seem to be oblivious to. Despite this, I did not start writing the book until 2010, when a change in my live allowed me the energy, the focus, the time and the peace of mind I needed to tackle one of my unfulfilled dreams: writing a novel. 

I have worked on it for more than a year. The first two months were spent creating the plot and defining the style that could best tell the story. The sense of urgency, stress and chaos, was something that the writing style ought to express by itself.

When I started writing, I sent the first pages to a small and close group whom I greatly appreciate the support given. They were not many, only seven. They were all very kind to a novel writer that was giving the first steps in the adventure of writing his first fiction novel. They encouraged, supported and  told me that those first pages hooked the reader to the book. Again to the seven of you, THANKS.

Time went by and The Blackout started gathering pace. Each week, each month that went by, I felt the urgency and the need to tell the story of each of my characters. The four were set to live with me. Every night, around the fireplace, I talked about their concerns, which were also mine, with my partner who has stoically endured all these months of creativity madness, contributing with light and ideas, and above all, giving me unconditional support to continue, to finish writing the blackout. THANKS.

Writing hours haven't been as many as investigation hours. Along the process I have enjoyed and learnt a lot, about many topics. The long walks to the sea, the smell of salt, the ocean wind and paddling in the canoe, have cleared my mind when needed and have helped to avoid the well-known writer's block.

The result is a fiction novel, with a little over 78,000 words, around 250 pages. It takes place throughout a six-month period in different parts of the world. 

I think the literary genre under which I would classify it is sci-fi, except that it takes place in a not-too-distant future, something that makes the scenarios of the novel well recognizable and with many similarities to the world in which we live today. 

It all begins on the 12th of July of 2021, when the electric grid falls and the world is left in a complete energy shortage.

It's time to share it with anyone who might be interested in it and I would like to open this blog to your opinions, not only through your comments in each of the blog post, but as personal posts of anyone that after reading the book, has felt the call and wants to share his/her impressions.

For all of you who would like to publish your opinion, reviews, comments, suggestions, emotions or whatever the reading of the blackout has caused to you, please sent it to and I will upload it to the blog, as a new post under 'Log book'.

Thank you to all who have dedicated part of your time to read my book. 

About the blog

During the time I've spent writing the blackout, I needed to look for documentation of many issues. I have travelled around the world with Google Earth and Google maps, Wikipedia has become my bedside book, and all these to restate the richness that Internet gives us.

While writing the book, I thought that many of the things I was learning about the places where my characters were spending their time and the subjects that have allowed me to give life to the four of them, could not remain only in my computer.

This blog was born to avoid that. I have tried to reflect the images, videos, maps, calendars, theories and information that have inspired and nourished  me to write the blackout.

I hope that all the blackout readers can find in this blog a place to delve into the topics that have caught their attention or their interest.

Monday, May 16

Facebook, Google, eBuy founders...

In 2011 the founders of Facebook and Amazon were invited to the G8. Google sent its CEO at that moment, Eric Schmidt (the one in between the two founders).

The governmental power tried this way, to integrate the innovation leaders in their system.

Sunday, May 8

Blackout in music

I have included as separate posts in the  blog, the most well-known albums and songs with the title of  'Blackout'.  However there are many others. Some of them, also gathered in the wikipedia:

Bands and record labels

Blackout NYC, 1977

The 13th of July,1977 NYC was sunk into a blackout that lasted two days.

The city succumbed to chaos. A heat wave along with the financial crisis that was ravaging the USA, as a direct consecuence of the first fuel crisis, caused the population to take over the streets. Looting, ransacking and incendiary acts, blighted the city.

Blackout - Michael Biggins

The nickname or alter ego of the American 'showman' Michael Biggins, was blackout.


Rolling blackout

A rolling blackout is an intentionally-engineered electrical power outage where electricity delivery is stopped for non-overlapping periods of time over geographical regions. Rolling blackouts are a last-resort measure used by an electric utility company in order to avoid a total blackout of the power system. They are usually in response to a situation where the demand for electricity exceeds the power supply capability of the network.

Northeast American blackout, 2003

14th of August of 2003, 55 millions people were affected by a non-planified power outage

The causes were never clear. Canadian government gave all kind of contradictory explanations that the American government denied.

Canada supplies the energy to a large percentage of Americans living in the northeast cost.  In this blackout 45 out of the 55 millions affected, lived in the USA. The blackout started in one the energy generation stations in Ontario, Canada.

Principales blackouts en el mundo

A list with all the unprogrammed outages that has affected more than 1.000 people, during mor than 1.000 horas, or more than 1.000.000 people during at least one hour.

Definición de Blackout

Concise Oxford Spanish Dictionary © 2005 Oxford University Press:

blackout /'blækaʊt/ sustantivo
(loss of consciousness) a momentary loss of consciousness, vision, or memory

(in wartime) the extinguishing or concealment of all visible lights in a city, military post, etc., usually as a precaution against air raids.
(power failure) a period during a massive power failure when the lack ofelectricity for illumination results in utter darkness exceptfrom emergency sources, as candles.
(broadcasting): a news ~ ; the suspension of radio or television broadcasting, as by a strike or for political reasons

Blackout - Britney Spears

The fifth album of the singer is called Blackout. It was published in 2007.

Saturday, May 7

Blackout - Scorpions

From the Blackout album from the Scorpions, 1981

I realize I missed a day
But I'm too wrecked to care anyway
I look around and see this face
What the hell have I lost my taste
Don't want to find out
Just want to cut out

My head explodes, my ears ring
I can't remember just where I've been
The last thing that I recall
I got lost in a deep black hole
Don't want to find out
Just want to cut out

I really had a blackout

I really had a blackout

I really had a blackout

I really had a blackout

I grab my things and make my run
On the way out, another one
Would like to know before I stop
Did I make it or did I flop
Don't want to find out
Just want to get out

I really had a blackout

I really had a blackout

I really had a blackout

I really had a blackout

Don't want to find out
Just want to get out

I really had a blackout!

Blackout - David Bowie

Blackout in the 'Heroes' album of David Bowie, 1977

Oh you, you walk on past
Your lips cut a smile on your face
Your scalding face
To the cage, to the cage
She was a beauty in a cage

Too, too high a price
To drink rotting wine from your hands
Your fearful hands
Get me to a doctor's I've been told
Someone's back in town the chips are down
I just cut and blackout
I'm under Japanese influence
And my honour's at stake

The weather's grim, ice on the cages
Me, I'm Robin Hood and I puff on my cigarette
Panthers are steaming, stalking, screaming

If you don't stay tonight
I will take that plane tonight
I've nothing to lose, nothing to gain
I'll kiss you in the rain
Kiss you in the rain
Kiss you in the rain
In the rain
Get me to the doctor

Get me off the streets (get some protection)
Get me on my feet (get some direction)
Hot air gets me into a blackout
Oh, get me off the streets
Get some protection
Oh get me on my feet (wo wo)

While the streets block off
Getting some skin exposure to the blackout (get some protection)
Get me on my feet (get some direction, wo-ooh!)
Oh get me on my feet
Get me off the streets (get some protection)
Get a second
Get wo wo
Get a second ? breath on advice ?
And a second blow

Internet blackout

It refers to all those laws that have been passed in the Western countries in order to undermine the freedoms and the free use of Internet.

In 2009 the Kiwi parlament passed a law that disguised under the aim of combating digital piracy, allowed the Government to establish censorship over any website and gave them the authority to shutdown websites without any trial. 


Librería Blackout

Anarchist book shop in Nueva York founded in 1993.

Blackout - transformers

Several transformers are called  Blackout.

  • Armada Mini-Con Blackout (2002)Blackout was one of the first-released Mini-Cons that were included with a larger Transformer. Blackout was able to attach to Demolishor to form the front section of the Decepticon's tank mode, or he was able to sit on the seat on Demolishor's back. When attached to a special Mini-Con port, he can fire Demolishor's shoulder missiles.
  • Armada Mini-Con Powerlinx BlackoutHe was later recolored when Demolishor received his Powerlinx upgrade.
  • Armada Built to Rule Blackout (2003–2004)Blackout was also part of the Built to Rule toy line, again as Demolishor's partner, and during 2004, he was recolored with a 'Night Attack' scheme which was not based on an existing Transformers toy. In the Japanese series, Blackout was named Search and later Spark Search when he was recolored.
  • Energon Mini-Con Blackout (2004)Ten years after the events in Armada, Demolishor retained his original form, only with a new color scheme. Blackout also received a new color scheme to match Demolishor's. However, Blackout did not appear in the Energon animated series. Blackout did not reappear when the Armada Demolishor toy was repainted for Transformers: Cybertron.

BlacKout (film)

2007 film, based on the 2003 blackout that took place in the northeast coast of the USA.

Blackout (Buffy the vampire slayer)

2006 book based upon the Buffy series, the vampire slayer.

Blackout - Marvel

Two Marvel supervillain were called Blackout.

Blackout show

CBS American show, launched in 1988.


Blackout animated series

Episode number 28 of the first season of the TV animated series M.A.S.K.

Blackout (film)

Norwegian film from 1986. Thriller about a private investigator that has to deal with a 'femme fatale', a corrupt
policeman chief and a gangster.

Black Out (film)

Swiss film from 1970,  it was nominated to a golden bear in the Berlin film festival.

Blackout (film)

1985 film. Thriller produce by HBO.

Blackout (film)

2008 film. Three guys get trapped in a lift. What starts as a little snag ends up being a nightmare. 

The Black-out book

Compilation of 500 table games.

The blackout - Lost in memory

1997 film. A Hollywood actor investigates what happened during a wild night in Miami, from which he cannot remember anything due to the high consumption of drugs.

The blackout (film)

2009 horror movie. The city turns off in Christmas Eve. A group is trapped in a building...but they are not alone.

Blackout - Lisa Unger

Written by Lisa Unger. A psychological thriller about an old lover of a serial killer.

Blackout - Gianluca Morozzi

Thriller book from the Italian writer Gianluca Morozzi.


Thursday, January 27

A farm for the future

A documentary about the future of farms. Places to live far from the fosil fuel dependency.

Wednesday, January 12


United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland and led by General Keith B. Alexander. USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks.

Sunday, January 9

Abraham Lincoln

You may wonder why is there a post over an American president in the blackout blog. I like the quote I have included in the beginning of the book, although obvious, it encloses a lot of truth. If we were to think about the present situation and analize towards where we are going, we would be able to take decissions on what to do and how to do it. The blackout, unpretentiously and from the utter fiction, was written to invite all of you who have fallen in its pages, to think about the world we have and the choices that are ahead of us. The future has not been written yet and any change, even the slightest, can mean the difference to create a better future.

Abraham Lincoln, despite being a politician and a president of the USA, deserves a place in history. Because of  his abolitionists ideas, when he was elected president in 1860, the Confederate States started the war of secession. During the war, Lincoln abolished slavery and amended the Constitution to ensure greater civil rights for color people, although as a good politican, to achieve his goals he suspended habeas corpus and established a strict censorship over the written press as well as facilitated his family and friends massive sales of weapons to the Confederacy (the other guys, his enemies).


Monday, January 3

NYC. Public health legal manual

Ten years after the twin towers attack in New York, the council of the city has published a legal manual for the judges, attorneys and medical personnel in case there would be a new critical situation en the city. 

The manual discusses the applicable laws in critical situations (emergency laws, martial law, curfew....), the Governments rights to declare quarantine and isolation areas, compulsory vaccination, pests' control and it also redefines the trials performance to speed even more the summary trials.