Results 1 to 9 of 9

Thread: Intarwebs cut by vandals?

  1. #1
    Senior Member

    Join Date
    Mar 2011
    Location
    harms way
    Posts
    17,777

    Intarwebs cut by vandals?

    At approximately noon on February 25, 2015, the Internet went down in a wide swath ranging from just north of Phoenix stretching to Flagstaff, Arizona. Internet service was restored the following day around 1pm local time.

    The very first reports I received about the outage, coming out of Wickenburg and Prescott, was that the ISP from Century Link went down because a car crashed into a transformer. Shortly after that, reports stated that a construction crew hit a power line causing Internet service to go down. From the Phoenix media, we now know that this was the work of “vandals” who discovered where cables, buried several feet underground,were located in the midst of rough terrain. These “vandals” subsequently cut through the Internet cables which were inches to a foot thick and this was the cause this massive outage.


    The Key Word of the Day Is “Vandals”

    The media has been very uniform in describing this act as the work of “vandals”.


    -Independent Channel 3 referred to the outage as the work of
    “vandals”.

    -Phoenix CBS Channel 5 also used the word “vandals”.

    -Phoenix Fox News, Channel 10, described this as the work of “vandals

    -Phoenix NBC, Channel 12, said this Internet take down was perpetrated by “vandals”.

    -Phoenix ABC, Channel 15, also used the word “vandals”.

    -AZ Central, the website for the Arizona Republic used the word “vandals” to describe the origin of the attack.

    -Even the BBC and Russia Today used the word “vandals”.

    For those of us that have covered events such as this, we can often smell a cover-up when we see the repetitive use of a key word or phrase. In this case, the key word is “vandals”. In this instance, the implied use of the word “vandal” is designed to indicate that whomever attacked these cables, presumably owned by Century Link, were amateurs who were engaged in some kind of prank. As I investigated further, it became clear that this was a well-coordinated and well planned attack by persons with expertise related to the attack. Further, whomever did this had to have had specialized equipment to cut through these cables. The simple act of just finding where these cables also required specialized knowledge.

    Additionally, at briefings held by the FBI in 2005, two of the men stated that they were told if it was necessary to invoke martial law, they would take down all communications so dissidents targeted for arrest could not warn each other.
    http://www.thecommonsenseshow.com/20...n-martial-law/

    Other places in Oklahoma and Texas also went down.
    "And how we burned in the camps later thinking, what would things have been like, if every security operative, when he went out at night to make an arrest, had been uncertain, whether he would return alive and had to say good-bye to his family?"

  2. #2
    Senior Member

    Join Date
    Jul 2010
    Location
    Wreckless driving on dirty back roads
    Posts
    8,959
    funny, as soon as I heard this I was thinking foul play. it makes me wonder where the talking points were issued.
    While no one ever listens to me,
    I am constantly being told to be quiet.

    In a world of snowflakes,
    be the heat..

  3. #3
    Team Guns Network Silver 04/2013 alismith's Avatar

    Join Date
    Jul 2010
    Location
    44th "Free" State
    Posts
    19,176
    Don't worry, guys. Now that the Gov't has control of the Internet, no one would dare mess with those cables, again.

    The Fed has everything protected now....
    "Valar morghulis; valar dohaeris."

    Commucrats are most efficient at converting sins and crimes to accidents or misunderstandings.-Oswald Bastable

    Making good people helpless won't make bad people harmless.

    Freedom isn't free.

    "Attitude is the paintbrush that colors our world." TV Series, Haven.

    My Spirit Animal has rabies.

    I'd rather be an American than a Democrat.

    "If you can make a man afraid, you can control him" Netflix Series, The Irregulars

  4. #4
    Team GunsNet Platinum 02/2015 davepool's Avatar

    Join Date
    Jul 2010
    Location
    Phoenix,Az
    Posts
    4,545
    It was probably a gang of our dreaded saber-toothed desert gophers, those suckers have carbon steel claws and teeth and can gnaw through rocks

  5. #5
    Senior Member

    Join Date
    Mar 2011
    Location
    harms way
    Posts
    17,777
    All of wich gopher activity is similar to the rodents who pulled off this;

    SAN JOSE, Calif.—The attack began just before 1 a.m. on April 16 last year, when someone slipped into an underground vault not far from a busy freeway and cut telephone cables.

    Within half an hour, snipers opened fire on a nearby electrical substation. Shooting for 19 minutes, they surgically knocked out 17 giant transformers that funnel power to Silicon Valley. A minute before a police car arrived, the shooters disappeared into the night.
    http://www.wsj.com/articles/SB100014...59141941621778





    And not to mention this;






    Hackers attacked the U.S. energy grid 79 times this year
    The nation's energy grid is constantly under attack by hackers.

    In fiscal year 2014, there were 79 hacking incidents at energy companies that were investigated by the Computer Emergency Readiness Team, a division of the Department of Homeland Security. There were 145 incidents the previous year.
    The outermost defenses aren't holding up. Between April 2013 and 2014, hackers managed to break into 37% of energy companies, according to a survey by ThreatTrack Security.

    Cybersecurity firm FireEye (FEYE) identified nearly 50 types of malware that specifically target energy companies in 2013 alone, according to its annual report. Energy firms get hit with more spy malware than other industries, according to a 2014 study by Verizon
    http://money.cnn.com/2014/11/18/tech...rgy-grid-hack/




    Wich makes me wonder one thing; why are these devices left unprotected and hackable?
    "And how we burned in the camps later thinking, what would things have been like, if every security operative, when he went out at night to make an arrest, had been uncertain, whether he would return alive and had to say good-bye to his family?"

  6. #6
    **Team GunsNet SILVER 12/2014** skorpion's Avatar

    Join Date
    Jul 2010
    Location
    Oh-Hi-A
    Posts
    3,344
    Attack On Arizona’s Internet Was the Beta Test for the Implementation of Martial Law
    http://www.dcclothesline.com/2015/02...aw/#more-45204
    The pen is mightier than the sword, but only when you're shoving it through your enemy's throat.
    USMC Active Duty, 2004-2008
    Gunsnet Member since January 2003

  7. #7
    Senior Member

    Join Date
    Mar 2011
    Location
    harms way
    Posts
    17,777
    The whole thing is weird. If 0bama has a innernet kill switch why go to all the trouble of slicing a cable? Maybe cable slicing is the excuse to declare martial law?
    "And how we burned in the camps later thinking, what would things have been like, if every security operative, when he went out at night to make an arrest, had been uncertain, whether he would return alive and had to say good-bye to his family?"

  8. #8
    Senior Member

    Join Date
    Mar 2011
    Location
    harms way
    Posts
    17,777
    Also, if 0bama didn't do it, it may have been spetsnaz, spets train for these exact types of acts.


    "Many press articles about SPETSNAZ (Special Purpose Forces) concentrate on their glamorous and sensational aspects, such as assassination missions and masquerading in the West as athletes. Sensationalism and concentration on issues of relatively minor importance impede readers seeking a balanced understanding of SPETSNAZ capabilities and limitations. The purpose of this article is to provide such an understanding.

    Soviet special purpose forces are called by several names, including reydoviki (from the English word "raid"), diversionary troops, and reconnaissance/sabotage troops, but they are most popularly known as SPETSNAZ, an acronym from the Russian spetsialnoe naznachenie, meaning special purpose. SPETSNAZ are controlled by the Soviet General Staff's Main Intelligence Directorate (GRU-Glavnoe Razvedyvatelnoe Upravlenie). The Soviet Union's Warsaw Pact allies maintain similar forces.

    The mission of the SPETSNAZ is to conduct what the Soviets call Special Reconnaissance (Spetsialnaya Razvedka). According to the Soviet Military Encyclopedia, Special Reconnaissance is defined as,

    Reconnaissance carried out to subvert the political, economic and military potential and morale of a probable or actual enemy. The primary missions of special reconnaissance are: acquiring intelligence on major economic and military installations and either destroying them or putting them out of action, organizing sabotage and acts of subversion; carrying out punitive operations against rebels; conducting propaganda; forming and training insurgent detachments, etc. Special reconnaissance is ... conducted by the forces of covert intelligence and special purpose troops.

    More simply, the chief missions of SPETSNAZ are reconnaissance and sabotage. The missions of punitive action and forming insurgent groups are holdovers from World War II. Currently, the only insurgent training conducted by SPETSNAZ consists of advisory efforts in Africa and possibly Cuba. Soviet emphasis on a short war probably precludes any serious plans to organize partisan detachments in Western Europe in the event of war.

    SPETSNAZ operate up to 1000 kilometers behind enemy lines, with emphasis on enemy nuclear delivery means, either locating them for attack by other forces or, if necessary, attacking by themselves. Typical SPETSNAZ targets include mobile missiles, command and control facilities, air defenses, airfields, port facilities, and lines of communication. In addition, specially trained SPETSNAZ elements have the missions of assassinating or kidnapping enemy military and civilian leaders."
    http://www.airpower.maxwell.af.mil/a...-dec/boyd.html

    Stanislav Lunev said they'e already here, wating for the word, bet more will covertly come shortly before they attack.
    That is if they're not working with 0bama to dismantle the USA.

    "And how we burned in the camps later thinking, what would things have been like, if every security operative, when he went out at night to make an arrest, had been uncertain, whether he would return alive and had to say good-bye to his family?"

  9. #9
    Team GunsNet Platinum 02/2015 davepool's Avatar

    Join Date
    Jul 2010
    Location
    Phoenix,Az
    Posts
    4,545
    Quote Originally Posted by 5.56NATO View Post
    All of wich gopher activity is similar to the rodents who pulled off this;

    SAN JOSE, Calif.—The attack began just before 1 a.m. on April 16 last year, when someone slipped into an underground vault not far from a busy freeway and cut telephone cables.

    Within half an hour, snipers opened fire on a nearby electrical substation. Shooting for 19 minutes, they surgically knocked out 17 giant transformers that funnel power to Silicon Valley. A minute before a police car arrived, the shooters disappeared into the night.
    http://www.wsj.com/articles/SB100014...59141941621778





    And not to mention this;






    Hackers attacked the U.S. energy grid 79 times this year
    The nation's energy grid is constantly under attack by hackers.

    In fiscal year 2014, there were 79 hacking incidents at energy companies that were investigated by the Computer Emergency Readiness Team, a division of the Department of Homeland Security. There were 145 incidents the previous year.
    The outermost defenses aren't holding up. Between April 2013 and 2014, hackers managed to break into 37% of energy companies, according to a survey by ThreatTrack Security.

    Cybersecurity firm FireEye (FEYE) identified nearly 50 types of malware that specifically target energy companies in 2013 alone, according to its annual report. Energy firms get hit with more spy malware than other industries, according to a 2014 study by Verizon
    http://money.cnn.com/2014/11/18/tech...rgy-grid-hack/




    Wich makes me wonder one thing; why are these devices left unprotected and hackable?
    Oh, i forgot to mention our gophers have been genetically engineered by the NSA

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •