Free Republic
Browse · Search
News/Activism
Topics · Post Article


1 posted on 04/24/2021 7:32:22 PM PDT by narses
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-26 next last
To: narses

Designed to ensure no declassification attempts by Trump could be disemminated. Anywhere.


2 posted on 04/24/2021 7:35:53 PM PDT by montag813 ("Fallen, fallen, is Babylon the Great")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

This is beyond my ability to speculate.


3 posted on 04/24/2021 7:36:04 PM PDT by Rebelbase
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Interesting. For Chinese Skynet? Complete surveillance?


4 posted on 04/24/2021 7:38:30 PM PDT by dynachrome ("I will not be reconstructed, and I do not give a damn.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Bookmark


7 posted on 04/24/2021 7:49:14 PM PDT by Southside_Chicago_Republican (The more I learn about people, the more I like my dog. )
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Probably wanted to ensure that it was being used and not able to be given away.


8 posted on 04/24/2021 7:50:05 PM PDT by glorgau
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

I have some IT experience but not even enough to barely understand MOST of this article.

I’d like to.

It seems important- especially the “scooping up traffic” line.

I wish I understood it but I have a gnawing sense that it would be too frightening.


9 posted on 04/24/2021 7:57:26 PM PDT by Ken Regis
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

While I have no idea what they are up to, I would guess the Swamp and their DOD is up to something and it is not good for the United States or Americans.


10 posted on 04/24/2021 8:04:10 PM PDT by Tupelo (Old, Tired, Cranky and Disgusted)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Seeing as how massive and widespread the election fraud was, and how the internet was a vital tool, as well as the involvement of virtually the entire government, one would certainly conclude that the incident in question was initiated with the best of intentions.


11 posted on 04/24/2021 8:04:28 PM PDT by robel
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Occams razor says to me that this was a planned DoD test and the timing is just coincidence.


12 posted on 04/24/2021 8:18:13 PM PDT by bigbob
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Bookmark


14 posted on 04/24/2021 8:22:56 PM PDT by pke
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce; dayglored; Whenifhow; null and void; aragorn; EnigmaticAnomaly; kalee; Kale; ...

p


15 posted on 04/24/2021 8:35:32 PM PDT by bitt (People who wonder if the glass is half empty or half full miss the point. The glass is refillable.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

IP Information for 62.115.128.183
Quick Stats
IP Location United States Of America United States Of America Chicago Telia Company Ab
ASN United States Of America AS1299 TELIANET Telia Carrier, SE (registered Sep 01, 1993)
Resolve Host palo-b1.ip.twelve99.net
Whois Server whois.ripe.net
IP Address 62.115.128.183

************************************************************

IP Information for 128.223.51.15
Quick Stats
IP Location United States Of America United States Of America Eugene University Of Oregon
ASN United States Of America AS3582 UONET, US (registered May 11, 1994)
Resolve Host route-views4.routeviews.org
Whois Server whois.arin.net
IP Address 128.223.51.15
NetRange: 128.223.0.0 - 128.223.255.255
CIDR: 128.223.0.0/16
NetName: UONET
NetHandle: NET-128-223-0-0-1
Parent: NET128 (NET-128-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: University of Oregon (UNIVER-193)
RegDate: 1987-04-07
Updated: 2011-07-10
Ref: https://rdap.arin.net/registry/ip/128.223.0.0

OrgName: University of Oregon
OrgId: UNIVER-193
Address: UO Information Services
Address: 1225 Kincaid Street
City: Eugene
StateProv: OR
PostalCode: 97403
Country: US
RegDate:
Updated: 2019-04-11
Ref: https://rdap.arin.net/registry/entity/UNIVER-193

OrgTechHandle: EDMIS1-ARIN
OrgTechName: Edmiston, Jason
OrgTechPhone: +1-541-346-1759
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/EDMIS1-ARIN

OrgTechHandle: TEACH4-ARIN
OrgTechName: Teach, David
OrgTechPhone: +1-541-346-1719
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/TEACH4-ARIN

OrgNOCHandle: UONET-ARIN
OrgNOCName: UOnet NOC
OrgNOCPhone: +1-541-346-4397
OrgNOCEmail:
OrgNOCRef: https://rdap.arin.net/registry/entity/UONET-ARIN

OrgAbuseHandle: UAD4-ARIN
OrgAbuseName: UOnet Abuse Desk
OrgAbusePhone: +1-541-346-4397
OrgAbuseEmail:
OrgAbuseRef: https://rdap.arin.net/registry/entity/UAD4-ARIN

OrgTechHandle: JAD46-ARIN
OrgTechName: Dominguez, Jose Alfredo
OrgTechPhone: +1-541-346-1685
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/JAD46-ARIN

RAbuseHandle: UAD4-ARIN
RAbuseName: UOnet Abuse Desk
RAbusePhone: +1-541-346-4397
RAbuseEmail:
RAbuseRef: https://rdap.arin.net/registry/entity/UAD4-ARIN

RTechHandle: JAD46-ARIN
RTechName: Dominguez, Jose Alfredo
RTechPhone: +1-541-346-1685
RTechEmail:
RTechRef: https://rdap.arin.net/registry/entity/JAD46-ARIN

RNOCHandle: UONET-ARIN
RNOCName: UOnet NOC
RNOCPhone: +1-541-346-4397
RNOCEmail:
RNOCRef: https://rdap.arin.net/registry/entity/UONET-ARIN


16 posted on 04/24/2021 8:37:58 PM PDT by Chode (there is no fall back position, there is no rally point, there is no LZ... we're on our own. P144:1)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

To those who want to know, the writer discussed the Domain Name System and a Defense security assessment of it. There’s really nothing more to it. I installed and configured a few DNS servers and other servers during the ‘90s. No big deal.


17 posted on 04/24/2021 8:41:40 PM PDT by familyop (Only here for the tales from the rubber room.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses
The only thing I can imagine of that the US government is setting up some sort of "man-in-the-middle" proxy for vast numbers of Internet users, which could act like the world's largest wiretap operation. To do this they would have to probably get co-operation from the ISPs, but that's easy enough to imagine.

I think any rational person always assumes that "big brother is watching", this is probably just a move to make that a reality.

It would be a big step towards becoming Communist China.

18 posted on 04/24/2021 8:44:40 PM PDT by The Duke (Search for 'Sydney Ducks' and understand what is needed.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses
I think DoD's explanation sums it up perfectly.

Defense Digital Service (DDS) authorized a pilot effort advertising DoD Internet Protocol (IP) space using Border Gateway Protocol (BGP). This pilot will assess, evaluate and prevent unauthorized use of DoD IP address space. Additionally, this pilot may identify potential vulnerabilities. This is one of DoD’s many efforts focused on continually improving our cyber posture and defense in response to advanced persistent threats. We are partnering throughout DoD to ensure potential vulnerabilities are mitigated.

With hacked BGP routes, a bad actor could launch an attack sourced from the 11.0.0.0 net. Now, DoD can spot the BGP hackers.

21 posted on 04/24/2021 9:59:50 PM PDT by IndispensableDestiny
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Will somebody please explain this to an old FReeper, who can barely turn on a PC, let alone understand all this? Thanks in advance.


22 posted on 04/24/2021 10:24:44 PM PDT by bobby.223 (Retired up in the snowy Mountains of the American Redoubt and it's a great life!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

The message above has a timestamp of 16:57 UTC (11:57am ET) on January 20, 2021, moments after the swearing in of Joe Biden as the President of the United States and minutes before the statutory end of the administration of Donald Trump at noon Eastern time.

Odd timing. Nah.


23 posted on 04/24/2021 10:30:16 PM PDT by McGruff
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses
“......but we can certainly hope that the DoD uses the threat intel gleaned from the large amounts of background traffic for the benefit of everyone.”

No that right there is some funny stuff, I don't care who you are!

Naive as all get out.

24 posted on 04/24/2021 10:39:28 PM PDT by mad_as_he$$
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

I take it you are talking to yourself and a few close friends since no one else will have a clue what you just wrote.
Wow do I miss Rush.
YOu could bring “everyone” on board.....


26 posted on 04/25/2021 2:39:19 AM PDT by rodguy911 ((FreeRepublic home of the free because of the Brave---Where we go One))
[ Post Reply | Private Reply | To 1 | View Replies ]

To: narses

Per 1 article Global Resource Systems owns or is involved in all of this so who owes it? https://www.tampabay.com/news/military/2021/04/24/pentagon-mystery-with-a-florida-connection-is-solved-sort-of/

“””What a Pentagon spokesman could not explain Saturday is why the Defense Department chose Global Resource Systems LLC, a company with no record of government contracts, to manage the address space.”””


27 posted on 04/25/2021 3:33:20 AM PDT by blueyon (`nt to be a nothing burger)
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson