Designed to ensure no declassification attempts by Trump could be disemminated. Anywhere.
This is beyond my ability to speculate.
Interesting. For Chinese Skynet? Complete surveillance?
Bookmark
Probably wanted to ensure that it was being used and not able to be given away.
I have some IT experience but not even enough to barely understand MOST of this article.
I’d like to.
It seems important- especially the “scooping up traffic” line.
I wish I understood it but I have a gnawing sense that it would be too frightening.
While I have no idea what they are up to, I would guess the Swamp and their DOD is up to something and it is not good for the United States or Americans.
Seeing as how massive and widespread the election fraud was, and how the internet was a vital tool, as well as the involvement of virtually the entire government, one would certainly conclude that the incident in question was initiated with the best of intentions.
Occams razor says to me that this was a planned DoD test and the timing is just coincidence.
Bookmark
p
IP Information for 62.115.128.183
Quick Stats
IP Location United States Of America United States Of America Chicago Telia Company Ab
ASN United States Of America AS1299 TELIANET Telia Carrier, SE (registered Sep 01, 1993)
Resolve Host palo-b1.ip.twelve99.net
Whois Server whois.ripe.net
IP Address 62.115.128.183
************************************************************
IP Information for 128.223.51.15
Quick Stats
IP Location United States Of America United States Of America Eugene University Of Oregon
ASN United States Of America AS3582 UONET, US (registered May 11, 1994)
Resolve Host route-views4.routeviews.org
Whois Server whois.arin.net
IP Address 128.223.51.15
NetRange: 128.223.0.0 - 128.223.255.255
CIDR: 128.223.0.0/16
NetName: UONET
NetHandle: NET-128-223-0-0-1
Parent: NET128 (NET-128-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: University of Oregon (UNIVER-193)
RegDate: 1987-04-07
Updated: 2011-07-10
Ref: https://rdap.arin.net/registry/ip/128.223.0.0
OrgName: University of Oregon
OrgId: UNIVER-193
Address: UO Information Services
Address: 1225 Kincaid Street
City: Eugene
StateProv: OR
PostalCode: 97403
Country: US
RegDate:
Updated: 2019-04-11
Ref: https://rdap.arin.net/registry/entity/UNIVER-193
OrgTechHandle: EDMIS1-ARIN
OrgTechName: Edmiston, Jason
OrgTechPhone: +1-541-346-1759
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/EDMIS1-ARIN
OrgTechHandle: TEACH4-ARIN
OrgTechName: Teach, David
OrgTechPhone: +1-541-346-1719
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/TEACH4-ARIN
OrgNOCHandle: UONET-ARIN
OrgNOCName: UOnet NOC
OrgNOCPhone: +1-541-346-4397
OrgNOCEmail:
OrgNOCRef: https://rdap.arin.net/registry/entity/UONET-ARIN
OrgAbuseHandle: UAD4-ARIN
OrgAbuseName: UOnet Abuse Desk
OrgAbusePhone: +1-541-346-4397
OrgAbuseEmail:
OrgAbuseRef: https://rdap.arin.net/registry/entity/UAD4-ARIN
OrgTechHandle: JAD46-ARIN
OrgTechName: Dominguez, Jose Alfredo
OrgTechPhone: +1-541-346-1685
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/JAD46-ARIN
RAbuseHandle: UAD4-ARIN
RAbuseName: UOnet Abuse Desk
RAbusePhone: +1-541-346-4397
RAbuseEmail:
RAbuseRef: https://rdap.arin.net/registry/entity/UAD4-ARIN
RTechHandle: JAD46-ARIN
RTechName: Dominguez, Jose Alfredo
RTechPhone: +1-541-346-1685
RTechEmail:
RTechRef: https://rdap.arin.net/registry/entity/JAD46-ARIN
RNOCHandle: UONET-ARIN
RNOCName: UOnet NOC
RNOCPhone: +1-541-346-4397
RNOCEmail:
RNOCRef: https://rdap.arin.net/registry/entity/UONET-ARIN
To those who want to know, the writer discussed the Domain Name System and a Defense security assessment of it. There’s really nothing more to it. I installed and configured a few DNS servers and other servers during the ‘90s. No big deal.
I think any rational person always assumes that "big brother is watching", this is probably just a move to make that a reality.
It would be a big step towards becoming Communist China.
Defense Digital Service (DDS) authorized a pilot effort advertising DoD Internet Protocol (IP) space using Border Gateway Protocol (BGP). This pilot will assess, evaluate and prevent unauthorized use of DoD IP address space. Additionally, this pilot may identify potential vulnerabilities. This is one of DoD’s many efforts focused on continually improving our cyber posture and defense in response to advanced persistent threats. We are partnering throughout DoD to ensure potential vulnerabilities are mitigated.
With hacked BGP routes, a bad actor could launch an attack sourced from the 11.0.0.0 net. Now, DoD can spot the BGP hackers.
Will somebody please explain this to an old FReeper, who can barely turn on a PC, let alone understand all this? Thanks in advance.
The message above has a timestamp of 16:57 UTC (11:57am ET) on January 20, 2021, moments after the swearing in of Joe Biden as the President of the United States and minutes before the statutory end of the administration of Donald Trump at noon Eastern time.
Odd timing. Nah.
No that right there is some funny stuff, I don't care who you are!
Naive as all get out.
I take it you are talking to yourself and a few close friends since no one else will have a clue what you just wrote.
Wow do I miss Rush.
YOu could bring “everyone” on board.....
Per 1 article Global Resource Systems owns or is involved in all of this so who owes it? https://www.tampabay.com/news/military/2021/04/24/pentagon-mystery-with-a-florida-connection-is-solved-sort-of/
“””What a Pentagon spokesman could not explain Saturday is why the Defense Department chose Global Resource Systems LLC, a company with no record of government contracts, to manage the address space.”””