It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Major US East Coast hack

page: 6
24
<< 3  4  5   >>

log in

join
share:

posted on Oct, 21 2016 @ 05:37 PM
link   
a reply to: Witness2008

twitter and github were down here few hours ago. that's Europe, Poland.

also, www.abovetopsecret.com...



posted on Oct, 21 2016 @ 05:47 PM
link   
a reply to: jedi_hamster

What kind of phone access is there? I don't have any idea what is going on, for sure anyway. The latest tweets however sound like Assange. And why would he not be able to access the internet with a phone? Really no reason that he would have to rely solely on the Embassy connection. They certainly have not been co-opted, the 14th podesta file was released today. If your going to mount an attack, you don't announce it, and in fact you create diversions that lead every where but where it's at.

But then that explanation would work if your the US wanting to avert our attention. I just don't think that this is the case.



posted on Oct, 21 2016 @ 05:50 PM
link   
a reply to: Witness2008

the route has nothing to do with it. dns servers were attacked, in the US. when you can't get an IP address of a website from them, you won't be able to connect to it, regardless of your location and internet service used. i'm using a hspa modem for example, so it's basically as if i would be using a smartphone.



posted on Oct, 21 2016 @ 05:52 PM
link   
a reply to: jedi_hamster

How is then that a lot of folks could access the sites they wanted to with phones?



posted on Oct, 21 2016 @ 05:55 PM
link   

originally posted by: butcherguy

originally posted by: roadgravel
Seems odd other than being upset over JA.

Why would WL say this? Just a guess or do they know something.

Maybe WikiLeaks didn't say it.
Maybe?


So some else then has access to the WK twitter account. There should be a retraction at some point.



posted on Oct, 21 2016 @ 05:58 PM
link   

originally posted by: roadgravel

originally posted by: butcherguy

originally posted by: roadgravel
Seems odd other than being upset over JA.

Why would WL say this? Just a guess or do they know something.

Maybe WikiLeaks didn't say it.
Maybe?


So some else then has access to the WK twitter account. There should be a retraction at some point.

You would think so.
The takeover of WikiLeaks twitter account was rumored for the past few days.



posted on Oct, 21 2016 @ 06:02 PM
link   
If so then WK doesn't care and has abandoned it work. Or it wants confusion.



posted on Oct, 21 2016 @ 06:02 PM
link   

Event cause: On Friday October 21, 2016 at approximately 11:10 UTC, Dyn came under attack by a large Distributed Denial of Service (DDoS) attack against our Managed DNS infrastructure in the US-East region. Customers affected may have seen regional resolution failures in US-East and intermittent spikes in latency globally. Dyn’s engineers were able to successfully mitigate the attack at approximately 13:20 UTC, and shortly after, the attack subsided.

At roughly 15:50 UTC a second DDoS attack began against the Managed DNS platform. This attack was distributed in a more global fashion. Affected customers may have seen intermittent resolution issues as well as increased global latency. At approximately 17:00 UTC, our engineers were again able to mitigate the attack and service was restored.

www.dynstatus.com...



posted on Oct, 21 2016 @ 08:39 PM
link   
Double-dip Internet-of-Things botnet attack felt across the Internet


Drew explained the attack in a Periscope briefing this afternoon. "We're seeing attacks coming from a number of different locations," Drew said. "An Internet of Things botnet called Mirai that we identified is also involved in the attack."

The botnet, made up of devices like home Wi-Fi routers and Internet protocol video cameras, is sending massive numbers of requests to Dyn's DNS service. Those requests look legitimate, so it's difficult for Dyn's systems to screen them out from normal domain name lookup requests.

Earlier this month, the code for the Marai botnet was released publicly. It may have been used in the massive DDoS attack against security reporter Brian Krebs. Marai and another IoT botnet called Bashlight exploit a common vulnerability in BusyBox, a pared-down version of the Linux operating system used in embedded devices. Marai and Bashlight have recently been responsible for attacks of massive scale, including the attack on Krebs, which at one point reached a traffic volume of 620 gigabits per second.

Link



The attack itself is likely pointed at a Dyn customer rather than at Dyn itself. Some indications point to the attack focusing on Sony's Playstation domains, though Dyn has not confirmed this.

edit on 10/21/2016 by roadgravel because: (no reason given)



posted on Oct, 22 2016 @ 12:50 AM
link   
LOL love living up north 500 kb up 3 Mb down did a b now downloading c

just hope you still have electrical power by Nov 8



posted on Oct, 22 2016 @ 10:14 PM
link   

originally posted by: bknapple32
a reply to: butcherguy

Its a Ddos attack. I highly doubt the govt is ddosing amazon.


No #e, some bad players causing trouble. It's not like Dyn can just ship their DNS. Corero inc might be pretty responsive but the amount of data this entailed was unmanageable by anything I am aware of. Killing things up stream may be all that resolved this one, or it simply subsided. This kind of thing terrifies me. I earn my living from similar services.
edit on 22-10-2016 by Donkey_Dean because: (no reason given)



posted on Oct, 23 2016 @ 01:22 AM
link   



posted on Oct, 23 2016 @ 10:55 AM
link   
SEVERAL OF THE TORRENT SITES ARE UNREACHABLE NOW INCLUDING PIRATEBAY THEY ARE ALL SAYING ERROR 521 OR C522 CAN'T LOAD A LIVE VERSION OF PAGE DOES WIKILEAKS USE TORRENTS TO DISTRIBUTE LARGE FILES?
i don't think this is an individual or a group like anon this is seems too me is somebody or group trying to stop info from hitting the streets.



posted on Oct, 23 2016 @ 10:58 AM
link   
a reply to: proteus33

I have noticed internal server problems at the wikileaks site this morning, something I have never seen. Haven't been anywhere else but will report when I see something.



posted on Oct, 23 2016 @ 12:17 PM
link   

originally posted by: GenerationGap
www.abovetopsecret.com...

That is all.

I would like to add a quote from another post supporting what the poster above stated.




"In the next few weeks there will be a false flag cyber attack that will be blamed on Russia again. This will lead to the Department of Homeland Security being granted total control of the election and its voting machines. Donald Trump will have the election stolen from him just as it was planned months ago. Hillary will be elected president and one of her first decisions as president will be to increase and push the missile shield closer towards Russias border, threatening Putin. But thats not all, Hillary will invade Syria and attack Assad controlled Aleppo. Hillary will then enter a special bunker code named The "Womb of Artemis", located deep beneath the Swiss Alps. She will order a ruthless attack on Russian forces in Damascus and that will trigger a limited nuclear exchange."



posted on Oct, 23 2016 @ 12:24 PM
link   
Saw this happening for the past week. Actually the attacks have been crazy all over the map since the debates started.

For those who want to monitor the hacks/attacks you can watch it real time on IP VIKING.

Major players this week have been U.S., China and Saudi Arabia.



posted on Oct, 23 2016 @ 12:47 PM
link   
Likely the US Government is using its influence on allies to have them attack and shut down file sharing sites in order to keep the deadswitch releases from happening. I would gather that these files that are going to be released by a few entities are likely on larger file sharing networks because of the amount of traffic they will garner once dropped. If counter-intel and shut these major sites down it will not allow for the files to be released.

In effect it would be the only way to shut the dead mans switch down for Assange and O'keefe I guess. I would think that the second a file is uploaded to any sharing site that it could be almost instantly marked and searched worldwide and either shut down or deleted.

But hey...that is just my conspiracy hat talking....



posted on Oct, 23 2016 @ 01:27 PM
link   
double post.
edit on 23/10/2016 by jedi_hamster because: (no reason given)



posted on Oct, 23 2016 @ 01:28 PM
link   

originally posted by: Vasa Croe
Likely the US Government is using its influence on allies to have them attack and shut down file sharing sites in order to keep the deadswitch releases from happening. I would gather that these files that are going to be released by a few entities are likely on larger file sharing networks because of the amount of traffic they will garner once dropped. If counter-intel and shut these major sites down it will not allow for the files to be released.

In effect it would be the only way to shut the dead mans switch down for Assange and O'keefe I guess. I would think that the second a file is uploaded to any sharing site that it could be almost instantly marked and searched worldwide and either shut down or deleted.

But hey...that is just my conspiracy hat talking....


you're terribly wrong.

those files were already released, long time ago. they're just encrypted and all that needs to be released, are the decryption keys.

and those can be just posted on twitter.
edit on 23/10/2016 by jedi_hamster because: (no reason given)



posted on Oct, 23 2016 @ 01:53 PM
link   
a reply to: jedi_hamster

Yep, that's how to make it "insurance". Get it distributed so there is no one or two points of failure.



new topics

top topics



 
24
<< 3  4  5   >>

log in

join