Do you remember all those strange acts of vandalism over the past couple of years? First, there was the bizarre, and very professional, assault on an electrical power substation at the very southern end of Silicon Valley in California, an assault that left part of the region without electrical power for a few hours. The papers and media tended to report this as an act of vandalism. The trouble was, you'll recall, that the "vandals" knew exactly what to to, and what to target, inside the sub-station, and were in, out, and gone before local law enforcement even had a chance to respond. In short, the team that hit the sub-station were not vandals at all; they were professionals.

Then we had the case of the primary internet cable between Flagstaff and Phoenix, Arizona that was cut last year. Again, the act was attributed to vandals, but even if so, these were vandals that had enough professional acumen to know where to cut the cable. Again, this wa an "in and out" job.

Now there's this, and you may not have heard this on the mainstream/lamestream media(and this story was shared by many of you!):

Vandals sever another Internet backbone cable in California

Again, we're being told this is an act of vandalism, and again, in the San Francisco Bay-Silicon Valley area. This time, note the area:

"The latest attack occurred at around 4.30 am Pacific Time near the town of Livermore, about 50 miles east of San Francisco. Someone climbed down a manhole cover there and cut through several fiber optic cables, according to severalreports. The FBI is investigating.

"The cables are operated by backbone providers such as Level 3 Communications, which sell capacity to other cable and Internet providers. The cables carry huge amounts of data, so cutting them can slow services over a wide area."(Emphasis added)

Now, I don't know about you, but reading about internet cable cutting and "Livermore" in the same context raises my eyebrows a bit. Not much, but definitely a bit.

There's another version of this story here:

Calif. attacks send warning that Internet lines are 'basically unsecured'

This second article makes it clear the FBI is not thinking in terms of vandalism:

:Experts and the FBI say whoever cut the lines needed tools and expertise, and that it's unlikely the repeated acts are simple vandalism. The attacks generally happened in underground vaults where the cables were protected by sheathing called conduit.

Those underground vaults are rarely monitored, and often sit in remote areas. In many parts of the West, the cables are buried a few feet underground but their routes are marked by waist-high orange poles, and above-ground junction boxes are housed in easily accessible storage sheds. While the Internet was designed to be redundant, there aren't that many backbone cables. Cutting a few could cause widespread disruption."

However, at the end of the first article there's this:

"The FBI has now reported 11 incidents in the Bay Area over the past year in which people intentionally cut through fiber optic cables. It’s not clear if the attacks are related. Five of the incidents were in Fremont, with others in Berkeley, San Jose and Walnut Creek. The FBI wants people to report any suspicious activity around the time the cables were cut. A list of the previous 10 incidents is here"

And, just for good measure, here's the actual FBI website and statement:

FBI and Local Law Enforcement Seek Public’s Assistance Concerning Severed Fiber Optic Cables in the East Bay and South Bay

"The FBI, in a close-working relationship with local law enforcement agencies in the Bay Area, is requesting assistance to identify the individuals responsible for vandalizing fiber optic cables in Fremont, Walnut Creek, Alamo, Berkeley, and San Jose, California. Within the past year, cables were intentionally severed at the following locations:

  • July 6, 2014, 9:44 p.m. near 7th St. and Grayson St. in Berkeley
  • July 6, 2014, 11:39 p.m. near Niles Canyon Blvd. and Mission Blvd. in Fremont
  • July 7, 2014, 12:24 a.m. near Jones Road and Iron Horse Trail in Walnut Creek
  • July 7, 2014, 12:51 a.m. near Niles Canyon Blvd. and Alameda Creek in Fremont
  • July 7, 2014, 2:13 a.m. near Stockton Ave. and University Ave. in San Jose
  • February 24, 2015, 11:30 p.m. near Niles Canyon Blvd. and Mission Blvd. in Fremont
  • February 24, 2015 11:30 p.m. near Niles Canyon Blvd. and Alameda Creek in Fremont
  • June 8, 2015, 11:00 p.m. near Danville Blvd. and Rudgear Road in Alamo
  • June 8, 2015, 11:40 p.m. near Overacker Ave and Mowry Ave in Fremont
  • June 9, 2015, 1:38 p.m. near Jones Road and Parkside Dr. in Walnut Creek

Interestingly there do appear to be patterns here: first, as the article points out, the attacks are concentrated in Fremont, and secondly, most of the attacks appear to be conducted in the span of a month from June 6 to July 7, with only two attacks not conducted in that time frame. And even then, the two February attacks occured on the same day and at the same time, in two locations, in the same city: Fremont.

Now, I don't know about you, but everything here screams "pattern" and "coordination" to me(and it probably does to the FBI and local California law enforcement). This is, in my view, something more than mere vandalism, particularly when one factors into the context the sub-station attack, which may or may not be related (but my bet is, that it is related).

The real question here is "what is the motivation? Who benefits?" Here the high octane speculation is anybody's guess, and your high octane is as good as mine; this whole series of incidents falls into the "you tell us" category. Are these some sort of psyop or false flag operation, designed to test tactics for a much more generalized series of such incidents, to call for more "security" and internet regulation? Perhaps.

But the bay area with its Silicon Valley is an area of secrets and technologies, and hence, a beehive of foreign espionage activity. The Russians have long had a heavy intelligence presence in the area, and one can only assume that China and just about every other major power does as well. Could these incidents be their operations? Well, again, perhaps, but one would think they would be quite hesitant to engage in such activities and run the danger of exposure and compromising their more valuable and direct espionage activities. Either way one slices it, something is going on; there are patterns, and if a hack from South Dakota can spot them then it stands to reason that the FBI has as well, and probably knows more than it can, at present, say.

This is not only one to watch, but, it's in that category of "you tell us." Perhaps in your own high octane speculations, some valuable insight may occur that may help to flush up and capture the culprits.

See you on the flip side.

Posted in

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".


  1. DanaThomas on July 12, 2015 at 11:25 am

    The Italian press is buzzing with the Hacking Team affair, the Italian firm aptly named Hacking Team (apparently well known in the aptly-named Italian firm working in the twilight zone of the cyber war), with some awkward connections from a former US ambassador to the Sudan… They say that their “security” software was hacked, and their databases have been published on the web. There may be no connection, but Rome’s foreign minister has said that the Cairo attack by Isil-Isis was specifically directed against Italy.

    • Robert Barricklow on July 12, 2015 at 3:10 pm

      is the CIA – which has those dark connections;
      including the WW11 Nazi/Gladio connection.

  2. DanaThomas on July 8, 2015 at 11:02 am

    Hey, another “glitch” hits the NYSE:

    • Robert Barricklow on July 8, 2015 at 1:25 pm

      I like the way your connecting these dots Dana.
      Looks like those previous “tests” runs have taken the show
      on-the-road to Broadway, in a production gone…

      • DanaThomas on July 9, 2015 at 4:25 am

        Thanks to Professor Farrell our dot-connecting technique is getting better!

  3. duncan mckean on July 6, 2015 at 9:56 pm

    i’m sure that it is near impossible to have a clarion reckoning about the current (CURRENT).

  4. Joshua B. Riddle on July 6, 2015 at 11:15 am

    Well if you shutdown one pathway on the internet, your data has to take another route. So the question is where did the data get rerouted thru, find that and I think you will find an answer. Odds are whom ever was responsible for this purposely rerouted the data so it had to pass thru a different point where you could possibly collect the data. That’s my best guess.

  5. reddog on July 6, 2015 at 6:34 am

    Here’s a theory for you: The cable cuts are diversions to cover splicing operations. If you wanted to tap into a cable, you would first make a “vandalism” cut in a visible location, then install your splice equipment in a hidden loation during the outage.

  6. TRM on July 5, 2015 at 6:16 pm

    I’m betting on a group of “Unabombers” who have been screwed over by the system and are PO’d and not going to take it any more. I don’t know if we will ever see a manifesto like Theodore Kaczynski published but I’m thinking we will.

    Veterans who have been thrown overboard by the system would have the training to pull off a lot if not all of these. Cut my benefits and I’ll cut your wires or shoot up your power stations. Perhaps their manifesto has already been delivered but only to the authorities who are sitting on it.

  7. Churchless Mouse on July 5, 2015 at 2:09 pm

    Multiple goals as usual.

    Their playing up the vulnerability angle could be a ruse for drone use inside the us

  8. Delurking on July 5, 2015 at 1:32 pm

    There seems to be a primary focus on Fremont and a secondary focus on Walnut Creek. These two could potentially be major telecommunications junctions, but then why worry about off-the-beaten track places, blocked by the Coast Range, like Alamo and Danville? The involvement of those two locations points me toward Livermore and Livermore Labs. And indeed, if you open up the first link, there just occurred a similar incident in Livermore itself. And I do not know why you would hit Livermore, which is really not on the way to anything significant, unless you were targeting Livermore Labs.

    So what is going on at Livermore Labs today and who would be interested? Of course it could be a disgruntled former employee too.

  9. emlong on July 5, 2015 at 11:56 am

    High frequency trading interrupts to benefit certain trading parties, anyone?

  10. Jon on July 5, 2015 at 11:32 am

    Putting on my detective’s cap, I would look at a number of things:

    What businesses, agencies or people are in those areas – look at the mix or the people who might be most likely to be impacted, whether they know it or not. (internet based alarm or monitoring systems, trading systems? Did someone use the disruption to embed something?)

    Distraction. While people focus attention on this activity, is something else going unnoticed?

    It could be training for bigger things. Someone might be training groups of people to locate and disrupt such lines as a part of some bigger op. (Jade Helm warm-up? Ocean’s 15?)

    It could be some malevolent amateurs just out to flip the finger at some authority figure, albeit very anal retentive and skilled amateurs.

    It could be part of some international geopolitical thing, although that would seem less likely, as this is very public, and would expose them to discovery, especially in this day and age with everyone and their brother carrying cameras (phones).

    It could be someone with some kind of advanced technology, invisibility, etc., that is proving a point – they may be announcing their targets privately to whomever, then carrying out the attacks undetected to drive their threats home. Proof of concept or threat of extortion.

    It could be someone trying to bring attention to certain areas, businesses, or agencies, for some unknown reason – illegal activities, hidden threat, etc.

    It could be people staging fake threats to prevent loss of funding to their agency, or someone who wants to get a government contract to protect against such threats.

    It could be someone trying to flush out those responsible for investigating such things to target them in the future as a part of a more thorough op.

    Two primary approaches to such things – who is (or could be) impacted (positively or negatively), and follow the money.

    • DanaThomas on July 9, 2015 at 4:26 am

      Good summary Jon.

  11. Robert Barricklow on July 5, 2015 at 9:05 am

    In going w/the Sherlock pic theme:
    “What you do in this world is of no consequence;
    The Question is,
    ‘What you can make other people Believe You Have Done?'”
    – A Study In Scarlet.

    This looks to be “connected” to the new malignant form of technocapitalism/The conquest of nature that technocapitalism and its corporatism represent occurs through social domination.
    Technology becomes an independent force wielding overwhelming power over society[and practically un-opposable?/refer to the Dr.’s post above!]. An instrument of corporatism , manipulated[and manipulable) to further profit and power. For instance, Agriculture is directly concerned w/profit and indirectly w/feeding people. Similarly, the organization of health care is directly an economic enterprise and is only secondarily influenced by people’s health needs[indeed if genocide has the bean counters stamp of approval?].

    Thus, the following video, which I will provide in a reply to this.

    [just-in-case of Marvin’s Space Modulator popping-up]

    • Robert Barricklow on July 5, 2015 at 9:08 am

      “GeoINT: Casting A Neural Net On Humanity – RFID Not Required!”

      • Sandygirl on July 7, 2015 at 11:24 am

        Way back in 1982 (28 years old) I thought of our govt watching me. And now 33 years later the technology is astounding, wow that was fast. My 1st job in 1975 was just beginning to use computers and that was for inventory only. The CLOUD (the beast) knows all, even the speed of your keystrokes.

        • Delurking on July 7, 2015 at 2:48 pm

          I’m not sure about 1982, but I think by 1983 your government WAS watching you as Echelon had just come online. They knew they could not spy on you constitutionally from within the US, so they merely went to England to spy on you as a foreign nation would (this was pre-9/11 when the Constitution still counted for at least a tiny bit). SICK.

          Anybody in the US associated with any kind of spying on Americans, even way back to 1983 or earlier, needs to be prosecuted to the fullest extent of the law, up to and including treason charges where applicable. Properly assume that any desire to spy on anybody equates with a desire to blackmail and control. We need to eradicate this psychopathic human garbage “control freak” behavior and mentality from the face of the earth, beginning with the US. Government is a farce so long as anybody is blackmailed. So ensure that anybody who feels the impulse to “get the goods” on anybody else properly fears the supreme penalty such that they never again act on that sickest of impulses.

          Good government would work to ensure that nobody can ever blackmail anybody else, in the end ensuring the preservation of its own integrity. Gee, why has no one anywhere ever had such good government?
          What a sorry world!

  12. marcos toledo on July 5, 2015 at 8:43 am

    Anybody for the idea that TPTB turning the World into a planetary The Village ala The Prisoner and the rest of us numbers. Or they going to be the state with no responsibilities playing their childish games with our lives as game pieces in their sick game of who lives and who dies.

  13. Aridzonan_13 on July 5, 2015 at 6:03 am

    A few possibilities exist. These are Gummint False Flag ops to gen up some more DHS money, kill the Internet rehearsal and blame it on “terrorists”. Disgruntled tech types would be taking it out on “the Man”. The surgical precision of these “cuts” scream pro. Here in Phx, whole sub surface power substations have been stripped of their copper in an evening. That’s a lot of copper!! Pros are the only ones that could have done the job w/o getting fried. Desperate people, do desperate things.

    On the foreign agent angle, my guess is they would be more apt to bug, tap these cables for the information they carry. But, then again, who knows? These attacks have all been in Western locales.

    What’s interesting, is fiber is relatively easy to fix and Packet Network Systems automatically re-route traffic..

  14. Lost on July 5, 2015 at 5:44 am

    Perhaps this fiber optic cable cutting is being done to set the stage for the introduction of subspace communication–it already exists.

    And assuming the tech to read the signal is cheap and small, which it is, over night, cable TV companies, phone companies and cell phone companies and satellite communications are replaced. And normal over air radio and TV goes the way of the telegraph.

    Of course such gear portends other problems.

    • DanaThomas on July 5, 2015 at 7:51 am

      “Follow the money”

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events