ALL THOSE PENTAGON IP ADDRESSES
Today's blog is about a story so unusual that I have absolutely no idea what to make of it. That's not to say I don't have plenty of high octane speculations about it, but even then, I'm left with even more uncertainty about my usual uncertainty about my high octane speculations. In fact, I'm so uncertain I don't even know if the prior sentence even made sense, hence I'm filing this one under "you tell me." That said, the reason I'm blogging about it is because of all the stories and articles I received this past week, this one nearly tied with the story about those strange directed energy-mind manipulation attacks going on in Swampington, D.C., and like that story, this one too originates - in all its fetid curiosity - from the same place. So again, thanks to all of you who shared this story.
And it's a strange one, so I'm going to present three of the versions of it that people sent along, to underscore how strange it is:
The big Pentagon internet mystery now partially solved
The big Pentagon internet mystery now partially solved Daily Mail
Why The Pentagon Handed Control Of Its 175 Million IP Addresses To One Tiny Firm
You'll note the first two articles are the AP version of the story by Frank Bajak. And the story is relatively simple in and of itself: the Pentagon - or Pentagram as we like to call it - has handed over control of a bunch of its internet IP addresses to a very small firm about which virtually nothing is known. Citing the Mr. Bajak's article:
A very strange thing happened on the internet the day President Joe Biden was sworn in. A shadowy company residing at a shared workspace above a Florida bank announced to the world’s computer networks that it was now managing a colossal, previously idle chunk of the internet owned by the U.S. Department of Defense.
That real estate has since more than quadrupled to 175 million addresses — about 1/25th the size of the current internet.
”It is massive. That is the biggest thing in the history of the internet,” said Doug Madory, director of internet analysis at Kentik, a network operating company. It’s also more than twice the size of the internet space actually used by the Pentagon.
After weeks of wonder by the networking community, the Pentagon has now provided a very terse explanation for what it’s doing. But it has not answered many basic questions, beginning with why it chose to entrust management of the address space to a company that seems not to have existed until September.
The military hopes to “assess, evaluate and prevent unauthorized use of DoD IP address space,” said a statement issued Friday by Brett Goldstein, chief of the Pentagon’s Defense Digital Service, which is running the project. It also hopes to “identify potential vulnerabilities” as part of efforts to defend against cyber-intrusions by global adversaries, who are consistently infiltrating U.S. networks, sometimes operating from unused internet address blocks.
Madory said advertising the address space will make it easier to chase off squatters and allow the U.S. military to “collect a massive amount of background internet traffic for threat intelligence.”
Some cybersecurity experts have speculated that the Pentagon may be using the newly advertised space to create “honeypots,” machines set up with vulnerabilities to draw hackers. Or it could be looking to set up dedicated infrastructure — software and servers — to scour traffic for suspect activity.
OK, that seems clear enough...
... until one probes the massive size of what's involved. Basically, 175,000,000 internet addresses is almost one address for every two people in the whole USA, give or take a few decimals... that's a lot of internet space just to be running threat assessments. In fact, it's more space than all of AT&T or China. And as the AP article points out, why hand it over to a small company that shares addresses in a post office in a UPS store and that does not return calls.
Which brings us to the third article linked above, and to this little tidbit:
Brett Goldstein, director of the Defense Digital Service (DDS), said the Pentagon had authorized the pilot program to "assess, evaluate, and prevent unauthorized use of DoD [Department of Defense] IP address space," adding that it could help "identify potential vulnerabilities." (Boldface emphasis added)
So what is the "Defense Digital Service" or DDS? Well, L.G.L.R. spotted this article and sent it along:
Defense Digital Service Delivers Mission-Aligned Tech for DOD
You'll note that the article is from the US Department of Defense itself, and accordingly, much of the article is standard boilerplate: long on fluffy self-promotion, and short on juicy details. But there are some intriguing tells nonetheless. Consider the following:
DDS has roughly 70 technologists, including 19 active-duty service personnel. The civilians tend to come from private-sector backgrounds and are on two-year term-limited appointments. Goldstein refers to his team, which includes engineers, designers and developers, as a "SWAT team of nerds" that reports to the secretary of defense.
DDS experts don't dwell in the office, either. They travel to where service members are to see how DDS can help use technology to address challenges. Goldstein said he's been to Afghanistan three times so far, and that the project pipeline for DDS originates directly through the critical needs of the services and combatant commands.
He also said he's recently been visiting various commands as well, including U.S. Transportation Command, Army Cyber Command, U.S. Central Command, U.S. Special Operations Command, and U.S. Strategic Command as he works to further hone DDS priorities to have the biggest impact possible.
Another project focused on strengthening the security of DOD systems. In the private sector, many of the largest companies use "bug bounty programs" or have their systems evaluated by vetted outsiders known as "ethical hackers" to find and report bugs — and then pay cash when flaws are discovered. The federal government had never done that before until DDS launched the "Hack the Pentagon" program in 2016. It was the first federal bug bounty program, and it has led to thousands of vulnerabilities reported in government systems.
Looking forward, some near-term efforts under Goldstein will include expanding the DDS "Jyn" program that pairs cyber soldiers and other military tech talent with DOD experts on special projects; launching a pilot to help modernize and automate portions of the security clearance process; building out a new satellite office in Augusta, Georgia, near the Fort Gordon community; and continuing to advise on the JEDI cloud procurement.
While I certainly do not discount the possibility that there is disinformation here, and even the possibility that the whole "Defense Digital Service" might just be a front for a much deeper more sophisticated but unknown department, just as I do not discount the strange little Florida start-up company might be the same, for the sake of argument, let us take the above statements at face value. Doing so, what do we have? We have
(1) " a swat team of nerds" that
(2) travels around the world "networking" with various command and control structures of the Defense Department, notably including "Army Cyber Command" and "US Special Operations Command";
(3) it's involved in increasing cyber security, presumably via "bug bounty programs," and
(4) "pairs cyber soldiers and other military tech talent with DOD experts on 'special projects'".
In other words, we're looking at a full scale cyber counter-intelligence, intelligence, and hacking operation. Of interest here is that "bug bounty program," which would certainly fit the bill for cyber-counter-intelligence operations, for such operations are bound to be targets for infiltration by foreign intelligence services wanting to cloak their very real cyber-operations within the program.
But there's a couple of areas curiously absent from the boilerplate: (1) space, and (2) financial flows. The latter would, indeed, be a rich data stream both for cyber-intelligence and cyber-counter-intelligence operations, and I cannot help but think that this may be part of what's covered under the generic "special projects". And the importance of space to cyber-operations and the military goes without saying.
I cannot help but think that this is also somehow linked to the Bidenenko regime's warning to Russia that it intended to "send a message" whose true significance would be appreciated only by Russia, and not the general public. I wonder, in other words, if we're not looking at that message in some form or fashion.
If so, then one might remember that any electrical circuit can be used as a conduit for mind manipulation technologies: cyber-warfare meets mind-manipulation tech as it were. If so, then we might also be looking at a new phase of assymetrical warfare operations.
On and on I could go, but as I said, this is such a strange story that it's a case of "you tell me".
See you on the flip side...
Help the Community Grow
Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.
So speculating today! Yay!
First of all it makes me wonder who put out the information. It seems apparent to me that due to litigation slowdown of implementation of the Microsoft 10 billion JEDI cloud as well as the challenge by Oracle that the cloud should not be under one company that perhaps the IP’s are either M-Soft’s or even maybeeee–given the Florida address-Rubio and Trump’s relationship with Oracle a second cloud exists. So maybe during those brief terms at DOD with Anthony Tata and Ezra Watnick (who btw had a stint with Oracle) the bees were very busy.
Btw Tata wrote a book called…..wait for this…..DARK WINTER. And what was it about?
“In a blistering scenario almost too close to the headlines, former Brigadier General Anthony J. Tata delivers a chillingly authentic glimpse of tomorrow’s wars—and the anonymous hackers who hold the fate of the world at their fingertips . . .
By the time anyone realizes what’s happening, it is too late. A dark network of hackers has infiltrated the computers of the U.S. military, unleashing chaos across the globe. U.S. missiles strike the wrong targets. Defense systems fail. Power grids shut down. Within hours, America’s enemies move in. Russian tanks plow through northern Europe. Iranian troops invade Iraq. North Korean destroys Seoul and fires missiles at….”
From Washington Post:
“Oracle, whose database business is threatened by the Defense Department’s broader move to the cloud, was the most vocal among a cadre of companies that resisted JEDI early on. Oracle chief executive Safra Catz, one of Trump’s closest allies in the tech world, raised the issue at a dinner with him in April 2018, just a month after the contract was announced, The Post and Bloomberg News reported at the time.”
“An Oracle lobbying document eventually reached the president’s desk, people familiar with the matter told The Post. Sen. Marco Rubio (R-Fla.), whose campaign has received donations from Oracle founder Larry Ellison,”
“Oracle brought its first bid protest against JEDI in August 2018, months before bids were due, arguing that giving one company too much control over the military’s information resources was a bad idea.”
Btw-the Army has their own system separate from the rest already…
My suggestion is: follow the money. Explanation:
1. Even if it involves some technical complications, you can build up your own IPv4 network somehow duplicating internally the available IPv4 address space, meanwhile still communicating with the outside. Actually this is called “Network address translation” and is often used to overcome shortage of IP adresses. But:
2. The world wide public IPv4 space is getting sparse. So, there is a market for it and the price per IP adress seems to be around 30 US-$ per IP if I read this correctly: https://ipv4marketgroup.com/ipv4-pricing/ . And those 170.000.000 IP addresses would be worth $ 5 billion…
3. Meanwhile, all modern machines, software and the internet backbones etc are now IPv6 compliant (and the IPv6 space is incredibly huge, theoretically 3.4 * 10**38), so they could switch huge amount of internal traffic to that new IPv6 protocol. (Afaik, only some older endpoints are problem to a complete switch to IPv6, or they are just having fun of continuing artificially for business…).
4. And then they tell us a more or less unrelated fancy story about it…
One thing is for sure, there is always more than one goal/reason/purpose for (“them”) doing anything.
1. While one’s bewildered head is in electronic clouds, thieves hands are in one’s pocket.
2. Gravestones are better voters, when having addresses in electronic clouds.
3. Trojan Horses can multiply in swarms, like colonies of rabbit holes.
4. Mind tricks of thieves take many forms, yet they always seek HARD ASSETS, in the endgame conquest.
5. While fantasy is real in one’s mind, liquidation is real in one’s reality.
A thief is a beggar at the door, playing tricks…
There is a sharp distinction, between ISAACS and JACOBS. One does better, to learn it fast, because one’s life might depend on it.
What one believes is, what one has been led on to believe. Pope Satan has always been a conjurer of spells: Divide et impera.
I wonder if there’s a connection to this year’s WEF Cyber Polygon “simulation,” where they’ll be gaming out a cyberattack on supply chains. Wasn’t Herr Blofeld bloviating about how devastating an upcoming cyberattack could be? That said, they could be stacking functions that involve monitoring digital currency, fighting “domestic _______ists”, etc.
Hmmmmm……Defense Digital Service is not registered with Florida Department of State Division of Corporations….does it even exist… maybe not in Florida?
They’re not really that many given how much the internet has grown and the many uses found for it.
The first or IPv4 or Internet Protocol Version 4, the original version of the IP protocol, which was introduced in 1981 and continues to be used alongside the newer IP Version 6, was exhausted in 2019. It had limitations that the early developers had not foreseen – the popularity and many uses of the internet, for instance.
Today there are many adversaries using the networks to undermine the use the originators had intended. Those treacherous types no longer need an introduction, either, and are reason enough to come up with an alternative means of high speed – nearly everything in communications.
Potential vulnerabilities have been getting identified for a good long time since broad band blew the doors off the baud, the signaling rate of a line. The number of transitions (voltage or frequency changes) that are created per second. It’s only at very low speeds that baud was once equivalent bits per second (bps). Now there are protocols that allow how speeds can translate signal. The name stuck. Like most digital technologies they were fruitful and multiplied right along with their sophistication and uses for signal intelligence. Something very much associated with defense and confidentiality.
The applications for signal use and intelligence were enormous when it was simpler. Now Tyrannosaurus Tech (to include Big Tech) has nearly become the monster of CGI Sci-Fi. One of those things that free enterprise and innovation begets. Now Big Red thinks it can steal it for itself, take over the transmission hubs, and subjugate the rest of the user base to its whims.
It falls under that “Unrestricted Warfare” collection the Party has adopted over the decades where any and all uses and methods of use are militarized toward controlling operations on land and sea, in the air, and now low orbit and space realms of natural satellites, constructed satellites, and craft for use by the Party. Ambitious really, but not new. Probably another facet of why signals went largely to digital. The realm of the super data crunchers to be sure. It seems numbers are an equalizer second to none.
There is nothing wrong with your internet. We control the horizontal we control the vertical we can make your internet go from a soft hum to a blaring crescendo. We can make images you see go from a soft blur to crystal clarity. Sit back and we will control all you see and hear for the rest of your life welcome to the twilight zone outer limits X Files Fringe.
Not sure if RT is always the best source for news but lately they seem to be a reliable source…imagine that! I always listen to their news recap each day and any related opinion shows covering a topic I’m interested in. This story was one of those. RT reported that the transfer occurreed ten minutes BEFORE Trump exited the White House… That would be a mere 10 minutes before Biden swearing in. So in my mind the thot plickens…
Did anyone hear that time reference in any of the media you heard/read?
From my perspective, all media is edited; don’t want anything of real import slipping out. First off; real journalism is not even in the script.
But, if some wayward journalist had any ideas of being a journalist;
well, the editor will advise him what paygrades mean.
USSA media is garbage in; and their readers complete the cycle by speaking/writing garbage out.
RT is a step above; but still boxed in the international “scripted” corral.
Only, at sites like these, and Solari/Fitts; for example, are readers/members I thinking/writing outside the sheeple “scripted” corral.
Some journalism leaks through in other video platforms and websites.
If that isn’t bad enough; “they’re” looking for even more censorship.
The tipping point of total information breakdown maybe coming soon; and their “organized” approach may be history.
So, take the shot quick; before your mind becomes your own.
Take the shot quick; so “they” can own your mind/thoughts.
It’s all about the operating systems’ injections;
A symbolic Body Snatcher’s Invasive “Pod” injection.
If you think it’s bad operating systems’ now;
wait till their on their double digit system’s invasive injections.
Or, into their triple digits injection systems’.
If you want to know how gullible someone is; ask them,
“How many injections have you had?”.
Or, “What’s your injections up to?”.
Or, simply look at their stamped stupidity passport.
[Sorry, got carried away]
“Men, it has well been said, thinks in herds;
it will be seen that they go mad in herds,
while they only recover their senses slowly, and one by one.
Extraordinary Popular Delusions and the Madness of Crowds
by Charles Mackay/1841
This current Covid1984 Re-Set op stated long-term goal is to have machines and AI do all the work for human beings. The unstated op;
is to have the vast majority of those human beings terminated.
To today’s post.
First off, the title implies “known” addresses; meaning, that there are many more unheard of IP addresses. And, even there; those Pentagon IP addresses may be a deeply layered onion of addresses, going far down the military’s architected, internet rabbit hole.
The day of the stolen election, by an international media cartel’s explicit in-your-face operation. That’s the day the Pentagram’s addresses were also “stolen”.
When there’s an major op going on[regime change];
there’s countless other oops happening, all at once.
“Idle chunk” of Pentagram internet.
Meaning, your pay grade isn’t high enough to translate idle chunk.
From here on out; it’s a Alice In Wonderland lingua franca.
“In that direction,” the Cat said, waving its right paw round, “lives a Hatter; and in that direction, “waving the other paw,
“lives a March Hare. Visit either you like; they’re bot mad.”
“But I don’t want to go among mad people,” Alice remarked,
“Oh, you can’t help that,” said the Cat:
“we’re all mad here. I’m mad. Your mad.”
From my mad perspective; I’m looking at space.
I mean, there’s so much unaccounted for “space”;
that it seems to scream: “space”.
Either way: the official acknowledgement, of a by-design porous internet, thus needing countless addresses to fill compromised holes[w/whatever, including honey pots]; or, knowing that going outward into space, the military needed countless addresses to fill the coming void – the Pentagram planning reveal its method to madness.
Then the article comes to the byte/meat of the Pentagram:
cyber warfare/DDS. This covers quite a bit of territory;
and, needless to say, requires countless addresses.
Part of that territory is mind control; as any electrical circuit can be used as a conduit for mind manipulation[at the very least].
Part maybe attached the the countless covid1984 operations;
including, population control.
“How do you know I’m mad?” said Alice.
“You must be,” said the Cat, “or you wouldn’t have come here.”
I was going to make a snarky reference to the old days of using other kinds of “messaging” or threats… and post the following that was an interesting story like the porn found on NASA computers:
https://thehill.com/policy/cybersecurity/451383-house-bill-aims-to-stop-use-of-pentagon-networks-for-sharing-child (as you all know, the names given to legislation typically indicate the opposite of the agenda)
http://www.dailymail.co.uk/news/article-3184951/ NASA-employees-caught-buying-child-porn-site-showed-three-year-olds-abused- escape-prosecution-names-kept-secret.html
Posting anyway in case someone missed those stories that of course, the MSM covered-but-didn’t-cover-not-sorry.
However, I agree with Sophia’s statement above…they’ve promised an even bigger boom.
Now, I should have though of that: the highly secretive
and blackmailing child pornography international organization.
That’s a HUGE “player”; and the Pentagram would Have to be “involved”, in some sort information warfare theatre of operations.
After all; this sinister organization is also going to expand to the stars.
Thanks for the links!
Both JPF and CAF have discussed the system of blackmail, coercion and control you mention in the context of the Epstein Empire downfall and have noted that it signaled a controlled demolition of that system, as he was a significant fulcrum/info database yet no longer needed with modern surveillance and control. I’ve lost a lot of sleep over this because the system is so vast, so structured, so well-funded that I fear it will simply transition into the hands of even lesser humans…and what happens to those kids…
Anyway, I keep wondering if the “operation” expands to this breakaway civilization? Likely, one of the stacked functions of the reset is to recalibrate the finances and values for those in the process of breaking away and their holdings here on planet earth (and I’m sure someone else out there has a much better way of stating that). Is the reset a holistic shift TO the B.C.? Do they continue to bleed earthers dry over, say, another century while they establish off-planet? If off-planet is so much better, why not just “go” now? What do they need?
I suppose we’ll find out when someone goes onto Reddit for an AMA during the alien invasion.
Your guess, is as good as mine.
It may be; they’re clueless by design. That the vast majority are just “following orders” and/or brainwashed into submission.
But the few who really know; maybe more fearful of the majority finding out how they’ve been had. They’ll want their blood and their heads – literally.
So, it just may be: kill, or be killed.
Still, there is more of an’other’ story in this.
But, saving one’s skin; is high up on the to do list.
If the US and it’s financiers were going to switch to a digital currency one would want to model the traffic and work out the kinks in real time. You bet this has national security implications–and I well remember all of those advertisements this past summer from the financial sector recruiting talent for a push to get banking into the cloud. If this fits into a financial transformation project, this would mean they may want to extract financial data from the internet in realtime, pass it through the new financial digital platform and begin reviewing the traffic and accounts to ensure the proposed system is functioning properly. You want a private firm involved in this modeling program to keep the audits independent and to provide feedback to its primary customer under the cloak of corporate secrets. It’s a wild guess, and the branch on which I sit may be in free fall, but it’s a scenario that fits a major change in a new technological implementation for a new digital financial system. Someone wants assurances this will actually work. They also want to know how vulnerable the system is from external actors–but assumes the external actors will actually begin trying to crack the system. My guess: they will begin but will not exploit any vulnerabilities until after the switch to a digital economy. If the DOD is employing a blue team in secret, they will want a way to exploit the system for their master’s use to inject and remove digital “capital” from the system as needed also.
For the record, whether the original version has the credit scoring component or not, my comments assume such a module was built into the system.
Again, there’s method to madness.
I should have thought of that too.
I mean, it’s a natural!
The Pentagram would want a command & control structure in-place;
as the “switch” proceeds apace.
[I don’t want it to happen; but this “madness” has gone far beyond control.]
Good thinking, OC! There’s no way the various intel apparatuses of governments and nonstate actors are going to sit back and not build systems to monitor, secure, and hack the digital “currencies” they all know are coming.
Agree that this is a very plausible scenario, although I assumed this is what was being explored for the past decade as crypto universe was evolving. They’ve had a long time to study the dark net economy. Like most every other technological advancement, I have assumed intelligence industrial complex fostered this phenomenon and consider them decades ahead of current events. So I guess this is the “make it look legit” phase? This is where they try to fit this system into the pretend multiple-entry U.S. gov system?
This kind of feels like the fleet-to-fleet transfer list of “Non-Terrestrial Officers” and named ships spreadsheet…
Regardless, I also agree that like all other aspects of governmental functions that are facilitated by private companies are protected with NDAs and other corporate legal umbrellas.
“Nerds” in Afghanistan? Good luck with that….
The backward-looking Anglosphere is still dreaming of Mackinder….
Has this something to do with a totally secure quantum internet? This allows secure non-hackable communication and data to be sent and received using photon entanglement.
As we know, just encrypting a message or data and sending it using the existing internet is not always secure.
IP addresses are just that – addresses. They are not preloaded nor can they be preloaded other than associating code to the address – but you would still need a webpage or “container” for the code. The IP address alone cannot act as a container, cannot contain “stuff”. It’s an address. Like your home address. The address itself is benign, it’s what the address identifies/contains is what can be anything other than benign.
Six million internet persons (ip) are living, bleeding, suffering in cyberspace…
SCYTHIAN YOGA 3
Greeted, by her sunrise on plain,
she is foreboded explain,
that headed for fall
is fire in all,
riding sunset, at end of reign.
(“Explain” is not a noun found in dictionaries, so I made it up, as poetic crime, to fit the rhyme.)
An obscure company now managing a huge unused chunk of the Internet that, for decades had been owned by the U.S. military.
Pentagon said it is using the third-party company in a “pilot” project to conduct security research.Well, it couldn’t have been DARPA as their event was before Jan 2021. So how security conscious were they handing 175 million IP addresses to a virtual unknown third party?
FETT Bug Bounty Helps Strengthen SSITH Hardware Defenses
After three months of reviewing more than 13,000 hours of hacking labor conducted by more than 580 cybersecurity researchers, DARPA announced on January 28, 2021, that its Finding Exploits to Thwart Tampering (FETT) Bug Bounty validated the security-enhancing efficacy of newly designed hardware architectures developed under the agency’s System Security Integration Through Hardware and Firmware (SSITH) program. The exercise also pinpointed critical areas to further harden defenses.
From July-October 2020, DARPA held its first ever bug bounty program – a crowdsourced, red team exercise used to evaluate and analyze a technology’s defenses. DARPA partnered with the Department of Defense’s Defense Digital Service (DDS)—a self-described SWAT team within the DoD—and Synack, a crowdsourced security platform on this effort.
Others have speculated they could use them to mirror peoples accounts to gain access to them, their identity and passwords for AI to sift through.
I guess it will be a breakaway internet. ?
Nice Dolan reference 😉
As opposed to a Breakaway Internet, how about a hardened subset of it that can survive the “Internet Kill Switch” being activated? Rand Paul tried to bring in legislation depriving POTUS of this legal authority, I believe: “S.4646 – Unplug the Internet Kill Switch Act of 2020” https://www.congress.gov/bill/116th-congress/senate-bill/4646
We might also consider this in the context of globalist puppet Obama surrendering US control of Internet (to ICANN) in Oct 2016 shortly before Trump came to power. e.g.,
I would interpret this DoD Internet addresses issue as being part of the broader power struggle / factional warfare that we are witnessing play out; the US military leadership can hardly be obvious to this.
Also, recall Trump’s inauguration and the strange moment with the military leadership. Yet another element of a greater, hidden dialectic.
Internet Bill of Rights (IBOR) v. “Net Neutrality” debate?
I think you’re heading in the right direction, along with the breakaway internet comment.
Maybe DOD is connecting with Aliens. Seriously.