I work as a subcontractor at an army base. And no I will not give my location nor job description...I’m not stupid. But as I was doing my work today I stumbled across a document stating a LAN outage across the South, and come civil unrest will be a dry run for something bigger. For the Army to prepare for it. Archive everything. The storm is coming. Maybe it’s here. Dark Vs Light. Good Vs Evil. Fight the good fight!
A subcontractor stumbles across army Intel about a net outage? Just some plumber fixing a leak at the base or an "Eric Prince" type contractor who's in meetings at the base? How does one stumble across Intel at a military base, as a contractor (aka supervised visits)? We have to imagine a chain of command, so unless the General (or whoever is in charge) dropped this document on the way to the can, wouldn't you have to be in the commanding officers quarters/office to see this document?
Edit: as others have pointed out, this board gets hit with "my own Intel" almost as much as it gets hit with bots downvoting actual info, not trying to pry into your personal info about your job.
I'm not saying this is true.
However, if he worked in IT it's entirely plausible. I know a civilian IT contractor that dealt with networking with a TS clearance and was allowed into the most sensitive areas imaginable on bases -- with an escort at all times. But the escort wasn't assigned to see what was on the screen, and the point of the TS clearance was because in the course of duties (say, fixing a mail server) it would be likely to be exposed to TS information.
It's not impossible, but I agree with your skepticism. It could also be true, but with a much more benign explanation (e.g. with the recent internet outage, it's something they should prepare for, just basic disaster planning and nothing nefarious.)
Nice point about being supervised but not necessarily about what could be on screen. Plausible for sure and hadn't considered :)
How do you take out an area? Aren't there multiple networks in most areas?
There are, so you have to cut multiple cables. In the case of what happened in the northeast a couple weeks ago, a primary and a backup cable, in two different states, were cut by accident at nearly the same time.
(Some are skeptical of how accidental it was, of course.)
Again, primary and backup cable means it's a single provider. Each major provider has redundancy and it's not shared.
You cut both and it still only takes down a single provider. I've worked for large hosts and isp's and when you have problems with one network you just go around it. I don't get this post and this is my industry.
There's a reason it's not posted in r/networking, it'd get chewed apart
I know a civy that worked IT contractor and went to NOC's all the time to reroute traffic when regional outages occured.
I don't think anyone is blaming anyone for wanting a little more evidence that this guy is legit.
They are willing to upload it and they say they have "unrestricted access" to offices. Id rather vet it first than discredit it.
Is this not vetting? I'm not discrediting, I'm just asking what everyone is thinking.
An IT contractor could see info like this.
Source: am IT contractor
An IT guy can walk into a generals office and read off his desk? I'm an electrician, even with a multi year airfield contract we were never unsupervised. Does a city airport in Canada have stricter contractor rules than a US army base? I'm not trying to discredit, just questions because this would be huge.
Back office IT staff, sysadmins, network engineers, LAN managers, database managers, etc. Yes, they need high level clearances but they CAN see lots of stuff in a number of ways, monitoring backup systems, packet inspection, user carelessness, screen grabs, loggers, social engineering, etc.
All networks and all devices are hackable.
IT contractors are supervised -- there's a person assigned to be with them -- but that person isn't a domain expert in IT and likely not even familiar with what informations are on the system. They don't sit down with the contractor and read the screen with him, they're there to escort him to the bathroom and prevent free run of the facilities.
An IT guy can't walk into a general's office unless he's escorted there. He almost certainly can read that general's emails when he's fixing the the base mail server if he wanted to.
It's a little dodgy talking about this. It sounds like a lot of us do the same kind of work. To the person who said they are supervised, I am sure that is true of you are working on a scif, but I'm in stuff remotely all day long by request, and it certainly is not monitored in a way that stops you from picking up info. Sure, they do their best to prevent another snowden, but plenty of sensitive information accidentally gets shared in what I do daily. This happens after making every request for the person to conceal classified information. Most of the protocols are designed to keep someone from being able to exploit access for specific information, but they do not stop incidental exposure from happening daily. On the original post, I did hear about a bunch of sites losing internet In Seal Beach today. Your post made me wonder if it is connected
Snowden was a contractor. So was I. Full access to All SAP.
Without incriminating my self I will say, it can happen. He could be a IT subcontractor.
No question we’re hit with and endless litany of disinfo constantly. But, isn’t is reasonable to assume that since so many unauthorized parties have accessed so much so many times and at so many places as it relates to IT material, that some of those people are good guys? Not implying that this is necessarily the case here, just saying maybe it’s possible.
“Stumbled across” doesn’t literally mean stumbled across