Opening comments and news from James
STOP SOPA and PIPA Now! OR
your favorite Internet sites will Fade to Black...
A follow up on below article:
I received this PC World link in email explaining the details of the operation. After reading I have two basic comments:
A)- if this is true at it's face value:
1)- This could be an idea to be used by TPB as an internet false flag.
2)- The concept of using the DNS servers for an Internet Kill Switch as outlined below is still 100% valid.
B)- If this story is part of a PsyOps... well... (Fill in the blank) what BlackOps, False Flag waiting ahead that can be masked by the confusion and broken communications
Thus I recommend, Highly recommend, we all take note of the IP's of your favorite web pages just in case there is a disruption, no matter who is behind it.
Also, check your computers for the DNS malware mentioned in the PPPW World article linked above. I checked and I am ok. -James
An Internet Kill Switch Test?
Perm Link= http://feet2fire.innersites.com/smf/index.php/topic,853.0.html
By James A. Jancik
Feb. 14th, 2012
FBI to Shut Down DNS Servers March 8th. [Source] This is why we need to get to know the direct IP URL address of your favorite Alternate (Better termed, "Real" these days) news websites.
They claim the reason is to root out some DNS based "Malware"; which in itself might be true. BUT, it is a perfect mask of what I said months ago would be the real Internet "Kill Switch"; that is to shut down the main DNS servers. This can implemented very easily and cut off access for most named websites. (IE.- www.feet2fire.com, etc). And with rumored IRAN or Syria invasion floating around for those time frames, well, it got me to thinking about this again.
This has been attempted in the past in form of semi coordinated attacks but failed. But it did demonstrate a potential threat, though downplayed, the the bulk of all DNS requests do go thru a relatively few number of servers (more of a function of routing convenience, rather then hard limits).
I'll be damned if I cannot find the source story I read. I think it was in 2007-2009. There are 13 Root Clusters under IPv4, expanded to many more on IPv6. But, the article pointed out (by chance) that ~10 to 20 servers handed the major portion (like 80-90% of root inquiries). And an attack was made on these few servers that failed; alleged at that time for be from China (which they denied). But it pointed out that if these shut down, most of the DNS traffic would have to reroute lessor servers, thus created logjams and would resort to many DOS protective actions by those servers and would effectively lock up the internet traffic. I thought this would be a perfect quick, easy internet kill switch if these main servers were "volunteered" to shut down. While not perfect, the chaos/re-routed/overload would be VERY effective.
After poking around looing for the original story I read, I found these:
"The attackers targeted five of the Internet's DNS root name servers, using bots or zombified computers to execute the DDOS attack. Two of the root name servers eventually dropped 90 percent of their DNS query traffic"
"The majority of the traffic came from nodes in Seoul (61 percent of the attack traffic) and Beijing (18 percent). Another 13 percent originated from nodes in San Francisco and another 7 percent elsewhere, according to ISC numbers."
"If the DNS servers were to fall over then pandemonium would ensue,..."
"had the attack been successful then all website access and email delivery would have been suspended globally."
The way around this theoretical kill switch is to go directly to your website and bypass the DNS servers. To do this is to use the actual IP address. Examples:
www.tradegyandhope.com is http://18.104.22.168
www.sott.net is http://22.214.171.124
The trick is to get these addys BEFORE the DNS servers go down.
Here is a link I used to get the numbers:
But there are others. [Google Search] As you will see not all domain names convert to raw IP numbers. One of the reasons is they are on a shared server with shared IPs and many use the same IP. Feet to the Fire is one of these types. However, it's sister server, http://126.96.36.199 (while being on a shared server) does have it's own unique IP. http://188.8.131.52
In the event this "test" coincides with some type of False Flag/C0-Intel/Black-Op, (or a test to be used at some future point) use the above IP and scholl down to access a special (limited) Feet to the Fire mirrored site. Or, you can try this direct link:
My point is the FBI will shut down these "backbone" servers on March 8th. which, as these articles have said, will cripple Internet access and emails world wide. Since 99% of the internet users have no idea what a DNS server is, let alone a workaround, one cannot realistically get a better, more effective Kill Switch. If this is not the Big Kill to coincide with Mid East War Plans, , they may be testing testing for the day still to come.. So, learn your favorite websites' true IP address ASAP!