Related thread: https://voat.co/v/pizzagate/1527919
As you can see, I'm a first-time poster and please correct me, if I did something wrong while posting and of course if I missed some information.
It did basicly makes "sense" to me, that those organizations act the way they want and don't even try to hide their identity and it would be an interesting coincidence, but it seems like it is, because those IPs should be VPN IPs (of course it's possible, that they use the VPN provider to attack the wiki).
So I started researching the IP ranges the suspicious IPs are in. As pointed out before[1] the IPs belong to CachedNet LLC. A lot of those ranges are banned by several Anti Spam services[2], which is typical for VPN/Proxy-Providers.
After more research, since this is just speculation yet, I ended up in the support forum[3] of a VPN-Provider called "privateinternetaccess". There are multiple threads, in which people are complaining about the VPN, because it's not working that well. People, who use the VPN, get IPs (in Delaware) of CachedNet LLC, because the VPN-Provider probably bought them from CachedNet. You can also find a reference about the IPs status in spam databases like Spamhaus. The IPs are used for a lot of spam.
Quote from the forum user:
This doesn't appear to be working, when I connect via the New Zealand location. I have checked the IP location, and it comes up as Delaware U.S.A.
So, as I said at the beginning, DYNCORP might use the VPN to attack the Wiki, but the IPs location in Delaware is no evidence itself. Correct me, if I missed a fact.
[1] https://voat.co/v/pizzagate/1527919/7433447
[2] http://www.spambotsecurity.com/forum/viewtopic.php?f=7&t=3874
https://stopforumspam.com/ipcheck/162.212.171.37
https://cleantalk.org/blacklists/162.212.171.37
etc. etc.
[3] https://www.privateinternetaccess.com/forum/discussion/18802/new-zealand-vpn-not-working
Archive in case of deletion: http://archive.is/ACcDs
view the rest of the comments →
ghost_marauder ago
Occam's razor. Dynacorp IP was attacking host of anti Dynacorp Information. Means and motive.
Alternative actors must first have access to that particular VPN, or put a RAT on somebodies computer (1 being simple, 2 being a bit more difficult (especially on corp machines)). Motive, probable disinfo and narrative building. Or, to knock out the information.
Disinfo to drive down reputation and stock (reputation is already in the toilet, so money would matter), or to false flag us.
Narrative building. Launch attack, get us to look into this, waist time and effort of investigators. Alternatively, get us to pay more attention to dynacorp because they are doing something.
Knock out the info. Taking down the Pizzagate wiki would be a good blow for a Hacktivist, or somebody wanting attention. Either way, failure would not be good enough, and a continuation of attacks would be required.
If there is not a continuation of attacks then either a, they realize they are being watched and are planning side strategy; b have already achieved their goal.
In the end, I'll stick with the razor. Going down the alternative bunny wholes without any proof or sign post is kind of messy. And apologies to those who actually made it through my rant. My mind works off of branching, and linear text is like the worst form of communication for me.
Catsfive ago
This is not how the razor works. The number of assumptions in both theories is still the same. Our standards for proof must remain high. There is nothing wrong with having two plausible theories in play here and considering them both equally.