"Machines in Flames is an experimental documentary that details the journey Thomas and Andrew underwent in the search for the group CLODO (Committee for Liquidation and Subversion of Computers). CLODO were/are an elusive group who were invested in attacking and burning down computer centres in France in the early 1980s. After a series of attacks in Toulouse, they disappeared and were never discovered."
This is a option that shouldn't be discounted. Listened to the excellent Popular Front podcast on CLODO (https://podcasts.apple.com/gb/podcast/the-anti-tech-militant...).
These were very sophisticated, probably computer scientists themselves who were horrified at how the tech would be used and sabotaged a lot of the infrastructure. Seemingly just to make a point in the history books that the way things went was not without resistance.
Why not? In all of the material that you and GP link to, it is said that CLODO was last active in the 80's and then vanished, never to be heard from again. That's over 30 years of apparent inactivity. There are some coincidences between the target and CLODO's previous targets, but... that's it.
Edit: From Wikipedia...
>Since December, 1983, CLODO has no longer been classified as 'active' by the National Consortium for the Study of Terrorism and Responses to Terrorism.
CLODO is a French slang word for homeless, in my youth (50 years ago) it was used sometimes as a synonym for "hippie".
"One who chooses not to conform to prevailing social norms: especially one who subscribes to values or actions such as acceptance or self-practice of recreational drug use, liberal or radical sexual mores, advocacy of communal living, strong pacifism or anti-war sentiment, etc."
You don't need to be a "professional" to find where important internet cables are, lift manhole covers and chop them in two places with some sort of cordless powertool or whatever. You just need to be motivated enough to do a targeted vandalism instead of a random one. This reminds me of computer hacks where the victim describes the attack as "sophisticated" to try and hide their own security incompetence.
Multiple locations, coordinated roughly at the same time: that's boyscout level hard. You need a map and a watch, is all.
You don't need power tools, just a cutter. This is fiberglass coated in something like PVC. A knife will do. This "hard to repair" refers to making two cuts, a bit further apart than whatever slack is in the cable. You do that by taking up the slack, then making cuts where the cables don't touch.
It does not scream professional in the slightest, only motivation and a few like-minded people.
They way it's done is everyone checks in to a group chat when they are in position and then one person in charge (either back at home or even himself in the field) tells the group to go when he judges everything to be ready.
You walk along major roads, railways, rivers and under bridges checking for manholes. They have the owners' names on them. If it's the name of a telco, there's fiber in there.
A decent high leverage cable cutter costs under $50 and cuts through fibre like butter. A few seconds at each point where fibre is accessible is all that's needed to do damage that costs hundreds to thousands of dollars to fix. Damage a cable in multiple locations and it's pretty easy to create a 24+ hour outage as repair crews won't know the extent of damage until multiple repairs are made. Physical telecom infrastructure is really easy for a determined attacker to take out of service, and if they're wearing an orange vest, nobody will think twice to question them.
Reading between the lines of the previous reports the particular locations chosen to cut seem to suggest some inherent knowledge about major transport networks.
In the sense they knew where to go to take down primary and backup paths etc. Cut the cables twice to prevent easy splicing etc.
Reminds me of the Metcalc power infrastructure attacks [0]. Can't help but feel these are some sort of state level trial runs of some sort.
We're seeing this with Ukraine & starlink to some extent - infra is now a key component of warfare & frankly dry runs make sense in that context. Same with testing your ability to cut undersea cables
> I wouldn’t rule out a nation state “practice” attack though.
I would...
Backbone routers scattered across the country suddenly go dark, nobody has any idea what happened, and logs are missing? Sure, you can pin that on nation-states if you want. Or APTs, Annoyingly Persistent Teenagers, depending on the style of the attack.
"Physically going into another nation and cutting their infrastructure up" is closer to an act of war than most nations will get for "practice."
2 weeks after mass graves were found outside Kyiv.
2 days after Macron wins the election and is congratulated by Putin.
Tensions were heightened in unusual ways. Motive was probably not in short supply.
Disgruntled worker Vandalism? Anti-tech vandalism? Attack on broad flows of traffic by a nation-state?
Or maybe a highly targeted attack against an unidentified victim entity who relied on multiple redundant links for security/comms in a sexy French movie-style heist? Someone should check to see if the Mona Lisa has been replaced with a fake.
What is the certain way that was used that makes people think it was a professional? A clean cut is easier to fix that a hacksaw cut, but the technician can always cut off an extra piece to have a clean cut to join. A large missing piece is harder to fix, but even non professionals could think of that. Not sure what else was done to those cables.
A far more effective way to sabotage the infrastructure would be to plant a bomb there, in the hole. It does not even have to be a functional bomb. It's enough to just make the repair technicians fear for their lives. It will take a lot of time for them to call a bomb disposal unit, and so on.
And then you repeat that a couple of times at random places. If you don't want to kill people, the first bombs should be duds, but occasionally some of the later bombs should be real, so they don't let down the guard, but learn to fear the repair jobs.
Then after that, EVERY SINGLE repair job, even when you didn't actually sabotage it yourself, would become super-expensive and take lots-and-lots of time.
After you trained them, you can lower the number of sabotages with mostly duds, and the occasional real bomb, to just once every couple of months. They still need to handle every single repair job as if you had been there. Minimal cost for you, maximized cost for them.
It also scales up law enforcement's efforts to catch you, and pushes the criminal act you would perform up to terrorism. There are not many who would be willing to throw away their lives for acts that mostly just cause a bit of economic damage.
"Machines in Flames is an experimental documentary that details the journey Thomas and Andrew underwent in the search for the group CLODO (Committee for Liquidation and Subversion of Computers). CLODO were/are an elusive group who were invested in attacking and burning down computer centres in France in the early 1980s. After a series of attacks in Toulouse, they disappeared and were never discovered."
https://machinesinflames.com/ https://theanarchistlibrary.org/library/le-clodo-clodo-speak... https://landscapesurgery.wordpress.com/2022/05/23/machines-i...