Feeds

O2's southeastern crash caused by 'well-organised theft'

Work of an international gang, seemingly

High performance access to file storage

Updated O2's ongoing outage was down to a well-organised theft of networking kit, which engineers are struggling to replace while promising to connect customers by close of play.

O2 customers in North and East London, Sussex and Kent are still without service following a break-in at one of the operator's unmanned sites. While clearly professionals the thieves still managed to make a mess of the site, which is why it's taking so long to get the network up and running again.

The break-in was at one of O2's East London hubs, around midnight, with engineers responding when huge chunks of South East England lost connectivity. Repairs were further delayed by the necessity of securing the site until plods arrived to gather evidence, in the hope of catching the miscreants responsible.

Photographs taken and evidence gathered, the engineers are now working on restoring the network and O2 is hoping to have full coverage again later today.

But no one is expecting network switches to turn up in the local boozer or market stall; it seems this theft was professionally carried out and probably with a buyer in mind. Telecom switches are expensive bits of hardware, but only to the right person - your average tealeaf would have more luck shifting a Monet than a network switch, but there are operators around the world who will pay for the right equipment.

In February Vodafone was hit by a similar theft, in Basingstoke, which also saw specialist switches disappear in the middle of the night and customers left disconnected for half a day.

Neither Vodafone nor O2 is saying exactly what was taken, or how far the police investigations have got - but expect to see all the network operators reviewing their security arrangements in the next few weeks. ®

Update

O2 has now sent us the following statement: "Following the theft and vandalism at one of our operational sites in E London, we have been working hard to resume normal mobile service to N and E London, Kent and E Sussex. Some affected customers were able to make calls again from 4.30 pm, and service across the region is being restored now with a few pockets of no coverage still remaining. We are carefully monitoring this throughout the night."

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.