Feeds

O2's southeastern crash caused by 'well-organised theft'

Work of an international gang, seemingly

Intelligent flash storage arrays

Updated O2's ongoing outage was down to a well-organised theft of networking kit, which engineers are struggling to replace while promising to connect customers by close of play.

O2 customers in North and East London, Sussex and Kent are still without service following a break-in at one of the operator's unmanned sites. While clearly professionals the thieves still managed to make a mess of the site, which is why it's taking so long to get the network up and running again.

The break-in was at one of O2's East London hubs, around midnight, with engineers responding when huge chunks of South East England lost connectivity. Repairs were further delayed by the necessity of securing the site until plods arrived to gather evidence, in the hope of catching the miscreants responsible.

Photographs taken and evidence gathered, the engineers are now working on restoring the network and O2 is hoping to have full coverage again later today.

But no one is expecting network switches to turn up in the local boozer or market stall; it seems this theft was professionally carried out and probably with a buyer in mind. Telecom switches are expensive bits of hardware, but only to the right person - your average tealeaf would have more luck shifting a Monet than a network switch, but there are operators around the world who will pay for the right equipment.

In February Vodafone was hit by a similar theft, in Basingstoke, which also saw specialist switches disappear in the middle of the night and customers left disconnected for half a day.

Neither Vodafone nor O2 is saying exactly what was taken, or how far the police investigations have got - but expect to see all the network operators reviewing their security arrangements in the next few weeks. ®

Update

O2 has now sent us the following statement: "Following the theft and vandalism at one of our operational sites in E London, we have been working hard to resume normal mobile service to N and E London, Kent and E Sussex. Some affected customers were able to make calls again from 4.30 pm, and service across the region is being restored now with a few pockets of no coverage still remaining. We are carefully monitoring this throughout the night."

Internet Security Threat Report 2014

More from The Register

next story
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.