The Most Dangerous Cyber Towns

Where Cyber world Goes to Hide?
Exploring the world secret and 'the most dangerous cyber towns' of bulletproof hosting that’s hidden deep in underground bunkers, isolated at sea, in empty apartments.

Here are some notorious bunkers and isolated locations from all around the world.

CYBERBUNKER – ABANDONED NATO BUNKER TURNED BULLETPROOF HOSTBuilt in 1955 outside of the small town of Kloetinge in the southern part of the Netherlands, the bunker was intended as a wartime military command center, capable of withstanding a nuclear attack. Discarded by the Dutch military in 1994 and rebuilt in 1998 as a data center called CyberBunker, the facility is known for having provided bulletproof hosting to cybercriminals launching spammer, malware, and botnet attacks.

BAHNHOF: THE FORMER HOSTER OF WIKILEAKS
Built in 1970 as a civil defense center inside the White Mountains of Stockholm, this bunker was designed to protect essential government functions from enemy nuclear bomb attacks. In 2008, Swedish Internet provider Bahnhof converted the facility into a data center, notorious for providing hosting for websites such as WikiLeaks.

SOUTHEAST ASIA: HOME TO NOMADIC BULLETPROOF HOSTERS
The region of Southeast Asia contains the countries of Indonesia, Singapore, the Philippines, Thailand, Vietnam, Myanmar, Malaysia, and Cambodia.
Southeast Asia has been known to be a home to bulletproof hosters of illegal content, and has become one of the many battlegrounds in the war against cybercrime.

SEALAND: THE ISLAND HOME OF THE FIRST BULLETPROOF HOSTER
Sealand is located six miles off the coast of Suffolk, England, originally built by the British during World War II as an anti-aircraft gun platform. The platform was declared an independent nation in 1967 by occupant Roy Bates, with the mission to maintain freedom and justice for its citizens. In 2000, Bates, in partnership with Ryan Lackey, declared Sealand the new home of HavenCo, the world’s first bulletproof hoster.

THE BUNKER – UNITED STATES
Located in Montgomery, Texas, The Bunker was originally a 40,000 square foot nuclear bomb shelter constructed in 1982 by Louis Kung to protect his family and employees in the event of war or breakdown of society. The entrance to the facility previously concealed numerous gun ports and rooftop-mounted machine gun nests. Today, the site is a state-of-the-art data center campus with an adjacent four-story building used as a disaster recovery site. 


THE BUNKERS – UNITED KINGDOM
Built to protect British citizens in the event of a nuclear attack, two former command and control bunkers in Kent and Newbury were acquired from the UK Ministry of Defence and US Air Force in 1994 and converted into two colocation data centers. Self-proclaimed as “the UK’s most secure data center”, the Kent facility is located 30 meters behind a perimeter fence and boasts 3-meter-thick walls, 24-hour on-site technical and security team (ex-military & police), on-site MOD trained guard dogs, infrared cameras and military electromagnetic pulse protection.

SWISS FORT KNOX – SWITZERLAND
Cold War bunkers known as the Swiss Fort Knox.  Located 10km apart and hidden beneath the Swiss Alps near Lausanne, the data centers pull glacial water from a deep subterranean lake to enhance its cooling systems. The site features unparalleled security including facial-recognition surveillance and bulletproof surfaces to resist any military or terrorist threat. Swiss Fort Knox is one of 85 colocation facilities in Switzerland.

IRON MOUNTAIN – UNITED STATES
Former limestone mine in Western Pennsylvania became one of the world’s most secure colocation sites. The facility is located 65 meters beneath the ground, within a 200-acre campus protected by heavily armed guards, perimeter security, metal detectors, CCTV, biometric access controls and mantraps. Other features include private suites, secure cages, individual cabinets and a carrier-neutral network. Iron Mountain manages a total of six data centers across the United States.



Source: The Most Dangerous Town on the Internet - Where Cybercrime Goes to Hide 

Comments