
Secret Service zaps Weaponized SIM Farms @”Shut Down” NYC Cell Networks
Investigators seized 300 SIM servers and 100,000 SIM cards across multiple sites.
(ZeroHedge) – Hours before President Donald Trump’s address to the United Nations General Assembly, the U.S. Secret Service announced that it had dismantled a massive, decentralized SIM farm network, just 35 miles from New York City, hidden inside five abandoned apartment buildings. The telecommunications stealth weapon was capable of paralyzing regional cell networks through denial-of-service attacks.
Key Details from the Secret Service Report:
Investigators seized 300 SIM servers and 100,000 SIM cards across multiple sites.
The devices enabled anonymous threats, encrypted communications, and could launch telecom attacks such as:
- Disabling cell towers
- Denial-of-service attacks
- Secure communication for criminal enterprises
Early analysis shows links between nation-state actors and known criminals.
CBS News described the seizure as the largest of its kind, noting the network was scattered across abandoned apartment buildings at more than five sites, roughly 35 miles from New York City.
The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General… pic.twitter.com/sZKUeGqvGY
— U.S. Secret Service (@SecretService) September 23, 2025
“This https://youtu.be/xdVmp1gwyZonetwork had the potential to disable cell phone towers and essentially shut down the cellular network in New York City,” Secret Service Special Agent in Charge Matt McCool stated in a video released in the report by the agency.
Beyond DDoS attacks, the SIM farms could also support psychological warfare operations such as:
- Mass disinformation campaigns
- Emergency false alerts (e.g., fake evacuation texts)
CBS, citing multiple officials briefed on the probe, reported that early findings suggest the network was used for communications between foreign governments and individuals already known to U.S. law enforcement.
In our view, the likelihood of this being part of a larger threat vector for potential physical terrorism appears elevated. Consider this: disrupting communications in tandem with a physical attack would be the playbook for foreign adversaries – or perhaps even the globalist …
_________
Header featured image (edited) credit: (AP Photo/Richard Drew). Emphasis added by (TLB)
••••
••••
Stay tuned…
••••
The Liberty Beacon Project is now expanding at a near exponential rate, and for this we are grateful and excited! But we must also be practical. For 7 years we have not asked for any donations, and have built this project with our own funds as we grew. We are now experiencing ever increasing growing pains due to the large number of websites and projects we represent. So we have just installed donation buttons on our websites and ask that you consider this when you visit them. Nothing is too small. We thank you for all your support and your considerations … (TLB)
••••
Comment Policy: As a privately owned web site, we reserve the right to remove comments that contain spam, advertising, vulgarity, threats of violence, racism, or personal/abusive attacks on other users. This also applies to trolling, the use of more than one alias, or just intentional mischief. Enforcement of this policy is at the discretion of this websites administrators. Repeat offenders may be blocked or permanently banned without prior warning.
••••
Disclaimer: TLB websites contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of “fair use” in an effort to advance a better understanding of political, health, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than “fair use” you must request permission from the copyright owner.
••••
Disclaimer: The information and opinions shared are for informational purposes only including, but not limited to, text, graphics, images and other material are not intended as medical advice or instruction. Nothing mentioned is intended to be a substitute for professional medical advice, diagnosis or treatment.
Leave a Reply