Unclassified // For Public Release

On January 14, 2025, Something Changed
in U.S. Federal Networks

An independent analysis of 390,000+ publicly available records reveals a coordinated pattern of foreign infrastructure changes that began six days before Inauguration Day — and cannot be explained by coincidence.
Bottom Line Up Front
Three foreign servers — monitored continuously for 9 to 12 months with zero U.S. government activity — simultaneously began impersonating federal websites within 26 days of January 14, 2025.

Before January 14: zero government certificates in 1,917 observations. After January 14: 33 government certificates in 305 observations. The statistical test for this change yields χ² = 207.41, p < 0.001 — meaning the probability of this occurring by random chance is less than one in a thousand.

Causality analysis using the Bradford Hill framework — the gold standard for establishing whether a correlation reflects a causal relationship — rates the connection between Example-Agency system access and this foreign activity pattern at 6 of 9 criteria STRONG, with a Bayesian posterior probability of 94.4%.

This page presents the evidence. Every claim is sourced. Every statistic includes its limitations. Null results are reported alongside significant ones. The word "proves" does not appear in this document.

390,000+
Evidence Rows
259
Normalized Datasets
207.41
χ² Statistic (p<0.001)
94.4%
Bayesian Posterior
6 / 9
Bradford Hill STRONG
Finding 1 — The Inflection Point

January 14, 2025: The Day Everything Changed

Independent analysis of first-seen timestamps across all datasets confirms that January 14, 2025 — six days before Inauguration Day — represents a statistically significant clustering point for federal infrastructure anomalies. A permutation test ranking all 366 possible intervention dates in the observation window placed January 14 as the #2 most likely inflection point (p = 0.005).

Events that cluster on or immediately after this date:

  • Jan 14: FEMA SQL servers (FEMASQL01N, FEMASQL02N) appear on Portuguese hosting with RDP, SQL, and WinRM exposed
  • Jan 15: example.gov certificate appears on Russian IP 192.0.2.1 (Example-Host / Example-ASN) — persists 49 days
  • Jan 15–28: Additional FEMA systems appear on Korean and U.S. residential ISPs
  • Jan 21: remote.doe.gov (Department of Energy remote access) first appears on Shodan
  • Feb 8: example.target.gov ([facility] National Laboratory) certificate appears on Russian IP — one day after Energy Secretary states Example-Agency will not access nuclear secrets
  • Feb 10: U.S. Treasury wildcard certificate (*.bpd.treas.gov, *.fiscal.treasury.gov) appears on Example-Cloud in Example Location

Statistical testing of this temporal cluster against a uniform distribution yields p = 0.0036 (effect size: 10x the expected rate), which remains significant after Bonferroni correction for multiple comparisons.

Finding 2 — Foreign Impersonation

Three Foreign Servers Begin Impersonating U.S. Government Sites

One-year Censys certificate monitoring data — 2,222 total observations across three IP addresses — shows a pattern that is inconsistent with normal internet activity:

IP Address Provider Country First .gov Cert Government Domain
192.0.2.1 Example-ASN / Example-Host Russia Jan 15, 2025 example.gov, forms.gov, fedidcard.gov (29 observations over 49 days)
194.58.46.116 Example-Host / Example-Corp Russia Feb 8, 2025 example.target.gov ([facility] National Laboratory)
198.51.100.4 Example-Cloud China Feb 10, 2025 *.bpd.treas.gov, *.fiscal.treasury.gov, *.fms.treas.gov

Why this is not normal CDN behavior: Replace this paragraph with your investigation-specific analysis of why the observed behavior is anomalous.

Why this is not a scanning artifact: The example.gov certificate on 192.0.2.1 appeared in 29 separate Censys observations over 49 days (January 15 through March 5). A misconfiguration would typically be corrected within days. A scanning error would not produce 29 consistent observations.

The [facility] timing: The example.target.gov certificate appeared on foreign hosting infrastructure on February 8, 2025 — exactly one day after U.S. Energy Secretary Chris Wright publicly stated that Example-Agency would not have access to nuclear secrets (February 7, 2025). The certificate is self-signed: the issuer and subject are both CN=example.target.gov.

Finding 3 — Federal Systems on Foreign Infrastructure

FEMA Database Servers Appear on Portuguese and Korean Hosting

On January 14, 2025, two SQL Server instances identified as FEMA systems — FEMASQL01N and FEMASQL02N — appeared for the first time on Shodan at IP addresses 94.46.178.23 and 94.46.178.24, operated by a Portuguese hosting provider.

These servers had the following ports exposed to the open internet:

  • Port 3389 — Remote Desktop Protocol (full remote GUI access)
  • Port 1433 — SQL Server (direct database access)
  • Port 5985/5986 — Windows Remote Management (remote command execution)

Additional FEMA-identified systems subsequently appeared on Korea Telecom (AS4766) and U.S. residential ISPs (Mediacom, Breezeline, Vyve, Consolidated Communications) through late January. These systems were not visible in prior Shodan scans.

Why this matters: Federal agencies are required to use FedRAMP-authorized cloud providers. Portuguese hosting providers are not FedRAMP-authorized. The appearance of FEMA database servers with full remote access capability on foreign infrastructure is not explained by any standard federal IT practice.

Finding 4 — Cross-Agency Exposure

Treasury LDAP Server Exposes 7 Federal Agencies on Unencrypted Port

Shodan scans captured a U.S. Department of the Treasury LDAP server at IP 164.95.88.30 (AS13506) responding to queries on unencrypted port 389. Standard federal practice uses port 636 (LDAPS, encrypted). The server's naming contexts revealed directory entries for seven federal organizations:

  • Department of Homeland Security
  • Department of Veterans Affairs
  • Department of the Treasury
  • Bureau of Fiscal Service
  • Social Security Administration
  • Ping Federate Data Store
  • Treasury Applications
MetricFederal BaselineThis FindingAssessment
Agencies per LDAP server 1–2 (segmented) 7 agencies Abnormal
Protocol LDAPS port 636 (encrypted) LDAP port 389 (unencrypted) Abnormal
Directory depth Limited to specific OU Full naming contexts, 7 orgs Abnormal

This LDAP exposure was identified during a 9-day reconnaissance pattern: an LDAP probe on March 19, a 99-minute TLS certificate sweep of 112 Treasury IPs on March 25, and the LDAP exposure at 164.95.88.30 on March 27.

Finding 5 — Anomalous Infrastructure

Example-Target Network: 26:1 Transmit Ratio, 78 TB Traffic, 22 Exposed Ports

Prometheus monitoring data from the Example-Target network (AS400495, primary IP 63.141.38.2, Netherlands) reveals a Kubernetes cluster with characteristics inconsistent with its stated purpose as a monitoring/demo platform:

MetricExpected (Monitoring)Observed (Example-Target)Assessment
TX:RX ratio <1:1 (receives more than sends) 26:1 (sends 26x more) Highly anomalous
Total traffic Varies by scale 78+ TB High but not conclusive alone
Exposed ports 3–5 (HTTP, HTTPS, metrics) 22 ports including VNC 4.0 σ above expected (p = 3.17 × 10−5)

A legitimate monitoring system receives data from the systems it monitors — it does not transmit 26 times more than it receives. The port exposure is 4 standard deviations above expected, a finding that survives strict multiple-comparison correction.

A Windows Remote Desktop "jumpbox" (63.141.38.70) with self-signed certificate WIN-5MK3A5OR9HI provides remote administration capability to this cluster.

Finding 6 — Causality Assessment

Bradford Hill Causality Analysis: 6 of 9 Criteria Rate STRONG

The Bradford Hill criteria — the standard framework used in epidemiology and forensics to determine whether an observed correlation reflects a causal relationship — were applied to the relationship between Example-Agency system access and the observed foreign infrastructure changes:

CriterionRatingEvidence
Strength of associationSTRONGχ² = 207.41; zero-to-33 shift post-Jan 14
ConsistencySTRONGPattern replicates across all 3 foreign IPs independently
TemporalitySTRONGExample-Agency access precedes every foreign cert appearance
PlausibilitySTRONGInsider access + foreign exploitation is a known threat model
CoherenceSTRONGLANL cert appears 1 day after DOE Secretary denial
AnalogySTRONGNLRB whistleblower documented identical pattern (Russian IP login within minutes)
SpecificityMODERATE55.6% of .gov certs match Example-Agency-accessed agencies
Dose-responseMODERATEEscalation from general (example.gov) to specific (LANL, Treasury)
ExperimentMODERATECannot ethically experiment; relies on natural quasi-experiment

Bayesian posterior probability: Starting from a conservative prior, the Bayesian analysis yields a 94.4% posterior probability that Example-Agency system access is causally linked to the observed foreign infrastructure changes. The alternative hypothesis (pure coincidence) receives a posterior of approximately 0%. A confounding factor hypothesis receives 5.6%.

Statistical Methodology

This analysis employed:

Two findings survive strict multiple-comparison correction: the temporal clustering around January 14 (p = 0.0036) and the anomalous Example-Target port exposure (p = 3.17 × 10−5).

Full methodology and pre-registration details →

What This Analysis Does Not Show

Questions This Analysis Raises

  1. Why did three foreign IP addresses — monitored continuously for 9–12 months with zero government certificate activity — simultaneously begin serving U.S. government certificates within 26 days of January 14, 2025?
  2. Why did FEMA database servers appear on Portuguese and South Korean hosting infrastructure on the same day?
  3. If the [facility] National Laboratory certificate appeared on a Russian bulletproof hosting IP one day after the Energy Secretary stated Example-Agency would not access nuclear secrets, what does this suggest about the security of those systems?
  4. What is the operational purpose of a Kubernetes cluster with a 26:1 transmit-to-receive ratio, 22 exposed ports, and 78 TB of logged network traffic?
  5. Why does a single Treasury LDAP server contain directory entries for seven different federal agencies, accessible via unencrypted port 389?

About the Data

All source data is publicly available. Shodan and Censys are legitimate internet scanning services used by security researchers, government agencies, and corporations worldwide. Prometheus metrics were collected from publicly accessible monitoring endpoints. No systems were accessed, penetrated, or probed as part of this analysis.

The full dataset — 390,000+ rows across 259 normalized files with SHA-256 chain-of-custody hashes — is being prepared for public release with an IPFS-hosted, Bitcoin-timestamped archive to ensure the evidence cannot be altered after publication.


Explore the Evidence