Cali Fires, Hacked Smart Meters, and Sam Altman's OpenAI
The California fires seem to be caused by load oscillating attacks on smart meters to create faults (sparks) in the electrical grid. In 2024, Itron smart meter partnered with Microsoft Azure OpenAI.
We have seen videos circulating on social media about houses without smart meters not catching fire. But what if it’s not houses without smart meters, but homes that also have whole home surge protectors? I think that would be interesting to find out.

An October 16, 2012 article, Are California Smart Meters Causing Fires? published by PBS SoCal was already questioning the safety of smart meters and their fire risk.
What's the real culprit? Vergetis Lundin's sources have their suspicions:
Is Sensus getting a raw deal from PECO? "Yes," say some industry insiders -- because the "real" smart meter issue is overheating caused by a "hot socket," whereby meter boxes (all UL-tested by the way) do not allow for clean contact with meters.
A hot socket is a term used to describe the damaged caused to a meter by overheating and can be the cause of as many as 1,000 house fires per year. The sheer volume and distance between the multiple locations in California cannot be attributed to poor connections or bad installation. This looks more like unrestricted warfare and a hostiles hacking our energy grid to create fires.
But who and how?
First, the How
According to OSU’s College of Engineering, hackers can destabilize an electrical grid by manipulating smart meters to create an oscillation in electricity demand. The findings were published in IEEE Access.
In the 2023 study, associate professor Jinsub Kim and his team of researchers used a model known as a time-domain grid protection simulator to demonstrate how causing a load oscillation attack (switching meters on an off) can compromise the power grid.

One of the types of attacks made possible by the new technologies involves hacking into the advanced metering infrastructure, often abbreviated as AMI, and controlling the smart meter switches to cause load oscillations.
"Imagine calling everyone you know and saying, 'OK, at 6 p.m. we are all going to turn the lights on," Cotilla-Sanchez said. "Even if you got a couple thousand people to do that, it would be unlikely to cause much instability because the grid is able to absorb fairly big changes in supply and demand—for example solar panels at the end of the day do not produce electricity and we are able to anticipate and compensate for that.
"But if a person were to remotely coordinate a large number of smart meters to switch customers on and off at a particular frequency, that would be a problem."
That type of incident would start with someone performing reconnaissance by "poking" a couple of locations in a grid and using the information gained to estimate the grid's destabilizing oscillation frequency, he said. After determining which customer meters to turn on and off at that frequency—less than 1 Hertz or cycle per second—the attacker would be ready to launch an assault.
And comparatively speaking, an attack doesn't need to involve that many meters.
"We juxtaposed our work with related recent grid studies and found that a well-crafted attack can cause grid instability while involving less than 2% of the system's load," Cotilla-Sanchez said.
My last substack addressed the numerous faults registered in the power grid in the Pacific Palisades, Eaton, and Hurst in the hours just before the fires broke out. Were smart meters hacked to create the faults (sparks) registered by Whisker Labs in the electrical grid?
In 2012, most of the historically Black middle-class neighborhood of Altadena (Eaton) was fully switched over to smart meters before the opt out plan was approved by an administrative law judge. Now, it’s a pile of smoldering ashes.
The Who: Chisrael and the Silicon Valley Nazis
CISA director Jen Easterly said the biggest threat facing the nation’s utility industry comes not from Russia, which is bogged down in Ukraine, but rather from China. But Just China?
Benjamin Netanyahu said Israel and China are a “marriage made in heaven.”

The utility companies and the makers of the Sensus smart meters used in California risk losing a lot of money in lawsuits, so there’s not really any motive for their involvement.
Who would have the access to the numerous smart meters in California in order to create the load oscillation attack?
Smart Meters and DNA
Why is Lior Rauchberger—the Australian founder of MyDNA lab—also involved in home automation and smart meters? Maybe this is a spy operation? Smart meters spy on your energy consumption and weaknesses in the electrical grid and genetics spy on your DNA.
In 2021, the Jewish Australian Rauchberger merged his MyDNA company with Houston based Gene by Gene and its parent FamilyTreeDNA. FamilyTreeDNA lead by the very pro-Israel and pro-genocide Bennett Greenspan, Max Blankfeld, and Jim Warren. Greenspan moved his family from the Los Angeles area to Texas and Blankfeld is the owner of Blancap Investments.
Max Blankfeld has a very interesting Linkedin profile. He attended Technion in Israel from 1970-1973, serves on the National Council of AIPAC, and National Board of FIDF.
Bibi’s Boys and Australian Smart Meters
Rauchberger—who has ties to possible Israeli spies—is also the director of Urban Intelligence that specializes in designing and installing electrical home automation—specifically smart meters. His company Vivi targeted a “strategic US investment partner” and has “big plans to penetrate” even more of the US market.
His partner? Nuvo CEO Paul McMurtrie
Spotless Advanced Metering Services Acquired Nuvo
On November 2, 2016, Downer Group’s Spotless Advanced Metering announced its acquisition of electrical contracting and technology services firm Nuvo who partnered with Rauchberger.
“Led by [Nuvo CEO] Paul McMurtrie, Nuvo will arm Spotless with an elite team of technical advisors skilled across data platforms, security systems, electrical, high voltage, low voltage, smart systems and building technologies, CCTV, audio visual, lighting and technology integration,” the company said. “Nuvo has a growing presence in the areas of energy efficiency, solar solutions and battery storage systems.”
It’s the perfect resume for carrying out a load oscillation hack of a smart meter.
Spotless’s business model provides a service direct to retailers, including meter supply, finance, installation, maintenance servicing, and remote digital services. It’s parent company, Downer Group, has close ties to Australia’s utility sector.
Was Downer Group forced to sell off its Israeli connected smart meter assets?
Feb 20, 2024, Australia and New Zealand smart metering and energy data intelligence specialist Intellihub has acquired the smart metering assets from Downer’s Spotless Advanced Metering business. The Australian based company NET2GRID Energy AI also works with both Intellihub and Itron Inc.
On the July 4, 2024, the Australian Energy Market Commission (AEMC) announced an extension to the final date of November 28, 2024 for the accelerating smart meter deployment.
It seems these smart meters are being specifically targeted and hacked because they are a sign of petroleum’s future demise. If we no longer need oil, than Bibi has absolutely no leverage getting American troops involved in the Middle East to fight for Greater Israel.
Southern California Edison’s Ties to Sam Altman and Microsoft
In 2012, the American company Itron Inc. announced the 4 millionth smart meter installed by Southern California Edison. On February 15, 2024, Itron—that operates in California—announced they were integrating with Microsoft Azure OpenAI. Yes, the same OpenAI tied to Sam Altman, Elon Musk, and Peter Thiel. Microsoft’s R&D is also headquartered in Israel.

This integration will also tap into a wealth of previously unavailable data created by Itron and third-party DI applications, such as load disaggregation, transformer connectivity and loading data, resulting in faster time to development and deployment, lower operational costs and faster decision making for mission critical operations.
By allowing Itron to partner with Microsoft Azure OpenAI, it handed over our electrical grid data to our enemies. They knew the frequency needed for a load oscillation attack on those smart meters to cause fires.
Open AI a Netanyahu-Backed Cult
It seems the Silicon Valley Nazi Network and the Netanyahu Crime Syndicate with the help of their Chinese friends strike again.
Note: Just like White Americans aren’t responsible for actions of the Nazi network, Jewish and Chinese Americans are not responsible for the criminal actions of Chisrael.
I will continue to keep an eye on this story as more information becomes available. You know where to find me on X for tips and I’m now on Instagram (@divided.conquered).
You can follow me on X.com @DCinTejas—my DMs are always open—or email me at DCinTejas@proton.me. If you email just DM me, so I know to check it. Thanks!
-DeAnna Calderón
More reading on OpenAI:
First off, amazing article. Thank you for your attention to detail!
As an engineer (Loose definition lol), this makes me wonder about other technologies and companies that are vulnerable to production/service-line hacks that can be used to carry out terrorism. If I had all the money in the world right now, I'd probably spend it on burying those industries in ethical, patriotic engineers trained to spot and prevent ops and exploitable technology like this.
A lot of people don't realize how insecure most Technical Solutions are, or how they get that way. Most people, even Engineers, don't understand that you can design solutions to be fundamentally secure from certain kinds of attacks by avoiding certain design patterns, or that through manipulation of certain department leadership of the customer company, you can justify slipping control mechanisms into the Ghost Requirements for a technology that will effectively give you an undocumented backdoor.
For those reading who don't know, Ghost Requirements are psuedo-requirements that are assumed or a given due to the underlying technology(ies) being used, or how it's implemented.
For an oversimplified example, Architects like to use vertically federated, TCP-based Message Queues to upscale data flow from many endpoints to some central service in an easy to understand/visualize way. But they also require you to cache/store messages at several points in your infrastructure.
Depending on the size and nature of the data you're transporting, it might be easier and more secure to implement some encrypted UDP/DTLS scheme that maximizes direct throughput to your central service for scalability without caching your data anywhere outside the receiving Server's Kernel's own internal network packet queues, which are naturally access protected.
/Someone/ needs access to Message Queue Servers, but UDP/DTLS just passes through every router to the target without stopping, and should be encrypted (Unless you've not patched Heartbleed ;)).
So in this example, if your customer isn't bright, and you're criming and need access to customer data before it gets back to your App Server, you can just make sure you work Message Queues into your proposed Solution and it will be assumed that your "Support Teams" need access to the Queue Servers. Poorly handle or define your access points on these servers, and watch data get siphoned off.
Bonus points if you can convince them that an anti-virus program will reduce performance of the queue nodes.
The need for enforced standards for Architectural Security in the tech industry CANNOT be stressed enough. There is virtually no enforced regulation on this stuff in the US.
O'Connell railed against your work on patreon and called you a jewess. What the hell happened?