Home   Medway   News   Article

Openreach cable theft and damage sees hundreds left without internet at Allhallows and Hoo

Hundreds were left without internet on the Hoo Peninsula due to "malicious attacks" on Openreach cables.

The last 10 days has seen vandals cut and steal cables, which connected homes and businesses to broadbrand, three times.

Hundreds were left without internet because cables were vandalised
Hundreds were left without internet because cables were vandalised

The first attack happened on Sunday, October 17, and most customers have been reconnected now.

Richard Ginnaw, senior manager of Openreach security, said: “Our network has been the subject of three malicious attacks in the past ten days affecting hundreds of customers on the Openreach network, including essential emergency services.

“At Allhallows, a cable was cut on 17 October at the junction of Grain Road and Powerstation Road, then another cable was cut yesterday near the junction of Ratcliffe Highway and Stokes Road. At Hoo, our cable was cut and stolen in two locations – Stokes Road and Vicarage Road.

“The police attended on each occasion and the areas were made safe. Most of the repairs have now been completed; the Hoo repairs are expected to be completed on Thursday, October 28.

"If any customers in the Hoo or Allhallows area are having problems with their broadband or phone connection, we’d recommend they report it to their service provider.”

Hundreds were left without internet on the Hoo Peninsula Pic: Historic England
Hundreds were left without internet on the Hoo Peninsula Pic: Historic England

EE confirmed the vandalism led to some customers being impacted in Allhallows yesterday and on Sunday.

Services are now fully restored, a spokesman said.

Kent Police have been approached for comment.

To get the latest updates in ongoing cases, police appeals and criminals put behind bars, click here

Read more: All the latest news from Medway

Close This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.Learn More