Clippy and Bob were unavailable for comment.
While tidying up some loose ends, I took an inventory of the Kimberlin-related websites that are still running. The following sites are no longer accessible.
op-critical dot com
indictbreitbart dot org
alightymedia dot org
occupyforaccountibility dot org
americancrossroadswatch dot org
The apparent reason is that there is no hardware connected to their IP address. These sites first went dark several months ago when their name sever was taken down. Now the server hosting them is gone.
Op-Critical’s account on MySpace (yes, MySpace still exists) appears unused and doesn’t seem to have links to any of the band’s music. At least some of their videos are still on YouTube.
On the internet nobody can hear you being subtle.
macOS 11.0 (Big Sur) has been released. I have it running on my laptop, and the results have been quite satisfactory so far. Most applications seem to be running faster than they did under 10.15.7.
Over the past couple of days, I’ve taken note of the disappearance of most, if not all, of the Kimberlin-related websites hosted in the U. S. It appears that the reason is that the registration for the web domain that hosted the name server for those sites has expired.
Brett Kimberlin has moved another one of his websites to an offshore server. The greencasamaryland dot org site is now hosted on the same server in Holland as breitbartunmasked dot com and empr dot media.
Seven years ago today, I ran this post about Dread Pirate #BrettKimberlin and Autocorrect.
* * * * *
I abbreviate the name of TDPK’s 501(c)(4), Velvet Revolution US as VRUS. The autocorrect keeps trying to insert an i.
Maybe I should let it.
* * * * *
Of course, there’s a significant difference between the VRUS website (which is still up wasting bandwidth) and a virus. Most viruses have better continuing support from their originator.
This post from six years ago today was about #BillSchmalfelt and Malware.
* * * * *
UPDATE—Less than an hour has gone by since my initial post, and the Cabin Boy has pulled down that version of the Patriot-Ombudsman home page (H/T, Frankie in the comments).
UPDATE 2—It’s 30 minutes later, and trying to get to Patriot-Ombudsman results in being forwarded to the Old Uncle Bastard site (NIWLTI) which doesn’t seem to have been maintained for the past few months.
UPDATE 3—The Sore Loserman now has the Old Uncle Bastard site sorta/kinda up and running. He claims that his other site was “hit by malware.” Yeah, the Weiner “I-was-hacked” defense.
* * * * *
Almost every Team-Kimberlin-related website has some form of crapware such as adware, tracking cookies, and, occasionally, genuine malware. Extremely good protection software is highly recommended.
… the FCC finally pulled the plug on Net Neutrality. I seem to remember that this was one of the things that was supposed to kill us or at least raise the price of sending an email to a dime.
I don’t appear to be dead yet.
There are a lot of computers here at Stately Hoge Manor dedicated to various purposes—CAD systems, music recording, amateur radio, software development, gaming, and more. Most of them have a wireless mouse associated with them, so it’s become as standard practice to give each wireless mouse a unique name. Around here the list of mouse names includes:
I’ll click on Pinky to publish this post.
Res ipsa loquitur.
On the internet nobody can hear you being subtle.
Five years ago today, I did a post Brett Kimberlin and Vitamin A Deficiency about Brett Kimberlin’s involvement with the anti-GMO crowd. He has a website called citizensagainstgmo dot com which hasn’t been maintained for years. In 2014, that site was hosted on the same server as 24 other Kimberlin-related sites.
* * * * *
There are 25 sites currently hosted at 126.96.36.199.
* * * * *
AKAIK, there aren’t any more Kimberlin-related sites at that IP address. Some of them have metastasized elsewhere. Some are gone for good.
These sites are now hosted at 188.8.131.52—
7. velvetrevolution.us 184.108.40.206
These sites are now hosted at 220.127.116.11—
4. protectourelections.org 18.104.22.168
These sites are now hosted on generic GoDaddy servers—
This site is now hosted at 22.214.171.124—
This site is now hosted at 126.96.36.199—
These domains are registered but don’t have active websites—
These domains are gone—
The Gentle Reader may wonder why one would bother to gather such information. Suffice it to say that webhosting isn’t free, and one can learn things by following the money.
This is the webpage for a domain called treasonisttrump dot com. It was registered on 4 June, 2018, and is hosted on the same server as jtmp dot org, protectorelections dot org, and several other Kimberlin-related web sites.That’s the whole website so far. I guess The Dread Deadbeat Protector Kimberlin was too busy protecting elections and doing other important stuff to even put a working DONATE button on the site. However, neglecting this site was a mistake. As of last night, treasonisttrump dot org ranked 6,972,797 on the Internet and protectourelections dot org ranked 9,456,252.
10 A$=”I’m learning to code!”
20 PRINT A$
The Daily Caller has a report concerning a debate among employees at Google about how to manipulated search results to disfavor politically incorrect websites. The report says they have copies of communications showing that The Daily Caller and Breitbart were specifically targeted.
The report quotes a Google employee as saying, “I think we have a responsibility to expose the quality and truthfulness of sources,” as justification for manipulating search results. The report quotes a Google spokeswoman saying that the conversation did not lead to manipulation of search results for political purposes.
“This post shows that far from suppressing Breitbart and Daily Caller, we surfaced these sites regularly in our products. Furthermore, it shows that we value providing people with the full view on stories from a variety of sources,” the spokeswoman told TheDCNF in an email.
“Google has never manipulated its search results or modified any of its products to promote a particular political ideology. Our processes and policies do not allow for any manipulation of search results to promote political ideologies.”
I’ve switched to DuckDuckGo as my default search engine.
UPDATE—The Intercept has a post up about Google’s work on Dragonfly, a search engine for China that would censor broad categories of information about human rights, democracy, and peaceful protest.
The project, as it was then specified, was not something I could sign off on in good conscience.
Read the whole thing.
The Daily Caller is reporting another protest by Google employees. About 1,400 of them signed a letter about the Dragonfly project being worked on for China so that they could take “ethically-informed decisions about our work, our projects, and our employment.” According to the article, that’s only about half the number of Google employees who signed on to a letter opposing Google’s work on a DoD image recognition contract.
Google complied with the employee request concerning its AI development work with the DoD and failed to renew the contract. Will Google now back away from developing a censored search engine for China?
The Times of Israel has an article up about recent intelligence operations directed against Iran.
Iranian infrastructure and strategic networks have come under attack in the last few days by a computer virus similar to Stuxnet but “more violent, more advanced and more sophisticated,” and Israeli officials are refusing to discuss what role, if any, they may have had in the operation, an Israeli TV report said Wednesday.
The report came hours after Israel said its Mossad intelligence agency had thwarted an Iranian murder plot in Denmark, and two days after Iran acknowledged that President Hassan Rouhani’s mobile phone had been bugged. It also follows a string of Israeli intelligence coups against Iran, including the extraction from Tehran in January by the Mossad of the contents of a vast archive documenting Iran’s nuclear weapons program, and the detailing by Prime Minister Benjamin Netanyahu at the UN in September of other alleged Iranian nuclear and missile assets inside Iran, in Syria and in Lebanon.
And Reuters reports that the Iranians have sorta/kinda fessed up on the computer virus attack.
Gholamreza Jalali, head of Iran’s civil defense agency, said on Sunday that Iran had recently neutralized a new version of Stuxnet.
“Recently we discovered a new generation of Stuxnet which consisted of several parts … and was trying to enter our systems,” Jalali was quoted as saying by the semi-official ISNA news agency at a news conference marking Iran’s civil defense day. He did not give further details.
Sounds like some folks at the Mossad have been earning their pay.
VelvetRevolution.us is a 501(c)4 not-for-profit run by Brett Kimberlin. It’s articles of incorporation say the the purposes of the corporation are “The public welfare and a minority for political activity”—whatever that really means. The corporation is the registered owner of several web domains. The Gentle Reader should not be surprised to learn that one is velvetrevolution dot us. Here’s are the others:
brettkimberlin dot info
brettkimberlin dot net
brettkimberlin dot org
brettkimberlin dot us
mccutcheonwatch dot info
trumpindependentforpresident dot net
The mccutcheonwatch domain appears to be a companion to mccutcheonwatch site that used to be hosted on the same server as the Justice Through Music Project site.
The brettkimberlin domains being owned by VRUS could be a use of corporate funds to cover personal expenses.
The trumpindependtforpresident domain is intriguing. It was registered in August, 2015.
While drinking my first cup of coffee this morning, I took a look through the connection log for Hogewash! for the last couple of thousand logins. There were 9 folks still using XP and one connection each from users of Vista, Windows 8, and FreeBSD i686.
The two most popular systems were Windows 10.0 and iOS 11.2.4. Together, they accounted for about half the connections.
FWIW, the machine I usually use to create this site is currently running MacOS 10.13.4.
Yesterday, I posted a brief description of some of the types of operating systems used on device that have connected to Hogewash! recently. I mentioned that one visitor was using a PS 4. That user is now attempting to mask the operating system of his device.
The Gentle Reader will probably not be surprised to learn that most common operating systems used on devices which connect to Hogewash! are Windows 10 and Windows 7. They are slightly more common than iOS 10 and iOS 11. Android 7 is back in fifth place just ahead of MacOS 10.13.
Some of the less common systems include various forms of Linux (mostly Ubuntu) and Windows 8, and about 1% of visitors are still running Windows XP. One visitor is using a PS 4.
UPDATE—Corrected a typo.
Yep. We’re still waiting for news from the pending Team-Kimberlin-related court cases, so here’s another example of false reporting by the Cabin Boy™ caused by his limited understanding of how the Internet really works. This was originally published as a Prevarication Du Jour on 13 October, 2015.
* * * * *
The Cabin Boy™ has posted what he claims to be the text of an unsolicited comment he allegedly received to one of his posts. He says that he believes that the comment is from [redacted] in Manassas, Virginia. He claims to have traced the IP address back to a cell tower near where [redacted] lives, and he provides a map with the location of the cell tower shown.
According to the several utility databases, there is a cell tower within a few dozen feet of the location shown. However, according to the FCC, [redacted]’s cellular provider is not on that tower. Moreover, why would [redacted] use his cellular connection if he were at home. Even he were using his phone instead of a computer, he would more likely use a the wi-fi connection into his landline cable provider to avoid data charges and for higher speed.
This leaves several possibilities. One is that one of the Cabin Boy™ “friends” is pranking him. Another is that the whole thing is a lie. Or perhaps it’s something else.
UPDATE—I’ve just verified how IP addressing works for mobile devices. The IP address seen by the Internet looking back at a mobile device is actually the address of a server at the cellular ISPs point-of-presence. For example, my portable wi-fi hotspot is sitting on our kitchen table in Westminster, Maryland, and I can see the lights on the carrier’s tower out the living room window, but the IP address associated with it on the Internet is in Arlington, Virginia.
In order to determine the address of a connection all the way back to a cell tower, one needs to go through the carrier’s internal connection logs. That requires a subpoena. How many of you think that the Cabin Boy™ was able to get a subpoena for information sent this afternoon, serve the subpoena, and get the response from [redacted]’s cell phone carrier in a matter of a few hours? For that matter, how many think he could get such a subpoena in the first place?
* * * * *
And the Cabin Boy™ thinks that he’s going to be able to use the discovery process in his LOLsuit VIII to force ISP and the like to disgorge all sorts of information about the IP address and that hie can use them to identify more of his perceived enemies. Even more silly, he thinks LOLsuit VIII will survive long enough to allow for any discovery.
Any fool can write code that a computer can understand. Good programmers write code that humans can understand.
Here’s some fun factoids about the Interwebz—That’s the complete list of the web domains using xeonhosting dot net for a nameserver as of 21:30 UTC yesterday. I’ll leave it to the Gentle Reader to note anything else these domains might have in common.
Meanwhile, we’re at T-minus 16 days and counting in the Hoge v. Kimberlin, et al. lawsuit.