Team Kimberlin Post of the Day


Seven years ago today, I ran this post about Dread Pirate #BrettKimberlin and Autocorrect.

* * * * *

I abbreviate the name of TDPK’s 501(c)(4), Velvet Revolution US as VRUS. The autocorrect keeps trying to insert an i.

Maybe I should let it.

* * * * *

Of course, there’s a significant difference between the VRUS website (which is still up wasting bandwidth) and a virus. Most virus have better continuing support from their originator.

Team Kimberlin Post of the Day


This post from six years ago today was about #BillSchmalfelt and Malware.

* * * * *

When I went to check on the Cabin Boy’s Patriot-Ombudsman website (No, I won’t link to it.) this morning, the Opera browser showed me this:P-Omalware

Poking around the actual code for his home page revealed this:P-Omalware1

Hmmmmm.

UPDATE—Less than an hour has gone by since my initial post, and the Cabin Boy has pulled down that version of the Patriot-Ombudsman home page (H/T, Frankie in the comments).

UPDATE 2—It’s 30 minutes later, and trying to get to Patriot-Ombudsman results in being forwarded to the Old Uncle Bastard site (NIWLTI) which doesn’t seem to have been maintained for the past few months.

UPDATE 3—The Sore Loserman now has the Old Uncle Bastard site sorta/kinda up and running. He claims that his other site was “hit by malware.” Yeah, the Weiner “I-was-hacked” defense.

Uh, huh.

* * * * *

Almost every Team-Kimberlin-related website has some form of crapware such as adware, tracking cookies, and, occasionally, genuine malware. Extremely good protection software is highly recommended.

Wireless Mice


There are a lot of computers here at Stately Hoge Manor dedicated to various purposes—CAD systems, music recording, amateur radio, software development, gaming, and more. Most of them have a wireless mouse associated with them, so it’s become as standard practice to give each wireless mouse a unique name. Around here the list of mouse names includes:

Mickey
Minnie
Pinky
Brain
Tom
Jerry

I’ll click on Pinky to publish this post.

Team Kimberlin Post of the Day


Five years ago today, I did a post Brett Kimberlin and Vitamin A Deficiency about Brett Kimberlin’s involvement with the anti-GMO crowd. He has a website called citizensagainstgmo dot com which hasn’t been maintained for years. In 2014, that site was hosted on the same server as 24 other Kimberlin-related sites.

* * * * *

There are 25 sites currently hosted at 184.171.169.170.

1. americancrossroadswatch.org
2. breitbartunmasked.com
3. breitbitnews.com
4. campaignaccountabilitywatch.org
5. citizensagainstgmo.com
6. exposedpolitics.com
7. groundswellexposed.com
8. huntonandwilliamswatch.org
9. indictbreitbart.org
10. issaoversight.org
11. jtmp.org
12. kochwatch.org
13. mccutcheonwatch.org
14. nrawatch.org
15. occupyforaccountability.org
16. op-critical.com
17. pressswarm.org
18. prosecutenewscorp.com
19. protectourelections.org
20. pussyriotdefensefund.org
21. serveroverlords.com
22. smartechwatch.org
23. soshanyuanhost.net
24. velvetrevolution.us
25. whoistedcruz.com

* * * * *

AKAIK, there aren’t any more Kimberlin-related sites at that IP address. Some of them have metastasized elsewhere. Some are gone for good.

These sites are now hosted at 198.15.113.115—

1. americancrossroadswatch
2. campaignaccountabilitywatch.org
3. citizensagainstgmo.com
4. huntonandwilliamswatch.org
5. occupyforaccountability.org
6. op-critical.com
7. velvetrevolution.us 198.15.113.115

These sites are now hosted at 209.188.0.218—

1. indictbreitbart.org
2.  jtmp.org
3. kochwatch.org
4. protectourelections.org 209.188.0.218

These sites are now hosted on generic GoDaddy servers—

1. exposedpolitics.com
2. issaoversight.org

This site is now hosted at 134.19.177.202—

breitbartunmasked.com

This site is now hosted at 196.245.246.71—

mccutcheonwatch.org

These domains are registered but don’t have active websites—

1. nrawatch.org
2. prosecutenewscorp.com

These domains are gone—

1. breitbitnews.com
2. groundswellexposed.com
3. pressswarm.org
4. pussyriotdefensefund.org
5. serveroverlords.com
6. smartechwatch.org
7. soshanyuanhost.net
8. whoistedcruz.com

The Gentle Reader may wonder why one would bother to gather such information. Suffice it to say that webhosting isn’t free, and one can learn things by following the money.

Team Kimberlin Post of the Day


This is the webpage for a domain called treasonisttrump dot com. It was registered on 4 June, 2018, and is hosted on the same server as jtmp dot org, protectorelections dot org, and several other Kimberlin-related web sites.That’s the whole website so far. I guess The Dread Deadbeat Protector Kimberlin was too busy protecting elections and doing other important stuff to even put a working DONATE button on the site. However, neglecting this site was a mistake. As of last night, treasonisttrump dot org ranked 6,972,797 on the Internet and protectourelections dot org ranked 9,456,252.

Don’t Be Weasels


The Daily Caller is reporting another protest by Google employees. About 1,400 of them signed a letter about the Dragonfly project being worked on for China so that they could take “ethically-informed decisions about our work, our projects, and our employment.” According to the article, that’s only about half the number of Google employees who signed on to a letter opposing Google’s work on a DoD image recognition contract.

Google complied with the employee request concerning its AI development work with the DoD and failed to renew the contract. Will Google now back away from developing a censored search engine for China?

Stay tuned.

Stuxnet II


The Times of Israel has an article up about recent intelligence operations directed against Iran.

Iranian infrastructure and strategic networks have come under attack in the last few days by a computer virus similar to Stuxnet but “more violent, more advanced and more sophisticated,” and Israeli officials are refusing to discuss what role, if any, they may have had in the operation, an Israeli TV report said Wednesday.

The report came hours after Israel said its Mossad intelligence agency had thwarted an Iranian murder plot in Denmark, and two days after Iran acknowledged that President Hassan Rouhani’s mobile phone had been bugged. It also follows a string of Israeli intelligence coups against Iran, including the extraction from Tehran in January by the Mossad of the contents of a vast archive documenting Iran’s nuclear weapons program, and the detailing by Prime Minister Benjamin Netanyahu at the UN in September of other alleged Iranian nuclear and missile assets inside Iran, in Syria and in Lebanon.

And Reuters reports that the Iranians have sorta/kinda fessed up on the computer virus attack.

Gholamreza Jalali, head of Iran’s civil defense agency, said on Sunday that Iran had recently neutralized a new version of Stuxnet.

“Recently we discovered a new generation of Stuxnet which consisted of several parts … and was trying to enter our systems,” Jalali was quoted as saying by the semi-official ISNA news agency at a news conference marking Iran’s civil defense day. He did not give further details.

Sounds like some folks at the Mossad have been earning their pay.

Team Kimberlin Post of the Day


VelvetRevolution.us is a 501(c)4 not-for-profit run by Brett Kimberlin. It’s articles of incorporation say the the purposes of the corporation are “The public welfare and a minority for political activity”—whatever that really means. The corporation is the registered owner of several web domains. The Gentle Reader should not be surprised to learn that one is velvetrevolution dot us. Here’s are the others:

brettkimberlin dot info
brettkimberlin dot net
brettkimberlin dot org
brettkimberlin dot us
mccutcheonwatch dot info
trumpindependentforpresident dot net

The mccutcheonwatch domain appears to be a companion to mccutcheonwatch site that used to be hosted on the same server as the Justice Through Music Project site.

The brettkimberlin domains being owned by VRUS could be a use of corporate funds to cover personal expenses.

The trumpindependtforpresident domain is intriguing. It was registered in August, 2015.

Hmmmm.

How Old is Your OS?


While drinking my first cup of coffee this morning, I took a look through the connection log for Hogewash! for the last couple of thousand logins. There were 9 folks still using XP and one connection each from users of Vista, Windows 8, and FreeBSD i686.

The two most popular systems were Windows 10.0 and iOS 11.2.4. Together, they accounted for about half the connections.

FWIW, the machine I usually use to create this site is currently running MacOS 10.13.4.

An Interesting Change


Yesterday, I posted a brief description of some of the types of operating systems used on device that have connected to Hogewash! recently. I mentioned that one visitor was using a PS 4. That user is now attempting to mask the operating system of his device.

Hmmmm.

What Gets Connected to Hogewash!


The Gentle Reader will probably not be surprised to learn that most common operating systems used on devices which connect to Hogewash! are Windows 10 and Windows 7. They are slightly more common than iOS 10 and iOS 11. Android 7 is back in fifth place just ahead of MacOS 10.13.

Some of the less common systems include various forms of Linux (mostly Ubuntu) and Windows 8, and about 1% of visitors are still running Windows XP. One visitor is using a PS 4.

UPDATE—Corrected a typo.

Team Kimberlin Post of the Day


Yep. We’re still waiting for news from the pending Team-Kimberlin-related court cases, so here’s another example of false reporting by the Cabin Boy™ caused by his limited understanding of how the Internet really works. This was originally published as a Prevarication Du Jour on 13 October, 2015.

* * * * *

The Cabin Boy™ has posted what he claims to be the text of an unsolicited comment he allegedly received to one of his posts. He says that he believes that the comment is from [redacted] in Manassas, Virginia. He claims to have traced the IP address back to a cell tower near where [redacted] lives, and he provides a map with the location of the cell tower shown.

According to the several utility databases, there is a cell tower within a few dozen feet of the location shown. However, according to the FCC, [redacted]’s cellular provider is not on that tower. Moreover, why would [redacted] use his cellular connection if he were at home. Even he were using his phone instead of a computer, he would more likely use a the wi-fi connection into his landline cable provider to avoid data charges and for higher speed.

This leaves several possibilities. One is that one of the Cabin Boy™ “friends” is pranking him. Another is that the whole thing is a lie. Or perhaps it’s something else.

UPDATE—I’ve just verified how IP addressing works for mobile devices. The IP address seen by the Internet looking back at a mobile device is actually the address of a server at the cellular ISPs point-of-presence. For example, my portable wi-fi hotspot is sitting on our kitchen table in Westminster, Maryland, and I can see the lights on the carrier’s tower out the living room window, but the IP address associated with it on the Internet is in Arlington, Virginia.

pantsonfireIn order to determine the address of a connection all the way back to a cell tower, one needs to go through the carrier’s internal connection logs. That requires a subpoena. How many of you think that the Cabin Boy™ was able to get a subpoena for information sent this afternoon, serve the subpoena, and get the response from [redacted]’s cell phone carrier in a matter of a few hours? For that matter, how many think he could get such a subpoena in the first place?

* * * * *

And the Cabin Boy™ thinks that he’s going to be able to use the discovery process in his LOLsuit VIII to force ISP and the like to disgorge all sorts of information about the IP address and that hie can use them to identify more of his perceived enemies. Even more silly, he thinks LOLsuit VIII will survive long enough to allow for any discovery.

Team Kimberlin Post of the Day


Here’s some fun factoids about the Interwebz—That’s the complete list of the web domains using xeonhosting dot net for a nameserver as of 21:30 UTC yesterday. I’ll leave it to the Gentle Reader to note anything else these domains might have in common.

Meanwhile, we’re at T-minus 16 days and counting in the Hoge v. Kimberlin, et al. lawsuit.

Yours Truly, Johnny Atsign


Johnny Atsign Logo 2ANNOUNCER: From Westminster, it’s time for—

SOUND: Skype rings once. Receiver picked up.

JOHNNY: Johnny Atsign.

ZOMBIE: (Telephone Filter) Hey, Johnny. It’s Pete Candler.

JOHNNY: What’s up, Pete?

ZOMBIE: (Telephone Filter) I’m having a bit of a computer problem that I think you might be able to help me with.

JOHNNY: Well, I’m not much of an IT guy …

ZOMBIE: It’s not strictly a technical problem, and you may know where to find a solution.

MUSIC: Theme up and under.

ANNOUNCER: The Lickspittle Broadcasting System presents W. J. J. Hoge in the transcribed adventures of the man with the action-packed Twitter account, America’s fabulous free-lance Internet investigator …

JOHNNY: Yours Truly, Johnny Atsign!

MUSIC: Theme up to music out. Continue reading