Team Kimberlin Post of the Day

Team Kimberlin often complained they were the victims of false narrative while being the source of narrative that were not only obviously false but also mind-bogglingly stupid. Consider this Prevarication Du Jour from seven years ago today.

* * * * *

The Cabin Boy™ has posted what he claims to be the text of an unsolicited comment he allegedly received to one of his posts. He says that he believes that the comment is from [redacted] in Manassas, Virginia. He claims to have traced the IP address back to a cell tower near where [redacted] lives, and he provides a map with the location of the cell tower shown.

According to the several utility databases, there is a cell tower within a few dozen feet of the location shown. However, according to the FCC, [redacted]’s cellular provider is not on that tower. Moreover, why would [redacted] use his cellular connection if he were at home. Even he were using his phone instead of a computer, he would more likely use a wi-fi connection into his landline cable provider to avoid data charges and for higher speed.

This leaves several possibilities. One is that one of the Cabin Boy™ “friends” is pranking him. Another is that the whole thing is a lie. Or perhaps it’s something else.

UPDATE—I’ve just verified how IP addressing works for mobile devices. The IP address seen by the Internet looking back at a mobile device is actually the address of a server at the cellular ISPs point-of-presence. For example, my portable wi-fi hotspot is sitting on our kitchen table in Westminster, Maryland, and I can see the lights on the carrier’s tower out the living room window, but the IP address associated with it on the Internet is in Arlington, Virginia.

pantsonfireIn order to determine the address of a connection all the way back to a cell tower, one needs to go through the carrier’s internal connection logs. That requires a subpoena. How many of you think that the Cabin Boy™ was able to get a subpoena for information sent this afternoon, serve the subpoena, and get the response from [redacted]’s cell phone carrier in a matter of a few hours? For that matter, how many think he could get such a subpoena in the first place?

* * * * *

Schmalfeldt posted a comment which I let through moderation— To which one of the Gentle Readers replied—

Team Kimberlin Post of the Day

This episode of Yours Truly, John Atsign first ran five years ago today.

* * * * *

Johnny Atsign Logo 2ANNOUNCER: From Westminster, it’s time for—

SOUND: Skype rings once. Receiver picked up.

JOHNNY: Johnny Atsign.

ZOMBIE: (Telephone Filter) Hey, Johnny. It’s Pete Candler.

JOHNNY: What’s up, Pete?

ZOMBIE: (Telephone Filter) I’m having a bit of a computer problem that I think you might be able to help me with.

JOHNNY: Well, I’m not much of an IT guy …

ZOMBIE: It’s not strictly a technical problem, and you may know where to find a solution.

MUSIC: Theme up and under.

ANNOUNCER: The Lickspittle Broadcasting System presents W. J. J. Hoge in the transcribed adventures of the man with the action-packed Twitter account, America’s fabulous free-lance Internet investigator …

JOHNNY: Yours Truly, Johnny Atsign!

MUSIC: Theme up to music out. Continue reading

Team Kimberlin Post of the Day

One of the less famous members of Team Kimberlin is Neal Rauhauser. Sometime around 2010, Kimberlin brought Rauhauser on board as his IT guy/hacker. While Rauhauser has an interesting set of social engineering skills, he’ just barely adequate at IT. This post from nine years ago today mocked #NealRauhauser, Natxec Editor, an his inflated claims of influence.

* * * * *

Stacy McCain has a post up about Neal Rauhauser’s claim that

… policy intel for 700+ Congressional staffers runs through a system I built and I back up the natsec editor. I hear stuff average bear does not.

Uh, huh.

If you read down to the UPDATE, you see that the system he is probably talking about is a blog called Progressive Congress News. To find out what Progressive Congress News really is click here. A bit of fisking is in order.

… system I built … probably means that he did some coding. The link above says that

Progressive Congress News utilizes existing online tools, as well as internally-developed software, to create an aggregated news feed for Congressional staff, activists, and politically-engaged citizens.

Sounds like a left-wing RSS feed or some such.

… back up the natsec editor … probably means that when the real guy went on vacation that they let Mr. Rauhauser post something.

I hear stuff average bear does not. They have meds for that.

This guy is truly a legend in his own mind.

UPDATE–I’m beginning to see tweets and posts interpreting this as Neal Rauhauser claiming to have access to national security information. I sincerely doubt that would be true. Even to have access to a federal government non-classified computer system requires a background check that I doubt Mr. Rauhauser could pass. If 20 % of the stuff I read about his background is true, a check for access to classified information would quickly turn up items that would possibly result in his immediate arrest. If he is being given access without a clearance, someone is risking a long time in jail. If Mr. Rauhauser is claiming access to classified information, I hereby award that claim a genuine Paul Klipsch lapel button.

* * * * *

BTW, the idea of using pro se litigation to go after Team Kimberlin’s enemies was Rauhauser’s idea, probably the worst he inflicted on them.

Team Kimberlin Post of the Day

While tidying up some loose ends, I took an inventory of the Kimberlin-related websites that are still running. The following sites are no longer accessible.

op-critical dot com
indictbreitbart dot org
alightymedia dot org
occupyforaccountibility dot org
americancrossroadswatch dot org

The apparent reason is that there is no hardware connected to their IP address. These sites first went dark several months ago when their name sever was taken down. Now the server hosting them is gone.

Op-Critical’s account on MySpace (yes, MySpace still exists) appears unused and doesn’t seem to have links to any of the band’s music. At least some of their videos are still on YouTube.

Big Sur

macOS 11.0 (Big Sur) has been released. I have it running on my laptop, and the results have been quite satisfactory so far. Most applications seem to be running faster than they did under 10.15.7.

Team Kimberlin Post of the Day

Seven years ago today, I ran this post about Dread Pirate #BrettKimberlin and Autocorrect.

* * * * *

I abbreviate the name of TDPK’s 501(c)(4), Velvet Revolution US as VRUS. The autocorrect keeps trying to insert an i.

Maybe I should let it.

* * * * *

Of course, there’s a significant difference between the VRUS website (which is still up wasting bandwidth) and a virus. Most viruses have better continuing support from their originator.

Team Kimberlin Post of the Day

This post from six years ago today was about #BillSchmalfelt and Malware.

* * * * *

When I went to check on the Cabin Boy’s Patriot-Ombudsman website (No, I won’t link to it.) this morning, the Opera browser showed me this:P-Omalware

Poking around the actual code for his home page revealed this:P-Omalware1

Hmmmmm.

UPDATE—Less than an hour has gone by since my initial post, and the Cabin Boy has pulled down that version of the Patriot-Ombudsman home page (H/T, Frankie in the comments).

UPDATE 2—It’s 30 minutes later, and trying to get to Patriot-Ombudsman results in being forwarded to the Old Uncle Bastard site (NIWLTI) which doesn’t seem to have been maintained for the past few months.

UPDATE 3—The Sore Loserman now has the Old Uncle Bastard site sorta/kinda up and running. He claims that his other site was “hit by malware.” Yeah, the Weiner “I-was-hacked” defense.

Uh, huh.

* * * * *

Almost every Team-Kimberlin-related website has some form of crapware such as adware, tracking cookies, and, occasionally, genuine malware. Extremely good protection software is highly recommended.

Wireless Mice

There are a lot of computers here at Stately Hoge Manor dedicated to various purposes—CAD systems, music recording, amateur radio, software development, gaming, and more. Most of them have a wireless mouse associated with them, so it’s become as standard practice to give each wireless mouse a unique name. Around here the list of mouse names includes:

Mickey
Minnie
Pinky
Brain
Tom
Jerry

I’ll click on Pinky to publish this post.

Team Kimberlin Post of the Day

Five years ago today, I did a post Brett Kimberlin and Vitamin A Deficiency about Brett Kimberlin’s involvement with the anti-GMO crowd. He has a website called citizensagainstgmo dot com which hasn’t been maintained for years. In 2014, that site was hosted on the same server as 24 other Kimberlin-related sites.

* * * * *

There are 25 sites currently hosted at 184.171.169.170.

1. americancrossroadswatch.org
2. breitbartunmasked.com
3. breitbitnews.com
4. campaignaccountabilitywatch.org
5. citizensagainstgmo.com
6. exposedpolitics.com
7. groundswellexposed.com
8. huntonandwilliamswatch.org
9. indictbreitbart.org
10. issaoversight.org
11. jtmp.org
12. kochwatch.org
13. mccutcheonwatch.org
14. nrawatch.org
15. occupyforaccountability.org
16. op-critical.com
17. pressswarm.org
18. prosecutenewscorp.com
19. protectourelections.org
20. pussyriotdefensefund.org
21. serveroverlords.com
22. smartechwatch.org
23. soshanyuanhost.net
24. velvetrevolution.us
25. whoistedcruz.com

* * * * *

AKAIK, there aren’t any more Kimberlin-related sites at that IP address. Some of them have metastasized elsewhere. Some are gone for good.

These sites are now hosted at 198.15.113.115—

1. americancrossroadswatch
2. campaignaccountabilitywatch.org
3. citizensagainstgmo.com
4. huntonandwilliamswatch.org
5. occupyforaccountability.org
6. op-critical.com
7. velvetrevolution.us 198.15.113.115

These sites are now hosted at 209.188.0.218—

1. indictbreitbart.org
2.  jtmp.org
3. kochwatch.org
4. protectourelections.org 209.188.0.218

These sites are now hosted on generic GoDaddy servers—

1. exposedpolitics.com
2. issaoversight.org

This site is now hosted at 134.19.177.202—

breitbartunmasked.com

This site is now hosted at 196.245.246.71—

mccutcheonwatch.org

These domains are registered but don’t have active websites—

1. nrawatch.org
2. prosecutenewscorp.com

These domains are gone—

1. breitbitnews.com
2. groundswellexposed.com
3. pressswarm.org
4. pussyriotdefensefund.org
5. serveroverlords.com
6. smartechwatch.org
7. soshanyuanhost.net
8. whoistedcruz.com

The Gentle Reader may wonder why one would bother to gather such information. Suffice it to say that webhosting isn’t free, and one can learn things by following the money.

Team Kimberlin Post of the Day

This is the webpage for a domain called treasonisttrump dot com. It was registered on 4 June, 2018, and is hosted on the same server as jtmp dot org, protectorelections dot org, and several other Kimberlin-related web sites.That’s the whole website so far. I guess The Dread Deadbeat Protector Kimberlin was too busy protecting elections and doing other important stuff to even put a working DONATE button on the site. However, neglecting this site was a mistake. As of last night, treasonisttrump dot org ranked 6,972,797 on the Internet and protectourelections dot org ranked 9,456,252.

Don’t Be Weasels

The Daily Caller is reporting another protest by Google employees. About 1,400 of them signed a letter about the Dragonfly project being worked on for China so that they could take “ethically-informed decisions about our work, our projects, and our employment.” According to the article, that’s only about half the number of Google employees who signed on to a letter opposing Google’s work on a DoD image recognition contract.

Google complied with the employee request concerning its AI development work with the DoD and failed to renew the contract. Will Google now back away from developing a censored search engine for China?

Stay tuned.

Stuxnet II

The Times of Israel has an article up about recent intelligence operations directed against Iran.

Iranian infrastructure and strategic networks have come under attack in the last few days by a computer virus similar to Stuxnet but “more violent, more advanced and more sophisticated,” and Israeli officials are refusing to discuss what role, if any, they may have had in the operation, an Israeli TV report said Wednesday.

The report came hours after Israel said its Mossad intelligence agency had thwarted an Iranian murder plot in Denmark, and two days after Iran acknowledged that President Hassan Rouhani’s mobile phone had been bugged. It also follows a string of Israeli intelligence coups against Iran, including the extraction from Tehran in January by the Mossad of the contents of a vast archive documenting Iran’s nuclear weapons program, and the detailing by Prime Minister Benjamin Netanyahu at the UN in September of other alleged Iranian nuclear and missile assets inside Iran, in Syria and in Lebanon.

And Reuters reports that the Iranians have sorta/kinda fessed up on the computer virus attack.

Gholamreza Jalali, head of Iran’s civil defense agency, said on Sunday that Iran had recently neutralized a new version of Stuxnet.

“Recently we discovered a new generation of Stuxnet which consisted of several parts … and was trying to enter our systems,” Jalali was quoted as saying by the semi-official ISNA news agency at a news conference marking Iran’s civil defense day. He did not give further details.

Sounds like some folks at the Mossad have been earning their pay.

Team Kimberlin Post of the Day

VelvetRevolution.us is a 501(c)4 not-for-profit run by Brett Kimberlin. It’s articles of incorporation say the the purposes of the corporation are “The public welfare and a minority for political activity”—whatever that really means. The corporation is the registered owner of several web domains. The Gentle Reader should not be surprised to learn that one is velvetrevolution dot us. Here’s are the others:

brettkimberlin dot info
brettkimberlin dot net
brettkimberlin dot org
brettkimberlin dot us
mccutcheonwatch dot info
trumpindependentforpresident dot net

The mccutcheonwatch domain appears to be a companion to mccutcheonwatch site that used to be hosted on the same server as the Justice Through Music Project site.

The brettkimberlin domains being owned by VRUS could be a use of corporate funds to cover personal expenses.

The trumpindependtforpresident domain is intriguing. It was registered in August, 2015.

Hmmmm.

How Old is Your OS?

While drinking my first cup of coffee this morning, I took a look through the connection log for Hogewash! for the last couple of thousand logins. There were 9 folks still using XP and one connection each from users of Vista, Windows 8, and FreeBSD i686.

The two most popular systems were Windows 10.0 and iOS 11.2.4. Together, they accounted for about half the connections.

FWIW, the machine I usually use to create this site is currently running MacOS 10.13.4.

An Interesting Change

Yesterday, I posted a brief description of some of the types of operating systems used on device that have connected to Hogewash! recently. I mentioned that one visitor was using a PS 4. That user is now attempting to mask the operating system of his device.

Hmmmm.

What Gets Connected to Hogewash!

The Gentle Reader will probably not be surprised to learn that most common operating systems used on devices which connect to Hogewash! are Windows 10 and Windows 7. They are slightly more common than iOS 10 and iOS 11. Android 7 is back in fifth place just ahead of MacOS 10.13.

Some of the less common systems include various forms of Linux (mostly Ubuntu) and Windows 8, and about 1% of visitors are still running Windows XP. One visitor is using a PS 4.

UPDATE—Corrected a typo.