Team Kimberlin Post of the Day


Five years ago today, I did a post Brett Kimberlin and Vitamin A Deficiency about Brett Kimberlin’s involvement with the anti-GMO crowd. He has a website called citizensagainstgmo dot com which hasn’t been maintained for years. In 2014, that site was hosted on the same server as 24 other Kimberlin-related sites.

* * * * *

There are 25 sites currently hosted at 184.171.169.170.

1. americancrossroadswatch.org
2. breitbartunmasked.com
3. breitbitnews.com
4. campaignaccountabilitywatch.org
5. citizensagainstgmo.com
6. exposedpolitics.com
7. groundswellexposed.com
8. huntonandwilliamswatch.org
9. indictbreitbart.org
10. issaoversight.org
11. jtmp.org
12. kochwatch.org
13. mccutcheonwatch.org
14. nrawatch.org
15. occupyforaccountability.org
16. op-critical.com
17. pressswarm.org
18. prosecutenewscorp.com
19. protectourelections.org
20. pussyriotdefensefund.org
21. serveroverlords.com
22. smartechwatch.org
23. soshanyuanhost.net
24. velvetrevolution.us
25. whoistedcruz.com

* * * * *

AKAIK, there aren’t any more Kimberlin-related sites at that IP address. Some of them have metastasized elsewhere. Some are gone for good.

These sites are now hosted at 198.15.113.115—

1. americancrossroadswatch
2. campaignaccountabilitywatch.org
3. citizensagainstgmo.com
4. huntonandwilliamswatch.org
5. occupyforaccountability.org
6. op-critical.com
7. velvetrevolution.us 198.15.113.115

These sites are now hosted at 209.188.0.218—

1. indictbreitbart.org
2.  jtmp.org
3. kochwatch.org
4. protectourelections.org 209.188.0.218

These sites are now hosted on generic GoDaddy servers—

1. exposedpolitics.com
2. issaoversight.org

This site is now hosted at 134.19.177.202—

breitbartunmasked.com

This site is now hosted at 196.245.246.71—

mccutcheonwatch.org

These domains are registered but don’t have active websites—

1. nrawatch.org
2. prosecutenewscorp.com

These domains are gone—

1. breitbitnews.com
2. groundswellexposed.com
3. pressswarm.org
4. pussyriotdefensefund.org
5. serveroverlords.com
6. smartechwatch.org
7. soshanyuanhost.net
8. whoistedcruz.com

The Gentle Reader may wonder why one would bother to gather such information. Suffice it to say that webhosting isn’t free, and one can learn things by following the money.

Team Kimberlin Post of the Day


This is the webpage for a domain called treasonisttrump dot com. It was registered on 4 June, 2018, and is hosted on the same server as jump dot org, protectorelections dot org, and several other Kimberlin-related web sites.That’s the whole website so far. I guess The Dread Deadbeat Protector Kimberlin was too busy protecting elections and doing other important stuff to even put a working DONATE button on the site. However, neglecting this site was a mistake. As of last night, treasonisttrump dot org ranked 6,972,797 on the Internet and protectourelections dot org ranked 9,456,252.

Don’t Be Weasels


The Daily Caller is reporting another protest by Google employees. About 1,400 of them signed a letter about the Dragonfly project being worked on for China so that they could take “ethically-informed decisions about our work, our projects, and our employment.” According to the article, that’s only about half the number of Google employees who signed on to a letter opposing Google’s work on a DoD image recognition contract.

Google complied with the employee request concerning its AI development work with the DoD and failed to renew the contract. Will Google now back away from developing a censored search engine for China?

Stay tuned.

Stuxnet II


The Times of Israel has an article up about recent intelligence operations directed against Iran.

Iranian infrastructure and strategic networks have come under attack in the last few days by a computer virus similar to Stuxnet but “more violent, more advanced and more sophisticated,” and Israeli officials are refusing to discuss what role, if any, they may have had in the operation, an Israeli TV report said Wednesday.

The report came hours after Israel said its Mossad intelligence agency had thwarted an Iranian murder plot in Denmark, and two days after Iran acknowledged that President Hassan Rouhani’s mobile phone had been bugged. It also follows a string of Israeli intelligence coups against Iran, including the extraction from Tehran in January by the Mossad of the contents of a vast archive documenting Iran’s nuclear weapons program, and the detailing by Prime Minister Benjamin Netanyahu at the UN in September of other alleged Iranian nuclear and missile assets inside Iran, in Syria and in Lebanon.

And Reuters reports that the Iranians have sorta/kinda fessed up on the computer virus attack.

Gholamreza Jalali, head of Iran’s civil defense agency, said on Sunday that Iran had recently neutralized a new version of Stuxnet.

“Recently we discovered a new generation of Stuxnet which consisted of several parts … and was trying to enter our systems,” Jalali was quoted as saying by the semi-official ISNA news agency at a news conference marking Iran’s civil defense day. He did not give further details.

Sounds like some folks at the Mossad have been earning their pay.