All posts by Leo Goldstein

Democrats Claim Suppression of Conservatives is Google’s Right

The funniest part of the Google CEO Sundar Pichai testimony before the House Judiciary Committee was when Representative Lieu (D-CA) said that Google and other for-profit corporations have First Amendment rights—after Democrats were denying, protesting, and suppressing such rights for decades and had a derangement syndrome over Citizens United. Soon, they might figure out that bakers refusing to make cakes for a “gay marriage” ritual have First Amendments rights too.

Google does have First Amendment rights and exercise them on its corporate blogs, by speaking to the media, placing ads on the sites of third parties and its own site, and in many other ways. But Google Search, YouTube, and most other resources are services, not speech. They are not different from auto repair or accounting. This is how Google has been marketing them, and this is how users understand them. Continue reading Democrats Claim Suppression of Conservatives is Google’s Right

Honest Search Engine!

The Honest Search is upgraded. It includes hundreds of trustworthy websites that have been suppressed or hidden by Google: (Breitbart, American Thinker, Daily Caller, Townhall, PJMedia, FreeBeacon, FrontPageMag, WUWT etc.), mainstream moderate-conservative publications (Foxnews, Forbes etc.), as well as specialized sites and blogs, related to the theme of this website.

The Honest Search is  not a Google replacement, but a unique and indispensable tool for people of all political persuasions, who want to learn about Continue reading Honest Search Engine!

Google Uses Wikipedia to Suppress Competition

Google tends to push Wikipedia results to the top and to use them in snippets despite Wikipedia being unreliable, untrustworthy, biased, and unpredictable. This is not naivete but a ruthless anti-competitive strategy. Wikipedia is owned by Wikimedia, a typical San Francisco nonprofit foundation, to which Google and its top officers donated millions of dollars. But most of its income is apparently derived from small donations by visitors, mostly referred by Google. The business relations between Google and Wikimedia go both ways. Continue reading Google Uses Wikipedia to Suppress Competition

Social Media Damages Adolescents’ Health (WUWT)

WUWT has published my two-parts paper, showing that:

  • the overwhelming body of clinical research demonstrates that social media severely damages adolescents’ health
  • the social media companies suppress and corrupt ongoing research and distort well known results

  • the academic establishment, MSM, and the rest of the left wing political machine aid this suppression

  • there is similarity and overlap between climate alarmism and social media damage quietism Continue reading Social Media Damages Adolescents’ Health (WUWT)

The Cal Government Is Responsible for the Wildfire Deaths

2018-11-18 update: CA Gov. Jerry Brown Vetoed Bipartisan Wildfire Management Bill in 2016 (Canada Free Press, August 2018):

Last year, as all Hell was breaking loose in California as residents were burned out of their homes, neighborhoods and businesses, Gov. Jerry Brown was jetting around the world spouting climate change propaganda, and calling this California’s ‘new normal.’

“With climate change, some scientists are saying Southern California is literally burning up, and burning up as maybe a metaphor or a description not just to the fires right here, but what we can expect over the next years and decades,” Brown said.

Today [2018-08-09], as California burns once again under torrential wildfires, many Californians have been asking why the dramatic increase in wildfires in the last five years… that is everyone except Governor Jerry Brown.

The current (November 2018) wildfire are the deadliest in California history. Wildfires are normal in California, but their extent and the damage in this and previous years are unprecedented.  Continue reading The Cal Government Is Responsible for the Wildfire Deaths

Twitter Labeled Trump Supporters “Russian-linked,” Mixed Humans with Bots

On or around October 31, 2017, Twitter testified about so-called Russian activities related to the 2016 U.S. presidential election.  This and consequent testimonies were slanted to support the Democratic conspiracy theory of “Russian interference.” It might have been prepared together with congressional Democrats.

Even with this understanding, a closer look at Twitter testimonies reveals surprising findings:

  • Twitter and the DNC interpreted the word Russian as a reference to the native language and/or place of birth of an individual, not employment by the Russian government or even Russian citizenship. Large part (possibly most) of the so-called Russian-linked accounts belong to American citizens with no relation to the Russian government. At the same time, Twitter elected to disregard accounts making election related tweets from indeterminate locations, and likely to represent foreign governments and other entities.
  • Answering questions from senators, Twitter repeatedly used the term automated account as a synonym of a bot, thus dehumanizing Twitter users. The use of automation is allowed and even encouraged by Twitter, which provides a special Application Programming Interface (API) for this purpose. The automation might be as simple as manually scheduling tweets for a later time or auto-responding when the user is away from his or her computer.

Continue reading Twitter Labeled Trump Supporters “Russian-linked,” Mixed Humans with Bots

Even The Atlantic Questioned Loyalty of Big Tech

15 Things We Learned From the Tech Giants at the Senate Hearings

The Atlantic, Nov 2, 2017

“Most Russian advertising on Facebook was used to build up pages, which then distributed their content “organically.”

The $100,000 of advertising that has been a big focus of Congressional interest was used primarily to build audiences for a variety of Russian-linked pages. In other words, they paid to buy likes and build the distribution channels through which they would pump disinformation.”  Continue reading Even The Atlantic Questioned Loyalty of Big Tech

Notes Misc

2018-11-06: Where I voted (Austin TX), the voting machines’ user interface is very counter-intuitive and inconvenient for older people. A dial for selecting checkboxes and buttons Back and Forward are intuitive for the Millenials, but not for senior citizens. That probably caused many of them to make mistakes, with the net effect negative to Republicans.

2018-08-06NR: Facebook blocks an ad of a Republican candidate, referring to her childhood in Communist Cambodia.

Mueller Investigation was Bought for more than ¥130k

2018-10-14 Update: Added clarifications and remarks on the relationships of the Mueller’s law firm WilmerHale with the government of China are added near the end. Also, the words “expectation of future business with China” were changed to “expectation of future income contingent on approval of Chinese government” to better reflect the structure of his compensation in WilmerHale.

In March 2017, two months before his appointment as Special Counsel, Robert Mueller received $24,000 (~ ¥130,000) from a firm owned by a top official of the Chinese government and the Communist Party of China. Almost certainly, he had expectation of future income contingent on approval of Chinese government. In exchange, he accepted, articulated, and publicly committed himself to the DNC conspiracy theory that “Russia had hacked the democracy”. Russia has hacked neither democracy nor the Democrats (despite them being near opposites). The DNC had an incompetent information systems team and an unprotected network that could have been hacked by anybody. For eight months the DNC fought FBI attempts to help, while possibly being suspicious of the FBI because of Hillary’s bathroom server. Persons who published the DNC’s dirty laundry or gave it to WikiLeaks are likely not connected to Russia at all and might be Americans. We don’t know their names because the Democratic Party made up the narrative that Putin ordered the DNC hacking and leaking of documents to aid Trump. Obama administration sent the FBI, CIA, DHS, and ODNI to confirm this narrative, rather than to investigate who had accessed the DNC voter’s database, believed to contain very detailed personal profiles of almost all adult Americans. The conspiracy theory of a Trump-Russia collusion was built on top of this narrative.

The firm that paid Mueller his ¥130k is the International Data Group (IDG), a subsidiary of China Oceanwide Holdings Group. Continue reading Mueller Investigation was Bought for more than ¥130k

Former Mueller’s Firm WilmerHale Works for China, too

Robert Mueller’s law firm WilmerHale has been working for China for long time. It has a large office in Bejing, the only WilmerHale office outside of the US and the EU. (https://archive.is/Wgabw, https://archive.is/2v8fG).

WilmerHale lobbied for China and legally represented China, but didn’t register as a foreign agent under FARA. WilmerHale achieved some of the most spectacular trade benefits for China (emphasis added):

With respect to China, our team includes the chief US architect and negotiator of China’s entry into the WTO and one of the leading regulatory lawyers in Beijing (and a member of the Board of Governors of the American Chamber of Commerce—People’s Republic of China). 

In advising on trade policy and trade negotiations, we have helped develop or shape key trade initiatives and legislation both in and outside government, including Congress’ landmark grant of Permanent Normal Trade Relations to China; negotiating priorities in the Trans-Pacific Partnership free trade agreement negotiations; congressional implementation of various US free trade agreements; and trade-related provisions in internet, patent and drug importation legislation.  Continue reading Former Mueller’s Firm WilmerHale Works for China, too

FBI/DHS Report GRIZZLY STEPPE was Junk

The GRIZZLY STEPPE – Russian Malicious Cyber Activity released jointly by FBI and DHS on December 29, 2016 was an update on another propaganda piece — the Joint Statement from DHS and ODNI on Election Security, published by the Obama administration on October 7 to aid Hillary and other fellow democrats in the elections.

GRIZZLY STEPPE was so incompetent that even convinced partisans laughed it off. Continue reading FBI/DHS Report GRIZZLY STEPPE was Junk

Imaginary Social Media Component of Imaginary Russian Meddling

The social media component of the alleged “Russian activities in the 2016 elections” was non-existent. The IRA, a.k.a. the “troll farm” in Russia, allegedly bought ads for about $100k; this is chump change and not even worthy of a government operation. Most of it has been spent on Facebook, and most ads ran AFTER the 2016 elections. Continue reading Imaginary Social Media Component of Imaginary Russian Meddling

Russian Activities in 2016 Elections were anti-Trump

It’s almost funny that the so-called Intelligence Community Assessment (January 6, 2017,  Assessing Russian Activities and Intentions in Recent US Elections) claimed that the Russian interference had been against Hillary and in favor of Trump, although most of the evidence in it demonstrated the opposite. RT (Russia Today TV) and IRA (Internet Research Agency, a “troll farm” in Saint Petersburg) agitated in favor of Hillary and the policies of the Democratic Party, and against Trump and the policies of the Republican Party.

RT was anti-Trump in the 2016 elections (from The Nation)

The Nation is far from being pro-Trump. I think it might be called an Old New Left. This is what it says on the subject, with the links to the RT footage. The following are long quotes from The Nation.

RT America Was Not ‘Pro-Trump’

The problem with the claim that RT America is pro-Trump is that it is simply false. Many of the channel’s biggest names were either ardently anti-Trump or highly skeptical of what a Trump presidency might mean for America.  Continue reading Russian Activities in 2016 Elections were anti-Trump

CrowdStrike, MIS Department, and the DNC

Hillary presidential campaign chairwoman Donna Brazile’s book Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House can be retold in one sentence:

The Russians have hacked the elections and poisoned my dog Chip.

Nevertheless, the book reveals some information concealed by Hillary and the DNC loyalists in FBI.

  • In August, seeing CrowdStrike’s helplessness, the DNC invited real cyber security people to form a competent network security team that the book calls the Hacker House, or HH. This contradicts the DNC official story that CrowdStrike was doing a fabulous job
  • HH found out that the DNC network was unprotected, and that anybody could have hacked into it 
  • HH informed DNC and Hillary’s campaign leadership of this fact and spent most of its time training DNC networking administrators
  • HH was asked, but refused to support allegations that the DNC network had been penetrated by “Russians.” HH also had run-ins with CrowdStrike.
  • The DNC, Hillary, and the Obama administration disregarded and suppressed this information. They continued their electoral campaign strategy: worsening relations with Russia, accusing Trump of collusion with Putin, and using the FBI, CIA, DHS, and ODNI to sabotage Trump’s campaign.  During the transition period, John Brennan and other Obama/Clinton loyalists used false allegations of the “Russian hacking” to attempt something like a coup d’état. The coup was not a complete failure – the angry Democrats have nearly wrestled control of the DOJ away from the elected president.

Continue reading CrowdStrike, MIS Department, and the DNC

A Review of the “Intelligence Community Assessment”

2018-10-03 update: I have just noticed that the declassified ICA text was published only a few hours before the joint session of Congress that certified Trump as the next president. James Clapper spent the previous day falsely alleging that the Assessment had been done by the U.S. Intelligence Community, pushed an exaggerated version of its conclusions, and leaked parts of it to the media. In his testimony before the Senate Armed Services Committee, Clapper made repeated assaults on the president-elect. When referring to Trump’s sober reaction to the alleged assessment, Clapper uttered the following: “I’ve received many expressions of concern from foreign counterparts of what has been interpreted as disparagement of the intelligence community.” The Assessment and even the published-the-next-day ICA text were still classified and hidden from the president-elect! Now that seems like a last ditch effort to prevent Trump’s inauguration. BTW, who were his ‘foreign counterparts’ and why was he so concerned about their opinions?

Attached is a review of the declassified version of the notorious Intelligence Community Assessment, published on 01/06/2017. The declassified ICA text (“the ICA text” or “the text”, referring to the public version of the alleged assessment) regurgitates the Democratic talking points and allegations that Putin ordered interference in the 2016 elections, including claims that the alleged interference was directed against electing Hillary and in favor of electing Trump as president. The latter statement was supported only by the FBI and CIA, not by the NSA. The ICA demonstrated an extreme partisan bias in favor of Hillary Clinton and the Democratic Party. The ICA text contains no declassified information. It repeats the same allegations over and over either without evidence, or with evidence refuting them. A quarter of the text is devoted to proving the obvious: that RT is controlled or directed by the Russian government.

Download

Continue reading A Review of the “Intelligence Community Assessment”

Silicon Valley Totalitarian Dystopia

The enlightened Silicon Valley has apparently created a totalitarian dystopia. Here, the term Silicon Valley includes Google, Facebook, Twitter, Microsoft, and Apple (“GFTMA”), even as Microsoft is headquartered in Washington state.

GFTMA have developed tools for nearly total speech control and deployed them against conservatives and other opponents of the Left. They tied themselves to the Left under the Obama administration. The political censorship and discrimination against the “right of left” authors and readers is well documented. This article focuses on the scientific and technical human potential of this country, a large part of which is computer and network engineers, scientists, businessmen, and other specialists affected by Silicon Valley. Continue reading Silicon Valley Totalitarian Dystopia

Origin of Operation “Crossfire Hurricane”

Needs update!  (See The Real Origination Story of the Trump-Russia Investigation and more recently published evidence)

2018-09-18. It’s possible that the DNC and/or Hillary campaign started preparing the “Russian collusion” story immediately after the initial attribution of the DNC network breach to Russia by CrowdStrike on May 6 (rather than on June 12, as assumed in the article.) That better explains the hiring of Christopher Steele in early June, the issuing of a visa to Natalia Veselnitskaya on June 1, the strange text of the email introducing Veselnitskaya to Trump Jr., and the meetings between Glenn Simpson of Fusion GPS with her immediately before and after her meeting with Trump Jr.  Continue reading Origin of Operation “Crossfire Hurricane”

Climate Alarmism Kills

Massachusetts has been hit by a series of natural gas explosions. The main cause of this disaster is aging and deteriorating infrastructure, natural gas pipelines in this case.  Massachusetts (and New York, California, and few other deep blue states) diverted necessary funds from maintaining and upgrading infrastructure to climate change propaganda as well as subsidies to cronies in “renewable energy” and “carbon free” financing. Massachusetts Democrats were so prejudiced against pipelines that the state elected to import LNG from Russia. Continue reading Climate Alarmism Kills

Voodoo Attributions in Cyber Security

The Official Attribution of Network Breaches is Based on Conspiracy Theories

The DNC has not been hacked by the Russian hacking groups Fancy Bear (APT28) or Cozy Bear (APT29) for one simple reason: neither of these groups exists or existed at any time.

APT (Advanced Persistent Threat) was a code name for Chinese Espionage. There were attempts to detect specific groups under the broad umbrella of the APT. Then Mandiant (later acquired by FireEye) attempted to generalize the definition to include putative state-sponsored hacker groups from other countries. But such generalization cannot work. The attribution of cyber-security incidents to state backed sophisticated hacker groups worked only for China because it was a cyber-fortress surrounded by the Great Firewall of China. Continue reading Voodoo Attributions in Cyber Security

What is the ‘Advanced Persistent Threat’?

APT [Advanced Persistent Threat] is a term to refer to Chinese espionage
without saying Chinese espionage. Full stop.
Scott J Roberts
, APT is a Who not a What …

The full quote:

“This classified intelligence was a problem. … These DoD/IC teams wanted to help, but couldn’t disclose classified information. They came up with a compromise: sharing indicators and information without disclosing the actual actor behind it. Specifically APT, supposedly coined by Colonel Greg Rattray, was a couple groups of actors primarily operating out of mainland China and believed to be members of the People’s Liberation Army. We now know these groups today as APT1Anchor Panda, and Elderwood, as well as other private designations.

APT is a term to refer to Chinese espionage without saying Chinese espionage. Full stop.”

Continue reading What is the ‘Advanced Persistent Threat’?

Mastercard, Jihad, and Fentanyl

Corrected on 2018-08-26: 70,000 is the number of total deaths from drug overdose. Fentanyl and other synthetic opioids account for 40% of them.

There were more than 70,000 deaths from drug overdose in the U.S. in 2017. About 30,000 of them involved fentanyl or similar synthetic opioids many times stronger than heroin. Most illegally purchased synthetic opiods are manufactured in China. Online shops in China used to receive payments from Americans through Mastercard and Visa to ship these deadly drugs by mail. The number of overdose deaths involving synthetic opioids skyrocketed 10x since 2013:  Continue reading Mastercard, Jihad, and Fentanyl

Notes on the Fake News Media

Robert Graham: That [2014/02/05] NBC story 100% fraudulent

“On February 4th, NBC News ran a story claiming that if you bring your mobile phone or laptop to the Sochi Olympics, it’ll immediately be hacked the moment you turn it on. The story was fabricated. The technical details relate to going to the Olympics in cyberspace (visiting websites), not going to there in person and using their local WiFi.”

“By the way, the easy way to figure out where journalists commit fraud is by watching for ‘passive voice’. Journalists normally avoid passive voice, preferring stronger language. But, when they need to hide things, they passive voice to cover up details.”

This advice seems obsolete now. Just watch their lips. When the lips are moving, the MSM journalist is lying.

Russian Bears with Donkey Ears

The “assessment” that the Russian government hacked the DNC and leaked its emails was wrong. It’s almost impossible to attribute a network breach to a sophisticated hackers group.

When #CrowdStrike and FireEye started making the fraudulent attribution on cyber security events, many other companies followed. The Obama regime has corrupted and dumbed down the DHS, DNI, and FBI. They bought this fraud, and then added some.

In 2016, Hillary and the DNC were deceived by CrowdStrike into believing that Russia was behind the leaks of their emails that shouldn’t have been written in the first place. Together with Obama they forced that deception on the FBI and intelligence. Then they blamed Russia for their election defeat!

Most successful network security breaches are conducted by criminal hackers, many of whom are based or originate from Russia and Eastern Europe. Most unsuccessful attempts are conducted by amateurs. Organizations should protect their networks, rather than blame nation states.

Read Jeffrey Carr, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort or Robert Graham, Dear Obama, From Infosec – both are (or were) anti-Trump.

All “Evidence” of “Russian Meddling” Came from the DNC

What a tangled web we weave …

Continues Origin of Operation “Crossfire Hurricane”

Update: Steele might have learnt what the DNC wanted him to write about Trump directly from the DNC, rather than indirectly through MSM. DOJ official Bruce Ohr reportedly communicated with Steele in the time when his wife Nellie Ohr worked for Fusion GPS that hired and worked with Steele.

The leaked “opposition research” (mostly smear) on Trump consisted of 230 pages. Only one short paragraph was devoted to allegations about Trump’s relations and attitudes towards Russia. Thus, neither the DNC nor Hillary campaign believed around May 2016 that there was even a small impropriety in Trump’s connections with Russia.  The opposition research file was apparently dated December 2015, but the DNC allowed it to leak between late April to early June of 2016 (likely on June 12-14), then advertised it in the WaPo article on June 14, 2016.

The liberal media attitude toward Putin changed from lukewarm to hostile almost overnight between July 16 and July 21, simultaneously with the creation and adoption of the Trump-Putin conspiracy theory as a major part of the Democratic Party line. Continue reading All “Evidence” of “Russian Meddling” Came from the DNC

Crimes of DNC Loyalists in DOJ and Intelligence

Even the New York Times admitted that Obama holdovers had committed crimes, probably including espionage, sedition, sabotage, obstruction of justice, and/or subornation of perjury in the transitional period. From the NYT March 1, 2017:

As Inauguration Day approached, Obama White House officials grew convinced that the intelligence was damning and that they needed to ensure that as many people as possible inside government could see it, even if people without security clearances could not. Some officials began asking specific questions at intelligence briefings, knowing the answers would be archived and could be easily unearthed by investigators — including the Senate Intelligence Committee, which in early January announced an inquiry into Russian efforts to influence the election.

At intelligence agencies, there was a push to process as much raw intelligence as possible into analyses, and to keep the reports at a relatively low classification level to ensure as wide a readership as possible across the government — and, in some cases, among European allies. Continue reading Crimes of DNC Loyalists in DOJ and Intelligence