October 19, 2019

SHOCK: Google Censors and Manipulates Search Engine Results

A reader sent me a link to a Michelle Malkin piece published at Ammoland, about information from a Google whistleblower who claims that Google manipulates and censors content from its search engines and other media outlets, such as YouTube.

Well, no kidding!!! Cripes sakes anyway. For many years I have been making that obvious claim. But I guess now with a whistleblower, we can confirm this is common practice at Google…or can we? Who is running this dog and pony show anyway? And most importantly, does anyone REALLY care? NOPE!

Like Facebook and all the other social media sites, they are all fake, controlled, manipulated, and censored. We are all at the mercy of the tech giants (whoever they really are) if we choose to participate in the game of Internet Technology Charades.

I began a “blog” before blogs were called blogs and before software became readily available in which a writer/blogger could more easily publish his work and have it available for anyone in the public realm to read or have access too.

Back in the day it was a frustrating thing to figure out how you could end up at the top of the heap in the search engines’ results pages. Some chose to spend money to buy their way into the search engine results (inject money? What possibly could go wrong?)

I first posted on an official blog site in November of 2005. If I could count the couple of years of hand-crafted blogging, I’m zeroing in on 15 years of posting blogs on the Internet (that’s only 5 years less than Malkin). With well over 30,000 personal posts published to only my own websites, one would think by now I could be easily found in the search engine results and readers numbering well into the tens of thousands. Not so!

Not unlike the big guns in Big Tech, I also have authored or co-authored 4 books. I have written too-numerous-to-count articles that have been published in many print and digital media sites across the country and in foreign lands. After 15 years of nonstop writing and publishing, a rational mind might think I would have a giant readership and would show up in the landing pages of search engines when readers/users search for key words that are common to what I mostly write about. Not so!

After all these years, I figure there must be one, or more, of at least three things going on. First, the base of my content is so tiny, with little interest, I will never draw more readers. Second, I’m a terrible writer incapable of holding the interest of readers enough to entice them back for more, and third, I have been for the past 15 years censored and manipulated off the search results pages.

I believe that in the last 4 to 6 months, especially since I have done a little shifting of content to information about the evilness of the corrupt man/government and sharing truth in the Living Word of Our Creator and “Hidden Scriptures” promised us to be revealed in the Last Days, my site has been the target of even my web hosts, who, for no apparent reason (to me anyway) shut down my website, claiming I was harming their servers and due to a poorly designed website I needed better security, etc. Even after showing them I had all the latest gadgets as part of the con game, they still refused to put me back online.

After over a month, I finally got the web hosts to upgrade their own software and I was brought back online. However, since coming back on line, my readership has been shrunk to basically nonexistent. At my peak, I had 3,000 to 4,000 daily readers (a pittance when you consider 15 years of writing and posting). Now, I’m lucky if a get a couple hundred.

Many readers who have signed up to receive my email notifications of when new articles are published, are finding the notifications shunted to the SPAM folder. Key information in those published articles is censored by the controllers of the Disqus commenting software system.

So, what’s the use? Sure I can tell you all about it and even complain, but what’s the use of spending valuable time researching for content to share, when the entities to which I am a slave to, are deciding who gets recognition and who does not.

It’s all part of the bigger Rigged System, the Bread and Circuses. I have no recourse. My only option is to hold out hope that the handful of readers I have value what I write enough to keep reading and hopefully they will be changed, even in the tiniest of ways, for the better having been fed portions of truth.

So, the reality is, if I chose to continue with an Online presence, I have no choice but to remain a censored slave by the “Image of the Beast.” I can complain to no end, but nothing will change and I suspect the censoring and manipulation will get even worse.

Will the day come when heavily censored writers will be target for execution? More than likely.

Share

Open Thread – 27th Day, 3rd Month, 2019

TREND? If You Want to Link to Something, It Will Cost You

Please use this open thread to post your ideas, information, and comments about issues not covered in articles published on this website. Thank you.

Share

How Much of the Internet is Fake?

Let’s answer that question with more questions. How much of this existence is fake? Why should we believe an article found on the fake internet isn’t fake?

This article, linked to from Drudge, is mostly rooted in faking all things on the internet for the purpose of lying, cheating, and stealing in order for some sinister “fakers” to make gobs of money. So what else is new?

The article states: “Some [malware infected computer bots] were sent to browse the internet to gather tracking cookies from other websites, just as a human visitor would have done through regular behavior. Fake people with fake cookies and fake social-media accounts, fake-moving their fake cursors, fake-clicking on fake websites — the fraudsters had essentially created a simulacrum of the internet, where the only real things were the ads.”

While all of this is disturbing, in the realm of our existing automatized culture of a hungry, non-thinking people, what difference does it make except for those thinking they are making money from the Internet when in reality, like Federal Reserve Notes, they are being conned?

The users don’t care. They see what they want, hear what they want, and repeat what they want. They may mouth that the Internet is fake, but that doesn’t stop them from jumping all in, gobbling it up as though it was life’s blood.

The “Catch-22” or circular thinking that is going on here is as ridiculous as the concept of everything being fake. Are we to believe, just in the same fashion that we do now, that because an Internet magazine media source reports what’s fake and what’s not, we are to disregard all other information and believe them? How does any of this make sense.

Such actions and reactions are creeping up on a “Clockwork Orange” kind of programming utilizing shock therapy to correct the behaviors of people, only the shock therapy isn’t as outwardly obvious. For those who haven’t figured it out yet, the shock therapy to brainwash the masses has been going on for a long, long time. As a matter of fact, it started in the Garden of Eden.

From all of this, we are left with this bit of nonsense based in a lack of understanding of the real reason the Internet is being used against us…the people: “What’s gone from the internet, after all, isn’t “truth,” but trust: the sense that the people and things we encounter are what they represent themselves to be. Years of metrics-driven growth, lucrative manipulative systems, and unregulated platform marketplaces, have created an environment where it makes more sense to be fake online — to be disingenuous and cynical, to lie and cheat, to misrepresent and distort — than it does to be real. Fixing that would require cultural and political reform in Silicon Valley and around the world, but it’s our only choice. Otherwise we’ll all end up on the bot internet of fake people, fake clicks, fake sites, and fake computers, where the only real thing is the ads.”

I’m in no position to disagree with the theory that all this stuff online is fake. It’s the solution that bugs me. The suggestion is that a cure requires “cultural and political reform.” It is precisely “cultural and political reform” that has driven us to this point of distrust “to be disingenuous and cynical, to lie and cheat, to misrepresent and distort…”

The only way of controlling the people is to ensure their division – their distrust of all except those who are doing the controlling. Government authority, or more accurately, the Global Power Structure fears the Internet because it can be a platform for truth. In it’s “unregulated” form the onus should be on the readers to decipher fact and fiction, but who’s left that wants to do that? The author of the piece intimates that the Internet needs more regulation, regulation that comes from the Global Power Structure that is doing all it can to make and keep the Internet “fake.”

Cultural and political reform, by design, has brought our very cultural to the pinnacle of distrust. By all indications, that’s exactly where “they” want us to remain. Therefore, why should we expect or even want cultural and political reform other than what we have been programmed to do?

We are caught in the web of circular following. While some can see the web they don’t understand how we got in. Without that knowledge, there is no way out.

Go ahead. Go look to Facebook for your answers. Maybe this time you’ll get something that is real but I wouldn’t hold my breath.

Share

When You Challenge Government’s Narrative

*Scroll for Update*

It has been written about often that in the 1960s, the CIA began an official and orchestrated campaign to destroy and/or discredit anyone who might challenge the official narrative. Often that official narrative is nothing more than lies/propaganda, designed most often to not only ridicule the one with the challenge but at the same time to foment distrust, along with hatred, among the masses of automatons. A fearful mass of nonthinkers is much easier to control and convince.

That extremely powerful label became, “The Conspiracy Theorist.”

We still hear it today, perhaps more than at anytime in our history, but has the label achieved its useful life expectancy? I believe it has. Welcome “Fake News.”

It appears to have begun at about the same time Hillary Clinton was going down in defeat in her election bid to become the next Puppet-in-Chief of the United States Corporation. She blamed her loss on “Fake News.” Bear in mind that even though Hillary Clinton may not have won the election, she and her perverted husband are too powerful to simply drop out of the picture.

The term might be surprising but the action, targeted against “alternative” Online news sites, blogs, etc., is actually, in the context of the rapidly moving Cyberspace, something old. Mainstream Media loathed the day when the Internet provided platforms for anyone wishing to provide alternative information – real or imagined. With the rapid growth of digital technology, newspapers and magazines dropped dead. Those media giants, whom we know are nothing but the mouthpiece of the CIA, Council on Foreign Relations, et. al., were losing their grip on propagandizing the U.S. and the rest of the world, say nothing about money. They tried, unsuccessfully to demean and ridicule the tens of thousands of websites, some very powerful and accurate, refuting the efforts of the Media in their march to systematically finish destroying what was left of a non-thinking readership’s minds. That attempt may have backfired somewhat, however, it only helped to bolster the more powerful “fake news” sites on the Net.

Something different had to be done to save the Powers and Principalities of the controlled worldwide Media. Thus began the promotion of the term “Fake News.” Much like Conspiracy Theorist, extremely successful in limiting anyone attempting to disprove the official politic of the Ruling Establishment, this new term is the necessary, modern-day replacement of conspiracy theorist. The term conspiracy theorist will never lose its firm grip, as the people, with fear ingrained into them and love of government forefront of their minds, will continue to use the term like a plumber uses a “roto-rooter.”

The result of the Conspiracy Theorist campaign is quite evident, as can be seen if you are anyone who dares open their mouth to speak against the official narrative. The same powerful media giants, controlled by the CIA, used the conspiracy theorist label and began to systematically brainwash the masses to become their own instruments to destroy attempts to dispel government lies.

Will the new “Fake News” hallmark take root as effectively as conspiracy theorist has? Only time will tell. Perhaps the push to destroy the minds of men across the globe through cellphone, “eye”pads, laptops, tablets, etc., with the onset of “The Internet,” had a bloodline that was not anticipated. Perhaps they didn’t think “Fake News” would grow so big and powerful and something needs to be done.

Eventually, the Internet will be fiercely censored and controlled by Government. It cannot be allowed to provide a platform in which a portion of it operates in opposition to (outside of controlled opposition) the official narrative of Government lies and propaganda. Until that time arrives, the stage will be set to give the automatons reason to ask for greater censorship and control over the Internet by Government as a means of protecting us all from “Fake News.”

Brilliant!

But, Don’t Go Look!

Because you probably think this is Fake News!

*Update* – 12/9/2016 – 12:58 am

It also appears that the Pope (the antichrist) has joined in (or actually is the orchestrate of the “Fake News” movement) the call to destroy all things not government sanctioned and controlled.

Pope Calls Fake News like “Fecal Fetish.” That would be like him and little boy fetish.

Share

Claims of Removal of Internet Existence a Lie

I couldn’t help but follow the link posted on Drudge about, “Delete Self from Internet with Press of Button.” The lie about deleting yourself says that it, “offers a way to wipe your entire existence off the internet in a few clicks.” That must be the biggest farce pertaining to Cyberspace I’ve ever heard. However, make no mistake about the fact it’s a scam designed to make money and trap some idiots.

The Internet, once you’ve been there….period, is much the same as applying for and possessing a Social Security Number. You can’t get rid of it….period – ever!. You might think “unsubscribing” and “deleting” Internet accounts will do the trick but it doesn’t. Even if one corrupt Internet business tells you, after you have hit the “unsubscribe” button for the 37th time and won’t be receiving anymore emails, they will, if they haven’t already, sold your information to other lurking rapers and prostitutes and we haven’t even begun to discuss what the Corporate United States of America criminal and pervert does.

Go ahead, “delete” your Facebook account. Soon you will discover it can’t be done. The CIA has your information filed for further use and along with it anyone and everyone you have ever made contact with…even in the smallest of ways. But you don’t want to believe that because it makes you uncomfortable.

Don’t fall for their con job. They can’t do what they tell you they can do. It’s too late. It’s as stupid as signing up for one of those accounts that will “store all your passwords” to all your accounts for you. What could possibly go wrong but more importantly, who would be so damned stupid?

BUT DON’T GO LOOK!

Share

Just a Random Thought

I understand the need or want of media outlets trying to find ways of making money. Nobody wants to buy their crap newspapers. Thinking that the change is the age of electronics and not the crap content of their news items, most media outlets have begun putting more effort into monetizing their websites. The result is that readers must spend the first 1 or 2 minutes, in some cases more, waiting for advertisements, most forced upon the reader, to load making it impossible to read. Combine this with the fact that anytime a user clicks their mouse or scrolls, a pop-up, pop-under, or new page of advertisement loads – sometimes multiple page, readers are stuck in some kind of cyber maze with no way out except to cancel the entire browser page. How is there profit in this?

When I first began a news oriented website, one of the first things I learned was that readers have short attention spans combined with zero patience waiting for pages to load. Did that disappear? Why do advertisers waste their money on these sites? Surely their return on investment has to be poor, at best.

For me, I am fed up. I’m almost at a point of never visiting or creating links to a lot of website because I don’t want to be associated with the bombardment of ads, the majority of which I have no control over.

Therefore, I am going to begin, at least for the most egregious of the offenders, to state the name of the site where something of potential interest exists, and let the reader decide if they want to spend the time and effort to read something that is probably fake anyways.

I once believed that for me to post a “teaser” and a link to a website where the entire content could be found, was doing the owner of that other site a favor. Perhaps I was and still am but if my readers get frustrated by following the links I provide, in the long run they will associate my site with that crap.

I have never loaded down my website with ads and try very hard to make sure that any videos I may post have to be activated by the reader. I refuse to force my readers to have to wait while unwanted advertisements load.

At present I pay for everything for this website out of pocket. I have no paid advertisers and will not do so. I am repeatedly turning down requests to run ads on my website. I know it costs me money but I feel that it is more important to educate readers than take advantage of them for profit. When the day comes that I am forced to do as the big guns in media are, I’ll quit. However, I doubt seriously that it will come to that because Internet censorship will be here soon, at even a grander scale than at present, I will be long gone by then.

So, I hope readers enjoy that they can come to this website and quickly and cleanly navigate the site and find information that is valuable to them.

Share

By Executive Order, President Ensures He Can Use Internet for Spying…For Our Protection.

Executive Order — Commission on Enhancing National Cybersecurity

EXECUTIVE ORDER

– – – – – – –

COMMISSION ON ENHANCING NATIONAL CYBERSECURITY

By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to enhance cybersecurity awareness and protections at all levels of Government, business, and society, to protect privacy, to ensure public safety and economic and national security, and to empower Americans to take better control of their digital security, it is hereby ordered as follows:

Section 1. Establishment. There is established within the Department of Commerce the Commission on Enhancing National Cybersecurity (Commission).

Sec. 2. Membership. (a) The Commission shall be composed of not more than 12 members appointed by the President. The members of the Commission may include those with knowledge about or experience in cybersecurity, the digital economy, national security and law enforcement, corporate governance, risk management, information technology (IT), privacy, identity management, Internet governance and standards, government administration, digital and social media, communications, or any other area determined by the President to be of value to the Commission. The Speaker of the House of Representatives, the Minority Leader of the House of Representatives, the Majority Leader of the Senate, and the Minority Leader of the Senate are each invited to recommend one individual for membership on the Commission. No federally registered lobbyist or person presently otherwise employed by the Federal Government may serve on the Commission.

(b) The President shall designate one member of the Commission to serve as the Chair and one member of the Commission to serve as the Vice Chair.

Sec. 3. Mission and Work. The Commission will make detailed recommendations to strengthen cybersecurity in both the public and private sectors while protecting privacy, ensuring public safety and economic and national security, fostering discovery and development of new technical solutions, and bolstering partnerships between Federal, State, and local government and the private sector in the development, promotion, and use of cybersecurity technologies, policies, and best practices. The Commission’s recommendations should address actions that can be taken over the next decade to accomplish these goals.

(a) In developing its recommendations, the Commission shall identify and study actions necessary to further improve cybersecurity awareness, risk management, and adoption of best practices throughout the private sector and at all levels of government. These areas of study may include methods to influence the way individuals and organizations perceive and use technology and approach cybersecurity as consumers and providers in the digital economy; demonstrate the nature and severity of cybersecurity threats, the importance of mitigation, and potential ways to manage and reduce the economic impacts of cyber risk; improve access to the knowledge needed to make informed cyber risk management decisions related to privacy, economic impact, and business continuity; and develop partnerships with industry, civil society, and international stakeholders. At a minimum, the Commission shall develop recommendations regarding:

(i) how best to bolster the protection of systems and data, including how to advance identity management, authentication, and cybersecurity of online identities, in light of technological developments and other trends;

(ii) ensuring that cybersecurity is a core element of the technologies associated with the Internet of Things and cloud computing, and that the policy and legal foundation for cybersecurity in the context of the Internet of Things is stable and adaptable;

(iii) further investments in research and development initiatives that can enhance cybersecurity;

(iv) increasing the quality, quantity, and level of expertise of the cybersecurity workforce in the Federal Government and private sector, including through education and training;

(v) improving broad-based education of commonsense cybersecurity practices for the general public; and

(vi) any other issues that the President, through the Secretary of Commerce (Secretary), requests the Commission to consider.

(b) In developing its recommendations, the Commission shall also identify and study advances in technology, management, and IT service delivery that should be developed, widely adopted, or further tested throughout the private sector and at all levels of government, and in particular in the Federal Government and by critical infrastructure owners and operators. These areas of study may include cybersecurity technologies and other advances that are responsive to the rapidly evolving digital economy, and approaches to accelerating the introduction and use of emerging methods designed to enhance early detection, mitigation, and management of cyber risk in the security and privacy, and business and governance sectors. At a minimum, the Commission shall develop recommendations regarding:

(i) governance, procurement, and management processes for Federal civilian IT systems, applications, services, and infrastructure, including the following:

(A) a framework for identifying which IT services should be developed internally or shared across agencies, and for specific investment priorities for all such IT services;

(B) a framework to ensure that as Federal civilian agencies procure, modernize, or upgrade their IT systems, cybersecurity is incorporated into the process;

(C) a governance model for managing cybersecurity risk, enhancing resilience, and ensuring appropriate incident response and recovery in the operations of, and delivery of goods and services by, the Federal Government; and

(D) strategies to overcome barriers that make it difficult for the Federal Government to adopt and keep pace with industry best practices;

(ii) effective private sector and government approaches to critical infrastructure protection in light of current and projected trends in cybersecurity threats and the connected nature of the United States economy;

(iii) steps State and local governments can take to enhance cybersecurity, and how the Federal Government can best support such steps; and

(iv) any other issues that the President, through the Secretary, requests the Commission to consider.

(c) To accomplish its mission, the Commission shall:

(i) reference and, as appropriate, build on successful existing cybersecurity policies, public-private partnerships, and other initiatives;

(ii) consult with cybersecurity, national security and law enforcement, privacy, management, technology, and digital economy experts in the public and private sectors;

(iii) seek input from those who have experienced significant cybersecurity incidents to understand lessons learned from these experiences, including identifying any barriers to awareness, risk management, and investment;

(iv) review reported information from the Office of Management and Budget regarding Federal information and information systems, including legacy systems, in order to assess critical Federal civilian IT infrastructures, governance, and management processes;

(v) review the impact of technological trends and market forces on existing cybersecurity policies and practices; and

(vi) examine other issues related to the Commission’s mission that the Chair and Vice Chair agree are necessary and appropriate to the Commission’s work.

(d) Where appropriate, the Commission may conduct original research, commission studies, and hold hearings to further examine particular issues.

(e) The Commission shall be advisory in nature and shall submit a final report to the President by December 1, 2016. This report shall be published on a public website along with any appropriate response from the President within 45 days after it is provided to the President.

Sec. 4. Administration. (a) The Commission shall hold periodic meetings in public forums in an open and transparent environment.

(b) In carrying out its mission, the Commission shall be informed by, and shall strive to avoid duplicating, the efforts of other governmental entities.

(c) The Commission shall have a staff, headed by an Executive Director, which shall provide support for the functions of the Commission. The Secretary shall appoint the Executive Director, who shall be a full-time Federal employee, and the Commission’s staff. The Executive Director may also serve as the Designated Federal Officer in accordance with the Federal Advisory Committee Act, as amended, 5 U.S.C. App. (FACA, the “Act”).

(d) The Executive Director, in consultation with the Chair and Vice Chair, shall have the authority to create subcommittees as necessary to support the Commission’s work and to examine particular areas of importance. These subcommittees must report their work to the Commission to inform its final recommendations.

(e) The Secretary will work with the heads of executive departments and agencies, to the extent permitted by law and consistent with their ongoing activities, to provide the Commission such information and cooperation as it may require for purposes of carrying out its mission.

Sec. 5. Termination. The Commission shall terminate within 15 days after it presents its final report to the President, unless extended by the President.

Sec. 6. General Provisions. (a) To the extent permitted by law, and subject to the availability of appropriations, the Secretary shall direct the Director of the National Institute of Standards and Technology to provide the Commission with such expertise, services, funds, facilities, staff, equipment, and other support services as may be necessary to carry out its mission.

(b) Insofar as FACA may apply to the Commission, any functions of the President under that Act, except for those in section 6 and section 14 of that Act, shall be performed by the Secretary.

(c) Members of the Commission shall serve without any compensation for their work on the Commission, but shall be allowed travel expenses, including per diem in lieu of subsistence, to the extent permitted by law for persons serving intermittently in the Government service (5 U.S.C. 5701-5707).

(d) Nothing in this order shall be construed to impair or otherwise affect:

(i) the authority granted by law to a department, agency, or the head thereof; or

(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.

(e) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

BARACK OBAMA

THE WHITE HOUSE,
February 9, 2016.

Share

Congressional Review Of Copyright Law May Destroy Internet News Sources

He explained, “To have a Supreme Court Justice say to me it’s over, they’ve got the votes, which means time is limited,” he added, noting that a day was coming when simply operating an independent website could be outlawed. That will end [it] for me – fine – I’ve had a hell of a run,” said Drudge, adding that web users were being pushed into the cyber ‘ghettos’ of Twitter, Facebook and Instagram.”

Drudge added, “This is ghetto, this is corporate, they’re taking your energy and you’re getting nothing in return – nothing!”

Source: Congressional Review Of Copyright Law May Threaten Drudge | The Daily Caller

Share

Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border

*Editor’s Note* This is what the Media is ALLOWED to report about what’s going on. Clueless, we don’t even know and probably don’t care about what is really going on. Keep living on Facebook and other social media. You are making their jobs easier.

Searching for evidence of computer hacking originating abroad, the Obama administration has stepped up warrantless monitoring, documents show.

Source: Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border

Share

ICANN sees privatization of Internet management soon

Fadi Chehade’s comments came despite criticism in the US Congress, where some lawmakers have resisted the plan to end Washington’s key management role in the Internet Corporation for Assigned Names and Numbers (ICANN). Chehade said all the necessary components for a new stewardship scheme are accounted for and there will be “major legitimizing endorsements” from several countries in coming weeks. “It is now up to the community to wrap them up, put them in a nice little box with a bow and ship them to Washington,” Chehade said, of the pieces of a plan to supplant a contract ICANN has with the US Department of Commerce. The comments come a year after the US government said it would end its technical oversight role for the Internet domain system, with the stipulation that it be managed without direct control by governments or intergovernmental bodies like the United Nations.
Source: ICANN sees privatization of Internet management soon – Yahoo News
Share