Google

All posts tagged Google

Anyone who has been targeted online, especially via mainly anonymous users on Google+, will, I am sure, be breathing a sigh of relief over the impending loss of the platform, as announced on Google’s site.

A number of reasons have been offered for this de-platforming, such as ‘low usage’, ‘security vunerabilties’, and ‘challenges involved in maintaining a successful product that meets consumers’ expectations’.

Whatever the reason, I for one will not be mourning it’s loss, but am also in no doubt whatsoever, that the abusers, the stalkers, the weirdo’s and the ghouls that are allowed to currently roam free, and cause absolute mayhem on the platform, will migrate elsewhere, and carry on regardless.

 

‘Shutting down Google+ for consumer (personal) accounts on April 2, 2019

30 January, 2019

In December 2018, we announced our decision to shut down Google+ for consumers in April 2019 due to low usage and challenges involved in maintaining a successful product that meets consumers’ expectations.

We want to thank you for being part of Google+ and provide next steps, including how to download your photos and other content.

On April 2nd, your Google+ account and any Google+ pages you created will be shut down and we will begin deleting content from consumer Google+ accounts.

Photos and videos from Google+ in your Album Archive and your Google+ pages will also be deleted. You can download and save your content, just make sure to do so before April. Note that photos and videos backed up in Google Photos will not be deleted.

The process of deleting content from consumer Google+ accounts, Google+ Pages, and Album Archive will take a few months, and content may remain through this time. For example, users may still see parts of their Google+ account via activity log and some consumer Google+ content may remain visible to G Suite users until consumer Google+ is deleted.

As early as February 4th, you will no longer be able to create new Google+ profiles, pages, communities or events….’

If 2016 was the ‘Year of the Snowflake’, then going on what has already been witnessed, 2017 may well turn out to be the ‘Year of the ‘Chilling Effect’.

The established order, and their partners-in-crime the mass media have, since the advent of the internet, been steadily losing the stranglehold they previously enjoyed over what people were allowed to read, see on the television and ultimately believe what was really going on in the world.

And that situation, as you can imagine, cannot, and will not be allowed to continue for much longer.

Putting aside the various elected governments, who are nothing more than the public face of the established order and their various agencies, the mass media are without doubt, the single most powerful agents of change there are, and have been hemorrhaging both their revenue and their audience to any number of the alternative online news outlets and social media feeds that are out there.

The mass media and the establishment are virtually indistinguishable in their objectives to control what people see, what they eat, what they wear, what is healthy, what is harmful and everything else in between – and only a fool would think otherwise as the evidence of this can be seen everywhere in modern society.

From what I have been seeing for myself, and what increasing numbers of concerned readers have been contacting me about, the fightback by the establishment against those who are publishing online what is really going on, has now reached a stage which is becoming not only obvious, but impossible to ignore.

The most noticeable effect of this fightback, is the number of alternative (to the establishment narrative) websites, social media and Youtube accounts that have been suspended or disappeared altogether recently, and increasing numbers of previously popular and informative articles and websites are being ‘de-listed’ from the largest search engines, effectively making them difficult to find.

I have been aware for a while that a number of articles that have been previously published on the Outlaw, despite their daily views increasing, have now disappeared from Google searches altogether, and that can also be said of other similar websites, who’s owners have contacted me over the same issue.

The agents of the establishment who operate within the mass media are easy to identify and make no attempt to disguise where their real allegiences lie, and can for the purpose of this article, be dismissed, as their objectives are clear to anyone with a functioning brain – the biggest threat that purveyors of the truth are facing, are those that the title of this post refer to.

‘Les Gardiens Des Portes’ (The Guardians of the Gates), or the establishment ‘Gatekeepers’ are by far among the most prolific, insidious, duplicitous and ultimately dangerous entities that can be encountered online ….

The main problem with Gatekeepers is that they are not easily identifiable, and operate not only within the mass media, but also within the so-called ‘Alternative Media’, on all social media platforms, on most of the ‘Truther’  forums and message boards, and unsurprisingly, have also commanded the biggest online audiences over the last few years.

You only have to look at how mainly fictious events like ‘Pizzagate‘ for example, have managed to gain so much traction online over the last few months, sending ‘Truthers’ scurrying all over the place rabidly chasing down any ‘evidence’ to support some of the most outlandish claims ever published, while effectively clogging up news feeds and burying any credible information that may have emerged during that time.

There is a purpose to this, and it is the Gatekeepers main role to ensure that ‘Fake News’ is always  foremost in peoples minds, in order to negate and distract from the truth, and to generally confuse and bamboozle.

For those of you who are still able to see past the white noise and bullshit, the Gatekeepers secondary role is to bring about a ‘Chilling Effect’ on whistleblowers and the truth tellers by using methods that are becoming more and more commonplace, as many of the recipients can and will testify to.

One method used is to utilise UK Harassment and Malicious Communication laws to silence people, by reporting blog articles and/or the comments, Forum/Messageboard posts, Tweets, and Facebook posts to the police to try and establish a ‘course of conduct’ against anyone who has highlighted their activities.

This has been shown to be a fairly common tactic, as I am aware of at least eight instances where people who have been clearly harassed, threatened, cyber-stalked and bullied online for many months and even years by Gatekeepers and their followers, have found themselves on the wrong side of the law for simply trying to highlight what has happened to them.

I am also aware of a number of court cases that are scheduled to be heard in 2017, which if they go according to plan, will bring about legislation to further restrict free and independent speech on the internet ….

Facebook has blocked the broadcaster Russia Today from posting on their own Facebook page, which according to an RT spokesperson: ‘is to prevent Russia Today from streaming the inauguration of President Elect Donald Trump.’

It has been alleged by various mass media outlets that a dispute (over a supposed copyright violation) has arisen because the broadcaster had ‘livestreamed outgoing President Obama’s final press conference’.

Video screened from the White House is ordinarily copyright free, and it is unknown at this point who the complainant was or what reason was given when it was made.

The Russian broadcaster cannot post any media or links onto it’s Facebook page until the conclusion of the inauguration ceremony at least, although it is believed that the ban is temporary, and there are immediate steps being taken to get the suspension lifted in order to cover at least some of the ceremony.

It has long been believed that Internet services like Google, AOL, Yahoo, Facebook, MSN, Twitter and many others have given the Security Services of the US Government free access to their user databases, Microsoft were the first to do so in 2006 …. so is this freezing out of a Russian-Centric media outlet, only the start of a wider-ranging clampdown on the censoring of what has been until now, freely-available information?

Especially if it conflicts with what the established order wants you to see and therefore believe what is really going on, and more importantly …. Is it also restricting free speech and ultimately, the reporting of the truth?

As the best-known and most widely used behemoth of online search engines, there is a fair chance that most people use Google on a daily basis.

However, it seems that very few people actually know how to use it properly in order to unlock it’s full potential. I rarely use it on my own machine, as I find it far too restrictive for certain types of research and specialised searching, but in Libraries and where other public access machines are available, it usually happens that your choice is limited to the Mountain View behemoth and very little else.

So if you have to use it, it may prove useful to know your way around it.

BASIC GOOGLE SEARCHING

Use quotation marks ” “ to find an entire search string.

eg. “love of Cheese” will only return results with that exact search term or ‘string‘.

Mark important words with a ” ” + (Plus)

If a search term must contain certain words or phrases, mark it with a + symbol. eg: +”William Shatner” book signing, will return all the results containing “William Shatner” but not necessarily those pertaining to a book signing.

Remove unwanted words with a – (Minus)

You may wish to search for the term “Sopranos” the TV Series, which will also return a generalised list of music related links as well.

In order to slim this search down and get a faster result, type: “sopranos” -music. This will then give you all search results with “sopranos” and NOT any related to ‘music’.

SPECIFIC WEBSITE SEARCHING

You can of course just type the full Uniform Resource Locator (URL or web address) if it’s known, but there also ways to discover more about that particular site if you so wish.

For example: “link:www.outlawjimmy.com”

This will display a list of all pages which Google has located which link to this site (or yours) or a favourite site. I should imagine that many website owners use this facility to gauge how popular their site is – (although they would never admit to it.)

‘CACHED’ WEBSITES

A  Web Cache is a mechanism for the temporary storage (caching) of Internet documents, such as HTML pages and images, to reduce bandwidth usage, server load, and lag. Google’s cache link in its search results, provides a way of retrieving information from websites that have recently gone down and is a way of retrieving data more quickly than by clicking the direct link.

An example of cache searching could be: “cache:www.outlawjimmy.com web” which will show the cached content of the site with the word “web” highlighted.

Another method is to use the query term ‘info:’, which will present information that Google has stored about that particular web page.

Eg: “info:www.outlawjimmy.com” will show information about the Outlaw’s homepage.

Always ensure that there is no space between the “info:” and the web page address.

If you want to search for a specific file type within a website, (.mp3, .avi, .doc, .odt, .jpeg, mpg, .ogg, .mov, .mp4) or omit a file type being returned, use the + (plus) or – (minus) signs in front as for a regular search.

If you begin a search using ‘allinurl:’ Google will restrict the search to only those words which follow that exact search query.

Eg: “allinurl:dogging hangouts” will only show documents which contain both ‘dogging‘ and ‘hangouts‘ in the results.

Note: You would be surprised to see how often that particular search term is ‘Googled’.

This also works in a less precise manner by using ‘inurl:’ which will still restrict the search to documents containing those words, but not always together.

As an example, “inurl:dogging hangouts” will return pages that contain the word ‘dogging‘ and the word ‘hangouts‘ which may be elsewhere in the document.

If you want to search certain words in the title of a website, ‘allintitle:’ can be used.

For example, “allintitle:truth matters” will search only for documents that have both ‘truth‘ and ‘matters‘ in the title.

Other useful search queries, are ‘allinlinks:’ which searches links only, not in the title or contained text, and “allintext:” which searches only with the contained text, not the links or title of the page.

However, no matter how good you perceive online searches to be as a resource, there is still no real virtual substitute for actually getting your hands dirty and searching actual places, scouring dusty documents and reading otherwise unobtainable books and papers.

Alternative Search Engines

BLEKKO

CC SEARCH

DUCKDUCKGO

WOLFRAM/ALPHA (Mobile)

Facebook, Twitter, LinkedIn, Google+, Pinterest: all of them could be the source of valuable intelligence that the UK’s intelligence agencies want to know about – and now government eavesdropping and security agency GCHQ is developing new tools to sift through them for nuggets of useful data.

The Cheltenham-based organisation is recruiting maths, physics and computing experts to devise groundbreaking algorithms that will automatically extract information from huge volumes of speech, text and image content gathered “across the full range of modern communications media”.

The secretive listening post plans to use the algorithms to help its surveillance systems make sense of human language, training its computers to automatically identify “valuable intelligence” within huge troves of intercepted data. This will enhance the agency’s ability to pick out keywords and phrases from phone calls and emails as they are passing over networks in near real-time, enabling government spies to “find meaningful patterns and relationships” between people deemed a threat, such as suspected terrorists.

The revelation has renewed concern over the government’s recently announced plans to upgrade its internet surveillance capabilities, with one leading civil liberties group warning that users of social networking sites are increasingly considered “fair game” as part of sweeping online monitoring efforts.

Offering a rare glimpse into the GCHQ’s highly classified work, a job vacancy advert posted on its website earlier this month told prospective applicants:

“You will be tackling one of the great challenges of our century: how to get computing systems to make sense of human language. Your success will have an immediate impact on our ability to gather and analyse vital intelligence.”

“The work involves devising algorithms, testing them and general problem solving in the broad field of language and text processing. This pioneering research work is open to specialist in mathematical/statistics, computational linguists (eg speech recognition and/or language processing) and language engineering.”

It added:

“Using data-mining techniques, you will help us to find meaningful patterns and relationships in large volumes of data. We are looking for skills across the following areas: data intensive computing … graph mining (web search, social network analysis), data visualisation and statistical data analysis.”

The technology being developed by GCHQ will draw comparisons with snooping tools allegedly used by its American counterpart the National Security Agency (NSA). The NSA has access to monitoring software capable of sifting out information including watch-listed names, keywords and phrases from electronic communications flowing through America’s networks, according to a sworn statement made by 32-year NSA veteran William Binney as part of a legal case over the spying, recently blocked by the US supreme court.

The role of GCHQ is focused heavily on monitoring overseas communications, gathering intelligence to inform foreign policy and military operations. However, it can intercept domestic communications with ministerial authorisation when doing so is judged to be in the interests of national security, safeguarding economic well being, or to prevent and detect serious crime.
GCHQ declined to answer specific questions about whether its projects involve intercepting any communications or analysing social networking profiles of individuals located in the UK, with a spokesman saying only that its analysis techniques “are fully aligned with GCHQ’s functions as described in the Intelligence Services Act 1994”.

Nick Pickles, director of civil liberties group Big Brother Watch, questioned whether GCHQ was effectively trying to “create a search engine” enabling it to go on “massive fishing trips” to mine communications.

“We accept that GCHQ needs power and technology in order to protect the public,” Pickles said. “But there’s a big difference between pursuing investigations using technology and using technology to go on massive fishing trips, in the process treating anyone using a mobile phone or social media sites as fair game to drag through its digital fishing nets.”

In 2009, GCHQ was revealed to have initiated a programme called ‘Mastering the Internet’ , a £1bn project to help monitor online communications. But analysing massive volumes of data passing through Britain’s networks has proven difficult for the intelligence agency due to advances in internet and mobile technology. In a speech earlier this month, GCHQ director Iain Lobban told an audience at the University of Leeds that its biggest challenges today have come from “the explosion in the volume of communications as well as the relentless increase in new ways of accessing and processing it”.

Representatives from the National Technical Assistance Centre, a sub-unit of GCHQ, have attended recent meetings with telecom firms – organised by industry body the European Telecommunications Standards Institute – where they have discussed how to upgrade surveillance capabilities to keep pace with new technologies. The government is currently conducting pre-legislative scrutiny of its communications data bill, dubbed the “snoopers’ charter” by critics, which is intended to vastly enhance how the authorities are able to monitor internet communications.

GCHQ, which employs more than 5,000 people, has had difficulty finding skilled new recruits as it has struggled to compete with salaries offered in the private sector. The parliamentary Intelligence and Security Committee reported in July that GCHQ was “losing critical staff with high-end cyber technology skills at up to three times the rate of the corporate average.” In a bid to attract fresh talent, the agency is taking a more proactive public role. It launched a cybersecurity competition in September, and last week showcased the work of its “young apprentices” at Manchester Science Festival, demonstrating code-cracking cyber games to mark the centenary of second world war codebreaker Alan Turing.

GCHQ declined to comment on how much interest the data mining vacancy had attracted. A spokesman said: “We do not give out information regarding the number of applications for posts.”

Ryan Gallagher