Al-right, most Canadians--like most people--are nice enough. But the arseholes really do make their mark.
Scanning traffic logs recently, I found something a bit odd: someone from McGill University in Canada was viewing the old blog.
Problem: the old blog is not viewable to anyone but me.
The settings --something Google can confirm-- are still:
Blog Readers Private - Only blog authors[The reason I made the blog private can be read here.]
It can't even be sees in the Wayback Machine:
And yet, some guy in Canada has visited not just once, but twice:
For those curious, the only thing a non blog author can see on a private blog is a Google page telling them to login, followed by a page telling them the blog is private.
People who enter the Blog URL into their browsers can still see the Blog Title but will be prompted to enter their Google account particulars and password. If they are not given the rights to view the Blog, a message will be shown: “It doesn't look like you have been invited to read this blog. If you think this is a mistake, you might want to contact the blog author and request an invitation.”
And if this was the case, no tracking tag would be loaded by their browser and there would be no record of their visit.
So what was McGilly Canuck looking at? Apparently this link to the January 2009 archives:
Not really seeing the point, unless they're trying to help Craig Lazo and friends delete their lies across the Internets....
So how did they do it?
It's not magic. There are no agents. There are only a handful of possibilities: among them being this person somehow guessed/acquired the account password, or they work for Google. Since the ISP is a Canadian University, it's probably not a Google employee--just someone who got very very lucky.
Then there are only a handful of possible motives--well, really only one: they are part of the truther fraud and are willing to risk some serious criminal charges to find out what's on an old, private blog written by one of the few people who figured out it was a fraud and escaped. Because "letting it go" is not in these people's skill set.
This isn't the first time I've had reason to suspect someone tried to access my accounts.
>In late 2007, early 2008, I have reason to suspect emails were deleted from one of my accounts, emails that proved the person used deception for recruitment. Hilariously that person hasn't changed their patter for years, trying to use, almost word for word, the same formula to get another person's trust. Luckily for the would be target, it's was very small activist scene and getting a warning through the right person wasn't hard.
>In a related event, the webmaster of "truthaction", after being "allowed" to use this individual's computer at an event, was to discover, years later, all the emails from this individual were deleted from his email account. Luckily, in her compulsive desire to spread lies and other fraudulently acquired information, she used the "truthaction" PM system, so copies of most of them were saved. There are several ways to access an account illegally by "allowing" someone to use a machine to login. Technically a keylogger isn't by itself illegal, but using it--or any other technique--to manipulate or steal information by deception is.
I changed my passwords long ago, but, needless to say, I've changed them again.
I also sent McGill Uni a wee little note about someone possibly abusing their ISP/Internet services.
It might be nothing they can do anything about, like say, a wireless service open to everyone. But a search of the ISP strongly suggests this is an individual.
Let us hope that, unlike the sad case of Harvard con man and Scholars for 9/11 Truth member, Gustavo Espada, McGill University has the backbone to not tolerate fraud or cybercrime from it's staff or students.
Because if this turns out to be evidence of a McGill staffer or student engaged in cybercrime, the next step is the RCMP and the FBI.