2. On 6/14/14,
@th3j35t3r sent a
tweet to an employer
about one of their
employees claiming
that the employee
played host to jihadi
websites.
Loyal followers
applaud him. Nobody
questions him.
https://twitter.com/th3j35t3r/status/477937190652350464
3. To support his claim,
@th3j35t3r provides a
link showing the name
of the company that
hosts al-qimmah.net;
Tehnologii Budushego*.
http://bit.ly/1mXi1r8
*This is a HOSTING
COMPANY. To see scope
covered by Tehnologii
Budusheg, search for
AS41665 (ISP number) at
http://bgp.he.net/.
4. He also provides a
screenshot of a
RIPE.net search
on the host
company name
with the company
contact, Andrey
Slusar,
highlighted.
http://bit.ly/1lzwIEe https://apps.db.ripe.net/search/ Search term = Tehnologii Budu
5. @th3j35t3r then links the
RIPE.net contact name to a
LinkedIn account .
That is how Andrey Slusar
became the target. That is how
Andrey Slusar was tarred and
feathered without a trial.
NOBODY
QUESTIONED
NOBODY
OBJECTED
NOBODY ASKED
FOR PROOF
http://linkd.in/1lzwPzE
6. Now let’s see what happens
when we try @th3j35t3r’s
logic and methodology
on some other unsavory
sites.
(Go to http://www.whoishostingthis.com if you want to play along at home.)
7. MEMRI claims that kavkazenter.com is affiliated with the
Russian jihad organization Caucasus Emirate:
10. Well, here’s the
RIPE.net search
for CloudFlare.
Let’s blame Nitin
Rao.
https://apps.db.ripe.net/search/ Search term = CloudFlare
11. And here you have it. One
of the evil bastards
responsible for hosting
jihadi websites. At least
that’s what you might think
if you choose to believe
@th3j35t3r’s approach is
correct.
Actually, this guy is just a
contact name at a large
company that does web site
hosting. He doesn’t have
any control over the client
base any more than Andrey
Slusar did . And, if
@th3j35t3r is as savvy as he
purports to be, he’d know
this is a fact. Then again,
facts seem to elude
@th3j35t3r on a regular
basis. https://www.linkedin.com/in/nitinrao