• Text smaller
  • Text bigger


Jesse Lee

Hold on to your hats, ladies and gentlemen! What you’re about to read will shock you. The Obama administration doesn’t like negative things being written about it on the Internet. So “O” and his thugocrats are doing something about it. They’ve created yet another czar position, this one intended to “rapidly respond” to any unfavorable stories. First Amendment, meet Pravda.

How will the new “director of progressive media & online response” accomplish this? In Goebbels-like fashion, by reaching out to the progressive media with one hand and with the other, grabbing anti-administration “violators” by their throats, figuratively speaking. The White House is “going aggressive” in the online world, gearing up for the months leading up to the 2012 election.

According to a published report in The Blaze, your tax dollars are now paying for this new position within the White House, dubbed “a dedicated enforcer and story squasher that loves the liberal media.”

“This week, Jesse Lee will move from the new media department into a role in the communications department as director of progressive media & online response,” Communications Director Dan Pfeiffer said last week in an internal memo provided to The Huffington Post.

So, who is Jesse Lee and what’s his claim to fame?

For starters, he was Nancy Pelosi’s media adviser. He also worked on the Democratic National Committee’s online team during the ’08 election.

One of the arrows in his quiver? His Twitter account, with the following warning: An official WH twitter account. Comments & messages received through official WH pages are subject to the PRA and may be archived. Learn more wh.gov/privacy.

And speaking of Twitter…

Obama appoints Twitter CEO Costolo to Presidential Advisory Group

Keeping it cozy, Obama is bringing Twitter into his inner sanctum, where Google and Facebook already have a place of prominence at the communications and technology table. Obama’s servants are setting another plate for Twitter CEO Dick Costolo, who joins the National Security Telecommunications Advisory Committee.

The fine china also is being laid out for other new appointees, Microsoft’s Scott Charney and McAfee’s David DeWalt, just months after Obama held a dinner with 12 of the country’s top tech executives.

Pass the salt.

G8 Summit concludes laws for Internet same as “real world”

According to Cnet, the G8 group of countries – France, Italy, Germany, the U.K., Japan, Canada, Russia and the U.S. – met last week in Deauville, France, to talk about a long list of issues, including the Internet.

In a lengthy statement released at the end of Friday’s meeting, the countries agreed on a 22-paragraph communiqué in which they lay out their view of the Internet – and make clear that laws apply in cyberspace exactly as they do in the real world.

During the forum, Facebook’s Mark Zuckerberg discussed the role of social media in political movements, specifically its impact and influence on the pro-democracy uprisings taking place in Arab countries.

Zuckerberg said: “People tell me: ‘It’s great you played such a big role in the Arab Spring, but it’s also kind of scary because you enable all this sharing and collect information on people. But it’s hard to have one without the other. You can’t isolate some things you like about the Internet and control other things you don’t.”

And in Iran, the regime is unplugging the Internet, creating its own “internal Internet.”

Google – Search & Destroy

Do you know that whenever you use a search engine, you disclose something about yourself? Yep. Your wants, needs, desires, interests and fears. And you may unwittingly be divulging your age, sex, religion, ethnic group, profession, political views and medical concerns. In Google’s case, all that information can be exploited to create dossiers on you that would have made former FBI director J. Edgar Hoover green with envy.

According to Scott Cleland, author of “Search & Destroy, Why You Can’t Trust Google, Inc.,” Google is not the company it claims to be. Evolving from an information servant to master, the company’s unprecedented centralization of information, tracking and profiling is destroying privacy while threatening our security and way of life.

“You are not Google’s customer – you are its products – lab rats to be monitored and tracked before having your personal information laundered to advertisers – and maybe even shared with the government,” Cleland says, pulling back the curtain to reveal the Internet giant’s close relationship with the Obama White House.

Cleland is the world’s leading Google critic and has been called to testify before Congress on three occasions regarding the Internet behemoth. He appeared on my radio program “The Andrea Shea King Show” last Thursday, where he explained why Google cannot be trusted and how the company with a “don’t be evil” slogan threatens our privacy, security and even our fundamental values and institutions.

By the way, WorldNetDaily’s Superstore has a great selection of books by best-selling authors that also deal with conservative and constitutional issues.

Google makes enemies

Meanwhile, moments after announcing its new Google Wallet, Paypal and its parent company eBay filed a lawsuit against the big G for stealing trade secrets and two key execs who they claim shared confidential info with Google. Here’s how it unfolded.

Jay Greene of Cnet wrote, “It got us thinking about the growing list of enemies Google has made over the years.”

But Google has also managed to alienate regulators, both in the United States and abroad. And as the company pushes into new markets, it’s found a passel of new rivals with which to do battle.

So here are the top five confrontations (not scientifically selected) in which Google has managed to mire itself.

More where that came from: “Paypal v Google: A Tawdry tale of trade secret misappropriation.”

What is Net Neutrality? Steven Crowder explains in plain English

From Hot Air: “Who gets to control the operation of private networks – those who own them, or the government?” Watch this humorous video. Stay with it to the very end.

Technology helps you survive a disaster

But which technologies? Applications? Hardware? Gadgets? Answer in this video.

IBM analysis: Social media indicates fewer canceling Memorial Day travel

IBM used an unusual surveying methodology to assess and analyze how many Americans planned to travel during the Memorial Day weekend. Their conclusion? You might be surprised at the method and the results.

Gmail’s “People Widget” gives you relevant info on who you’re emailing

Not sure you’re going to like this one, as your cursor might be the bane of your email existence. If you’re already using Google Gmail, you’re familiar with the annoying pop-ups that appear when you roll your cursor over someone’s name.

Well, now Google’s getting ready to roll out yet another pop-up “convenience” – the “people widget”. It’s described as a mini-social networking profile that pops up beside email messages to give you a dossier of who you’re emailing.

The widget includes recent conversations you’ve had with that person, upcoming appointments with them, and if they’re online now.

“The people widget surfaces content from friends, family and colleagues that is already available to you but may be hard to find and makes it easier to connect with them,” Google wrote in a blog post announcing the feature.

Get ready. The service will roll out over the next couple of weeks. Let me know if you like it.

You might find this new Google feature more useful: Flight schedules and airline routes integrated into its search engine. Search for a destination, and you’ll see airlines that serve that route and when they fly, as well as all destinations with non-stop flights from a particular airport. The details.

If you’re flying Alaska Air, your pilot is among the first to go paperless in the cockpit, using the iPad in lieu of flight manuals. It’s expected that the airline, along with others, will use the iPad to replace navigation maps and charts, making for an FAA-approved completely paperless cockpit.

Macs now suffering from malicious malware attacks

Beware of MacDefender!

One of the advantages of using a Mac computer has been its virtual imperviousness to viruses and malware attacks. However, techcreep is catching up with the Apple products.

“A recent phishing scam has targeted Mac users by redirecting them from legitimate websites to fake websites which tell them that their computer is infected with a virus,” Apple wrote on its support website. “The user is then offered Mac Defender ‘anti-virus’ software to solve the issue.”

The malicious software is designed to get you to download its virus protection software. But Apple says it is malicious software: “Its ultimate goal is to get the user’s credit card information, which may be used for fraudulent purposes. The most common names for this malware are MacDefender, MacProtector and MacSecurity.”

Apple is working on a software update to its Mac OS X operating system to combat Mac Defender. Here’s how to avoid or remove MacDefender and other malware.

More security concerns: Hackers strike again. U.S. defense contractor Lockheed Martin and others get infiltrated.

Bits & bytes

Know someone digitally addicted? Pass this story on to them

Are you texting more and conversing less? Do you interrupt real life relationships to Tweet or check your email? Are you so engaged with what’s happening on your computer screen that you’re emailing and chatting with your spouse who’s right there with you? Do you find yourself pulling away reluctantly from your computer when other obligations call? If you answered yes to any (or all) of these questions, you’re hooked. You’d better get an intervention before real life passes you by.

This week’s EarthCam view: Chicago’s Wrigley Field

The Time Capsule

“Those who cannot remember the past are condemned to repeat it.” – George Santayana

1868 – Memorial Day officially proclaimed

1940 – Dunkirk rescue over, Churchill warns of invasion

1953 – Queen Elizabeth II is crowned

1957 – Arthur Miller won’t name communists, convicted of contempt

1968 – Sen. Robert F. Kennedy assassinated in Los Angeles

1989 – Tiananmen massacre, hundreds dead

Now playing at the Princess Theater in Urbana, Ill.

Congratulations to WND readers Tom Reagan, Alvarado, Texas, and Tim Kerlin of Watervliet, Mich., who were among the first to correctly guess actor Liam Neeson in his portrayal of Oskar Schindler in the 1993 movie “Schindler’s List.” Directed by Stephen Spielberg, the film also starred Ralph Fiennes and Ben Kingsley.

Based on a true story, the film depicted World War II Poland during which Oskar Schindler, a womanizing Nazi businessman who profited from slave labor as millions of Jews were being killed. As he witnesses what’s happening, he sacrifices his business to save the lives of over 1,000 Jews. The film won 7 Oscars, another 65 wins and 22 nominations.

The quote was: “My father was fond of saying you need three things in life: a good doctor, a forgiving priest, and a clever accountant. The first two, I’ve never had much use for.”

This week’s quote: “I have a letter here, written a long time ago, to a Mrs. Bixby in Boston. So bear with me. ‘Dear Madam: I have been shown in the files of the War Department a statement of the Adjutant-General of Massachusetts that you are the mother of five sons who have died gloriously on the field of battle. I feel how weak and fruitless must be any words of mine which should attempt to beguile you from the grief of a loss so overwhelming. But I cannot refrain from tendering to you the consolation that may be found in the thanks of the Republic they died to save. I pray that our heavenly Father may assuage the anguish of your bereavement, and leave you only the cherished memory of the loved and lost, and the solemn pride that must be yours to have laid so costly a sacrifice upon the altar of freedom. Yours very sincerely and respectfully, Abraham Lincoln.”

Name the movie, the actor and the character. Send your answer to me at the email address below. Good luck!

  • Text smaller
  • Text bigger
Note: Read our discussion guidelines before commenting.