N.B. Apart from the web rep considering the far fetched conspirational prepper content not being considered here, just coming down on an analysis of almost endless chain of redirect locations…
http://killmalware.com/blackoutusa.org/# redirect via -http://svb.trackerrr.com/ → http://toolbar.netcraft.com/site_report?url=http://svb.trackerrr.com → http://toolbar.netcraft.com/site_report?url=http://471318-ipspx2.consim.com
For all the redirects see: http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fsvb.trackerrr.com%2Fpingback.php%3Furl%3Dhttp%253A%252F%252Fwww.blackoutusa.org%252Ftsl%252Findex.php%253Fr%253D9887%2526r%253D2053&useragent=Fetch+useragent&accept_encoding=
Site-Scan HTTP response header information
Request type: GET
Request-URL: -http://www.blackoutusa.org/tsl/index.php?r=9887&r=2053
Server protocol: HTTP/1.1
Redirected: Yes
Target-URL: -http://svb.trackerrr.com/pingback.php?url=http%3A%2F%2Fwww.blackoutusa.org%2Ftsl%2Findex.php%3Fr%3D4079%26r%3D2053
Response codes: 302 - Found
301 - Moved Permanently
302 - Found
302 - Found
301 - Moved Permanently
302 - Found
302 - Found
301 - Moved Permanently PleskLin vulnerability involved…
Here everything seems fine: http://www.dnsinspect.com/blackoutusa.org/1449618583
IP badness history: https://www.virustotal.com/nl/ip-address/69.20.108.228/information/ →
https://www.reasoncoresecurity.com/ip-address-69.20.108.228.aspx
Known websites on IP: https://myip.ms/info/whois/69.20.108.228/k/3025472352/website/usdeception.com#k1
Unique IDs about your web browsing habits have been insecurely sent to third parties. Insecure connections.
polonus