New Snowden revelation “GODSURGE” gives NSA ability to see everything your computer does – even the screen
Original documents released by Snowden reveal surveillance powers that go beyond root access, and into the hardware of all computer systems everywhere.
The exploit hooks itself into a computer’s boot loader, initiating an “infected” BIOS that is in no way distinguishable from normal computer activity, and can only be discovered through forensic investigation of the physical data chip using electron microscopes.
With GODSURGE, a complex malware loaded by the similarly named malware DEITYBOUNCE, secret agents are able to monitor users’ computer activity – even when the computer is offline – because the malware phones home when users plug back in, reporting activity and filling in historical gaps.
It is safe from an operating system reinstall because it lives on the motherboard, and does not affect the installation at all, remaining undetected by antivirus scanners and even computer scientists.
When Ross Ulbricht was found hiding among the stacks in the Glen Park public library in San Francisco, the 29-year-old Silk Road operator was believed to have covered his tracks perfectly. Speculation is rampant as to how he was really caught.
Neckbeards with no working knowledge of Internet technology hypothesized that an “anonymous” forum post asking for help on specialized messageboard code led unseen internet police to backtrace his IP. It is an unlikely connection, but compelling conspiracy theory, because it is a common supposition that the Internet is a self-referencing, self-cleaning hivemind; but it is far more likely that ubiquitous, self-replicating code that bounces to destinations through “jump hosts” – a self-replicating “Onion Router” of malware – led to his discovery because it tells the NSA exactly what any given computer is doing – or trying to do – without being caught.
Portrait of a killer: What drove Barack Obama to senseless murder?
‘Sup fellas! Six years into President Barack Obama’s indefinite rule, ‘the drone strike madman’ recently executed a series high-profile civilian murders referred to by analysts as “the Columbine of the Middle East.” Needless to say, Barry’s got a few of us here at the Chronicle wondering, “Dude, what did those weddings ever do to you?”
I’m Dr. Angstrom H. Trubadeur, and I have a Ph.D in child psychology. I have been watching Barack Obama for warning signs of a troubled childhood, and I am sad to report our “P” is extremely disturbed as a result of exposure to hyperviolent videogames.
For more than 30 years, I have studied the effects on violent videogames on children like Barry. I have published studies in Nature, New Scientist and The Internet Chronicle explaining how and why videogames negatively affect people’s behavior; how it affects their minds; how it affects their worldview; and in this case, how violent videogames led to the most unrelenting series of terrorist attacks ever conducted in human history.
As part of a crack team of Chronicle researchers, we are all searching for an answer to the same question: Why you gotta kill so many innocent people, Barry?
Former Sec. of Defense Donald Rumsfeld said Modern Warfare 2 would trigger “anger blackouts” in Barack and he became inconsolable until an innocent victim died in a simulated explosion.
“Barry used to play that predator drone mission over and over again,” Rumsfeld said. “We thought nothing of it, at the time. But little did we know, Barack Obama would go on to be even more evil – and less human – than I am.”
You can still see his eyes flicker every so often, as Barry reminds himself and others to ‘stay frosty.’
Former Chief of Staff Angel Hyatt said Obama used to sit in his office at ACORN all day, deliberating with Penultimo over whether to pay the USSR immediately, or in bi-annual installments.
“You could tell he really wanted to become a hardline dictator someday,” Hyatt said. “Videogames allowed him to do that in a safe environment. Now that he’s president, who knows what dormant perversions lie in wait.”
Hyatt added that Barry’s success at Tropico was owed to the early issue of the Wiretapping and Secret Police edicts, available after appointing a Minister of Defense. “No uprisings here!” Barry gleefully announced.
“I’m looking at Obama for a fourth term,” Hyatt said. “He seems to enjoy the human bed.”
Barry loved every aspect of drug dealing: the profiteering, the exploitation, drug abuse – you name it. It certainly explains a lot about all the guns the CIA runs through Mexico.
His affinity for Coke Fiend 3 was more of a byproduct of an existing history of powermongering. There is little evidence to suggest the Coke Fiend game series led to an increase in Obama’s drug crimes, but Barry was encouraged to commit racist hate crimes against Haitian ‘marks’ that he still can not talk about today without flying into a celebrated “blind rage mode.”
Both parents admitted he was never the same after playing this MA-17 Rated game.
Benghazi Cover-Up Simulator 2014
Your main character powers up when FOX News discredits a legitimate search for answers by participating in it.
Barry may have hardened his icy demeanor – and cold, unchanging gaze – by advancing a virtual political agenda in this gross negligence simulator.
Barry got the multiplayer expansion during a Steam Summer Sale and invited Sec. of State Hillary Clinton to play the game with him. During that time, they developed a perverse, destructive relationship at the center of an ever-expanding web of lies.
Nothing else could explain Barry’s insatiable lust for power and corporate servitude than his bottomless addiction to EVE Online.
Thousands of hours of dedication to this space-capitalism MMO may have put Barry – and our nation – on a direct path to unchecked neoliberalism. EVE Online is a libertarian hellscape beyond the imagination of anything Ayn Rand could have ever invented.
Hyatt said Barry came out of the experience with a new vision: To turn America into a new center of commerce, in which millions – perhaps hundreds of millions – could participate voluntarily in their own enslavement.
With the illusion of choice and control, Barry sustains corporate livelihood with an economic model no other country can live up to: unregulated industrialization of covert prisons and warfare, fed by increasing the necessity of war itself.
Without EVE Online and the addictive hyperviolence of Coke Fiend 3, America’s 44th president might have been a man of the people. But as a result of overexposure to gruesome, sexual imagery he is neither man, nor person.
Lebal Drocer, Inc Security Advisory-0001:
Multiple Cosmic Vulnerabilities in the Universe
Vendor: Gene Ray (http://timecube.com/)
Product: Cubic Time
Versions affected: ALL
Threat Level: Mauve
Cubic Time is a Reality that posits:
"EARTH HAS 4 CORNER
WITHIN SINGLE ROTATION.
1 of God Is Only 1/4 Of God."
Finding 1: Gene Ray’s Cubic Time Reality is Truth, but suffers from a Remote Logic Collision(RLC). This new class of bugs has been pioneered by Lebal Drocer, Inc,’s Chief Security Researcher, Dr. Angstrom H. Troubador. “From the outsiders perspective, Ray’s Time Cube Reality is the only absolute truth, but after years of analysis of his cryptic, peer-reviewed text and implementing a small simulation of the Time Cube in a isolated setting– I was able to remotely identify a logic collision which could cause catastrophic events.” he says, “I won’t go into how to crash the universe though,” Troubador said with a crooked smile.
“There are, however ways to use RLC vulnerabilities for the good of the universe and, in turn, mankind. One being, if you applied Hawking’s black hole “Apparent Horizon” theory, using it against a rotating XOR cipher with the gravitational constant, the Time Cube would result in a logic collision, leaking “unmangled” data from the black hole. Essentially, the Apparent Horizon/Time Cube RLC attack can be used to “decrypt” lost data from black holes, which Hawking has said was previously retrievable, yet mangled.”
Patch: Vendor contacted, no reply. Go wild, everyone!
Americans are actually RETARDED from
Religious Academia taughtONEism
The ONEist educated with their flawed 1 eye
perspective (opposite eyes overlay) Cyclops
mentality, inflicts static nonpulsatinglogos
as a fictitious queer same sex transformation.
Finding 2: Severe logic flaw in the Time Cube Reality causes cosmic confusion, resulting in Truth segmentation faults to the unaware. Dr. Troubador elaborates, “While Ray’s Time Cube is logically sound at this point, it suffers from a few misconfigurations in its base system of implementation, which can be leveraged to cause a “neuro-modulating Reality slow-torture cluster” to infuse itself into unwitting victims. The logic flaw above shows that Religious Academia teaches oneness, leading to “queer same sex transformations,” which is preposterous, considering God hates fags.”
Patch: Vendor alerted. No response.
Temporary fix/mitigation: Keep reading www.timecube.com for further englightenment.
This advisory has been brought to you by Lebal Drocer, Inc., your very own safe, secure blanket of protection from all dangerous things known and unknown. Purchase our products and pay for our security update subscriptions now, today!
[Editor’s note: Okay, alright now we are going to write this. I smoked a big old fat thing of weed and now we are going to write an article about]
The state of our world
…digital and otherwise – assuming there’s a difference (based on a paper forwarded to me by Kilgoar, I unconsciously pore over the definition of reality. The paper – originally published in a scientific journal, but now Aaron Swarz’d on this subversive website – stipulated that substantial evidence “exists” to suggest reality as we know it is a computer simulation.
Let’s just say for a second that we do live in a computer simulation designed to reproduce (or produce for the very first time) each facet of our existence – from the evolution of the single-celled organism to mankind, or from illiteracy to telekinesis. Let’s assume that every instance of reality exists not only in probability but in practicality. If we are part of “one” simulation then we may infer there possibly could be many others. Perhaps these alternate realities play out in widening variations – even to the extent we no longer recognize existence in its many otherworldly iterations.
Or let’s just say that’s all bullshit. Either way, does a two-party system actually reflect the needs of mankind?
Even fucking binary code “needs” more than 1′s and 0′s to function. Binary needs a processor.
Our false-binary political system does not allow us to recognize what goes on outside that vote – or that the government itself is a sort of processor, and not the result of voting itself. The processor is designed for certain purposes; all of them acted out, at its most basic level, in binary. And that is how America votes (and the results are menacingly consistent). Republican or Democrat, “left” or “right,” this one or that one, the lesser of two evils, and so on … it is by design that these are our choices.
It is of the utmost importance that we question, at every opportunity, what “reality” is, or is not.
To be, or not to be, that is the question—
This is a classic example of pre-computer false binary. I would have sailed out across God’s green ocean, and to hell with revenge and the idolization of one’s enemies.
But Prince Hamlet let himself get wrapped up in the binary when he should have been thinking about wrecking the processors. If you don’t like what your Pentium IV from 1999 is doing, then you don’t delete out a line of code. You replace that motherfucker. I’m talking about a processor revolution, and people don’t think like that. We are taught to think in binary. Yes and no.
So what if you KNEW “everything” was a computer simulation. Wouldn’t you want to play in it? Wouldn’t you be interested in seeing what it can do? Or does being a process relegate us to certain behaviors, certain parameters – certain “rules.” Maybe, right? But isn’t it worth a try?
LOS ANGELES, CA – The popular smartphone application “Snapchat” came under siege last week due to a decimating security breach, which allowed Internet hackers to enumerate 4.6 million user names and their corresponding phone numbers, before being halted by the servers API rate limit. Just as the snappy startup fixed its security faults, there came another blow to the reputation of what has become one of the most popular forms of sending sexually provocative, explicit even, pictures to friends, especially amongst teens.
Saturday, January 4th, the home of Snapchat employee and co-founder Dave Davidson was raided by the FBI, along with the Snapchat office in Los Angeles. When reached for comment, a spokesperson from the FBI’s Los Angeles branch had little to offer, but shed some light on the allegations: “The investigation is ongoing, but we can tell you that Davidson is being held under suspicion of distributing child pornography– pictures of teens he’d gathered from the Snapchat server– and selling them in bulk on what we have dubbed the “darknet,” a haven for pedophiles and Internet hackers, but we got’em this time… We got’em,” he said with a nod.
The “darknet” the agent referred to is a known nickname for the Tor network, which anonymizes Internet traffic and uses its own pseudo-top-level-domains known as “.onions” where anonymous communities are setup to disseminate child porn, atomic bombs and homeopathic cancer cures.
Colleagues of Davidson were shocked to find out what he had done: “He was always staying late, you know, putting in the extra work or so we thought,” said a Snapchat employee, “He always wore a hoodie with “REVENGE PORN” on the back, but we just thought he was being ironic. This is all quite chilling, really.”
INTERNET — The Internet Chronicle was under siege Sunday evening, as packets flooded in from across the globe, shutting down the site temporarily. This tactic is widely known and used by Anonymous, a loose-knit offshoot of Anonymous hacker group known as Anonymous, as an act of censorship to protest censorship and other such social injustices. Sure enough, moments after the attack began, the Anonymous flagship account @YourAnonNews took credit for the attack, issuing an ominous “Mango Down,” which is a technique pioneered by Anonymous subset troll organization the “Rustle League.” The @YourAnonNews attack was rumored to be spearheaded by Anonymous Commander “xyz” and collaborator “xnite.”
Staff writers were initially taken aback by this ugly turn of events, as we’ve always had a really great relationship with Anonymous and all of its offshoot groups. However, spiritual peace in our office was soon attained once resident Internet anthropologist Dr. Angstrom H. Troubador relished in the idea that we were actually a target of a “virtual sit-in.”
At a board meeting this morning, Dr. Troubador expressed with great exuberance how this pseudoevent was actually a blessing in disguise, as it cemented the Internet Chronicle forever in the annals of Internet history as a target of Anonymous. During his two hour long slide-show, Dr. Troubador referenced respected Internet anthropologists Gabriella Coleman and Peter Ludlow, the former actually being the current leader of Anonymous, and blamed Chronicle writers for making fun of Christ-like martyr and ex-leader of Anonymous, Barrett Brown, citing this as the cause for the attack.
“You idiots think you can just run around writing about whatever you want and get away with it? This isn’t the Internet of yesterday, my friends, this is an Internet ruled by the power of Anonymous and it’s about time we fucking recognized it.” Troubador said, poetically taking a drag from his spliff.
Upon leaving the meeting, all staff had to purchase Coleman’s book “Coding Freedom” to be read immediately and were forced to sign an agreement form that said we would pre-order her upcoming book on the hegemonic Internet force that is Anonymous.
People invested in Bitcoin argue the Litecoin will never gain traction in their precious magical money market. Poor Litecoin investors who are jealous of the Bitcoin master race’s infinite foresight profess feverishly on Bitcoin sub-forums that their currency WILL see come-uppance! Their dialogue is often one-sided as they battle the image of Johnny-Come-Lately who secretly wants himself a Bitcoin.
He wants it so bad. And now he is left to monitor Litecoin as she rises and falls like the tide of a bleak moonless beach, illuminated by the passing glimmer of the Bitcoin lighthouse which, with every sweeping motion, shines brighter – $100 brighter – on each irritating pass.
Temples to Litecoin were built in its honor, where crypto-shamans beg piously for restitution over of their doubts in the Bitcoin, and plea for a second chance. The Litecoin is perfect, they say. It’s faster. It’s quiet. It’ll stay out of Bitcoin’s way. It can be there, too. Can’t it?
The arguments playing out around Litecoin – ranging from whether it will ever increase in value, to whether the world can stand another cryptocurrency, to whether or not China is actually adopting the coin or simply “pumping it and dumping it” – are all tinged with the doubt of a million atheists who just caught a glimpse of God but are still too proud to admit it.
The fact that Litecoin even exists is “proof that there is room enough in the world for another cryptocurrency,” according to economist Dr. Angstrom Hydrocopolous Troubadour, who said he invests heavily in the market regardless of God’s wishes that he not gamble, or lust over his neighbor’s two wives.
Congress convened for a hearing this week to determine exactly what a Litecoin is and – being capitalists – how to profit from it. The results, Troubadour said, don’t look good.
The Litecoin may currently be cheap and accessible but, like the Bitcoin before it, could eventually become so bloated that only the 1% can ever afford to use it, and they will be so busy spending their Bitcoins they won’t even let go of a Litecoin for the plebeian masses to attempt to buy drugs with it, to escape from their meaningless, Bitcoin-absent lives.
Pray to the money gods for Litecoin to increase in value. Make a small sacrifice of $100, and in three years’ time, you too will have many hundreds of thousands of dollars to spend on anything you like.
I’m buying an ethanol-powered yacht. What will you buy?
INTERNET – Here’s a bit of good news for all you porntubers out there — LinkedIn has made the distribution of jailbait pornography a simple matter of clicking “Like”. With a click of the Like button, users instantaneously share their pornography history with coworkers, family and friends.
“Let’s say there’s an awesome image you’ve found on Motherless,” LinkedIn CEO Jim Nottaway said, “that if anybody else – even your wife – knew you were jacking off to this, you’d be institutionalized. Well, now they know.”
Leaving a remark on a photograph such as, “wat i wuldnt give to bust a load into her tight pussy” automatically shares the comment and video to your LinkedIn account, and emails a copy of itself into your subscribers’ inbox.
The speed of social networking has advanced beyond confirmation dialogues, so information and content is shared without warning at the time of consumption.
“It’s just basic knowledge,” said Internet Psychopathologist Dr. Angstrom H. Troubadour. Troubadour said the forced merger between content-based community websites and social networking sites heralds a new era of information networking. “It’s a great way to bring the power of social tools into community-based porno distribution rings. I am already seeing things, for free, that I used to have to travel to Bangkok and pay for.”
“Destroying your own life has never been easier,” said Nottaway. “With the power of LinkedIn, users will soon be able to share their favorite surreptitious jailbait photographs with people they know in real life, at unprecedented profits to us.”
Mark Daffadin has been on LinkedIn for years, where he said he got his first full time engineering job after college. Now, they’re taking it all back. “All my loved ones should know what I do on the Internet without my consent.,” Daffadin said. “LinkedIn is making huge progress to that end. It’s fun, and I’m horrified by what my future holds. Three days ago, Friday, I commented on the veracity of a lesbian three-way pink salad. Now, it’s Monday morning, and I’ve already started packing my desk.”
But not all people are happy with the merger. Thomas Mulligan of Dublin, Ireland said he works from home, and therefore can not be fired, but told reporters he has grown sick of seeing his inbox spammed with invites to join exclusive groups dedicated to images of pre-teens in bathing suits.
“Why do I need to look at this stuff?” Mulligan asked. “I have kids of my own.”
It’s hanging onto everyone, leering around at the room as it gropes the family children, probing for stuff it’s not supposed to find.
“Uh-oh, what have we here? Something you’re not supposed to be doing. Your parents would be very upset if they knew that you did that. There, there. Don’t cry. Really. You can make it all better. That’s a good girl. You don’t have to cry. Uncle NSA can help you make it all better. Shhhhhhhh.”
The NSA knows all the best changing rooms, where they can take a peek at your children’s sexting photos and blackmail their enemies with the same handy multi-tool, connected right into that magical cloud like it’s Ghost in the Fucking Shell.
But I already know you’re not mad. I’m just saying.
Heck, I’m glad we have something like the NSA protecting our freedoms, like other paramilitary, sub-governmental groups such as the Taliban, Hezbollah and Hamas protect the freedoms of their constituents.
Thanks, creepy Uncle NSA! Give me a hug. Hey! Tee-hee. Watch the hands!
This message brought to you jingoistically by Lebal Drocer, Inc. – American patriotism at its finest.
MOSCOW – In his new video, a sleepy Edward Snowden demonstrated how to hack any website using only an iPhone and the RAM from a scientific calculator. With these new secrets, Snowden said, literally anyone in the world can carry out an attack on a government agency.
“You hear a lot of talk about TOR and VPNs,” he cautioned, “that’s what LulzSec used to do.” Snowden said use of TOR and VPNs is what blew LulzSec’s cover.
With this new method, he said, “You’re free to take on any government agency. You can carry out really any attack vector on any website … And once you’ve done that, you’re basically a hacker,” he said. “And you’re completely untraceable.”