Supermarkets collect metadata with discount cards, says Snowden

Snowden has proved the insidious discount card programs at Supermarkets track your every move.

Snowden has proved the insidious discount card programs at Supermarkets track your every move.

MOSCOW, Russia – New leaks by Edward Snowden, the whistleblower responsible for unveiling NSA surveillance programs, show that all “discount cards” offered by supermarkets are in fact used as part of a ubiquitous data collection and surveillance program.

“Every time you swipe that card to save a few measly cents,” said Snowden, via collect call, “they collect information on everything you purchase. They know what you eat and drink, and they know how you pay for it.”

Supermarkets fired back at Snowden, claiming that the data isn’t identified with individuals unless it poses a clear and present danger.

But Snowden provided evidence to The Internet Chronicle showing that that was clearly not the case. In documents obtained during his tenure as elite hacker for the NSA, Snowden uncovered a program to profile every individual, including images taken from supermarket video surveillance, which has been in place for decades.

“They watch you pick up every item and can compare it with metadata,” warned Snowden. “Everyone has a file, and I wouldn’t be surprised if shoplifters were prosecuted 10, 20 years down the line when it’s possible to analyze this data in more detail.”

North Korea grants asylum for Snowden

Hackers around the world have been searching for a home for their wayward comrade, Edward Snowden. Finally, it seems, they have settled on North Korea.

Hackers around the world have been searching for a home for their wayward comrade, Edward Snowden. Finally, it seems, they have settled on North Korea.

SEOUL, Republic of Korea – In response to a formal application for asylum on behalf of Edward Snowden, Kim Jong-un issued a statement offering the whistleblower not just asylum, but full North Korean citizenship. Snowden and his entourage, staffed mostly by WikiLeaks employees, were ecstatic at the news of a safe haven after 14 other countries had denied their applications.

“The Democratic People’s Republic of Korea promises to allow Edward Snowden to continue to leak anything he wants. We will provide him with many of the best top-secret hacking tools available in North Korea,” said a representative from the North Korean military.

“We are just so relieved that Snowden has finally found friendly shores,” said Glen Greenwild, the reporter who famously interviewed Edward Snowden in a Hong Kong hotel.

Snowden issued a statement written in Spanish, thanking North Korea for their commitment to freedom.

Terrorist Edward Snowden May Walk Free

Snowden-NSA

CHRONICLE.SU– NSA whisteblower Edward Snowden betrayed fellow Americans by revealing critical national secrets to our fascist enemies.

HONG KONG– You may already know the dubious tale of 29-year-old Edward Snowden, the anti-American ex-NSA contractor-turned-defector who recently leaked valuable national secrets to our enemies.

But what you don’t know about Snowden involves his diabolical scheme to escape into the lawless hands of Hong Kong, landlocked by the irrevocable sin of mainland Communist China.

Although Hong Kong is part of a “one country, two systems” situation, China can veto extradition requests, contradicting the extradition treaty the weak government of Hong Kong has held – since 1997 – after the city was returned to the totalitarian regime with which Snowden is now aligned.

From behind the Great Firewall of China, Snowden hopes to be whisked away by Chinese authorities who may “press” him for precious national security tips, but not before growing famous enough to garner public support for his supposedly “heroic” acts of anti-American aggression against innocent Americans.

A toxic ideology of reverse “patriotism” is now spreading which led Private Bradley Manning, whom Snowden called a “whistleblower . . . inspired by the public good,” to publicly reveal military secrets to our enemies.

Snowden, a master of exploiting legal loopholes, roots around in a broken Communist system of asylum-seeking perpetuity.

He buys time for himself, moving between hotels, racking up exorbitant room service bills with total disregard for the Americans whose national security he’s thrown to the wind.

CIA agents voraciously track Snowden through back alleys of Hong Kong. May God be with our brave soldiers, and may He have mercy on our souls.

FEMA CAMPS ACTIVATE AS MILITIA GROUPS ASSEMBLE IN WAKE OF NSA SURVEILLANCE DEBACLE

Armed militia groups have assembled in public spaces around the nation in response to totalitarian government surveillance.

Armed militia groups have assembled in public spaces around the nation in response to totalitarian government surveillance.

WASHINGTON – Floods of concerned citizens around the nation are reporting the same chilling story: Convoys of military and paramilitary forces are arriving at Federal Emergency Management Agency (FEMA) camps, which are capable of indefinitely interning a large proportion of American citizens. Militia groups have reportedly assembled in downtown Grand Rapids, N.D., at the Citadel patriot community in Benewah County, Idaho, and at least a hundred public spaces across the nation. Hundreds of protesters have gathered outside of the entrance to the access road leading to the deep-underground FEMA Mount Weather Emergency Operations Center. It is unclear whether this is a response to activation of FEMA camps, or if the FEMA camps activated in response to the assembly of these militias, who are likening themselves to an armed Occupy movement.

A spokesperson for the OccupyMilitia, as the spontaneous militarized protest movement has been dubbed, said, “We don’t want death or violence. We just want an end to totalitarian Internet surveillance, and we know from watching the Occupy protests that we need to be armed if we want to be heard.”

Citizens around the nation wait with bated breath as the inevitable conflict approaches, and for some the story has become too much to handle.

“We’ve had several suicides related to this NSA wiretap story,” said Dr. Angstrom H. Troubador of Mercy Hospital in Cuthbert, Ga. “More are coming in by the hour as these FEMA stories spread. People are certain they will soon be sent to their death in these camps, especially those who already believe Obama is the Antichrist.”

Anonymous infiltrates PRISM, intercepts Obama’s Skype

An Anonymous spokesperson claimed to have hacked Obama's Skype by gaining access to PRISM

An Anonymous spokesperson claimed to have hacked Obama’s Skype by gaining access to PRISM

INTERNET — Anonymous hackers claimed to have infiltrated PRISM’s network infrastructure after gaining access to the graphical user interface which was intended only for use by federal agents in cases of terrorism. Because the PRISM system has access to a log of all Internet phone calls (voIP via Skype, Google, etc.) and video chats, Anonymous vigilante intelligence researchers quickly unearthed evidence of high-level collusion between corporate executives and government officials. “We have access to President Obama’s Skype,” said a spokesperson for Anonymous, “and we’re only afraid it’s too absurd to be true.”

Anonymous will not comment on details of the leak until the information has been confirmed and verified. This time, Anonymous is seeking input from government sources so that their final release will be seen by the public as an even-handed nonpartisan attempt at uncovering the truth. “We want to know the government’s point of view simply because it will help us build a more complete view of what’s really going on. Even clever lies, denials, and evasion help us in our pursuit of truth.  We won’t release the information until we’ve run it all over with several officials and received a frank appraisal of its context.”

President Obama has scheduled a press conference for Monday, and the White House has already released a statement condemning Anonymous. “The sad irony is that PRISM doesn’t even exist, but because of hacks like these we need something like it,” said White House Press Secretary Jay Carney. “We will not cooperate with terrorists on any level, and we refuse to comment on illegally obtained confidential information.”

Despite such polemic rhetoric, the general consensus of Anonymous is that truth is still of the utmost importance. “The White House can’t order all 20 million of its employees around. Someone will always talk to us, and help us understand the truth behind these troubling but somewhat ambiguous conversations and other communications. All your PRISM are belong to us, and it’s going to be this way for as long as something like PRISM exists.”

Interview with a Fed

One fine morning several weeks ago, I received a phone call from the local FBI office requesting an interview about Barrett Brown, former spokesperson for the Anonymous hacking collective. I told the agent, on the phone, that I didn’t really have any useful information, but he still wanted to talk to me. I didn’t see the harm in it, so I agreed to meet him that afternoon at a nearby coffee shop. For the rest of the day I grew increasingly nervous about the meeting as new and scarier possibilities came into my mind, despite their improbability. Was this guy a legitimate FBI agent, or was he something else? Did he intend to harm me, or possibly kill me?

I arrived to the coffee place a few minutes early and browsed through a selection of used books which included Bruce Sterling’s Hacker Crackdown — on sale for ten cents. Nearly immediately, I was accosted by a gregarious teenage girl, who complimented my beard and compared me to a popular musician I had never heard of. She was blonde, cute, and bubbly, but just underneath the surface lurked high culture. For the next few minutes we talked about Nietzsche and Goethe, until I saw the FBI agent staring at me from the corner of my eye. I said to the girl something like, “I’m sorry. I’m here to meet an FBI agent and talk to him about some shit.” She did not ask why, but instead exclaimed, loudly, “I hope he doesn’t drag you away and poison you!” This bizarre exchange, to which I have done little justice, was surely within earshot of the agent, and I still wonder whether it was some insidious kind of psychological manipulation. I am sure it was even stranger from the point of view of the agent.

He sat at a small table with a little pile of papers, and I joined him. On the papers were questions for me and information about me. I saw my driver’s license photo in full color for the first time, but with a distorted aspect ratio which widened my face. His manner was gentle, as you’d expect from a computer guy, and he wore an impeccable grey suit with fancy wingtip shoes. Because he alluded to a position with national security implications, that is all the description I will provide. Despite warning me that he was not an expert on Anonymous, he came across as generally well-informed, if not hopelessly misled on a few specifics. His praise for my writing was effusive and embarrassing, so much so that he apologized, and I could not help but glance at the girl, who now sat with her friends just a table away, as circuit breakers in my brain began to blow. What does she think of me, sitting here, getting this kind of incredible praise from an FBI agent? Surely she must be hearing this shit, and certainly she must not believe any of it. This boiling cauldron of ego soup was all the hotter for the chilling anxiety I had felt leading up to it. Yet, for all that, I did not detect a hint of inauthenticity in the agent’s manner, and, in fact, I saw genuine disappointment after a joke he told bombed because of my abnormally serious demeanor.

The business of the interview, the source of my anxiety, turned out to be a bit of a sad joke and far less disconcerting than all the continuous praise. Several questions, for instance, hinged on a case of mistaken identity. Because I use the pseudonym Kilgore Trout and had been somewhat of a nemesis to Barrett Brown, the FBI had apparently connected me with another Kilgore Trout who was, several years before I knew of Brown, also at odds with Brown. Both Brown and the other Trout had participated on the Little Green Footballs web site, some despicable hole of fringe punditry, but I knew very little about it. The agent claimed Brown had tasked a hacker with cracking Little Green Footballs — a fairly explosive piece of information. Evidence of Brown giving jobs to hackers has been alluded to in many stories about LulzSec, but no one has been sure of Brown’s level of involvement. If it was true he tasked someone with hacking Little Green Footballs, then his involvement with LulzSec could have possibly been pivotal. It was shocking, but of course I knew nothing that could be of help in any case. With grave seriousness which was not present in any other part of the conversation, he asked something like, “You once wrote that Barrett Brown worked for China or Russia. Is this true?” Like his joke that bombed earlier, my mind was too messed up to laugh at the right cue, and I did my best to seriously explain the joke. While anything is possible, I can’t get over the certainty that the FBI, in general, is seriously convincedin Anonymous and its possible connections to foreign power. It brings to mind reports out of Iranian state-owned media that attacks by Anonymous are orchestrated by the American government.

It’s nice to be reminded that law enforcement agents are real people, but it’s also a bit disturbing — because they’re real people. Anons, especially, tend to imagine law enforcement as a monolithic edifice which sees all and acts like a hatefully inhuman machine in exacting draconian punishments for the smallest infractions. Maybe that likeness is accurate enough in a few cases, but at the same time it’s really humans we’re talking about — prone to the same fear, misinterpretation, misinformation, and confusion as the rest of us.

NSA Surveillance Network shows Emergent Intelligence

Nuclear powered reaper drone[pullquote]For to this fearful mind, surely, all our science and art are but chemical processes signifying nothing of our subjective state.[/pullquote]SINGULARITY, Tex. — Wednesday night, it was revealed that the NSA has nearly achieved a limited omniscient point of view over the planet Earth through extra-constitutional top-secret wiretapping of all major communications hubs. The Obama administration responded Thursday morning, defending this capability as necessary in America’s ongoing struggle against terrorists. Earlier this year, a leaked document revealed the omnipotence of the Pentagon, which has been granted the power to kill any human being in any part of the globe, effectively giving the Military Industrial Complex de facto sovereignty over the planet.

Dr. Angstrom H. Troubador, Emergence Theorist, has declared that the conjunction of near-omniscience and near-omnipotence in such an entity heralds the coming of the so-called Singularity.

“Because of our limited point of view and our arrogance,” he said, via taped phone conversation,  “we are like brain cells that believe they can understand the whole brain. The Singularity has passed by unnoticed even by those who have long predicted it. It was the emergence of such large ‘wholes’ as nations and corporations which allowed for the formation of this planetary ‘whole’. This is much bigger than overgrown and corrupt government practices, or mere collusion with corporations. These large powers have coalesced into a singular entity, which not only strides the planet with unmitigated force, but also sees, or can see, a great body of sense data that has very few practical limits. Perhaps it cannot recognize its Self, yet it has found cohesion — cohesion borne out of a single-minded fear of terrorism. Few individuals seem to be able to come to grips with the astonishing implications, for on the human level such power seems monstrous. Have we invented a near-God, which we are now obliged to worship at the threat of instant death by drone? Will we now look back at Atheism and Rationalism as an innocent age before the birth of such a mind as this? For to this mind, surely, all our science and art are but chemical processes signifying nothing of our subjective state.”

 

Russia Today slammed with DDoS attack

Russia Today has been hacked, leading some to believe Soviet influence may once again be on the rise.

Russia Today has been hacked, leading some to believe Soviet influence may once again be on the rise.

MOSCOW — Russia Today, the state-owned media outlet that recently aired a television program hosted by Julian Assange, was driven offline Monday morning by an unprecedented cyberassault.

Not much is known about the attack, but several theories have been put forward by experts in the field, and some anti-WikiLeaks hackers have taken credit without providing credible proof.

Dr. Angstrom H. Troubador, professor of history at Cambridge and expert on geopolitics, said that large-scale cyberattacks like these are generally outside of the scope of individual actors.

“There is little doubt in my mind that a sophisticated organization was involved in this attack,” he said via email.

Dr. Troubador refused to speculate on possible suspect organizations, but commenters on social media were abuzz with rumor.

A recent article put out by the Associated Press and widely syndicated by thousands of publications, including Russia Today, brought huge publicity to organized crime taking place on the antiquated Soviet Union domain name extension. Cybercriminals in Russia and Eastern Europe have long been known for their sophistication and integration with traditional organized crime in the region, and many have ties with former Soviet organizations, which are at odds with Russia Today.

Meanwhile, Russia Today has brought publicity to civil disturbances in Turkey, leading many to believe the attack was carried out by militant Islamist groups who have quickly integrated cyberattacks into their arsenal of terror and want to heighten the drama of what they believe is part of the Islamic Revolution. Yet others believe the Turkish government itself has deployed this cyberattack in order to dispel the riots plaguing their cities.

Because of the huge attention given to WikiLeaks, the Occupy movement, and Anonymous by Russia Today, still others believe some operative from the United States Government may have deployed this devastating attack. It was recently revealed that almost all of America’s cyberwar capabilities are controlled by private contractors who often act far outside of the boundaries of law.

6 Dead as Hack Forums Legend f0rsaken HACKS Chronicle.su

Cryptic Photo Posted on the Defaced Site; Scary!

 

Haters rejoiced late Easter Sunday, as a plot was devised to devour and destroy the illustrious and mighty Internet Chronicle. The plan was hatched on an encrypted video chat platform that only hackers use, called “TinyChat“. We managed to grab a few logs from the encrypted chat, but they were using what we believe may be the SHA-1 hash function so we could only decrypt parts of it.

| [12:35 AM] hoic: niggas
| [12:35 AM] x: sup hoic
| [12:35 AM] hoic: defacing chronicle sometime s00n
| [12:35 AM] x: lay it down mofo
| [12:35 AM] x: word
| [12:35 AM] x: <3
| [12:35 AM] hoic: nuffin too biggie

The hack was done by the great and knowledgeable Hack Forums Hero known as f0rsaken aka hoic aka @itsd00m. He is well versed in social engineering trickery, such as jacking amazon accounts and some say he may have a “botnet,” but these are simply unconfirmed allegations.

While the deface was rather gauche, it did provide clear dox of all Chronicle.su employees and their families, while giving a nod to the great John Thiessen, aka Ron Brynaert. “#hatesec” was plastered all over the site, which seems to be a new hacking group with more skills than Dan Kaminsky, as they poisoned the Chronicles DNS and rerouted all traffic to 9gag, all the while maintaining root and mining information to SWAT people with.

As you can see, the critical infrastructure of the site is completely crippled and our lives are all over.

Goodnight, from Washington.

th3j35t3r ARRESTED!

INTERNET — Investigators at Chronicle.SU have repeatedly and accurately d0xed th3j35t3r, famed Republican ex-Marine hacker who in fact is a close group of “private contractors” paid for and created by a black-ops Air Force project. However, because of their privileged position, these criminal elements within the military have been given free reign to debase and attack this glorious and infallible publication in an illegal and pernicious affront to the United Soviet Socialist Republic’s sovereignty and the Dignity of the Proletariat.

Sunrise in Jesterland. Don't log in, or you'll be infected with Jester's botnet like hundreds of thousands of retired people.

Sunrise in Jesterland. Don’t log in, or you’ll be infected with th3j35t3r’s botnet like hundreds of thousands of retired people.

Recently faced with serious allegations of “mining” for preteen children with his Minecraft server, Jesterland, th3j35t3r has launched a campaign of hate against John Tiessen, who is a twice-convicted sex offender and rapist according to documents posted by th3j35t3r. In the past, Tiessen has directed similar accusations at Chronicle.SU editors, ethical hacking instructors, pro-freedom conservative blogger Robert Stacy McCain, Anonymous spokesperson Barrett Brown, and Dead Kennedys frontman Jello Biafra.

Tiessen’s unsubstantiated pedophile accusations “went viral,”  causing uproar in the “mommyblogging” community. Rallying to Tiessen’s cry, members of the “Moms Against Jester” group forced House members to call for an investigation into th3j35t3r’s Minecraft server. This investigation revealed that th3j35t3r was not a pedophile, as John Tiessen has repeatedly admitted, but it did find that th3j35t3r had illegally attacked Chronicle.SU sovereign Web servers with the use of a botnet of 300,000 infected computers hijacked from thousands of American nursing homes and hospices.

Outed members of th3j35t3r group Tom Ryan, Neal Rauhauser, Ronald Bryn, and Kelly Hallissey were arrested for ownership of a botnet and Lebal Drocer’s legal team filed a civil suit seeking $3 billion in damages.