September 02, 2014

The System

4chan: The ‘shock post’ site that hosted the private Jennifer Lawrence photos

by Terrence McCoy

As originally posted: The Washington Post
September 2, 2014

For all its cultural relevance, it’s possible you’ve never heard of 4chan. It’s not much to look at. Just a few pixels blinking on a page like something out of “Duck Hunt.”

The outdated design, however, belies its influence. Called one the “darkest corners of the Web” by a New York Times writer and the “ninth circle of Hell,” 4chan twins the irreverent with the abhorrent, birthing wildly popular memes such as Lolcats while simultaneously hosting some of the most prurient content on the Internet.

Its army of anonymous users anointed founder Christopher Poole Time Magazine’s Most Influential Person of 2009 by manipulating the poll. It gamed Google Trends, forcing a racial slur to its No. 1 spot. And one of its users, which number more than 7 million, was once investigated for spilling the contents of Sarah Palin’s e-mail.

But this weekend 4chan shot into headlines like never before. On Sunday evening, one or many 4chan users dumped what appeared to be a trove of private, nude photographs of numerous celebrities including Jennifer Lawrence and Kate Upton. The exact provenance of the images remains murky, like almost everything involving 4chan, which deploys fleets of anonymous users who vie for site supremacy by one-upping each other with outrageous material.

The trove of celebrity pictures was about as outrageous as it gets, perhaps the most intrusive, intimate pictures ever circulated publicly of celebrities. They quickly spilled to Reddit, where thousands purveyed it under the handle of “the Fappening” — “fap” means to masturbate — before the news reached Buzzfeed and the rest of the viral media gang.

Now, following 24 hours of hot coverage, the feds are involved. “This is a flagrant violation of privacy,” a Lawrence spokesman said in a statement reported by Reuters. “The authorities have been contacted and will prosecute anyone who posts the stolen photos of Jennifer Lawrence.”

The FBI said it is “addressing the matter,” calling the leak an “unlawful release of material involving high profile individuals.”

But exactly what makes 4chan unique may complicate the investigation into what party or parties were behind the leak. 4chan users operate with complete anonymity, which Poole said contributes to creativity. It also means, however, that users are free to post the profane, the hurtful, the evil. “They get rowdy — it’s like a bar without alcohol,” Willard Ling, one longtime user told the Wall Street Journal in 2008. “It’s like that psychological concept of deindividualization — when groups of people become less aware of their own responsibility.”

Nowhere among 4chan’s vast collection of message boards is this more apparent than in a section known as “/b/,” called the “darkest corner of the searchable Web.” It’s where the Jennifer Lawrence photographs first materialized, which were apparently hawked for bitcoin. And it’s also where more users are reportedly trying to ignite a viral hashtag #leakforJLaw, which encourages people to post nude selfies of themselves to support the celebrity.

Unless it’s a prank.

/b/ is a realm pervaded by something called “shock posts” — graphic scenes of violence or sex. A realm where “completely anonymous — no login, no username — people try to shock, entertain and coax free porn from one another,” wrote Gawker’s Nick Douglas. He said it’s otherwise known as the “a–hole of the internet.”

According to an MIT paper published by the Association for the Advancement of Artificial Intelligence, /b/ operates under a very different set of mores than most of society. Its “lack of identity makes traditional reputation systems unworkable,” the paper stated. “Second, instead of archiving conversations, /b/ deletes them when newer content arrives — often within minutes — which leads to a chaotic, fast-paced experience.” It makes “complete anonymity and content deletion the norm.”

It’s bound by few rules. According to Wired, the few include: “Do not talk about /b/,” Do NOT talk about /b/,” and “there is always more f—– up s— than what you just saw.”

The message board was the first created under the banner of 4chan, and Poole says it’s self-perpetuating and self-governing. “Ultimately, the power lies in the community to dictate its own standards,” he told the New York Times in 2008. “All we do is provide a general framework.”

But what if those standards plumb the depths of human depravity? Although there does appear to be some self-monitoring when it comes to child pornography, the group traffics in outright homophobic and sexist slurs. “/b/ is a man’s world, and women are routinely ignored or abused,” according to Wired. “The downward evolutionary pressure — everyone has to be more extreme than the last guy — has led /b/ to repeatedly phoning the parents of deceased, shouting Internet memes down the line at them.”

Example: the creation of the hashtag #cutforbieber, which soared into trending topics last year. “Tweet a bunch of pics of people cutting themselves and claim we did it because [Justin] Bieber was smoking weed,” one community member wrote, according to the Daily Dot. “See if we can get some little girls to cut themselves.”

Even now, amid widespread condemnation of the leaked photographs and the threat of prosecution, some /b/ users remain gleeful. “This might be the best but also the saddest day in /b/’s history,” the Daily Dot quoted one saying. “We’ve been teased with all these glorious pics. BUT there’s lots of videos out there, and I have a feeling that we will never get our hands on them. … it’s going to haunt you forever.”

The System

I fucking hate the idiots who suck up to the boss. 'Oh you're so brilliant'. 'Oh this is why you're the boss'. Oh shut the fuck up.

by "Texts To My Boss"

As originally posted on: Texts To My Boss (TextsToMyBoss) on Twitter
November 7, 2012

September 01, 2014

"The Corporate Bosses" and Capitalism

I will be so unproductive that the corporate bosses will start to wonder what productivity even means.

by "Texts To My Boss"

As originally posted on: Texts To My Boss (TextsToMyBoss) on Twitter
November 29, 2012

The System

Nothing is more unimportant than work. #LaborDay

by "Ayn Randy Savage"

As originally posted on: Ayn Randy Savage (anarchoantihero) on Twitter
September 1, 2014

The System

Who gives a piece of shit the right to supervise workers when he's never worked an honest day in his life?

by "Texts To My Boss"

As originally posted on: Texts To My Boss (TextsToMyBoss) on Twitter
November 13, 2012

August 31, 2014

The System

The following tweets were originally posted by "jimmylemons" on Twitter via his account (, variously, on September 8, 2013; September 23, 2013; October 11, 2013; March 22, 2014; March 30, 2014; June 4, 2014; June 22, 2014; July 15, 2014; July 21, 2014; August 16, 2014; and August 31, 2014.

crony capitalism is very profitable for a few,,,leaves millions in misery

communism,,,a few 1000 at the top make billions,,,20 million have govt jobs,,,10s of millions suffer

WAKE UP LIBERALS,,, Obama is not a liberal,,,he is the criminal head of syndicate looting the usa

Marxist democrats get their money from the Hollywood elites & perverts,,,its time to declare Hollywood the enemy of the constitution

OPEC pays 100s of millions in bribes to politicians who restrict usa energy production

you think the southern borders are open for free??? drug dealers & human traffickers pay huge bribes to keep border open

@abgdinstr @BladePunner we have a statist economy which benefits the 1%,,,the poor gets thrown a bone & the middle class gets screwed

Obama is the 1%'s best friend

far from being an enemy of the rich\,,,Obama is an advocate for them

Obama is great for the 1%

democrat party has become the party of the rich & poor,,,redistribution formula 10% for the poor 90% for the politicians & the rich

usa politicians get OPEC $billions deposited in their overseas bank accounts payment for restricting usa oil & gas production

southern border is not open for free,,,drug cartels & human smugglers pay the DC politicians $100s of millions

for the socialist & communist billionaires money & wealth is not enough,,,they seek absolute power & to rewrite history thru common core

The System

The following tweets were originally posted by "jimmylemons" on Twitter via his account (, variously, on April 22, 2014; April 27, 2014; August 7, 2014; August 9, 2014; and August 11, 2014.

the only gun control I want is to disarm the criminals

the independent states founded the federal govt not the other way around

to Iraqis,christians world over,,americans if you are not willing to defend your freedoms you will be a slave

red states should formally ally themselves,,ignore federal laws

I think the kurds deserve self rule & ownership of oil on their lands

August 30, 2014

The System

Twister – An Open Source, Encrypted, Peer-to-Peer Alternative to Twitter

As originally posted on: Infosecurity Magazine
January 15, 2014

Freitas had relied on Twitter to provide the news that his local media excluded during the Brazilian political protests of last June. But when news of the extent of NSA surveillance began to emerge, he became concerned that so much information was accessible under court order or surveillance from just one company. His solution was to develop a Twitter-alternative that keeps private messages private and inaccessible even to the NSA.

“As much as I like using Twitter for news reading, the possibility of a single entity being able to control this important flux of information made no sense to me,” Freitas told Wired. His solution is called Twister – an open source peer-to-peer encrypted micro-blogging platform that borrows code from Bitcoin and BitTorrent.

Because it is encrypted, even if intercepted, private (direct) messages cannot be read by anyone other than the intended recipient. The encryption used is the elliptic curve algorithm (not the same as that subverted by the NSA) that is used in bitcoins. It is thought to provide security comparable to a 3072-bit RSA. Since it is recorded nowhere, it cannot be subpoenaed by any court – but with the obvious corollary that if the user loses his key, he permanently loses access to all existing private messages.

Because it is peer-to-peer, there is no central server from which 'twists' can be recovered by a third party (for which, read Prism).

It is designed, Freitas explains in a FAQ, "so that other users can’t know if you are online or not, what your IP address is, or which users’ posts you might be reading. This information is recorded nowhere." But he also warns that he cannot fully guarantee this. "What I’m trying to say is that I personally have no means of doing it, nor any other normal user. However if one entity is capable of recording the entire internet traffic, he will probably be able to sort out exactly where you are connecting from (your IP address). If this bothers you then you probably already know the solution: use Tor."

But even if a single entity, for which read the NSA and GCHQ, "is capable of recording the entire internet traffic" (and this is not entirely impossible), what it gets is partial metadata only – that entity will be incapable of reading the content however much it tries (with currently known technology).

Twister was developed under Linux. Freitas has successfully ported it to Android and OS/X (both Linux-based operating systems). "Because the UI is just HTML5/Javascript," he comments, "porting it to other platforms is only a matter of recompiling the daemon. Windows, Mac and iPhone are certainly possible but I have no resources myself to do it." That is a clear invitation for the open source community to take up the challenge.

"Another more interesting long-term goal," he adds, "is to move all cryptography code into browser’s Javascript UI. This way users would be able to access twister from any client platform they use, choosing any third party server they want, while still keeping their private keys safe."

August 29, 2014

The System

The following tweets were originally posted by "UGNazi" on Twitter via one of the group's accounts (, variously, on August 23, 2014; August 24, 2014; and August 25, 2014.


No one will stop us! #UGNazi #OpFerguson #Anonymous

I got a botnet on my botnet thats illegal. :)

The System

If The Cops Can Track You, You Should Be Able To Track Them. Here’s How.

by John Vibes

As originally posted on:
May 18, 2014

The limitless possibilities of new technology are allowing people to fight back against police abuse like never before. Not only can people record occurrences of police brutality, but there are also dozens of apps that are designed to help you stay a few steps ahead of “the man”.

Out of the many helpful apps that can be found on Cop Block’s apps page, a GPS app called “Waze” is one of the most helpful for pinpointing the location of police and reporting police sightings to other drivers. When someone sees a police car or a speed trap somewhere along their route, they can make a report alerting other drivers in the area about the police activity.

There is even an option that allows you to type in a message that gives a better description of where the police are and what they are doing. This option also allows activists to send out witty messages to their fellow travelers, such as, “warning: state mercenaries extorting civilians near exit 7″.

There are a few different GPS apps out there that have similar features, but Waze has the most users, making the reporting more frequent and accurate. Waze also awards points to people who make regular reports, encouraging everyone to stay active and warn other drivers of danger when they can.

A brief description on the app’s website explains how Waze works.

“After typing in their destination address, users just drive with the app open on their phone to passively contribute traffic and other road data, but they can also take a more active role by sharing road reports on accidents, police traps, or any other hazards along the way, helping to give other users in the area a ‘heads-up’ about what’s to come. In addition to the local communities of drivers using the app, Waze is also home to an active community of online map editors who ensure that the data in their areas is as up-to-date as possible.”

Download Waze today by searching “Waze” on the app finder in your phone, or try visiting


John Vibes is an author, researcher and investigative journalist who takes a special interest in the counter culture and the drug war. In addition to his writing and activist work he is also the owner of a successful music promotion company. In 2013, he became one of the organizers of the Free Your Mind Conference, which features top caliber speakers and whistle-blowers from all over the world. You can contact him and stay connected to his work at his Facebook page. You can find his 65 chapter Book entitled “Alchemy of the Timeless Renaissance” at

August 27, 2014

The System

Self-Serve Coffee Shop Manages To Make Money On The Honor System

by Mary Beth Quirk

As originally posted on: Consumerist
August 26, 2014

You might think that offering customers the choice to pay whatever they want for something would be a sure way to the poorhouse. But one North Dakota coffee shop is not only making its honor system work, but it’s making money.

The owner of a North Dakota coffee shop says all the attention he’s gotten lately for his idea of charging customers whatever they want to pay is nice and all, but it’s not that surprising — everyone there knows their neighbors.

“I think that people who haven’t grown up in a small, tight-knit community like this are very surprised by honesty,” he tells the Associated Press.

He and his wife run the shop in a town of about 6,700 people, and don’t employ baristas. Instead, customers pick out their choice of coffee from a dispenser or choose a single-serve Keurig option, as well as pastries and soft drinks.

Prices are listed, but it’s up to customers to decide what to pay by credit card, cash or check. Change isn’t necessary, a sign instructs, just “round down and give yourself a break or round up and help us stay in business.”

That practice has brought in 15% more money than the asking prices for items, and the customers seem happy.

“I like the self-serve,” one teen says, saying it’s nice to not feel smothered. “There’s not someone like hovering over you all the time.”

North Dakota coffee shop works on honor system [Associated Press]

The System

The following release has been edited in terms of its formatting.

#OpFerguson #ResistWithFerguson #UGNazi #Anonymous #Dox #FuckTheSystem


@NaziDemon, @YourUGNaziNews, @OpFerguson, @EastCoastToasts Also I LOVE BRYAN SO MUCHH <3


Target: Daniel Page "Don't Push Don."


Name: Daniel Michael Page
Age: 55
DOB: 1958/10/07
SSN: 497-70-5836
Phone Number: (573) 784-2286
- Current Address: 8141 E Hwy
- City: Frankford
- State: MO
- Zip: 63441

Wife: Kimberly Clark Page
Age: 54
DOB: Oct 9, 1959

Emails: (JACKED)

Other Phone Numbers:

(919) 481-1846
(757) 424-2675
(573) 324-6901
(573) 324-2231
(573) 421-5560

Other Addresses:

636 Middleton Ave Cary, NC 27513
17070 Pike 291 Bowling Green, MO 63334
420 S 16th St Bowling Green, MO 63334
825 Brentwood Dr Norfolk, VA 23518

August 26, 2014

The System


As originally posted: Reporters Without Borders
August 26, 2014

Reporters Without Borders is relieved to learn that Peter Theo Curtis, a freelance journalist and author held hostage by the Jihadi group Al-Nosra in Syria since October 2012, was released yesterday.

We welcome Theo Curtis’ release after 22 months in captivity and we hope that similar efforts will be made to save the lives of other hostages held by militants in Syria,” said Reporters Without Borders assistant research director Virginie Dangles.

Curtis, 45, who writes under the name of Theo Padnos, was abducted by Al-Nosra, Al-Qaeda’s official wing in Syria, in southern Turkey as he was about to cross into Syria to report on the situation there.

His abduction was kept secret until his release, just days after Islamic State posted a video online showing US journalist James Foley’s staged execution by one of its militants. The video also showed Steven Sotloff, another US journalist who Islamic State is threatening to execute.

The System

The following release has been edited in terms of its formatting.

#Ferguson #DontShoot #FuckTheSystem #GameOver #UGNazi #Anonymous

| Twitter: |

--------- @OpFerguson --------- @YourUGNaziNews ---------

Governor You should have Expected US.


Name: Jeremiah Wilson "Jay" Nixon
Age: 58
DOB: February 13, 1956
SSN: 496-64-4799
Wife: Georganne Wheeler Nixon
Age: 59
Phone Numbers: (314) 367-3105 , SouthWestern Bell (Will get account soon.)
- Address: 1208 Elmerine AVE
- City: Jefferson City
- State: MO
- Zip: 65101


Password: Nixondynasty56
(releasing Work E-mail Password and logs soon!)

Phone Numbers:

(573) 751-4212
(573) 751-8825
(314) 367-2786
(573) 751-2379
(314) 531-4658

Other Addresses:

PO Box 1024
Jefferson City, MO 65102

221 W High ST
Jefferson City, MO 65101

4954 Lindell BLVD
Saint Louis, MO 63108

600 W Main ST
Jefferson City, MO 65101

374 Walton Ro
Saint Louis, MO 63108

PO Box 277
Hillsboro, MO 63050

10112 Lake Ridge CT S
Hillsboro, MO 63050

4466 W Pine CT
Saint Louis, MO 63108

Pob 277 21 F
Hillsboro, MO 63050

Pob 215
Hillsboro, MO 63050

1724 Massachusetts AVE NW
Washington, DC 20036

Other Stuff:

Twitter: @GovJayNixon
Work Phone Number: (573) 751-3222

(More Info coming soon!)

August 25, 2014

The System

Black Market Cannabis Road Hacked, $100,000 in Bitcoin Lost

by Pete Rizzo

As originally posted on: CoinDesk
August 25, 2014

Cannabis Road is now offline after suffering from an attack that saw hackers abscond with 200 BTC or roughly $100,355 at press time.

Users who attempt to access the online marketplace dedicated to cannabis products are now presented with a message from lead developer Crypto detailing the attack and the potential paths forward for the development team.

Crypto writes that he discovered the theft at roughly 10:15 AM UTC, after logging into Cannabis Road’s bitcoin wallet and noticing the balance was near zero.

He recalls:

“At first I thought it was a mistake, until I double checked, and triple checked, only to find out, we had in fact been robbed not 15 minutes earlier!”

The developer goes on to reveal the bitcoin address allegedly holding the stolen funds, before asserting that he does not yet know how the money is stolen.

Crypto concludes his message by issuing an apology to site users while expressing his current uncertainty over whether the project will be able to continue, adding:

“I am deeply sorry that I have failed you as a developer and a leader, and if I can figure out how this happened, maybe you will find it in your hearts to move past this and help us bring Cannabis Road back to life once again.”

Multisig employed

The success of the attack is particularly notable given that Cannabis Road had moved to integrate safeguards aimed at better protecting user funds through multi-signature technology, an evolution of the traditional wallet offering that introduces an arbitrator to the transaction process.

In a May interview with DeepDotWeb, Crypto indicated that Cannabis Road was using a hybrid version of multisig, however, in part to make the technology easier for its customers to use.

At the time, he indicated that Cannabis Road had added three levels of multisig in response to a rise in attacks against illicit websites, explaining:

“All three levels start off the same, asking for public keys of the buyer, vendor and market to create the shared (multisignature) address. The buyer sends funds to the shared address. Once the buyer is happy, the buyer agrees to finalize the order, this is where the three levels are offered.”

Two more advanced levels were added on top of this service, both of which put restrictions on the situations in which users would be asked to send their private keys.

Transparency promised

Crypto also promises Cannabis Road users that he will share information on the attack as it was discovered in order to provide more information to the broader deep web community.

Further, he estimates the damage of the attack to be significant for the online marketplace’s brand, suggesting that whether it continues to exist will be up to the site’s community.

Crypto wrote:

“I don’t know if Cannabis Road will continue to exist or not at this point, because there may be no reasonable way for us to recover from this.”

Notably, the site had suffered an early hack under the care of a previous developer in February. Though no funds were stolen in this attack, the incident did result in a leadership change, with Crypto taking the role of lead developer for the site.

Illicit markets targeted

The setback is the latest for the deep web’s illicit online marketplaces, which have been the target of a number of attacks so far this year.

Silk Road 2.0 suffered a significant hack in February during which it lost more than $2.6m in bitcoin in what was perhaps the community’s most high-profile attack.

In his remarks, Crypto moved to separate his actions from those that were taken by Silk Road 2.0 at the time, noting that he would not blame “transaction malleability” for the issue and that he now sympathizes with the situation that the site’s lead developer Defcon faced at the time.

Silk Road 2.0, however, has since been able to rebound from the event, revealing in late May that more than 80% of the customer funds stolen in the attack had been repaid.

Hat tip to DeepDotWeb

The System

Egypt feminist defecates on IS flag in the nude

Graphic content: Aliaa Magda Elmahdy posts photo to Facebook; Arab media avoid publishing since words ‘there is no God but Allah’ are printed on banner

As originally posted on: The Times of Israel
August 24, 2014

A well known Egyptian social activist and blogger posted a photo to Facebook Saturday of herself and another unidentified women defecating and menstruating on an Islamic State flag while in the nude, in what appears to be a protest against the Islamist terror group’s recent advances in northern Iraq and Syria.

Aliaa Magda Elmahdy did not specify why she posted the photo, though past controversies, such as a 2011 incident in which she posed in only stockings and red shoes for her blog — to protest against Egypt’s conservative culture — suggest that she was

opposing the Islamic State terror group’s brutally restrictive and misogynistic ideology.

In the image, the 23-year-old feminist is seen facing the camera, while the other woman, dressed in a black hijab, has her back towards the viewer. Two presumably plastic machine guns are in the background, and the veiled woman is holding up her middle finger. The letters IS are inscribed on Elmahdy’s stomach and on the second woman’s bottom.

Arab media across the Middle East avoided publishing the photo, since the words “there is no God but Allah” are printed on the desecrated flag, Army Radio reported.

Elmahdy said in the past that her photos “scream against a society of violence, racism, sexism, sexual harassment and hypocrisy.” However, she has been criticized for her endeavors not only by hard-line Muslims in her home country, but by liberal, secular leaning individuals as well.

“This hurts the entire secular current in front of those calling themselves the people of virtue,” Sayyed el-Qimni, a prominent secularist, said of the 2011 image, in an apparent reference to Salafi extremists, AP reported at the time.

Elmahdy did not respond to the criticisms, but continued to be active in the struggle to achieve equal rights for women in Egypt.

August 24, 2014

The System

The following is adapted from a transcript of a series of chats conducted via Facebook on August 17, 2014. It has been slightly edited in terms of content (simply to shield the identity of a person), and has been edited from its original formatting.

"Doug Mathers"

Should send me.a pic

[Dawn Quinn]


"Doug Mathers"


[Dawn Quinn]

I was sleeping and barely able to wake up and text ppl back.

"Doug Mathers"


What's upb

[Dawn Quinn]

Not much. Gonna get baked and cut grass. U?

"Doug Mathers"

Just chilling hornry

[Dawn Quinn]

That sucks

"Doug Mathers"


[Dawn Quinn]

K. What is ur game this time?

"Doug Mathers"

What u mean

[Dawn Quinn]

Y did u start msging me?

"Doug Mathers"

Cause I told you why and it's cause you make me horbyv


[Dawn Quinn]

Bc I think it's odd.

"Doug Mathers"

Why just suck my dick and be my cum SLUT

[Dawn Quinn]

I'm sure u have many other girls who could

"Doug Mathers"

Well so I want you

[Dawn Quinn]


"Doug Mathers"

Cause I want you

You turn me.on

[Dawn Quinn]

I might entertain the idea but u can't come here so

"Doug Mathers"

Well then and fucking.get dirty

[Dawn Quinn]

And how do I know I could even trust ur not setting me up? Ur not very honest to begin w

I fuxkin hate that thumb

"Doug Mathers"

What u mean I just want to get wild.and let you take control.of me

[Dawn Quinn]

Yeah that don't work. Im a submissive person

The System

The following tweets were originally posted by "UGNazi" on Twitter via one of the group's accounts (, variously, on August 13, 2014; August 15, 2014; and August 21, 2014.

Speeding is against the law. But if you have a nice car your going to speed. We have our GBL with laser jets.

We have made an SMS Bomber. Send us your enemy's numbers.

There's more than 3 people who run this Twitter Account. #TheMoreYouKnow