Hacker collective Anonymous takes credit for decimating the Internet Chronicles servers or something.
INTERNET — The Internet Chronicle was under siege Sunday evening, as packets flooded in from across the globe, shutting down the site temporarily. This tactic is widely known and used by Anonymous, a loose-knit offshoot of Anonymous hacker group known as Anonymous, as an act of censorship to protest censorship and other such social injustices. Sure enough, moments after the attack began, the Anonymous flagship account @YourAnonNews took credit for the attack, issuing an ominous “Mango Down,” which is a technique pioneered by Anonymous subset troll organization the “Rustle League.” The @YourAnonNews attack was rumored to be spearheaded by Anonymous Commander “xyz” and collaborator “xnite.”
Staff writers were initially taken aback by this ugly turn of events, as we’ve always had a really great relationship with Anonymous and all of its offshoot groups. However, spiritual peace in our office was soon attained once resident Internet anthropologist Dr. Angstrom H. Troubador relished in the idea that we were actually a target of a “virtual sit-in.”
At a board meeting this morning, Dr. Troubador expressed with great exuberance how this pseudoevent was actually a blessing in disguise, as it cemented the Internet Chronicle forever in the annals of Internet history as a target of Anonymous. During his two hour long slide-show, Dr. Troubador referenced respected Internet anthropologists Gabriella Coleman and Peter Ludlow, the former actually being the current leader of Anonymous, and blamed Chronicle writers for making fun of Christ-like martyr and ex-leader of Anonymous, Barrett Brown, citing this as the cause for the attack.
“You idiots think you can just run around writing about whatever you want and get away with it? This isn’t the Internet of yesterday, my friends, this is an Internet ruled by the power of Anonymous and it’s about time we fucking recognized it.” Troubador said, poetically taking a drag from his spliff.
Upon leaving the meeting, all staff had to purchase Coleman’s book “Coding Freedom” to be read immediately and were forced to sign an agreement form that said we would pre-order her upcoming book on the hegemonic Internet force that is Anonymous.
Litecoin trades now for $4.15
People invested in Bitcoin argue the Litecoin will never gain traction in their precious magical money market. Poor Litecoin investors who are jealous of the Bitcoin master race’s infinite foresight profess feverishly on Bitcoin sub-forums that their currency WILL see come-uppance! Their dialogue is often one-sided as they battle the image of Johnny-Come-Lately who secretly wants himself a Bitcoin.
He wants it so bad. And now he is left to monitor Litecoin as she rises and falls like the tide of a bleak moonless beach, illuminated by the passing glimmer of the Bitcoin lighthouse which, with every sweeping motion, shines brighter – $100 brighter – on each irritating pass.
Temples to Litecoin were built in its honor, where crypto-shamans beg piously for restitution over of their doubts in the Bitcoin, and plea for a second chance. The Litecoin is perfect, they say. It’s faster. It’s quiet. It’ll stay out of Bitcoin’s way. It can be there, too. Can’t it?
The arguments playing out around Litecoin – ranging from whether it will ever increase in value, to whether the world can stand another cryptocurrency, to whether or not China is actually adopting the coin or simply “pumping it and dumping it” – are all tinged with the doubt of a million atheists who just caught a glimpse of God but are still too proud to admit it.
The fact that Litecoin even exists is “proof that there is room enough in the world for another cryptocurrency,” according to economist Dr. Angstrom Hydrocopolous Troubadour, who said he invests heavily in the market regardless of God’s wishes that he not gamble, or lust over his neighbor’s two wives.
Congress convened for a hearing this week to determine exactly what a Litecoin is and – being capitalists – how to profit from it. The results, Troubadour said, don’t look good.
The Litecoin may currently be cheap and accessible but, like the Bitcoin before it, could eventually become so bloated that only the 1% can ever afford to use it, and they will be so busy spending their Bitcoins they won’t even let go of a Litecoin for the plebeian masses to attempt to buy drugs with it, to escape from their meaningless, Bitcoin-absent lives.
Pray to the money gods for Litecoin to increase in value. Make a small sacrifice of $100, and in three years’ time, you too will have many hundreds of thousands of dollars to spend on anything you like.
I’m buying an ethanol-powered yacht. What will you buy?
INTERNET - Susanne Brasko, Internet attorney at lawl, took down an article Saturday lambasting The Internet Chronicle’s pivotal role in the FBI raid on Aaron Bale. The article’s takedown coincides with the explosive release of Yung Danny Dantalion’s new hit single “Sue Basko – BASED FREESTYLE.”
Chronicle.su editors said they were hesitant to release Brasko’s threatening article before now. “But traditionally, when an article gets taken down, that’s our cue to ensure the integrity of the historical public record by putting it back up ourselves,” said Hatesec, staff writer for the Chronicle. “This is The Internet Chronicle, ENSURING everything you write online, is truly forever – just like our high school administration promised us it would be. Thanks, Blevins.”
The two-page article can be found below.
NOW PLAYING: Sue Basko – BASED FREESTYLE *RARE* Yung Danny Dantalion
MOSCOW - In his new video, a sleepy Edward Snowden demonstrated how to hack any website using only an iPhone and the RAM from a scientific calculator. With these new secrets, Snowden said, literally anyone in the world can carry out an attack on a government agency.
“You hear a lot of talk about TOR and VPNs,” he cautioned, “that’s what LulzSec used to do.” Snowden said use of TOR and VPNs is what blew LulzSec’s cover.
With this new method, he said, “You’re free to take on any government agency. You can carry out really any attack vector on any website … And once you’ve done that, you’re basically a hacker,” he said. “And you’re completely untraceable.”
The Grandmaster of the Illuminati stepped out of the shadows to tell reporters they were responsible for 9/11, and it may have been their worst mistake yet.
The Internet Chronicle tried to warn you about the AntiChrist on your doorstep, people, but now it’s standing in the kitchen cooking pies and poison. With the onset of certain war distant from the public consciousness, the administration of evil is allowed to enact whatever corporate edicts are handed to them, and no one of any importance pays the consequences.
Your children are hungry, with their mouths hanging open, eager to collect whatever dust may blow in because they haven’t seen real food in a decade. They’re fat but malnourished. Your penis no longer responds to anything but scat porn on Redtube. Your girlfriend left you for playing too much golf, and your friends stopped calling because you don’t play enough golf. Your face has become pink from a high sodium diet and now you get winded getting out of bed. What’s the point anymore?
The Internet Chronicle – that’s what. Through all your sadness, hunger, emotional pain and societal decay, The Internet Chronicle has been there for you. For almost a decade The Internet Chronicle has filled your life with meaning where there might only have been a rewarding cocaine addiction. For years now, The Internet Chronicle has brought you the unabashed truth about epic conspiracies spanning the Universe: Chemtrails, John F. Kennedy, HAARP weather control, LSD mind control, public assassinations of high profile targets, and the notorious homosexual agenda of the “American” Pickers.
The American public deserves the shitstorm they get, just as the Internet Chronicle deserves the heaps of praise it receives on a daily basis from outlets such as the AP, CBS and some of those inferior publications we can’t remember. Keep reading, keep learning, and keep the hate held high so that the dollars may flow, directly into our blossoming bank accounts. And for the love of God, keep sending us your insightful comments. We read each and every one.
INTERNET — Everything you thought you knew about hacking is bullshit.
After years of living underground, in refuge from the whitehat warlords, blackhat hackers will finally be eliminated in what is being dubbed the “Blackhat Holocaust.” What was once a rich and vibrant scene has been co-opted by the far right-left corporatarians, meaning dollar bills, fellas. Your hats are meaningless in the eyes of governments and corporations alike. All of your ideas, inventions, theories, exploits are being freely(at a cost) distributed amongst the wealthy to piss in the collective pool with.
The NSA are the biggest blackhats, man.
Your OPSEC is futile. You mull over the thousands of possibilities for event(x) out loud on twitter, while the blackhats laugh in the background. Such ugly schadenfreude; but their time has come.
The Internet Chronicles Chief Technology Officer and avid Biella Coleman fan, Dr. Angstrom H. Troubador elaborates: “Blackhats aren’t Anonymous, they aren’t carders, script kiddies, packeteers or those owning Linode for fun. Nay, they are something far more villainous.”
For about 15 years now, people touted whitehats as the enemy of the hacking community at large, but the real harbinger of destruction was the peddling of a deluded belief that being a blackhat meant you could still work for the government, you could still be a corporate lackey, you’d have to sell your soul, but you could still write your exploits… though you’d have to sell those too. Everyone needs money though, right? We understand.
Is there a way to overthrow the omnipresent blackhat hegemony? Absolutely! You must learn the ways of the blackhat, become a blackhat hacker, immerse yourself in all things blackhat. Write as many exploits as possible. You will be challenged though, oh you will be challenged. This task is not for the faint at heart or wallet. With your exploits comes the potential for sale to nation-state actors that will use your own tools against you, your friends and loved ones. You will be lured in by unimaginable riches, the wealth of a thousand kingdoms and oh the power, the mother fucking power! However grandiose it all may seem, don’t fuck your fellow hackers and citizens in the ass. Just don’t fucking do it.
The blackhats will come to you in many forms. It will happen this way: you will be coding… maybe the last sunny day of fall and an encrypted message will be sent to you from someone you know, perhaps even trust, and they will offer a smile, a becoming smile, but they will leave open the door to becoming a true blackhat and offer to give you a lift…
For this day: release your exploits, tools, techniques, everything you’ve ever learned! Destroy all of your 0day via disclosure or distribute them amongst the poor and impoverished! Take the power you collected through your quest for great knowledge and destroy it in one fell swoop.
Cum on them before they cum on you.
And then create something beautiful.
I suppose it doesn’t matter though, guys and dolls, because there’s a war going on and this war is prefixed with “cyber,” fellas. Buyin’ in, sellin’ out.
The Internet Chronicle’s editor-in-chief, Raghubir Goyal, explains that he is now forced to work on stories about insider trading from inside the USSR, because Lebal Drocer Intelligence Freedom and Internet Liberty officials went into the Chronicle’s headquarters in Cuthbert, Ga. and destroyed hard drives containing copies of Lebal Drocer stationary outlining some of their misdeeds.
Agents for Lebal Drocer, Inc. recently detained Vic Livingston, the gay Internet boyfriend of Chronicle staff writer Frank Mason who died mysteriously last year. Livingston, who is also a real journalist, was detained for several hours and questioned insistently by agents of the corporation, who would not let him out of their sight, even to go to the bathroom. They made him go number two a coffee can.
“Lebal Drocer knew their stocks were plummeting, so they sold shares of their company to unsuspecting idiots for nearly a thousand times their estimated value.”
Angstrom Troubadour, chronicle.su Financial Analyst.
Lebal Drocer, Inc. has toughened their stance on Internet freedom, citing the upswing in information terrorism as one reason for writing new legislation that would grant them “unfathomable” control over Internet traffic all over the world.
Lebal Drocer’s control over matters of Internet Freedom and Security is . . . unfathomable . . . frightening.
Dan Brown, author
Per protocol, the new measures will be written by Lebal Drocer’s “Litigation Legion” dream team of attorneys, and handed to indeterminate congresspersons – who will then be paid to introduce the legislation in the House – where other representatives will then be paid to vote for it.
[Editor's note: Surprisingly enough, this is how American politics really work!]
Features added to the new draconian Internet security measures include the outlawing of “copy and paste” for its ability to inherently defy Intellectual Property law, and will forbid all usage of the domain extension .se, .sx and .su – country-specific domain extensions used primarily by hackers and piracy advocates worldwide.
In coordination with Lebal Drocer, Inc., Welch’s NATURAL Concord Grape Jelly Spread have spearheaded anti-piracy measures after their recipe, “SUGAR, GRAPE FLAVORING™ AND PRESERVATIVE BASE,” were distributed via BitTorrent through audio, video, software and recipe piracy website The Pirate Bay, which is hosted on the illicit webservers that spam the Internet with Julian Assange’s propaganda known as Wikileaks.
President Barack Obama was overheard praising the efforts of Lebal Drocer, Inc. who paid for him to take office in 2012, narrowly defeating their darling candidate Mitt Romney, whose campaign was also financed and coordinated by Lebal Drocer, Inc.
This message is brought to you proudly by your big brother, Lebal Drocer, Inc.
There’s A Little Touch Of Lebal Drocer In Every Message You Send.™
Edward Snowden’s Impossible Journey into Twitter
June 8, as the U.K.’s Guardian newspaper was disclosing the identity of the leaker of top-secret National Security Agency PowerPoint slides, I was just finishing up a blog post on the leaker’s revelations. Having contrasted and compared published slides with claims by public officials, and given an in-the-loop Washington Post‘s reporter’s rationale for their selective release, I had the distinct sense that I was already behind the curve. The leaker, former NSA employee Edward Snowden, had fled the country for Hong Kong by the time he handed over the slides to The Guardian and The Washington Post.
In an exclusive video interview with The Guardian from Hong Kong – where he is currently seeking asylum – Snowden made claims even more extraordinary than the slides themselves.
In their video interview, The Guardian immediately took to framing Snowden as a whistleblower. Yet Guardian – along with, again, The Washington Post‘s – staff have refused to release all of the information Snowden had requested they would.
NSA, said Snowden, “targets the communications of everyone.” He added, “While they may be intending to target someone associated with a foreign government or someone that they suspect of terrorism, they’re collecting [citizens'] communications to do so.”
At one point Snowden’s accounts of life inside seemed contradictory, such as when he asserted that “any analyst at any time can target anyone – any selector, anywhere.” Only a moment later he would claim “not all analysts have the ability to target everything.”
Snowden spoke of a ruthlessly vindictive intelligence community willing to assassinate for his dissidence, exposing what he sees as an abusive panopticon. In retribution, he claimed, U.S. authorities could very well “pay off the triads,” members of Hong Kong organized crime, to take his life, “however long that happens to be.”
Snowden defined a narrow set of NSA analysts, such as himself, with broad omniscience into society. “I sitting at my desk certainly have the authorities to wiretap anyone, from you or your accountant to a federal judge to even the president,” he told The Guardian‘s Greenwald, Laura Poitras and Ewen MacAskill.
Snowden denied that he was trying to harm the United States or aid it enemies. Had he really wanted to endanger the country, he said, he “could [have] shut down the surveillance system in an afternoon.”
Snowden’s extraordinary claims were bolstered in part by statements to the LA Times by former NSA and CIA counsel Robert Deitz, who said, “There are, from time to time, cases in which some [NSA] analyst is [angry] at his ex-wife and looks at the wrong thing and he is caught and fired.” Deitz did not imply that these abuses by NSA analysts resulted in any criminal prosecutions for payrolled megalomaniacs.
Immediately I intuited that oncoming media profiles of Snowden would descend far lower than mere allegations of treason or defection. Snowden’s earlier leak to The Guardian of a top-secret Foreign Intelligence Surveillance Act Court memo had detailed not only Verizon’s release to the NSA of vast swaths of telephone records “wholly within” the United States. It confirmed the long-understood cooperation between electronic communications firms and the NSA in seeking out foreign intelligence information.
Quickly, I created a Twitter account with the closest possible match to Snowden’s name, @ejosephsnowden, and sought to begin a cartoonishly radical caricature of the e-dissident. To anyone who understood the implications of Snowden’s claims, the very existence of a Twitter account at all should have seemed impossible and thereby ironic. But how impossible would it seem to most, and how ironic? With that high-minded goal of watchdog journalism (to gauge media and public perception) along with an interest in finding some humor in a too-impulsive media environment, I began what would be a three-day mission of online sockpuppeteering. I was somewhat inspired by the FBI’s long campaign of using the Twitter account of hacker Hector Monsegur, or “Sabu” of LulzSec. Surely, some of the same tactics used to root out cybercriminals can be used in watchdog journalism.
You can read much of the tweeting content from early this week on The Internet Chronicle‘s updated Twitter account, where we have shamelessly co-opted the followers of the Snowden puppet. Although the marionette now sits here.
As the account quickly accelerated and peaked to 4,400 followers, I was struck by how many Twitter users were requesting that Twitter actually validate it. The pretense of such a request was that Twitter would somehow ascertain the identity of any actual Snowden, while somehow maintaining discretion with authorities as to the location of the hounded leaker. Despite assurances from those like Senate Majority Leaker Harry Reid (D-Nev.) that Snowden’s allegations of metadata monitoring weren’t anything “brand-new,” clearly many with half a mind to be interested in hearing from an NSA leaker had a rather breathtaking trust in the inviolability of trust Twitter kept with its end users. (Although to be fair, in the wake of PRISM’s having been revealed, Twitter claims it is as resistant as any communications firm to overreaching government requests.)
Additionally, striking is the number of people willing to thank Snowden openly, which – even should the old “Snowden” followers delete tweets or unfollow – I cannot imagine not having some effect in the future on their attaining clearances in the course of future employment with the federal government, the largest single domestic employer. Several people accused me of working for the CIA or the NSA, which is ludicrous, to my knowledge. Yet it was also illustrative of just how jaundiced these agencies’ reputations are.
In the course of his writings at Guardian and Salon, Greenwald has gone to great lengths to undermine the left-right narrative, and his own political connections add great credence to that. Those connections run the gamut, from contributions to the libertarian Cato Institute, to remarks given to an International Socialist Organization conference. Greenwald’s diverse affiliations are key to understanding the partisan political divide that surrounds outrage, when it occurs, over surveillance overreach.
In 2006, at the height of the last decade’s previous warrantless NSA controversy, a Pew poll highlighted acquiescence from 75 percent of Republicans and 37 percent of Democrats. On the other hand the past month’s revelations have yielded 64 percent approval on the issue from Democrats and 52 percent from Republicans. Whichever administration doing the monitoring appears to have a pretty serious influence on whether people feel like getting mad.
It was for this reason that my Ed Snowden was to be of what William Buckley termed the “fever swamps.” Heavily ideological, conspiracy-bent libertarians have an extremely ubiquitous online presence, and in the current climate, tend to lean Republican on foreign policy. (For example, Republicans made up a slight majority of the opposition to the Obama-era no-fly zone in Libya, and doubtless any upcoming Syria no-fly zone.) I knew there was going to be a lot of momentum to attempt to try Snowden in the public sphere—a mob mentality for which I have no regard whatsoever, even for the filthiest of criminals.
Former Mother Jones national security editor Adam Weinstein remarked on Twitter, “[T]he solipsism of a young white male libertarian IT guys … is a real problem.”
When as “Snowden,” I started tweeting support for Ron Paul, I had not yet actually heard that Snowden was a supporter of the former congressman and perennial, long-shot president hopeful. Weinstein referenced a stereotype that deserved lampooning, and so I, along with some help from Chronicle correspondent Jaime Cochran, took to the puppet with conspiratorial banter. It is unfortunate that, for much of the general public, anyone who would do what Snowden did would have to be an absolute sociopath. Billy Walshe, or “Kilgore,” had long ago set up a Greenwald sock puppet (@ggreenwild), subsequently shuttered by Twitter. We used that to endow the Snowden puppet with a veneer of undeserved credibility, mostly piloted by Walshe himself.
Even though Greenwald and WikiLeaks had disavowed the Snowden puppet (Greenwald, repeatedly and explicitly) the Snowden and Greenwald puppets apparently duped journalists, including Rosie Gray of Buzzfeed, a former Reuters social media editor, Boing Boing co-editor Cory Doctorow, David Shuster, a co-author of a book with Glenn Beck, and Reason editor Nick Gillespie. I won’t bother denying some degree of tap-dancing schadenfreude at that.
On the other hand, my three-day campaign of feigned anarcho-capitalist lunacy should serve as a warning of Nellie Bly magnitude to journalists and news junkies alike. As this news and entertainment outlet has painstakingly sought to demonstrate, a Brave New Internet demands greater incredulity from the media-consuming public. The Answer will never be that media networks as large as Twitter endeavor to root out impostors or screen for disinformation any more than they screen for the ill-informed. Just as time and experience has lessened susceptibility to (the not benign) 419 scams, the same will have to happen for Twitter users desperate for the ground-level scoop and click bait.
While the Post‘s Barton Gellman had told me that some of the data Snowden handed over was classified for good reason (I can’t know this, but we’ll never hear a admission like that in those terms, even if true, from Glenn Greenwald), it was important to point out, via the puppet, that we’ll always rely on some estate, first or fourth, to filter our data. Maybe the Snowden data the Post and The Guardian are withholding are dangerous if disclosed to the public. For now it’s a subject of speculation, speculation based on conversations that took place between these newspapers and the government before even the three (or in The Guardian‘s case, four) PowerPoint slides went public. But established journalists will always have an interest in maintaining access, daresay staying out of jail for espionage; and those motives may or may not happen to line up with the public’s right to know. Especially when the Fourth Amendment is on the line.
Certainly, Snowden’s personal life is about to get a serious snow job—and one treated with far wider credulity than any Twitter puppet.
Not long into the course of my sockpuppeteering, as Weinstein referenced, New York Times columnist David Brooks would not disappoint, disparaging the leaker for, of all things, not finishing high school and for being mildly rude to a neighbor once. Just as Frontline hyped Bradley Manning’s homosexuality as a factor in his decision to leak, and the media allowed Julian Assange’s alleged sex crimes in Sweden to overshadow legal threats he faced from the Justice Department, the media was sure to be hungry for some red meat, beyond anything high-minded, to explain Snowden’s leaks. Thus widespread banter about matters as insipid as the attractiveness of his ex-girlfriend.
The tabloid chum has and will spread in the waters of public discourse, from sources as serious as paper of record, which the public should have good reason to take with more credibility than an unverified Twitter account. As red as blind anger, the chum will obscure the prescient debate that must be had about the meaning of the Fourth Amendment in a technologically evolving, if not “advancing,” world. We must be sure that it does not attract the real sharks, those complicit in the abuse of power, power needed to protect Americans.
#GropeCrew has highlighted the tense and predatory sexual atmosphere at Nerd Conventions.
DALLAS — A group of dedicated trolls have taken to the Twitter hashtag #GropeCrew, expressing their desire to fondle women in skimpy anime costumes at the A-Kon anime convention. Sexual harassment and assault at similar conventions has been a topic of recent outrage and discussion, and some conventions like DEF CON have gone as far as issuing “yellow cards” as warnings to harassers.
These types of conventions are a haunting ground of sex-deprived nerds, who swarm in the thousands to meet so-called “booth babes,” or hypersexualized women in costumes who inhabit the dangerous intersection between childish sexual fantasies and anime fandom. Groping, harassment and even sexual assault are extremely common at conventions like A-Kon; and despite the tongue-in-cheek tone of #GropeCrew, the targeting of specific booth babes has hit a raw nerve.
“I’m tired of being eye-raped by teenage nerds every time I dress up as a sexy cartoon character,” said one anonymous booth babe. “I’m thinking of sitting out the next convention. This year has been a paranoid nightmare since the Grope Crew tweeted my picture.”
Supporters of the #GropeCrew say that they’re merely highlighting a problem that needs to be addressed, while most others seem to believe the atmosphere of sexual conflict at the A-Kon convention has only become more negatively charged because of their antics.
NOVATO, CALIF. (2-7-2012) - An anonymous internet user going by the name of OP released the bank account numbers, Social Security Numbers, phone numbers and addresses of a massive number of Novato residents Saturday.
CHRONICLE.SU URGENT UPDATE: (2-6-2013)
An anonymous caller phoned in a tip that he is “free now” and intends to “finish” what he “started” one year ago, challenging all preconceptions OP is a fag. Listen to the bone-chilling telephone call here.
The individual, who seemingly appeared out of the blue, addressed the anonymous website as his “crew,” using rhyming language.
Rumors are circulating that the information passed down originated from an accomplished hacker group comprised of remnants of LulzSec.
As leaks poured out, anonymous internet users suspected they might be credit cards, but later determined the leaked information was bank account numbers issued by Westamerica Bank, a local bank of California which issues ten digit account numbers like are found in the leaks, or “dox,” the term sometimes used for the disclosure of sensitive information.
Do you remember me?
Infamous I was
Fucking shit up, causing quite the buzz
I belonged to a team
With a hacker like theme
Now I’m lurking here
For a crew thats top tier
I have a plan thats 4 years in the making
And soon we’ll have what’s ours for the taking
A handful of brave or reckless individuals logged into the bank website using the details.
Others signed up for accounts using the credit information, immediately followed by declarations of deletion of virtual machines, as well as paranoia fueled incineration of their hard drives.
Another user asked, “what did they do to you OP? Seriously, not the whole fucking town could have wronged you.”
“OP” refers to the “original poster,” who has acknowledged the extreme likelihood of going to prison as a result of his or her actions.
After some investigation, it was determined OP’s identity might possibly have something to do with Jack Briner who, in 1997, used stolen lists of information from his former bank of employment for use at Westmerica Bank. Google results reveal Jack Briner is teaching economics to the upcoming best-and-brightest of San Jose.
OP was particularly inclined to call out an individual by the name of Jim Greenway, whose SSN was referenced repeatedly and explicitly. OP added, “the rest and greenway shall pay.”
UPDATE: Jim Greenway is a bank branch manager.
After posting the 25th batch of account numbers, OP quipped, “Don’t fuck with me, I’m football team,” spawning a meme which, as time goes on, will likely gain notoriety with its obscurity.
Also, there was a four hour countdown. At zero hour, this happened:
greenway is gone
i have set us up the bomb
time to say goodbye
as i too shall die