Add this Page to Facebook!   Submit to Twitter   Submit to Reddit   Submit to Stumble Upon   Pin It!   Fark It!   Tell A Friend  
Printer Friendly Page Save As Favorite Save As Favorite View Article Stats
8 comments

Exclusive to OpEdNews:
OpEdNews Op Eds

Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme

By (about the author)     Permalink       (Page 1 of 3 pages)
Related Topic(s): , Add Tags Add to My Group(s)

Must Read 1   Supported 1   Interesting 1  
View Ratings | Rate It

Headlined to H4 12/6/13
Become a Fan
  (1 fan)

opednews.com

(Article changed on December 6, 2013 at 11:11)

The past three months since the publication of Free Yourself from Microsoft and the NSA has seen a steady stream of increasingly shocking revelations about the extent of NSA spying in the US and around the world. NSA operatives have been caught spying on their wives and girlfriends. The NSA has also been caught spying on dozens of world leaders including Angela Merkel, the elected leader of Germany and the Pope in the Vatican, the leader of the Catholic Church. Clearly Angela Merkel and the Pope are not "terrorist threats."

http://news.panorama.it/cronaca/papa-francesco-datagate


Is Angela Merkel a terrorist?
(image by David Spring)

At the recent trial of hacker Jeremy Hammond, it was revealed that the NSA and FBI paid an informant named Sabu to help Jeremy Hammond hack into various government websites and computer systems all around the world. In November 2013, it was revealed that the NSA has hacked into more than 85,000 Windows computer networks around the world.

http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/

 

Is the Pope also a terrorist?
(image by David Spring )




This article provides evidence of several shocking links between Microsoft, the NSA, and Bitcoin, indicating a diabolical plot to manipulate, undermine, and corrupt the development of alternative digital currencies. As financial analyst, Greg Mannarino recently said, "We already have a digital currency. It is called the US dollar." It appears that the NSA wants to insure that no credible alternative to the US digital dollar arises. They therefore created and sabotaged Bitcoin in order to give alternate digital currencies a bad reputation.   

I realize what I am about to describe may seem difficult to believe. But if you take the time to read my entire book, Free Yourself from Microsoft and the NSA, available for free download at freeyourselffrommicrosoftandthensa.org, you will see many examples of Microsoft and the NSA doing things that are very evil in order to gain control over the entire planet. The NSA makes the Mafia look like a group of Sunday-school teachers. The NSA goal, from a February 2012 document, as confirmed by Snowden, released on November 22, 2013, is to extract all data on "anyone, anytime, anywhere" by influencing (corrupting) the "global encryption market." This goal is evidence of the worst of evil intentions. http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html?_r=0

This diabolical plot was first exposed on September 5, 2013, six days before I published Free Yourself from Microsoft and the NSA. Glenn Greenwald (and several others) exposed a new batch of top-secret NSA documents with articles in the Guardian, the New York Times, and ProPublica.

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=0

http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption

These three articles described a $3.5 billion, 14-year NSA program called Bullrun, which has severely corrupted encryption standards used to secure financial and other sensitive records. The program is much bigger and much more dangerous than the NSA PRISM program exposed in June 2013. The following is from the actual 2010 NSA memos:

"For the past decade, NSA has led an aggressive, multipronged effort to break widely used Internet encryption technologies." This NSA plot "actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs" to make them "exploitable. "

This raises the question of how the NSA is gaining access to these computer networks. One method is the backdoor key Microsoft gave the NSA in 1998, as I describe in detail in my book. However, the Bullrun program means that the NSA is also using deliberately flawed encryption programs to gain access to computer networks. The NSA refers specifically to using encryption keys in their 2013 budget request as being needed to "influence policies, standards and specifications for commercial public key technologies."

Public key technologies are the most commonly use of encryption methods. A public key is like a password. For example, if the password to your bank account is TakeMyMoney, the encrypted version of your password might be XQ4%zv20#49. A public/private key combination is used to translate the password back into TakeMyMoney. At the heart of all "key" programs are random number generators that make it hard for hackers to translate the encrypted password unless they possess the all-important keys. 

Encryption is the Achilles heel of internet and computer security. Without encryption there is no security. It is therefore essential to understand the history of how NSA corrupted crucial NIST (National Institute of Standards and Technology) encryption standards if we have any hope of getting back to internet security. Thanks to Snowden, we now know that in early 2006, the NSA insisted on adding an unsafe "elliptic curve based random number generator" created by the NSA to three other more secure encryption methods that had already been researched and approved before the NSA take over. The corrupted standard is in NIST Special Publication 800-90. For more details on this, see

Next Page  1  |  2  |  3

 

http://freeyourselffrommicrosoftandthensa.org

David Spring M. Ed. is a college instructor in web design and computer programming from Washington State and author of the book, Free Yourself from Microsoft and the NSA... Learn Linux and Libre Office. David has a Master's Degree in Education from (more...)
 
Add this Page to Facebook!   Submit to Twitter   Submit to Reddit   Submit to Stumble Upon   Pin It!   Fark It!   Tell A Friend
The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Writers Guidelines

Contact Author Contact Editor View Authors' Articles
Related Topic(s): , Add Tags

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme

Why the NSA should not be allowed to Spy on the Pope

Microsoft and the NSA Take Over the Obamacare Website

Superstorm Sandy: A Sign of Storms to Come

Comments

The time limit for entering new comments on this article has expired.

This limit can be removed. Our paid membership program is designed to give you many benefits, such as removing this time limit. To learn more, please click here.

Comments: Expand   Shrink   Hide  
4 people are discussing this page, with 8 comments
To view all comments:
Expand Comments
(Or you can set your preferences to show all comments, always)

Neither do I. But the NSA would... because their g... by David Spring on Friday, Dec 6, 2013 at 9:17:47 AM
Thank you David for connecting these dots. It is i... by Elizabeth Hanson on Friday, Dec 6, 2013 at 6:53:05 PM
The book goes into much more detail on the relatio... by David Spring on Friday, Dec 6, 2013 at 8:59:16 PM
"The system they have set up to draw innocent peop... by Paul McGee on Friday, Dec 6, 2013 at 7:33:00 PM
-continues- I hope that you will look into this f... by Paul McGee on Friday, Dec 6, 2013 at 7:35:52 PM
Paul,Thank you for pointing out that not all peopl... by David Spring on Friday, Dec 6, 2013 at 9:03:35 PM
How do we know that the NSA has limited their back... by Mark A. Goldman on Sunday, Dec 8, 2013 at 11:59:36 AM
Mark, These are all good questions. As I ex... by David Spring on Sunday, Dec 8, 2013 at 2:45:13 PM