69 online
 
Most Popular Choices
Share on Facebook 57 Printer Friendly Page More Sharing
Exclusive to OpEd News:
OpEdNews Op Eds    H4'ed 12/6/13

Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme

By       (Page 1 of 3 pages)   8 comments
Message David Spring
Become a Fan
  (2 fans)

(Article changed on December 6, 2013 at 11:11)

The past three months since the publication of Free Yourself from Microsoft and the NSA has seen a steady stream of increasingly shocking revelations about the extent of NSA spying in the US and around the world. NSA operatives have been caught spying on their wives and girlfriends. The NSA has also been caught spying on dozens of world leaders including Angela Merkel, the elected leader of Germany and the Pope in the Vatican, the leader of the Catholic Church. Clearly Angela Merkel and the Pope are not "terrorist threats."

http://news.panorama.it/cronaca/papa-francesco-datagate

Is Angela Merkel a terrorist?
Is Angela Merkel a terrorist?
(Image by David Spring)
  Details   DMCA

At the recent trial of hacker Jeremy Hammond, it was revealed that the NSA and FBI paid an informant named Sabu to help Jeremy Hammond hack into various government websites and computer systems all around the world. In November 2013, it was revealed that the NSA has hacked into more than 85,000 Windows computer networks around the world.

http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/

 


This article provides evidence of several shocking links between Microsoft, the NSA, and Bitcoin, indicating a diabolical plot to manipulate, undermine, and corrupt the development of alternative digital currencies. As financial analyst, Greg Mannarino recently said, "We already have a digital currency. It is called the US dollar." It appears that the NSA wants to insure that no credible alternative to the US digital dollar arises. They therefore created and sabotaged Bitcoin in order to give alternate digital currencies a bad reputation.   
I realize what I am about to describe may seem difficult to believe. But if you take the time to read my entire book, Free Yourself from Microsoft and the NSA, available for free download at freeyourselffrommicrosoftandthensa.org, you will see many examples of Microsoft and the NSA doing things that are very evil in order to gain control over the entire planet. The NSA makes the Mafia look like a group of Sunday-school teachers. The NSA goal, from a February 2012 document, as confirmed by Snowden, released on November 22, 2013, is to extract all data on "anyone, anytime, anywhere" by influencing (corrupting) the "global encryption market." This goal is evidence of the worst of evil intentions. http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html?_r=0

This diabolical plot was first exposed on September 5, 2013, six days before I published Free Yourself from Microsoft and the NSA. Glenn Greenwald (and several others) exposed a new batch of top-secret NSA documents with articles in the Guardian, the New York Times, and ProPublica.

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=0

http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption

These three articles described a $3.5 billion, 14-year NSA program called Bullrun, which has severely corrupted encryption standards used to secure financial and other sensitive records. The program is much bigger and much more dangerous than the NSA PRISM program exposed in June 2013. The following is from the actual 2010 NSA memos:

"For the past decade, NSA has led an aggressive, multipronged effort to break widely used Internet encryption technologies." This NSA plot "actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs" to make them "exploitable. "

This raises the question of how the NSA is gaining access to these computer networks. One method is the backdoor key Microsoft gave the NSA in 1998, as I describe in detail in my book. However, the Bullrun program means that the NSA is also using deliberately flawed encryption programs to gain access to computer networks. The NSA refers specifically to using encryption keys in their 2013 budget request as being needed to "influence policies, standards and specifications for commercial public key technologies."

Public key technologies are the most commonly use of encryption methods. A public key is like a password. For example, if the password to your bank account is TakeMyMoney, the encrypted version of your password might be XQ4%zv20#49. A public/private key combination is used to translate the password back into TakeMyMoney. At the heart of all "key" programs are random number generators that make it hard for hackers to translate the encrypted password unless they possess the all-important keys. 

Encryption is the Achilles heel of internet and computer security. Without encryption there is no security. It is therefore essential to understand the history of how NSA corrupted crucial NIST (National Institute of Standards and Technology) encryption standards if we have any hope of getting back to internet security. Thanks to Snowden, we now know that in early 2006, the NSA insisted on adding an unsafe "elliptic curve based random number generator" created by the NSA to three other more secure encryption methods that had already been researched and approved before the NSA take over. The corrupted standard is in NIST Special Publication 800-90. For more details on this, see

Next Page  1  |  2  |  3

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Must Read 1   Supported 1   Interesting 1  
Rate It | View Ratings

David Spring Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

David Spring M. Ed. is a college instructor in web design and computer programming from Washington State and author of the book, Free Yourself from Microsoft and the NSA... Learn Linux and Libre Office. David has a Master's Degree in Education from (more...)
 
Related Topic(s): Spying, Add Tags
Add to My Group(s)
Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme

Why the NSA should not be allowed to Spy on the Pope

Microsoft and the NSA Take Over the Obamacare Website

Superstorm Sandy: A Sign of Storms to Come

To View Comments or Join the Conversation:

Tell A Friend