W.B.: Well it comes from Star Trek, the Borg collective with their cube-type spaceships, they go around, it's actually they all share one hive mind, or I refer to it as one brain cell, so you know, what it really does is say they don't actually stimulate or encourage unique thinking. In other words, it's the collective thinking which is basically why I refer to it at the Borg Collective because this corporate thinking is not encouraging and stimulating creative and innovative approaches or thought and experiment to try and advance the technology.
R.K.: Now, I call my radio show the Bottom Up Radio Show because I believe we are transitioning from a top-down to a bottom-up world. What you have described sounds like the ultimate top-down system.
W.B.: Yeah that's right, that's basically what it was.
R.K.: It's rigid, it's fragile, it's very vulnerable.
W.B.: It makes everybody afraid to try to do anything. You know you have to have direct approval from the top down.
R.K.: Wow. Alright. So I wanted to cover the Borg Collective and the hive-mind and now I want to go on, it's kind of the last thing, is technology. You were talking about last night about how different operating systems and browsers, how NSA has their hooks into them and there has been some talk about how Microsoft is one of the worst. Tell us a little bit about how NSA works with operating systems and browsers?
W.B.: Well I think part of what they're trying to do is get to all the different corporations and the product that they produce and try to have them create weaknesses or put in types of information software or hardware and software into their products so they can be spread around the world and that gives them windows or weaknesses where they can break into things anywhere around the world, at least that's what 's being published so far.
And for example they said in a newspaper in the Netherlands they published that about a couple of months ago they published an article that showed that they had something on the order of greater than fifty thousand implants in the world, which means that they have these, this capability deployed around the world; it's switches where any switch can be instructed to dual route everything it gets back to NSA for example or anywhere else in the world.
So that means that they could have up to fifty thousand switches or servers around the world, giving and feeding them information.
R.K.: What about these back doors in operating systems?
W.B.: Well that's like a window into anybody who has that operating system. That gives them an avenue to go into their server or their computer and extract information.
R.K.: So they could literally go into hundreds of millions of different computers if they wanted to.
W.B.: That's very likely yeah.
R.K.: And is it also possible that having this kind of access, NSA could literally go on the offensive and create denial of service attacks using millions of computers? They could be the virus, they could be the malware, it could be NSA actually being the controller of an army of millions of computers.
W.B.: I would pretty much say that with all those implants and taps and everything they have across the entire network that basically means that they own a considerable part of the network and can manipulate or do anything with it that they pretty much want to do.
R.K.: Now, you mention that the US originally designed and built the internet and eighty percent of it is in the US.