Power of Story Send a Tweet        
- Advertisement -

Share on Google Plus Share on Twitter 1 Share on Facebook Share on LinkedIn Share on PInterest Share on Fark! Share on Reddit Share on StumbleUpon Tell A Friend 4 (5 Shares)  

Printer Friendly Page Save As Favorite View Favorites (# of views)   8 comments
Exclusive to OpEdNews:
OpEdNews Op Eds

Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme

By       Message David Spring       (Page 3 of 3 pages) Become a premium member to see this article and all articles as one long page.     Permalink

Related Topic(s): , Add Tags  Add to My Group(s)

Must Read 1   Supported 1   Interesting 1  
View Ratings | Rate It

opednews.com Headlined to H4 12/6/13

Author 78292
Become a Fan
  (2 fans)
- Advertisement -


There are many extremely unusual aspects to their system. There are only a few references with the latest reference being from 2002. However, they (he) boldly state: "We have proposed a system for electronic transactions without relying on trust." The problem with this statement is that all human transactions are based on trust relationships -- except of course for the NSA where the slogan is to trust no one!

But even if this person or group of persons had revealed themselves, so that it would be possible to determine where bitcoin really came from and what the motives of the developers were, there are many other very suspicious things about bitcoin. The choice of the NSA-promoted elliptical encryption was just the first red flag. Another major red flag is how bitcoins are initially generated. In a real digital currency, the generation of the currency would be tied to something of real value -- such as gold or silver or homes or even just a hard day's work. This is not the case with bitcoins. They are generated by handing your Windows-based computer over to some hidden third party who then uses your computer to "solve math problems." The first person to solve the current problem gets 50 bit coins. Because the math problems increase in difficulty over time, it takes more and more and faster and faster computers to solve the problems. This is called "mining." But the real mining is the data mining of the NSA. The system they have set up to draw innocent people into this trap is diabolical in the way that it takes advantage of the human weakness for greed.

Who is behind the curtain?

- Advertisement -

The final bit of evidence is to follow the money. Who is currently using and promoting bitcoin? One group is drug dealers. Sadly, the world's largest drug dealers are the CIA and NSA. This is a primary source of their hidden income. Another group promoting bitcoin is the military (such as the US Air Force). But ultimately, bitcoin is not about making money. It is about controlling digital currency. It is clear that the NSA has the digital keys to break bitcoin any time it wants. If and when bitcoin crashes, look for the NSA to be the "man behind the curtain."

Meanwhile, there have also been several toothless bills introduced into Congress to create the illusion that something will be done to reign in the NSA. None of these bills deal with the real problem which is that the NSA and Microsoft are taking over billions of computers in the world through the very dangerous UEFI -- NSA startup program. The only solution to the criminal activities of Microsoft and the NSA is to shut both of them down for good.

On November 8, 2013, computer-safety guru Eugene Kaspersky gave a talk in Australia in which he acknowledged that the Windows Flame and Stuxnet super viruses had infected Russian Windows computers controlling everything from nuclear power plants to their space station. Watch

- Advertisement -


Eugene notes of the Microsoft Windows program: "Windows network for the scientists.... they come to the space station with UBSs which are infected. I am not kidding!.. These kinds of networks are not safe by design... Unfortunately, they have the very same computer as you!   The attack is a virus. It can spread. If it infects an Australian power plant, I call it collateral damage. It is very possible that other nations which are not in conflict will be victims of cyber attacks on their critical infrastructure. Cyber space has no borders."

We discuss the NSA/Microsoft development of these super bugs in detail in our book. The only good news is that governments around the world are starting to realize the need for independent branches of the internet that are not under the direct control of the NSA. This has already led to a major drop in business for US technology corporations -- all of which are subject to control by the NSA. The cost to the US economy of NSA spying is already in the hundreds of billions of dollars. Oregon Senator Ron Wyden remarked last month, "If a foreign enemy was doing this much damage to the economy, people would be in the streets with pitchforks."

Things are certain to get worse. The Editor of the Guardian just today stated that they have only released one percent of the Snowden documents. So read this free book and stayed tuned for more updates.


David Spring M. Ed.

- Advertisement -

December 3, 2013

Next Page  1  |  2  |  3


- Advertisement -

Must Read 1   Supported 1   Interesting 1  
View Ratings | Rate It


David Spring M. Ed. is a college instructor in web design and computer programming from Washington State and author of the book, Free Yourself from Microsoft and the NSA... Learn Linux and Libre Office. David has a Master's Degree in Education from (more...)

Share on Google Plus Submit to Twitter Add this Page to Facebook! Share on LinkedIn Pin It! Add this Page to Fark! Submit to Reddit Submit to Stumble Upon Share Author on Social Media   Go To Commenting

The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Writers Guidelines

Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Related Topic(s): , Add Tags
- Advertisement -

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme

Why the NSA should not be allowed to Spy on the Pope

Microsoft and the NSA Take Over the Obamacare Website

Superstorm Sandy: A Sign of Storms to Come