Free Yourself from Microsoft and the NSA...

Learn Linux                  and Libre Office

 


 

Link to Print Version of our book!

Toamazon150x150 order the Print version of our book, "Free Yourself from Microsoft and the NSA", CLICK HERE!

Link to Kindle Ebook version of our book!

amazon150x150 To order the Kindle Version of our book "Free Yourself from Microsoft and the NSA"... CLICK HERE!

Link to Free PDF of our book!

For abook150x150 free PDF version of our book, "Free Yourself from Microsoft and the NSA", CLICK HERE!

Welcome to our website on how to free yourself from Microsoft and the NSA!

Welcome to our website on how to free yourself from Microsoft and the NSA by learning to use Linux and Libre Office and to our comprehensive step by step guide on learning how to install and use free open source tools (software) on your computer! Open source means the software is free and can be shared by anyone with anyone for any purpose. Open source is like a public library...free and open knowledge shared with the community for the common good. Free as in Freedom. No patents, no hassles, no barriers, no limits!

In June 2013, former NSA agent Edward Snowden confirmed that Microsoft works closely with the NSA. This website provides the shocking hidden details of that relationship and explains why it harms everyone from social activists to small business owners. If you are concerned about Microsoft handing over your data to the NSA, we are here to offer you a safer more secure option. If you have had enough of Windows 8 viruses, the Blue Screen of Death and Microsoft’s never ending stream of model changes and price increases, we will show you how to switch to a less expensive and more reliable alternative.

Our goal is to explain why you should install the free open source tools called Linux and Libre Office on your home, school and work computers – and then provide you with specific instructions on how to use these free open source tools to free yourself from the chains of Microsoft and the NSA.

But this website is about much more than simply learning Linux and Libre Office. Knowledge is power. If you really want to be free then it is important to learn the truth. Only the truth can set us free. The truth in this case is rather shocking. The truth is that there is a group of very wealthy powerful people who want to control the entire world – and to gain complete control, they intend to control both the internet and all of our computers. This book provides concrete evidence that at least some of the “crazy conspiracy theories” are true.

The shocking details revealed in this website include:

...Microsoft was “given” an exemption from the Sherman Antitrust Act in trade for giving the NSA access to all Windows computers.

...The NSA has access to every file on every one of the world’s two billion Windows computers – and has had this access since 1998!

.... The NSA used the “open back door” to Windows computers to launch a “cyber-attack” against Iranian nuclear power and oil plants in 2009 using an NSA created super virus called Flame.

... In early 2010, the Flame Super Virus escaped and began infecting commercial computers all over the world – and played a key role in causing the largest environmental disaster in the world – the BP Gulf Oil Spill.

... The Flame virus and its many cousins, which attack computers by pretending to be “Windows Updates,” have now infected millions of computers.

... As bad as all of this is the worst is yet to come. Microsoft’s latest operating system, Windows 8 comes with an extremely dangerous startup program called “UEFI: which is not only capable of remotely controlling every part of your computer – it is also capable of crashing the entire world economy!

“This wholesale invasion of American and foreign citizens privacy does not contribute to our security. Instead, it puts in danger the very liberties we are trying to protect.”   Daniel Ellsberg June 10 2013


In April 2014, Microsoft will end support for Windows XP computers – leaving hundreds of millions of Windows users unprotected from Flame and other viruses. In just a few simple steps, you can protect your existing computer and the data stored on it. Now is the time to learn the full story about the relationship between Microsoft and the NSA so that you can protect yourself from the coming crash.



Who is this guy and why is he saying this crazy stuff?
Because many of the claims in our book and on this website may sound crazy, I would like to briefly explain who I am and why I wrote this book. Up until recently, I was a website consultant, community college instructor and a loyal user of the Microsoft Windows operating system and Microsoft Office word processing program. However, in 2012, Microsoft made a radical change to the Windows operating system when it replaced Windows XP and Windows 7 with an entirely different system Microsoft called Windows 8 and which they now call Windows 8.1 Blue. This new system is extremely difficult to learn and use – and it has several “features” which severely limit your freedom. I was therefore in the process of writing a book called “Learn Linux and Libre Office – A Cure for the Windows 8 Blues” in order to give people an alternative to Windows 8.

 

Important Questions about Unusual Aspects of Windows 8
This research into strange aspects of Windows 8 and Windows 8.1 led me to seek out answers to a series of questions. These questions and their answers revealed several hidden connections between Microsoft and the NSA.

First, why has Microsoft been allowed to continue their monopoly of computer operating systems even after two federal judges found Microsoft guilty of repeatedly violating the Sherman Antitrust Act?The Microsoft Monopoly exemption occurred at the exact same time Microsoft gave the NSA access to all Windows computers. In fact, the Microsoft Monopoly exemption was granted by the same judge who later became the FISA court NSA judge! Could it be that our government secretly agreed to allow the Microsoft monopoly to continue in exchange for Microsoft giving the NSA access to all Windows computers?

 

Second, why would Microsoft risk their company and offend their users by moving away from a popular operating system like Windows 7 to an extremely unstable and complex operating system like Windows 8?
There were many strange things about Windows 8 that did not make sense. For example, why is the Windows 8 operating system actually two different operating systems with two different control panels and two different versions of the Internet Explorer web browser and two different sets of user interfaces? An operating system this complex has never existed before. Neither Windows XP nor Windows 7 had more than one control panel or more than one web browser. Also, why are our user names and passwords for Windows 8 now stored on a database at Microsoft rather than inside of our own computers as was the case with Windows 7? Such an invasion of privacy has never occurred before.

Third, why with Windows 8 and 8.1, was Microsoft forcing all computer manufacturers to move away from a simple stable computer startup program called BIOS to a new complex and unstable startup program called UEFI? Why should Microsoft even care what program computer manufacturers use to startup our computers? Why was the development of UEFI done in secret? Where did UEFI come from? Who created it? When was it created and what is its purpose? And why is UEFI ten times the size of BIOS if its only function is to tun on the computer and then hand the process over to the operating system?

 

Fourth, why does the UEFI startup program include a controversial feature called “Secure Boot”? Since its inception, Secure Boot has raised alarm bells among computer users because it gives Microsoft almost total control over our computers by preventing us from loading any program which is not approved by Microsoft. Members of the open source community have called this strange process “Restricted Boot” (see cartoon below). Where did secure boot come from? Who created it and what is its purpose?

Fifth, does Secure Boot included a “Windows 8 Kill Switch” which Microsoft (or the NSA) could use to kill your computer? Not only did the answer turn out to be yes, but the kill switch appears to be the main purpose of Windows 8!

 

Sixth, how does the Windows open back door work?it has been clear to many computer users that since 1998 Microsoft has used an “open back door” to make “updates” to our computers. This back door was created when Microsoft introduced Internet Explorer 4 and embedded this web browser into the Windows 98 operating system. I wanted to know how this back door worked, whether it could be turned off (it can’t) and what kind of changes it could make in your computer – even without your permission. What was the connection between the open back door andthe increasing number of Windows Updates containing malicious code which crash Windows computers?

 

Seventh, what was the Flame virus and how is the Flame virus related to Windows Update problems? In June 2012, Microsoft admitted that a super virus named Flame was using the open back door to remotely attack Windows computers. This led me to research several more questions: What is the Flame virus? Who created it? When was it created? What is its purpose and how does it work? Also why have Microsoft’s monthly updates gone crazy during the past year? Why are there so many reports of these updates crashing computers? Are these security patches related to the Flame virus and/or the NSA?

 

Eighth, did the NSA Flame virus cause the BP Oil Disaster? Researching the history of the flame virus led to even more disturbing questions about the relationship between Microsoft and the NSA. Several newspaper reports confirmed that in 2009, Microsoft played a key role in the NSA attack on Iranian Nuclear and Oil Facilities via the development of the Stuxnet and Flame super viruses. Then, in 2010, the Flame virus escaped and began crashing not just Iranian oil facilities but lots of other oil facilities around the world.

 

I discovered evidence that the Flame virus led directly to the BP Gulf Oil Spill – the worse environmental disaster in the history of the world.

 

Ninth, is it possible that the Cyber War and the War on Terror are both fake?I discovered evidence that the so-called Cyberwar is fake. There have been cyber attacks. But they have not come from either the Iranians or the Chinese. Instead, there is evidence that nearly all computer attacks on US computers are initiated by the NSA - in order to create the illusion of a cyberwar. I also discovered evidence that the War on Terror is fake. There is no Al Qaeda. What passes for Al Qaeda is merely a branch of the CIA. Nearly all terrorist attacks appear to have originated with the CIA in order to create the illusion of a war on terror.

 

Al Qaeda appears to be simply a front for the CIA and CIA paid operatives. The ground to air missiles being used by these fake Al Qaeda groups were given to them by our own US government.

 

American tax payers appear to be funding both sides of the war on terror.

 

By June, 2013, I had uncovered some very disturbing answers to all of the above questions. Answers to all of these questions are provided in more detail in Chapters 1 and 2. Even before the Snowden revelations, I came to the conclusion that the real purpose of Windows 8, UEFI, Secure Boot and the open back door to the Windows operating system has little to do with what we have been told and more to do with Microsoft and the NSA taking over total control of our computers. I was in the process of finishing this book exposing the problems of Windows 8 and outlining the connection between Microsoft and the NSA.

Then on June 6, 2013, the incredible Edward Snowden articles exposing the relationship between Microsoft and the NSA started to appear.
We now know, thanks to the Snowden revelations in June 2013 that Big Brother is downloading not only all of our phone calls and emails – but every document in every Windows computer. One slide in particular indicated that in 2007 Microsoft helped the NSA jump start a secret mass surveillance program called PRISM.

 

I was already aware that in 2007, shortly after joining the Prism program, Microsoft launched a parallel program to provide the NSA with a “kill switch” on all Windows 8 computers via a new secret startup program called UEFI with an ominous feature called Secure Boot. After the Snowden revelations, I realized that the most important aspect of this book was to warn people about the dangers of Windows 8, UEFI and Secure Boot and provide computer users with a way to regain control over their computers by helping them switch to the Linux operating system. Thus, I changed the name of the book from “Learn Linux and Libre Office – A Cure for the Windows 8 Blues to “Free Yourself from Microsoft and the NSA – Learn Linux and Libre Office.”

 

The goal of this book is two fold: first to help you become more aware of the problems of using the Microsoft operating system – and especially the problems associated with Windows 8, UEFI and Secure Boot – and to provide you with step by step instructions on how to add and use the Linux operating system and the Libre Office word processing program.

Could All the Conspiracy Theories Actually be True?
As in the Wizard of Oz, we are told to ignore the man behind the curtain as our own government ignores international law and kidnaps the elected President of Bolivia and holds him prisoner while they search his plane for a person whose only crime was leaking the truth to the American people. The truth is that we are all being spied on and these massive spy programs are a clear violation of the 4th Amendment to the US Constitution.

The 4th and 5th Amendments to the Constitution of my country, Article 12 of the Universal Declaration of Human Rights, and numerous statutes and treaties forbid such systems of massive, pervasive surveillance.”

Edward Snowden, June 12 2013

 

As a reminder, here is what our US Constitution has to say about freedom of speech and the right to privacy.

AMENDMENT I... Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

AMENDMENT IV...

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

 

What Snowden is saying and what I also believe is that our allegiance should not be to a corrupt government or to any immoral laws. Rather we should uphold the Constitution of the United States and we should support the Universal Declaration of Human Rights.

 Does the NSA control the Ministry of Truth?
As in the book 1984, power crazy people control the media. They control business. But their real objective is not merely to control knowledge and money – but to control people. How they control us is through something called the shock doctrine which is an endless war – a war against people, a war against our environment and a war against the truth. Because knowledge is power, these wealthy people want to control the internet. One way they control the transfer of knowledge is by waging a war against reporters and whistleblowers. Another way they plan to control the transfer of knowledge is by controlling all of our computers. They do this by controlling the backdoor to the Windows operating system on more than one billion Windows computers around the world. The best and easiest thing you can do to defeat their plan and to free yourself is by learning Linux, Libre Office and other free open source tools.

 

Try to imagine you are living in a world very different from what we were raised to believe, a world even worse than Orwell's 1984. Imagine a world in which the war on terror is fake. In this book, we provide evidence that the goal of the NSA is not to control terrorism – but to control and enslave people around the world. There are no weapons of mass destruction – only weapons of mass distraction.

War is Peace

Freedom is Slavery

Ignorance is Strength

George Orwell 1984

 

Imagine the possibility that the cyber war is fake. In this book, we provide evidence that the NSA not only has developed super bugs to attack other nations, but that it is also using those same super bugs to launch fake attacks on businesses here in America to make it look like there is a cyber war – when in fact the NSA is behind BOTH SIDES of the war – just like in the book 1984. Imagine a world where nearly everything you read in the newspaper and watch on TV news is fake. Imagine a world in which elections are sold to the highest bidder and political parties are simply friendly faces for Big Brother. The evidence is all around us and right in front of us. Think about the bank deregulation of 1999 with the repeal of the Glass Steagall Act – which led to the economic collapse of 2008 – which led to the multi-trillion dollar bailout of the “too-big-to-fail-and-too-big-to-jail” Wall Street banks. This bailout was accomplished by robbing trillions of dollars from the American people. The robbery is still going on.

Lies of the NSA
If you have any doubts left at all that our own government is lying to us about NSA spying, please watch the following three minute Youtube video produced by ProPublica. http://www.youtube.com/watch?v=eptZuXkUGmI

 

Oregon Senator Wyden asks a direct question: “Does the NSA collect data on millions of Americans?” James Clapper in an obvious act of perjury replied “No Sir.” What is most amazing about this lie is that James Clapper still has a job.Meanwhile, the NSA corporate backed war machine uses fear to manipulate and control us.

NSA SHOCK DOCTRINE WARNING SCALE

SEVERE DANGER... Bombs will explode any minute!!!

Hide under your bed and trust us to protect you.

HIGH RISK OF IMMINENT ATTACK (or maybe an attack in the next week or so... especially if you live in Detroit)

Contact your Congressperson and ask them to vote for more funding for the NSA. Call now while you still can!

ELEVATED RISK OF SOMETHING BAD PERHAPS HAPPENING SOMEWHERE IN THE NEXT MONTH...

Stay indoors and report anyone wearing a suspicious backpack. Avoid traveling in a car, train, plane or boat.

ATTACK STILL POSSIBLE... BUT OK TO GO SHOPPING... Internet Chatter no longer indicates an attack will happen soon. Feel free to go into debt. How about buying a new computer?

 

In August 2013, our government announced the closing of 22 US Embassies and issued a world wide travel alert for the entire month of August - warning Americans not to travel – during the biggest travel month of the year. Supposedly this warning is due to the threat of a possible terrorist attack from Al Qaeda based on unknown information from a “very credible source.”

 

Supposedly, the timing of this threat is related to the end of the holy month of Ramadan and Laylet al-Qadr, or the Night of Power, one of the holiest moments on the Muslim calendar. In August, 2012, Iran supposedly used this day to launch a cyber attack on Saudi Oil computers. However, in this book, we provide evidence that the Saudi computer attack on the “Night of Power” in August 2012 was launched by our own NSA. Iran had nothing to do with it. There are several problems with this new warning from the NSA. First, the timing has nothing to do with Muslim Holidays and everything to do with funding the NSA. The warning came just days after Congress almost voted to defund the NSA spying program.

 

As for the “credible un-named source” one wonders if that refers to James Clapper – the head of US Spying who recently admitted to lying to Congress in the “least truthful” way - or was it the CIA paid taxi driver who warned about “weapons of mass destruction” a few years ago?

On August 5, 2013, the Colbert Report aired the following clip on the Global Terror Warning: http://www.colbertnation.com/the-colbert-report-videos/428327/august-05-2013/global-terror-warning

The real purpose of the attack – or threat of attack – is to scare the American people into providing hundreds of billions of additional tax dollars to the NSA.

NSA Attack on the First Amendment Freedom of Speech
On August 8, 2013, there was another shocking attack on the 1st and 4th Amendments. The email service used by Edward Snowden, Lavabit, was shut down by the NSA for refusing to hand all of their data over to the NSA. Until they were shut down by the NSA, Lavabit had 400,000 users – all of whom no longer have access to their email accounts. The NSA justifies this abuse with what they call the “Three Hop” Rule which they claim gives them the right to all of the data of anyone who has any relationship to anyone who has any relationship to an NSA suspect. Since Snowden might have some relationship to a terrorist and since the 400,000 Lavabit users are on the same email database as Snowden, the NSA gets to download all of the data of all 400,000 people.

"This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”Ladar Levison, Founder of Lavabit

 
Below is a link to one of the most shocking videos I have ever watched:

http://www.youtube.com/watch?v=Ui3KpztUzVg&feature=c4-overview-vl&list=PL50BDB9BCCFAF09CA

 

Levison added: “What I’m opposed to are blanket court orders granting government access to everything. If the American people knew what our government was doing, they would not be allowed to do it anymore. What we have seen in recent years is their willingness to use those laws in ways personally I consider to be unconstitutional, unethical and immoral."

Edward Snowden, speaking from Moscow correctly noted, “America cannot succeed as a country where individuals like Mr. Levison have to relocate their businesses abroad to be successful.” The next day, another US email encryption provider, Silent Circle, shut down. Another US “secure” email service, Hushmail, caved and handed over their database to the NSA. Once people realize that their data is not safe with Hushmail, they too will go out of business. The lesson here is that the only safety for your data is by moving your cloud data and email service to servers which are located outside of the United States.

"If you run a business, and the FBI or NSA want to turn it into a mass surveillance tool, they believe they can do so, solely on their own initiative. They can force you to modify your system. They can do it all in secret and then force your business to keep that secret. Once they do that, you no longer control that part of your business. In a very real sense, it is not your business anymore. It is an arm of the vast US surveillance apparatus, and if your interest conflicts with theirs then they win. Your business has been commandeered."

Security Expert Bruce Schneier August 30 2013


Economic Suicide

The problem with NSA surveillance is that our entire economy depends upon email privacy for efficient communications. For the past 20 years, the one bright spot of the US economy has been our lead in technology and cloud computing. However, businesses and individuals do not want their data handed over to their competitors. They have seen how the NSA handed over Airbus data to Boeing. Businesses will increasingly migrate their data to places they view are safer. The systematic takeover or closure of companies such as Lavabit, Silent Circle, Hushmail, Microsoft, Google, Apple, AOL and all other “partners” of the NSA mean that all of these companies will eventually be driven out of business – because their business model cannot succeed when their potential customers know they are being run by and for the NSA. All of their employees will lose their jobs. Some economists have estimated that American technology businesses could lose over $100billion in cloud computing contracts worldwide over the next three years as businesses move their data overseas to avoid the NSA. However, cloud contracts are just the tip of the iceberg. As people around the world realize that companies such as Microsoft and Apple cannot be trusted to protect their data or their privacy, the total economic loss to the US will be in the trillions of dollars and millions of US technology workers will likely lose their jobs – all thanks to the cyber monster called the NSA.

 ”The U.S. government, in its rush to spy on everybody, may end up killing our most productive industry. Lavabit may just be the canary in the coal mine.” Jennifer Granick Stanford Center for Internet and Society

 

On August 21, 2013, the German Federal Office for Security in Information Technology (BSI) warned citizens to avoid Windows 8 for being “an security risk.” An English summary of the article is at the following link.

http://www.testosteronepit.com/home/2013/8/21/leaked-german-government-warns-key-entities-not-to-use-windo.html

Users of Windows 8 surrender control over their machine the moment they turn it on. For that reason, experts at the BSI warned the German Federal Administration and other key users against deploying computers with Windows 8

 

Rüdiger Weis, a professor at the Beuth University of Technology in Berlin, and a cryptographic expert, told Die Zeit in an interview that Microsoft wanted to completely change computing by integrating “a special surveillance chip” in every electronic device. Through that chip and the processes of Windows 8, particularly Secure Boot, “users largely lose control over their own hardware and software.”

With the 2008 bank bailout, the largest robbery in history occurred right in broad daylight. Since then, tens of millions of jobs have been transferred to sweatshops in China while entire American cities like Detroit have been destroyed and driven to bankruptcy. Will we now fall victim to an NSA induced recession?

Political Suicide

At the same time that the NSA is bringing down internet companies, it is also destroying freedom of the press. Reporters have been threatened with jail time for refusing to hand over their sources to the US government. In Great Britain, the government just forced the news agency, The Guardian, to destroy the hard drive containing information leaked to them by Edward Snowden. If we no longer have privacy or freedom of speech, how can any group critical of the government organize? How can any whistleblower safely contact any reporter? How can human rights groups get information from victims of human rights abuses? How can any client safely and privately communicate with any attorney? How can any patient privately consult with any doctor?

 

Legal Suicide... The End of the Rule of Law?

Also in August 2013, online open source legal firm, Groklaw, announced that they too are shutting down explaining that the work they do is simply not possible if they are under the control of the NSA. The American Civil Liberties Union and several other freedom groups have filed lawsuits trying to restore our 4th Amendment right to privacy.Perhaps the most shocking of all of the revelations in August 2013 occurred with the release on August 20, 2013 of the 85 page FISA Court opinion which found that the NSA had violated the Bill of Rights “tens of thousands” of times.

http://www.scribd.com/doc/162016974/FISA-court-opinion-with-exemptions

Written by FISA Court judge John D. Bates on October 3, 2011, on page 16, the court noted that the NSA has repeatedly lied to the court about what it was doing:

This Court is troubled that the governments revelations regarding NSA acquisition of internet transactions make the third instance in less than three years in which the government has disclosed a substantial misrepresentation regarding the scope of a major collection program... repeated inaccurate statements made in the governments submissions... frequently and systematically violating (the FISA Court orders).”

On Page 77, the court added: “The measures proposed by NSA for handling (emails of millions of Americans) tend to maximize rather than minimize the retention of non-target information.”

On Page 78, the court noted: “Each analyst... is left to apply the proposed minimization measures alone, from beginning to end, and without the benefit of his colleagues’ prior review... the governments proposed measures seem to enhance rather than reduce the risk of error... In sum, the NSA collection results in the acquisition of a very large number of Fourth Amendment protected communications that have no direct connection to any targeted facility and thus do not serve a national need.”

 

Basically, FISA court judge John D. Bates had assumed the government was telling the truth and then he found out the government was not telling the truth. In fact, the NSA had been keeping the FISA court in the dark since court oversight began in 2006. Judge Bates found that the NSA had violated the Fourth Amendment rights of Americans “tens of thousands of times” each year using the NSA’s own study (see page 41). In fact the actual number of violations may be in the hundreds of millions of times each year as we now know that the NSA is doing much more than they told Judge Bates.

On August 23 2013 we found out how the NSA got around restrictions placed on it by the FISA court was by paying its “Prism Partners” (including Microsoft) millions of dollars to do its dirty work for it.

 

The NSA paid and continues to pay millions of dollars to cover the costs of major internet corporations involved in the Prism surveillance program after a court ruled that some of the NSA's activities were unconstitutional. The material provides the first evidence of a financial relationship between the tech companies and the NSA. It is still not clear why it is okay for private companies like Microsoft to do things the NSA is not allowed to do. http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid

Also this summer, it was revealed at a Congressional hearing that the NSA has begun assembling scores of new cyber “offensive” and “defensive” teams, the agency’s most concrete step toward preparing the Pentagon and intelligence agencies for a new era of cyber warfare and computer conflict. These teams consist not only of NSA spies but also private corporate contractors.

 

The confluence of circumstances enabling mass surveillance has the potential to permanently imperil Americans' civil liberties. How we respond will determine whether we continue to function as a democracy.”

Heidi Boghosian, executive director of the National Lawyers Guild.

 

Microsoft Blackmails Windows XP Users
The NSA wants total control over our computers. Their plan to gain access to all of our computers requires that Windows users “upgrade” from Windows XP to Windows 8. To make this happen, in April 2013, Microsoft announced that they will discontinue support for Windows XP beginning in April 2014. Since then, they have used a series of malicious Windows updates to sabotage Windows XP and Windows 7 computers in an attempt to force uses to replace their current computers with Windows 8. The only protection from these attacks is to turn off “Automatic Windows Updates” and install Linux as a dual boot. Sadly, Microsoft has sabotaged the Windows operating system in order to make it more difficult to install Linux as a dual boot – but we will show you how to get around these obstacles. The only way to take back control over your personal or business computer is to learn how to install and use Linux and Libre Office.


 How this website is organized
This website is divided into ten categories. Each category has four sections. The first chapter covers the rise of the Microsoft Monopoly and its hidden connections to the NSA. The second chapter covers the frightening consequences of this collusion between Microsoft and the NSA. The third chapter covers some of the major drawbacks of Windows 8. I want to make sure you are aware of all of the drawbacks of Windows 8 in order to inspire you to take the time to follow through with the rest of the book and actually install Linux on your computer. The fourth chapter covers the history of open source alternatives. The fifth chapter reviews how to download and use Linux Mint in a virtual box inside of your normal Windows computer. This will allow you to see how easy it is to use Linux and Libre Office without making any major changes to your current computer. The sixth chapter explains why and how to back up your computer and how to “dual boot” Linux with Windows. This may seem hard to believe but Microsoft is deliberately trying to crash your computer and prevent you from using Linux. You will see that Linux is not only easier than Windows, it is also much faster. The remaining chapters cover additional free open source programs to use with Linux to free yourself from Microsoft and the NSA.

This website is the text portion of our complete ten week 40 hour online course on using Linux and Libre Office. Each of the 40 chapters covers one hour in our online course. Each chapter covers one week in our ten week course. Our course also includes 40 videos demonstrating the skills discussed in each chapter, 40 activities to help you master these skills and 10 video conference classroom sessions, one hour per week for 10 weeks. If you are interested in taking our complete online course on using open source tools or learning more about our programs, visit our website, collegeintheclouds.org or email us for information on the next course offering. We have also posted this book on our book website, freeyourselffrommicrosoftandthensa.org in case you want to read the book online or refer your friends to it.

Other Books and Courses by David Spring
This book is the first book and course in our six book, six course series for sharing knowledge. In our books and courses you will learn how to use several free knowledge sharing tools including the Linux Operating System, Libre Office for word processing, Joomla for website management, VirtueMart for Ecommerce and Moodle for Elearning.

 

For more information about all six of our books and their related courses, visit our main website, collegeintheclouds.org. Here you will also find links to our Youtube channel with videos covering all of the topics in our books and courses. If you have any questions, feel free to post them on our website forum!

http://collegeintheclouds.org/forum

 Are you ready to learn the power and freedom of Linux and Libre Office? Let’s get started!

David Spring, M.Ed.

September 11, 2013

 

Before moving on to Chapter One, we should first cover this basic question... What is Linux?
Linux is a free computer operating system that works on almost any computer.
Linux runs 90% of all super computers – because it is the fastest in the world.
Linux runs 80% of the all stock markets – because it is the safest in existence.
Linux runs 70% of all smart phones - because it is simple and easy to learn.
Linux runs 60% of all Internet servers - because it is very dependable.
Linux runs 50% of all tablets - because it is the most versatile operating system. Linux is so versatile that it can run almost any Microsoft Windows program – including MS Office. Most important, Linux does not allow the NSA to access to the data on your computer. In short, Linux is the foundation for our global economy and the largest shared technology in history. Linux is also a free open source alternative to the Windows 8 Blues!

The general public has no idea what Unix is and does not care about the history of Linux. All they want is a simple dependable operating system they can use to run their computers and programs and files. The general public is more likely to be familiar with the name Linus because the great American physicist Linus Pauling was very well known. His name is pronounced Line – Us. Thus, most Americans are likely to pronounce Linux as Line – X because that is similar to Line- Us Pauling. In my opinion, with the open source community, either pronunciation is correct. This is because Open Source is all about the freedom to do whatever you want. So pronounce Linux any way you want. The important thing about Linux is not how we pronounce it – but that we actually learn how to use it.

December 2013 Update... Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme

In the past three months since I published Free Yourself from Microsoft and the NSA, there has been a steady stream of increasingly shocking revelations about the extent of NSA spying in the US and around the world. NSA operatives have been caught spying on their wives and girlfriends. The NSA has also been caught spying on dozens of world leaders including Angela Merkel, the elected leader of Germany and the Pope in the Vatican, the leader of the Catholic Church. http://news.panorama.it/cronaca/papa-francesco-datagate



Clearly Angela Merkel and the Pope are not “terrorist threats.” In fact, the greatest threat to democracies around the world is the out of control lunatics pulling the strings at the NSA.



Below we will look at evidence of several shocking links between Microsoft, the NSA and Bitcoin indicating a diabolical plot to manipulate, undermine and corrupt the development of alternative digital currencies. As financial analyst, Greg Mannarino recently said, “We already have a digital currency. It is called the US dollar.” It appears that the NSA wants to insure that no credible alternative to the US digital dollar arises. They therefore created and sabotaged Bitcoin in order to give alternate digital currencies a bad reputation.

 

I realize what I am about to describe may seem difficult to believe. But these are only the latest of many examples of Microsoft and the NSA doing things that are very evil in order to gain control over the entire planet. In fact, the NSA makes the Mafia look like a gathering of Sunday school teachers. The NSA’s goal, from a February 2012 document, as confirmed by Snowden releases on November 22, 2013, is to extract all data on “anyone, anytime, anywhere” by influencing (corrupting) the “global encryption market.” This goal is evidence of the NSA’s evil intentions.

http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html?_r=0


The full extent of the NSA’s diabolical plot was first brought to light on September 5, 2013 when Glenn Greenwald (and several others) exposed a new batch of top secret NSA documents with articles in the Guardian, the New York Times and ProPublica. The following three articles describe a $4 billion16 year NSA bribery and kickback scheme called Bullrun which has severely corrupted encryption standards used to secure financial and other sensitive records.

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=0

http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption


The Bullrun program is much bigger and much more dangerous than the NSA PRISM program exposed in June 2013. The following is from the actual 2010 NSA memos which describe Bullrun:

For the past decade, NSA has led an aggressive, multipronged effort to break widely used Internet encryption technologies.” This NSA plot “actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable.

In other words, the NSA bribes companies like Microsoft with hundreds of millions of dollars every year in order to insert flaws into their computer programs. In November 2013, it was revealed that the NSA has hacked into more than 85,000 Windows computer networks around the world. http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/

 

This raises the question of how the NSA is gaining access to these computer networks. One method is the backdoor key Microsoft gave the NSA in 1998, as I describe in detail in my book. However, the Bullrun program means that the NSA is also using deliberately flawed encryption programs to gain access to computer networks. The NSA refers specifically to using encryption keys in their 2013 budget request as being needed to “influence policies, standards and specifications for commercial public key technologies.”

Public key technologies are the most commonly use of encryption methods. A public key is like a password. For example, if the password to your bank account is TakeMyMoney, the encrypted version of your password might be XQ4%zv20#49. A public/private key combination is used to translate the password back into TakeMyMoney. At the heart of all “key” programs are random number generators that make it hard for hackers to translate the encrypted password unless they possess the all-important keys.

Encryption is the Achilles heel of internet and computer security. Without encryption there is no security. It is therefore essential to understand the history of how NSA corrupted crucial NIST (National Institute of Standards and Technology) encryption standards if we have any hope of getting back to internet security. Thanks to Snowden, we now know that in early 2006, the NSA insisted on adding an unsafe “elliptic curve based random number generator” created by the NSA to three other more secure encryption methods that had already been researched and approved before the NSA take over. The corrupted standard is in NIST Special Publication 800-90. For more details on this, see
http://www.propublica.org/article/standards-agency-strongly-suggests-dropping-its-own-encryption-standard

On May 29, 2006, a pair of researchers in the Netherlands authored a paper showing that this NSA created elliptic curve based random number generator was insecure and that attacks against it could “be run on an ordinary PC.”

http://s3.documentcloud.org/documents/786216/cryptanalysis-of-the-dual-elliptic-curve.pdf

The math used by the Netherlands researchers was rather complex. A less complex explanation of the danger of this bad NSA encryption method was presented in August 2007 by two junior Microsoft employees at an internet security conference in Santa Barbara California.
http://www.wired.com/images_blogs/threatlevel/2013/09/15-shumow.pdf

This presentation occurred at almost the exact same time that Microsoft joined the NSA’s PRISM program and made dangerous modifications to the UEFI computer startup program (described in detail in my book). While there are many families of elliptical functions, all of them suffer from the same problem described by these researchers. Basically, elliptical curves are either too complex to be used for encryption without certain restrictions (such as limiting the elliptical curve function to integers) - or they are not random if there are restrictions.

The NSA must have had a purpose in mind in putting such a bad encryption method into the national standard list of approved encryptions. I therefore started researching applications that used this bad NSA encryption method. One application was the Windows operating system. Despite the fact that it was known to be insecure, Microsoft added this NSA fake encryption method to Windows Vista in February 2008. Even though the NSA flawed process was not the default encryption method, adding it to the Windows operating system made it much easier for the NSA to attack Iranian Windows computer systems later that same year. The NSA also likely used this same method to attack over 50,000 other Windows computer networks around the world in the next two years. The number is now over 85,000 compromised computer networks per a leak of top secret NSA documents released on November 23, 2013.

“The malware can be controlled remotely and be turned on and off at will. The ‘implants’ act as digital ‘sleeper cells’ that can be activated with a single push of a button. According to the Washington Post, the NSA has been carrying out this type of cyber operation since 1998.”

http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/


Among the other applications that adopted the flawed NSA encryption scam was Bitcoin, the world’s largest and most successful digital currency program. In fact, several lines of evidence indicate that Bitcoin was developed by the NSA between 2006 and 2008 – around the same time that the NSA sabotaged the NIST encryption standards. The domain name registration for Bitcoin was in August 2008 and the first paper was published in November 2008. The production of the first bitcoins was in January 2009. The NSA elliptical encryption method was and still is used to verify the authenticity of bitcoin ownership as one of the final steps in transferring ownership of bitcoins. This is despite the fact that the weakness of elliptical random number generators had been exposed in 2006 and again in 2007. Why would Bitcoin use a flawed encryption method produced by the NSA?

On October 28, 2013, an article appeared in Bitcoin Magazine claiming that Bitcoin got “lucky” because it used a Koblitz ellipse curve rather than the normal pseudorandom ellipse curve (secp256k1 rather than secp256r1).

http://bitcoinmagazine.com/7781/satoshis-genius-unexpected-ways-in-which-bitcoin-dodged-some-cryptographic-bullet/

But using a K curve rather than the R curve does not reduce the danger of the function. In fact, the article cited several examples of how the original programmer for bitcoin, Satoshi Nakamoto, got very “lucky” in avoiding less than obvious computer programming problems in the design of bitcoin. For example, the article explains that had the maximum number of bitcoins been 210 million instead of 21 million, Bitcoin could not be represented in floating point notation making bitcoin programming much harder. But rather than being lucky, these complex mathematical coincidences are strong evidence that Bitcoin was not designed by a single lucky person – but by many extremely smart mathematicians and computer programmers over a period of several years. Not many high tech organizations hire both mathematicians and computer programmers. And if they did, they would not be likely to choose the NSA flawed encryption method. In other words, the strange design of Bitcoin has the fingerprints of the NSA all over it.

The 2013 Bitcoin magazine article, which spoke so glowingly about how smart and lucky the founder of Bitcoin was, led me to dig deeper into the history of Satoshi Nakamoto and the history of Bitcoin. One of the best articles on this history was from Wired magazine in 2011. http://www.wired.com/magazine/2011/11/mf_bitcoin/

The mythical founder of Bitcoin was named Satoshi Nakamura. In his posts, he used a fake name and a fake German email address ( This email address is being protected from spambots. You need JavaScript enabled to view it. ). He claimed to be from Japan. But he spoke perfect English. He also wrote words using the British spelling (for example, colour rather than color). While careful steps were taken to hide the actual location of the emails, a detailed analysis of his 500 posts to the Bitcoin forum indicated that Satoshi lived in the US East Coast time zone – which just happens to be the time zone where NSA headquarters are located. In addition, Satoshi took an unusually long time - averaging two weeks - to respond to forum posts. This indicated that a group of people would prepare a response and then have it approved by senior officials before actually posting responses to the forum.

All of these red flags aside, the biggest clue indicating that the NSA was and is behind Bitcoin comes from following the money. With the rise in the value of Bitcoins, Satoshi now has nearly $200 million dollars’ worth of bitcoins. Yet he has never cashed any bitcoins in for dollars. Just as bitcoin was gaining widespread acceptance, Satoshi suddenly stopped posting altogether and simply disappeared. What kind of person or group of persons would be willing to turn their backs on $200 million? In my book, I give other examples of the NSA throwing away billions of dollars in order to control the internet. In fact, the NSA is the only group with the money, math and computer skills needed to pull of this Bitcoin scam.

No one has ever actually met this amazingly smart, lucky and/or generous computer programmer called Satoshi. Yet he was able to do what entire teams of programmers have failed to do – establish a digital currency now worth an estimated $21 billion. Doesn’t this story seem fishy to you? To me, it reeks of the foul stench of the NSA.

The NSA aka Satoshi, set up a website, bitcoin.org in August 2008 at just about the same time that the NSA started their PRISM program and the UEFI program. On the Bitcoin website, the NSA published a “white paper” under the Satoshi alias, explaining how Bitcoin works. http://bitcoin.org/bitcoin.pdf

This white paper is also very unusual. There are only a few references with the latest reference being from 2002. So why did it take Satoshi over six years to publish this white paper? In the paper, they (he) boldly state: “We have proposed a system for electronic transactions without relying on trust.” The problem with this statement is that all human transactions are based on trust relationships – except of course for the NSA where the slogan is to trust no one!

But even if this person or group of persons had revealed themselves, so that it would be possible to determine where bitcoin really came from and what the motives of the developers were, there are many other very suspicious things about bitcoin. The choice of the NSA flawed elliptical encryption method was just the first red flag. Another major red flag is how bitcoins are initially generated. In a real digital currency, the generation of the currency would be tied to something of real value – such as gold, or silver or homes or even just a hard day’s work. This is not the case with bitcoins. They are generated by handing your Windows based computer over to some hidden third party who then uses your computer to “solve math problems.” The first person to solve the current problem gets 50 bit coins. Because the math problems increase in difficulty over time, it takes more and more and faster and faster computers to solve the problems. This is called “bitcoin mining.” But the real mining is the data mining of the NSA. The system they have set up to draw innocent people into this trap is diabolical in the way that it takes advantage of the human weakness for greed to encourage people to hand over their computers to the NSA in order to get a fake digital reward.


Who is behind the curtain?
The final bit of evidence is to follow the money. Who is currently using and promoting bitcoin? One group is drug dealers. Sadly, the world's largest drug dealers are the CIA and NSA. This is a primary source of their hidden income. Another group promoting bitcoin is the military (such as the US Air Force). For those not familiar with the NSA, it is actually a branch of the military and has a very close relationship with the Air Force. Why else would the Air Force get involved in promoting a digital currency based on an NSA flawed encryption method?

But ultimately, Bitcoin is not about making money. It is about controlling digital currency. This is why the NSA is willing to walk away from a quick $200 million in profits. It is clear that the NSA has the digital keys to break Bitcoin any time it wants. If and when Bitcoin finally crashes, look for the NSA to be the “man behind the curtain.”

Bitcoin is only one of several diabolical plots being carried out by the NSA. On November 8, 2013, computer safety guru, Eugene Kaspersky, gave a talk in Australia in which he acknowledged that the Windows Flame and Stuxnet super viruses had infected Russian Windows computers controlling everything from nuclear power plants to their space station. Watch

http://www.youtube.com/watch?v=6tlUvb26DzI#t=1620

Eugene notes of the Microsoft Windows program: “Windows network for the scientists.... they come to the space station with UBS’s which are infected. I am not kidding!.. These kinds of networks are not safe by design... Unfortunately, they have the very same computer as you! The attack is a virus. It can spread. If it infects an Australian power plant, I call it collateral damage. It is very possible that other nations which are not in conflict will be victims of cyber attacks on their critical infrastructure. Cyber space has no borders.”

We discuss the NSA/Microsoft development of these super bugs in detail in our book. The only good news is that governments around the world are starting to realize the need for independent branches of the internet which are not under the direct control of the NSA. This has already led to a major drop in business for US technology corporations – all of which are subject to control by the NSA. The cost to the US economy of NSA spying is already in the hundreds of billions of dollars.

Oregon Senator Ron Wyden recently remarked, "If a foreign enemy was doing this much damage to the economy, people would be in the streets with pitchforks."

Meanwhile, there have also been several toothless bills introduced into Congress to create the illusion that something will be done to reign in the NSA. None of these bills deal with the real problem which is that the NSA and Microsoft are taking over billions of computers in the world through the very dangerous UEFI – NSA startup program. The only solution to the criminal activities of Microsoft and the NSA is to shut both of them down for good.

Things are certain to get worse. The Editor of the Guardian just today stated that they have only released one percent of the Snowden documents. So read this free book and stayed tuned for more updates.
http://freeyourselffrommicrosoftandthensa.org/


David Spring M. Ed.

December 5, 2013

Sliding Scale Donation... Pick and Option and Donate Now!

This low cost option is for those on a limited income. Thanks for your donation to College in the Clouds! Your donation automatically entitles you to post questions to our Course Forums and receive periodic email newsletter updates for our courses and books!

This option is for those with a reasonable income. Thanks for your donation to College in the Clouds! Your donation automatically entitles you to post questions to our Course Forums and receive periodic email newsletter updates for our courses and books!

This option is for those lucky enough to have a good paying job! Thanks for your donation to College in the Clouds! Your donation automatically entitles you to post questions to our Course Forums and receive periodic email newsletter updates for our courses and books!