Tuesday, December 31, 2013

AIDS - The Second Cure

Publication numberUS5676977 A
Publication typeGrant
Application numberUS 08/658,955
Publication dateOct 14, 1997
Filing dateMay 31, 1996
Priority dateSep 22, 1994
Fee statusLapsed
Also published asEP1024817A1, EP1024817A4, WO1997045133A1
InventorsMarvin S. Antelman
Original AssigneeAntelman Technologies Ltd.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Method of curing AIDS with tetrasilver tetroxide molecular crystal devices
US 5676977 A
The diamagnetic semiconducting molecular crystal tetrasilver tetroxide (Ag.sub.4 O.sub.4) is utilized for destroying the AIDS virus, destroying AIDS synergistic pathogens and immunity suppressing moieties (ISM) in humans.
A single intravenous injection of the devices is all that is required for efficacy at levels of about 40 PPM of human blood. The device molecular crystal contains two mono and two trivalent silver ions capable of "firing" electrons capable of electrocuting the AIDS virus, pathogens and ISM. When administered into the bloodstream, the device electrons will be triggered by pathogens, a proliferating virus and ISM, and when fired will simultaneously trigger a redox chelation mechanism resulting in divalent silver moieties which chelate and bind active sites of the entities destroying them. The devices are completely non-toxic. However, they put stress on the liver causing hepatomegaly, but there is no loss of liver function.
What is claimed is:
1. A method of treating AIDS-afflicted humans comprising injecting a multitude of tetrasilver tetroxide molecular crystals into the bloodstream of the human subject.
2. A method for increasing white blood cell counts in AIDS-afflicted humans comprising injecting a multitude of tetrasilver tetroxide molecular crystals into the bloodstream of the human subject.
3. Methods of treating AIDS-affilicted humans according to claims 1-2 where the concentration of said molecular crystals is approximately 40 PPM of the total blood weight of the human subject.

This application is a continuation-in-part of patent application Ser. No. 08/310,859 filed Sep. 22, 1994, now abandoned.
The present invention relates to the employment of molecular crystals as anti-AIDS devices, but more particularly to the molecular crystal semiconductor tetrasilver tetroxide Ag.sub.4 O.sub.4 which has two monovalent and two trivalent silver ions per molecule, and which through this structural configuration enables intermolecular electron transfer capable of killing viruses and binding them to the resulting silver entity so that a single intravenous injection will completely obliterate acquired immune deficiency syndrome (AIDS) in humans. Furthermore, said devices are capable of killing pathogens and purging the bloodstream of immune suppressing moieties (ISM) whether or not created by the AIDS virus (HIV); so as to restore the immune system.

The present invention is based on concepts previously elucidated in applicant's U.S. Pat. No. 5,336,499 which discloses the destruction and inhibition of bacteria, algae and the AIDS virus in nutrient life supporting systems by using said silver oxide devices. Example 3 of said patent discloses that 18 PPM of said crystal devices could totally suppress the AIDS virus (page 6, line 5). Subsequent to the filing of the aforementioned patent, further testing revealed complete 100% destruction of the AIDS virus in vitro at 20 PPM, and the fact that said devices were harmless when ingested and inhaled, being non-toxic.

Encouraged by these evaluations and successes, applicant obtained permission to evaluate the crystals in vitro against murine acquired immune deficiency syndrome (MAIDS). Only one facility in the State of Israel is licensed for these evaluations, namely, the Kaplan Hospital in Rehovot, Israel, which is affiliated with the Hebrew University-Hadassah Medical School where said evaluations were done.
The initial evaluations entailed experimenting with various silver moieties cited in applicant's aforementioned patent, concentrations, non-reactive buffers and modes of administration. After about 18 months of judicious efforts and initial failures, success was finally achieved in destroying the MAIDS virus in C57BL mice with a single intravenous injection. The results of this test program comprise Example 5 of U.S. Pat. No. 5,336,499. After success with mice, the inventor was able to test the efficacy of said devices on two select etiological groups of terminal AIDS patients in a clinic in Tegucigalpa, Honduras, Central America.

The AIDS patients comprised the etiological subgroups, Candidiasis and Wasting Syndrome. Current indicator diseases for diagnosing AIDS which have been expanded by the CDC, fall into the following five major categories with the approximate percent distribution among AIDS patients:

______________________________________1. P. carinii pneumonia              51%2. Wasting syndrome              19%3. Candidiasis     13%4. Kaposi's sarcoma              11%5. Dementia         6%______________________________________
This invention concerns itself with the treatment and cure of candidiasis and wasting syndrome AIDS patients with Tetrasil*. These two groups account for approximately one third of AIDS cases.
Stedman's Medical Dictionary (Williams & Wilken's 26th Ed., 1995) defines wasting syndrome "as a condition of 10% weight loss in conjunction with diarrhea or fever . . . Associated with AIDS (p. 1744)."
The main object of the invention is to provide for a molecular scale device of a single tetrasilver tetroxide crystalline molecule capable of restoring the immunity of AIDS afflicted humans of the two AIDS etiological subgroups, candidiasis and wasting syndrome.

Another object of the invention is to provide for immunity restoration in said AIDS afflicted humans through a single injection.

Another object of this invention is to destroy ISM in humans manifesting AIDS diseases of said AIDS etiological subgroups irrespective as to whether said ISM was HIV induced, since it is known that humans may manifest AIDS and still be HIV negative, and thus restore the immune system in said humans.

Another object of this invention is to destroy the AIDS virus when present in the systems of said AIDS afflicted humans.

This invention relates to a molecular scale device not only capable of destroying the AIDS virus, but of purging the human bloodstream of pathogens and restoring immunity to AIDS patients of the candidiasis and wasting syndrome categories. Said molecular device consists of a single crystal of tetrasilver tetroxide (Ag.sub.4 O.sub.4). The crystal lattice of this molecule has a unique structure since it is a diamagnetic semiconducting crystal containing two mono and two trivalent silver ions, which in effect are capable of "firing" electrons under certain conditions which will destroy AIDS viruses, other pathogens and immune suppressing moieties (ISM), not only through the electrocution mode, but also by a binding process which occurs simultaneously with electron firing, namely, binding and chelation of divalent silver, i.e., the resulting product of the electron transfer redox that occur when the monovalent silver ions are oxidized and the trivalent ions are reduced in the crystal. The binding/chelation effect occurs at active sites of the AIDS virus, pathogens and ISM. Because of the extremely minute size of a single molecule of this crystal, several million of these devices may be employed in concert to destroy a virus colony to purge a life support system of ISM and pathogens with the consumption of only parts per trillion of the crystal devices. Thus an optimum of 40 PPM of the devices by weight of human blood was found to be sufficient to completely obliterate AIDS. This concentration is slightly over double of the optimum concentration recommended in applicant's aforementioned U.S. patent for the destruction of the human AIDS virus in vitro. Other details concerning the structure of the crystal and its mechanism against pathogens, the AIDS virus and ISM would analogously hold here, and have already been further elucidated in said patent.

The actual destruction of pathogens, ISM and the AIDS virus is effectuated by injection of a suspension of these devices in distilled or deionized water with a non-reacting electrolyte directly, i.e. intravenously, into the bloodstream. A single injection is all that is required under these conditions. Accordingly, humans injected in this manner, upon being inspected after three weeks or more had elapsed and compared with similar humans that had been given placebos, were completely cured of AIDS. The control group still manifested AIDS. Accordingly, the tetrasilver tetroxide device performed in concert with and in full conformity with the ultimate objects of this invention. Furthermore, three out of four wasting syndrome terminal patients and four out of the five candidiasis terminal patients were still alive in 1995 after a year and a half had elapsed from their initial injection. By that time all the AIDS patients had been released from the clinic and allowed to return home.

Other objects and features of the present invention shall become apparent to those skilled in the art when the present invention is considered in view of the accompanying examples. It should, of course, be recognized that the accompanying examples illustrate preferred embodiments of the present invention and are not intended as a means of defining the limits and scope of the present invention.
Five patients afflicted with AIDS of the candidiasis etiological category were segregated for Tetrasil treatment. The rationale for selecting them was based on facts presented in an article by Peter H. Duesberg and Brian J. Ellison entitled "Is The AIDS Virus A Science Fiction?" (Policy Review, Summer 1990 pp. 40-51). Only the factual presentations of the article were utilized and the hypothesis of the authors was ignored. The facts presented in the article related to the method of selecting AIDS patients based on the five aforementioned etiological subgroups targeted by the CDC, and the evidence presented, that there is AIDS without HIV as well as with it so that an anti-viral agent in most instances will not necessarily restore the immunity system.

Evaluations with Tetrasil were conducted on AIDS patients at Lucha Contra el Sida, Comayaguela, Honduras. The patients two weeks prior to inoculation were removed from their AZT, AIDS therapy. Tetrasil was administered at approximately 40 PPM of blood volume per patient as a suspension in a proprietary buffer solution (pH=6.5), supplied by Holipharm Corporation.

The results of evaluations with candidiasis are tabulated in Table I under its disease category. All patients evaluated were terminal. Some, however, were in moderate (m) condition and others in poor (p) as designated in the Table. The I and F designations refer to initial and final values as shown. WBC indicates white cell blood count. The H column, following CD 8, indicates whether hepatomegaly occurred. This was an unfortunate consequence of the treatment which resulted in enlarged livers in all patients except the second one. Despite hepatomegaly, there was no interference with liver function.

The onset of hepatomegaly was not spontaneous and varied from patient to patient, being in the range of 4-16 days.

It should also be noted that shortly after injection of Tetrasil there were indications of fever (symbolized by T in the Ag.sub.4 O.sub.4 column), sometimes accompanied by fatigue (F). The body temperature was invariably 38.5.degree. C. (101.3.degree. F.). This was indicative of restoration of the immune response of the body, since normally the body will destroy pathogens when the immune system is functional by raising the temperature. The patient who died; first responded favorably to Diflucan, which previously gave no response. He was cured of his candidiasis, but unfortunately succumbed to his previous body damage. All the other candidiasis syndrome people who previously did not respond to the indicated medications subsequently responded after the Tetrasil treatment. Further evidence of the recovery of the AIDS patients manifested itself 30 days after the initial injection when white blood cell counts were taken. They are shown in Table I under the WBC column, which gives the initial and final WBC. All candidiasis patients showed a dramatic increase in their white blood cell counts, indicative of the restoration of their immunity systems.
The above protocol of Example 1 was repeated with AIDS patients exhibiting wasting syndrome. The results of their treatment are tabulated in Table I under the disease category of said syndrome. It should be noted that two of the four wasting syndrome patients showed improved white blood counts. The female patient, whose condition improved from poor and terminal to be among the living, showed a decrease in the WBC. However, she showed an increase in body temperature which was indicative of immune response. The test results indicate that one cannot rely on a single factor to indicate the demise of AIDS. The usual HIV marker CD 4 initial and final are irrelevant. ISM suppression appears to be more critical than the destruction of HIV. AIDS was suppressed, any permanent damage that had been done to the patients in the course of their succumbing to AIDS was not obviously cured or corrected by said crystal device treatment, rather said injury persisted and the patient was improved with respect to AIDS but still suffered from said permanent injury or impairment previously inflicted.

                                  TABLE I__________________________________________________________________________Response of AIDS Patients to Single 40 PPM Ag.sub.4 O.sub.4 Inoculation            Date                    WeightDISEASE PATIENT    Inoc.               WBC   CD 4       DEATH                                    Lbs.Group Sex    Age       Medictn            1994               I  F  I  F  CD 8                              H 1944                                    I   F  Ag.sub.4 O.sub.4__________________________________________________________________________Candidiasis M p    28 Diflucan            5/5               1,200                  4,200                      41                        -- 221                              + 6/11                                     82  76                                           T F m    33 "    5/5               6,000                  6,700                     554                        872                           394                              -      98  98                                           T F m    33 Ketaconzl            5/27               2,600                  3,850                     248                        181                           951                              +     123 123                                           T M p    62 "    6/2               3,300                  3,700                      89                        237                            59                              +     105  92                                           F F m    31 Pentamidn            6/2               2,400                  3,050                      9 181                            65                              +     121 118                                           PainWasting M m    27      5/27               3,600                  4,600                      39                         14                           709                              +     119 120                                           TSyndrome M m    28      5/27               2,750                  --  10                        --  60                              + 7/19                                    121 119                                           T, F F p    43      5/27               3,600                  2,700                      68                        246                           248                              +     101  98                                           T, F M m    19      5/10               3,850                  5,400                     137                         36                            48                              +     103 106                                           T, F__________________________________________________________________________
As this invention may be embodied in several forms without departing from the spirit or essential characteristics thereof, the present embodiments are therefore illustrative and not restrictive, since the scope of the invention is defined by the appended claims rather than by the description preceding them, and all changes that fall within the metes and bounds of the claims or that form their functional as well as conjointly cooperative equivalents, are therefore intended to be embraced by these claims.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4415565 *Mar 24, 1981Nov 15, 1983The United States Of America As Represented By The Secretary Of The ArmySilver metachloridine in treatment of infections
US4915955 *Sep 5, 1986Apr 10, 1990Sanosil Ag.Process for preparing a disinfectant
US4952411 *Oct 18, 1988Aug 28, 1990Trustees Of Columbia University In The City Of New YorkMethod of inhibiting the transmission of AIDS virus
US5073382 *May 9, 1991Dec 17, 1991N. Jonas & Co., Inc.Divalent silver alkaline bactericide compositions
US5078902 *May 9, 1991Jan 7, 1992N. Jonas & Co., Inc.Divalent silver halide bactericide
US5089275 *May 9, 1991Feb 18, 1992N. Jonas & Co., Inc.Stabilized divalent silver bactericides
US5211855 *Jan 24, 1992May 18, 1993N. Jonas & Co., Inc.Method of treating water employing tetrasilver tetroxide crystals
US5223149 *May 18, 1992Jun 29, 1993N. Jonas & Co., Inc.Trivalent silver water treatment compositions
US5336499 *Nov 5, 1992Aug 9, 1994Antelman Technologies, Ltd.Molecular crystal device for pharmaceuticals
US5571520 *Aug 4, 1994Nov 5, 1996Antelman Technologies Ltd.Molecular crystal redox device for pharmaceuticals

Non-Patent Citations
"Is The AIDS Virus A Science Fiction?" by Peter H. Duesberg and Bryan J. Ellison, Policy Review, Summer 1990, pp. 40-51.
2 *Is The AIDS Virus A Science Fiction by Peter H. Duesberg and Bryan J. Ellison, Policy Review , Summer 1990, pp. 40 51.

Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US6258385Apr 18, 2000Jul 10, 2001Marantech Holding, LlcTetrasilver tetroxide treatment for skin conditions
US6436420 *Jan 5, 2000Aug 20, 2002Marantech Holding, LlcHigh performance silver (I,III) oxide antimicrobial textile articles
US6485755Oct 20, 2000Nov 26, 2002Marantech HoldingMethods of using electron active compounds for managing cancer
US6645531Oct 20, 2000Nov 11, 2003Marantech Holding LlcMultivalent electron active compositions and methods of making and using same
US6669966Oct 20, 2000Dec 30, 2003Marantech Holding LlcCompositions for facilitating skin growth and methods and articles using same
US6989157 *Oct 22, 2002Jan 24, 2006Nucryst Pharmaceuticals Corp.Dry powders of metal-containing compounds
US7300673Apr 23, 2004Nov 27, 2007Exciton Technologies Inc.Deposition products, composite materials and processes for the production thereof
US7687076Nov 2, 2007Mar 30, 2010Exciton Technologies Inc.Deposition products, composite materials and processes for the production thereof
US7998504May 27, 2008Aug 16, 2011Exciton Technologies Inc.Deposition products, composite materials and processes for the production thereof
WO2001049303A1 *Oct 20, 2000Jul 12, 2001Marantech Holding LlcMultivalent electron active compositions and methods of making and using same
WO2003043537A1 *Nov 19, 2001May 30, 2003Antelman Marvin WImprovements in curing aids with tetrasilver tetroxide molecular crystal devices

U.S. Classification424/618, 514/495
International ClassificationA61K33/38
Cooperative ClassificationA61K33/38
European ClassificationA61K33/38
Legal Events
Dec 1, 2009FPExpired due to failure to pay maintenance fee
Effective date: 20091014
Oct 14, 2009LAPSLapse for failure to pay maintenance fees
Apr 20, 2009REMIMaintenance fee reminder mailed
Jun 15, 2005ASAssignment
Effective date: 20011118
Apr 12, 2005FPAYFee payment
Year of fee payment: 8
Aug 21, 2001ASAssignment
Effective date: 20010722
Apr 5, 2001FPAYFee payment
Year of fee payment: 4
May 31, 1996ASAssignment
Effective date: 19960531

Shocking: There Is No Hell Fire; Adam & Eve Not Real ––– Pope Francis Exposes

Sunday, December 29, 2013

Shocking: There Is No Hell Fire; Adam & Eve Not Real ––– Pope Francis Expose

One man who is out to open many old "secrets" in the Catholic church is Pope Francis. Some of the beliefs that are held in the church but contrary to the loving nature of God are now being set aside by the Pope who was recently name The Man of The Year by TIME Magazine.....

In his latest revelations, Pope Francis said:

"Through humility, soul searching, and prayerful contemplation we have gained a new understanding of certain dogmas. The church no longer believes in a literal hell where people suffer. This doctrine is incompatible with the infinite love of God. God is not a judge but a friend and a lover of humanity. God seeks not to condemn but only to embrace. Like the fable of Adam and Eve, we see hell as a literary device. Hell is merely a metaphor for the isolated soul, which like all souls ultimately will be united in love with God.” 
In a shocking speech that is reverberating across the world, Pope Francis declared that:

“All religions are true, because they are true in the hearts of all those who believe in them. What other kind of truth is there? In the past, the church has been harsh on those it deemed morally wrong or sinful. Today, we no longer judge. Like a loving father, we never condemn our children. Our church is big enough for heterosexuals and homosexuals, for the pro-life and the pro-choice! For conservatives and liberals, even communists are welcome and have joined us. We all love and worship the same God.”

In the last six months, Catholic cardinals, bishops and theologians have been deliberating in the Vatican City, in discussing the future of the church and redefining long-held Catholic doctrines and dogmas. The Third Vatican Council, is the largest and most important since the Second Vatican Council was concluded in 1962.

Pope Francis convened the new council to “finally finish the work of the Second Vatican Council.” 
The Third Vatican Council concluded with Pope Francis announcing that...
Catholicism is now a “modern and reasonable religion, which has undergone evolutionary changes. The time has come to abandon all intolerance. We must recognize that religious truth evolves and changes. Truth is not absolute or set in stone. Even atheists acknowledge the divine. Through acts of love and charity the atheist acknowledges God as well, and redeems his own soul, becoming an active participant in the redemption of humanity.”

One statement in the Pope’s speech has sent traditionalists into a fit of confusion and hysteria...
“God is changing and evolving as we are, For God lives in us and in our hearts. When we spread love and kindness in the world, we touch our own divinity and recognize it. The Bible is a beautiful holy book, but like all great and ancient works, some passages are outdated. Some even call for intolerance or judgement. The time has come to see these verses as later interpolations, contrary to the message of love and truth, which otherwise radiates through scripture. In accordance with our new understanding, we will begin to ordain women as cardinals, bishops and priests. In the future, it is my hope that we will have a woman pope one day. Let no door be closed to women that is open to men!”
A few cardinals in the Catholic church are against Pope Francis' latest declarations. Watch out for the report.
Copyright © 2013 Diversity Chronicle All Rights Reserved.

Sunday, December 29, 2013



One-score and ten has passed since 1984
Thirty years eerily indistinguishable from one very long snore
All about us humanity has been penned inside the Animal Farm
Ignorantly oblivious to the warnings of the Orwellian alarm

Omnipresent surveillance monitors the thinker’s senses
Media mind control builds invisible barbed wire fences
Big Brother observes all from every street corner
Thought-crime the offense that will make crumble the tolerance mortar

Prison walls have never looked so pale in hue
Newspeak the newest Latin replaces the wisdom of the forgotten Jew
Doublethink the innovative hypocrisy is appropriate for these harrowing times
Ready yourself for Room 101 when prayer becomes a torturous crime

2014 seemed so far far away
The hands of time have unlocked the door to a very ominous day
All this appeared to be fantasy so very long ago
Hollywood fiction will now explain the misery of this newest reality game show

Thank you,
Joseph Pede

Lindi Ortega - The Voice of an Angel

Saturday, December 28, 2013

Nikola Tesla - Thank you for this wonderful truth


"AIDS CURE" suppressed by "BIG PHARMA"

Cure for AIDS that the Pharma companies want to suppress

Dr. Robert Beck discusses the blood electrofication device that he sifted from obscurity and almost lost due to the media blackout. THIS TECHNOLOGY IS INEXPENSIVE, REAL, AND EFFECTIVE CURE FOR ALL INFECTIOUS DISEASE. THIS IS WHAT THE FDA, AMA, and the Pharmaceutical Drug Lords DO NOT WANT YOU TO KNOW.

Blood electrification. Patent 5139684, granted Aug 18 1992 (filed Nov 16 1990)
Electrically conductive method and systems for treatment of blood and other body fluids and/or synthetic fluids with electric forces

Inventors: Dr. Steven Kaali and Peter Schwolsky



A new process and system for treatment of blood and/or other body fluids and/or synthetic fluids from a donor to a recipient or storage receptacle or in a recycling system using novel electrically conductive treatment vessels for treating blood and/or other body fluids and/or synthetic fluids with electric field forces of appropriate electric field strength to provide electric current flow through the blood or other body fluids at a magnitude that is biologically compatible but is sufficient to render the bacteria, virus, and/or fungus ineffective to infect normally healthy cells while maintaining the biological usefulness of the blood or other fluids. For this purpose the low voltage electric potentials applied to the treatment vessel should be of the order of from about 0.2 to 12 volts and should produce current flow densities in the blood or other fluids of from one microampere per square millimeter of electrode area exposed to the fluid being treated to about two milliamperes per square millimeter. Treatment time within this range of parameters may range for a period of time from about one minute to about 12 minutes.

Friday, December 27, 2013

Bill Gates & Microsoft - NSA Terrorists

December 2013 Update... Connecting the Dots between Microsoft Backdoors, NSA Corruption and the Bitcoin Ponzi Scheme
In the past three months since I published Free Yourself from Microsoft and the NSA, there has been a steady stream of increasingly shocking revelations about the extent of NSA spying in the US and around the world. NSA operatives have been caught spying on their wives and girlfriends. The NSA has also been caught spying on dozens of world leaders including Angela Merkel, the elected leader of Germany and the Pope in the Vatican, the leader of the Catholic Church. http://news.panorama.it/cronaca/papa-francesco-datagate

Clearly Angela Merkel and the Pope are not “terrorist threats.” In fact, the greatest threat to democracies around the world is the out of control lunatics pulling the strings at the NSA.

Below we will look at evidence of several shocking links between Microsoft, the NSA and Bitcoin indicating a diabolical plot to manipulate, undermine and corrupt the development of alternative digital currencies. As financial analyst, Greg Mannarino recently said, “We already have a digital currency. It is called the US dollar.” It appears that the NSA wants to insure that no credible alternative to the US digital dollar arises. They therefore created and sabotaged Bitcoin in order to give alternate digital currencies a bad reputation.


I realize what I am about to describe may seem difficult to believe. But these are only the latest of many examples of Microsoft and the NSA doing things that are very evil in order to gain control over the entire planet. In fact, the NSA makes the Mafia look like a gathering of Sunday school teachers. The NSA’s goal, from a February 2012 document, as confirmed by Snowden releases on November 22, 2013, is to extract all data on “anyone, anytime, anywhere” by influencing (corrupting) the “global encryption market.” This goal is evidence of the NSA’s evil intentions.


The full extent of the NSA’s diabolical plot was first brought to light on September 5, 2013 when Glenn Greenwald (and several others) exposed a new batch of top secret NSA documents with articles in the Guardian, the New York Times and ProPublica. The following three articles describe a $4 billion16 year NSA bribery and kickback scheme called Bullrun which has severely corrupted encryption standards used to secure financial and other sensitive records.




The Bullrun program is much bigger and much more dangerous than the NSA PRISM program exposed in June 2013. The following is from the actual 2010 NSA memos which describe Bullrun:

For the past decade, NSA has led an aggressive, multipronged effort to break widely used Internet encryption technologies.” This NSA plot “actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable.

In other words, the NSA bribes companies like Microsoft with hundreds of millions of dollars every year in order to insert flaws into their computer programs. In November 2013, it was revealed that the NSA has hacked into more than 85,000 Windows computer networks around the world. http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/


This raises the question of how the NSA is gaining access to these computer networks. One method is the backdoor key Microsoft gave the NSA in 1998, as I describe in detail in my book. However, the Bullrun program means that the NSA is also using deliberately flawed encryption programs to gain access to computer networks. The NSA refers specifically to using encryption keys in their 2013 budget request as being needed to “influence policies, standards and specifications for commercial public key technologies.”

Public key technologies are the most commonly use of encryption methods. A public key is like a password. For example, if the password to your bank account is TakeMyMoney, the encrypted version of your password might be XQ4%zv20#49. A public/private key combination is used to translate the password back into TakeMyMoney. At the heart of all “key” programs are random number generators that make it hard for hackers to translate the encrypted password unless they possess the all-important keys.

Encryption is the Achilles heel of internet and computer security. Without encryption there is no security. It is therefore essential to understand the history of how NSA corrupted crucial NIST (National Institute of Standards and Technology) encryption standards if we have any hope of getting back to internet security. Thanks to Snowden, we now know that in early 2006, the NSA insisted on adding an unsafe “elliptic curve based random number generator” created by the NSA to three other more secure encryption methods that had already been researched and approved before the NSA take over. The corrupted standard is in NIST Special Publication 800-90. For more details on this, see

On May 29, 2006, a pair of researchers in the Netherlands authored a paper showing that this NSA created elliptic curve based random number generator was insecure and that attacks against it could “be run on an ordinary PC.”


The math used by the Netherlands researchers was rather complex. A less complex explanation of the danger of this bad NSA encryption method was presented in August 2007 by two junior Microsoft employees at an internet security conference in Santa Barbara California.

This presentation occurred at almost the exact same time that Microsoft joined the NSA’s PRISM program and made dangerous modifications to the UEFI computer startup program (described in detail in my book). While there are many families of elliptical functions, all of them suffer from the same problem described by these researchers. Basically, elliptical curves are either too complex to be used for encryption without certain restrictions (such as limiting the elliptical curve function to integers) - or they are not random if there are restrictions.

The NSA must have had a purpose in mind in putting such a bad encryption method into the national standard list of approved encryptions. I therefore started researching applications that used this bad NSA encryption method. One application was the Windows operating system. Despite the fact that it was known to be insecure, Microsoft added this NSA fake encryption method to Windows Vista in February 2008. Even though the NSA flawed process was not the default encryption method, adding it to the Windows operating system made it much easier for the NSA to attack Iranian Windows computer systems later that same year. The NSA also likely used this same method to attack over 50,000 other Windows computer networks around the world in the next two years. The number is now over 85,000 compromised computer networks per a leak of top secret NSA documents released on November 23, 2013.

“The malware can be controlled remotely and be turned on and off at will. The ‘implants’ act as digital ‘sleeper cells’ that can be activated with a single push of a button. According to the Washington Post, the NSA has been carrying out this type of cyber operation since 1998.”


Among the other applications that adopted the flawed NSA encryption scam was Bitcoin, the world’s largest and most successful digital currency program. In fact, several lines of evidence indicate that Bitcoin was developed by the NSA between 2006 and 2008 – around the same time that the NSA sabotaged the NIST encryption standards. The domain name registration for Bitcoin was in August 2008 and the first paper was published in November 2008. The production of the first bitcoins was in January 2009. The NSA elliptical encryption method was and still is used to verify the authenticity of bitcoin ownership as one of the final steps in transferring ownership of bitcoins. This is despite the fact that the weakness of elliptical random number generators had been exposed in 2006 and again in 2007. Why would Bitcoin use a flawed encryption method produced by the NSA?

On October 28, 2013, an article appeared in Bitcoin Magazine claiming that Bitcoin got “lucky” because it used a Koblitz ellipse curve rather than the normal pseudorandom ellipse curve (secp256k1 rather than secp256r1).


But using a K curve rather than the R curve does not reduce the danger of the function. In fact, the article cited several examples of how the original programmer for bitcoin, Satoshi Nakamoto, got very “lucky” in avoiding less than obvious computer programming problems in the design of bitcoin. For example, the article explains that had the maximum number of bitcoins been 210 million instead of 21 million, Bitcoin could not be represented in floating point notation making bitcoin programming much harder. But rather than being lucky, these complex mathematical coincidences are strong evidence that Bitcoin was not designed by a single lucky person – but by many extremely smart mathematicians and computer programmers over a period of several years. Not many high tech organizations hire both mathematicians and computer programmers. And if they did, they would not be likely to choose the NSA flawed encryption method. In other words, the strange design of Bitcoin has the fingerprints of the NSA all over it.

The 2013 Bitcoin magazine article, which spoke so glowingly about how smart and lucky the founder of Bitcoin was, led me to dig deeper into the history of Satoshi Nakamoto and the history of Bitcoin. One of the best articles on this history was from Wired magazine in 2011. http://www.wired.com/magazine/2011/11/mf_bitcoin/

The mythical founder of Bitcoin was named Satoshi Nakamura. In his posts, he used a fake name and a fake German email address ( satoshin@gmx.com This email address is being protected from spambots. You need JavaScript enabled to view it. ). He claimed to be from Japan. But he spoke perfect English. He also wrote words using the British spelling (for example, colour rather than color). While careful steps were taken to hide the actual location of the emails, a detailed analysis of his 500 posts to the Bitcoin forum indicated that Satoshi lived in the US East Coast time zone – which just happens to be the time zone where NSA headquarters are located. In addition, Satoshi took an unusually long time - averaging two weeks - to respond to forum posts. This indicated that a group of people would prepare a response and then have it approved by senior officials before actually posting responses to the forum.

All of these red flags aside, the biggest clue indicating that the NSA was and is behind Bitcoin comes from following the money. With the rise in the value of Bitcoins, Satoshi now has nearly $200 million dollars’ worth of bitcoins. Yet he has never cashed any bitcoins in for dollars. Just as bitcoin was gaining widespread acceptance, Satoshi suddenly stopped posting altogether and simply disappeared. What kind of person or group of persons would be willing to turn their backs on $200 million? In my book, I give other examples of the NSA throwing away billions of dollars in order to control the internet. In fact, the NSA is the only group with the money, math and computer skills needed to pull of this Bitcoin scam.

No one has ever actually met this amazingly smart, lucky and/or generous computer programmer called Satoshi. Yet he was able to do what entire teams of programmers have failed to do – establish a digital currency now worth an estimated $21 billion. Doesn’t this story seem fishy to you? To me, it reeks of the foul stench of the NSA.

The NSA aka Satoshi, set up a website, bitcoin.org in August 2008 at just about the same time that the NSA started their PRISM program and the UEFI program. On the Bitcoin website, the NSA published a “white paper” under the Satoshi alias, explaining how Bitcoin works. http://bitcoin.org/bitcoin.pdf

This white paper is also very unusual. There are only a few references with the latest reference being from 2002. So why did it take Satoshi over six years to publish this white paper? In the paper, they (he) boldly state: “We have proposed a system for electronic transactions without relying on trust.” The problem with this statement is that all human transactions are based on trust relationships – except of course for the NSA where the slogan is to trust no one!

But even if this person or group of persons had revealed themselves, so that it would be possible to determine where bitcoin really came from and what the motives of the developers were, there are many other very suspicious things about bitcoin. The choice of the NSA flawed elliptical encryption method was just the first red flag. Another major red flag is how bitcoins are initially generated. In a real digital currency, the generation of the currency would be tied to something of real value – such as gold, or silver or homes or even just a hard day’s work. This is not the case with bitcoins. They are generated by handing your Windows based computer over to some hidden third party who then uses your computer to “solve math problems.” The first person to solve the current problem gets 50 bit coins. Because the math problems increase in difficulty over time, it takes more and more and faster and faster computers to solve the problems. This is called “bitcoin mining.” But the real mining is the data mining of the NSA. The system they have set up to draw innocent people into this trap is diabolical in the way that it takes advantage of the human weakness for greed to encourage people to hand over their computers to the NSA in order to get a fake digital reward.

Who is behind the curtain?
The final bit of evidence is to follow the money. Who is currently using and promoting bitcoin? One group is drug dealers. Sadly, the world's largest drug dealers are the CIA and NSA. This is a primary source of their hidden income. Another group promoting bitcoin is the military (such as the US Air Force). For those not familiar with the NSA, it is actually a branch of the military and has a very close relationship with the Air Force. Why else would the Air Force get involved in promoting a digital currency based on an NSA flawed encryption method?

But ultimately, Bitcoin is not about making money. It is about controlling digital currency. This is why the NSA is willing to walk away from a quick $200 million in profits. It is clear that the NSA has the digital keys to break Bitcoin any time it wants. If and when Bitcoin finally crashes, look for the NSA to be the “man behind the curtain.”

Bitcoin is only one of several diabolical plots being carried out by the NSA. On November 8, 2013, computer safety guru, Eugene Kaspersky, gave a talk in Australia in which he acknowledged that the Windows Flame and Stuxnet super viruses had infected Russian Windows computers controlling everything from nuclear power plants to their space station. Watch


Eugene notes of the Microsoft Windows program: “Windows network for the scientists.... they come to the space station with UBS’s which are infected. I am not kidding!.. These kinds of networks are not safe by design... Unfortunately, they have the very same computer as you! The attack is a virus. It can spread. If it infects an Australian power plant, I call it collateral damage. It is very possible that other nations which are not in conflict will be victims of cyber attacks on their critical infrastructure. Cyber space has no borders.”

We discuss the NSA/Microsoft development of these super bugs in detail in our book. The only good news is that governments around the world are starting to realize the need for independent branches of the internet which are not under the direct control of the NSA. This has already led to a major drop in business for US technology corporations – all of which are subject to control by the NSA. The cost to the US economy of NSA spying is already in the hundreds of billions of dollars.

Oregon Senator Ron Wyden recently remarked, "If a foreign enemy was doing this much damage to the economy, people would be in the streets with pitchforks."

Meanwhile, there have also been several toothless bills introduced into Congress to create the illusion that something will be done to reign in the NSA. None of these bills deal with the real problem which is that the NSA and Microsoft are taking over billions of computers in the world through the very dangerous UEFI – NSA startup program. The only solution to the criminal activities of Microsoft and the NSA is to shut both of them down for good.

Things are certain to get worse. The Editor of the Guardian just today stated that they have only released one percent of the Snowden documents. So read this free book and stayed tuned for more updates. http://freeyourselffrommicrosoftandthensa.org/

David Spring M. Ed.
December 5, 2013