The BillyGate Affair: How Hackers at Microsoft and Google Revealed Their Massive Malware Operation
By BW McKinzie
()
About this ebook
The BillyGate Affair describes a most remarkable invasion of the author's computers. The attackers didn't try to hide the fact that they work for two of the world's best-known tech companies.
I'm a journalist, so I informed them that I'm obligated to report their illegal activities. The threat of exposure caused panic, apparently. Their efforts to silence me were extensive, starting with the destruction of my hard drives and other electronic devices.
But the hackers were careless. They left an indelible record of their visit.
During the attacks, it became clear that Microsoft and Google run a hacking operation that also disseminates malicious software. The alliance has several obvious objectives. Microsoft and Google have joined to extend their control of the planet's information infrastructure and their influence over consumer behavior. In connection with that, the book provides a pointed critique of the companies' business practices.
The BillyGate Affair also examines the career of America's richest hacker and the hack job that led to his huge fortune. It includes a brief history of the personal computer software industry and recounts the accomplishments of Gary Kildall, the computer scientist whose inventions were instrumental in launching the digital age.
The narrative is unique in at least one sense. It’s an open invitation to the Microsoft/Google hackers. To quote from the chapter that discusses censorship, I challenge them to stop publication of this work: "Please pursue prior restraint. Go for a temporary restraining order or block access to my book on the Internet. Sue for libel if this narrative diverges from the facts. Perhaps I should be treated like Edward Snowden or Chelsea Manning. Please arrest me for espionage if this story damages America's wars on privacy, freedom and terrorism."
People have said the story is too incredible and couldn't be true, but it's not a fabrication. The account is fully backed with a digital record of the invasion, other physical evidence, witness accounts and police reports.
BW McKinzie
The author is a freelance journalist and currently resides in the United States.
Related to The BillyGate Affair
Related ebooks
Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5A First Course In Ethical Hacking Rating: 0 out of 5 stars0 ratingsPentesting for Beginners - Short Stories Rating: 0 out of 5 stars0 ratingsHacking: A Comprehensive Guide to Computer Hacking and Cybersecurity Rating: 0 out of 5 stars0 ratingsGreatest Hackers in the History Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Social Engineer: Brody Taylor Thrillers, #1 Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Hacked Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsLearn Ethical Hacking: A Help Book of Ethical Hacking Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 3 out of 5 stars3/5Hacking the Future: Privacy, Identity, and Anonymity on the Web Rating: 3 out of 5 stars3/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsDeep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Cyberphobia: Identity, Trust, Security and the Internet Rating: 3 out of 5 stars3/5Hacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratingsBecoming an Ethical Hacker Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Online Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsPHP Security and Session Management: Managing Sessions and Ensuring PHP Security (2022 Guide for Beginners) Rating: 3 out of 5 stars3/5
White Collar Crime For You
Hidden History of Kentucky Political Scandals Rating: 3 out of 5 stars3/5TrafficKing: The Jeffrey Epstein Case Rating: 4 out of 5 stars4/5JonBenet: Inside the Ramsey Murder Investigation Rating: 4 out of 5 stars4/5Sammy The Bull Rating: 3 out of 5 stars3/5Heist: The Oddball Crew Behind the $17 Million Loomis Fargo Theft Rating: 3 out of 5 stars3/5Disloyal: A Memoir: The True Story of the Former Personal Attorney to President Donald J. Trump Rating: 4 out of 5 stars4/5Faith-Based Fraud: Learning from the Great Religious Scandals of Our Time Rating: 0 out of 5 stars0 ratingsFake Law: The Truth About Justice in an Age of Lies Rating: 4 out of 5 stars4/5Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts Rating: 4 out of 5 stars4/5Epstein: Dead Men Tell No Tales Rating: 4 out of 5 stars4/5Madoff Talks: Uncovering the Untold Story Behind the Most Notorious Ponzi Scheme in History Rating: 4 out of 5 stars4/5The Panama Papers: Breaking the Story of How the Rich and Powerful Hide Their Money Rating: 4 out of 5 stars4/5Kids for Cash: Two Judges, Thousands of Children, and a $2.8 Million Kickback Scheme Rating: 0 out of 5 stars0 ratingsGolden Boy: A Murder Among the Manhattan Elite Rating: 4 out of 5 stars4/5Billion Dollar Whale: the bestselling investigation into the financial fraud of the century Rating: 4 out of 5 stars4/5The Chickenshit Club: Why the Justice Department Fails to Prosecute Executives Rating: 5 out of 5 stars5/5Manhattan Cult Story: My Unbelievable True Story of Sex, Crimes, Chaos, and Survival Rating: 5 out of 5 stars5/5My Friend Anna: The True Story of a Fake Heiress Rating: 4 out of 5 stars4/5Bad Paper: Chasing Debt from Wall Street to the Underworld Rating: 4 out of 5 stars4/5Lying for Money: How Legendary Frauds Reveal the Workings of the World Rating: 4 out of 5 stars4/5A Senile Old Fart's View On The Trump Autocraczy Rating: 5 out of 5 stars5/5Licensed to Lie: Exposing Corruption in the Department of Justice Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The Best Way to Rob a Bank is to Own One: How Corporate Executives and Politicians Looted the S&L Industry Rating: 4 out of 5 stars4/5Moneyland: The Inside Story of the Crooks and Kleptocrats Who Rule the World Rating: 4 out of 5 stars4/5A Deal with the Devil: The Dark and Twisted True Story of One of the Biggest Cons in History Rating: 4 out of 5 stars4/5
Reviews for The BillyGate Affair
0 ratings0 reviews
Book preview
The BillyGate Affair - BW McKinzie
The BillyGate Affair: How Hackers at Microsoft and Google
Revealed Their Massive Malware Operation
By BW McKinzie, Ph.D.
Copyright 2014 by BW McKinzie, Ph.D.
Smashwords Edition
Dedication
This book is dedicated to the memory of Dr. Gary Kildall. His creations continue to enhance the lives of many millions worldwide. Kildall is remembered as the Edison of the PC.
He was the father of personal computer software and the founder of the PC revolution.
Chapter 1
Summary: An Encounter With Careless Hackers
The material that follows describes a computer invasion by corporate hackers. They were obviously reckless and incompetent.
When they entered the author's computers, they forgot to conceal their affiliation with Google and Microsoft. And these people were foolish. They left an indelible record of their many visits.
I'm a journalist, so I told them I'm obligated to report their illegal activities. The threat of exposure caused panic in high places, apparently. Efforts to silence me were extensive, starting with the destruction of my hard drives and other electronic devices.
During the attacks, it became clear that Microsoft and Google run a hacking operation that disseminates a large variety of malicious software programs. The evidence strongly suggests that these companies have merged their efforts to track Internet users and extend their control over the planet's information infrastructure. (Of course, they probably have generous assistance from the U.S. government.) In this connection, the book offers a pointed critique of the alliance's highly questionable business practices.
The BillyGate Affair also examines the exploits of America's richest hacker, focusing on the hack that led to his incredible fortune. It includes a short history of the PC software industry and revisits the legacy of Gary Kildall, the mostly forgotten genius who launched the digital age.
Chapter 2
Hackers at Microsoft and Google Disclose Remarkable Capabilities
After the U.S. National Security Agency surveillance revelations, it won't surprise anyone to learn that two of the agency's accomplices are running what amounts to a criminal syndicate.
This came to my attention when hackers from Microsoft and Google raided my computers. I told them I was obligated to write about their attacks and let everyone know.
The companies had to stop my report, of course, so I became the target of multiple crimes. Along the way, the leaders at Microsoft and Google demonstrated their criminal inclinations and revealed a remarkable set of capabilities.
There's no doubt in my mind. They would have had me killed if they could have gotten away with it.
Chapter 3
Entering the Hidden Domain
When thieves invaded my computers, it was like moving through a looking glass. Security was breached somehow, and I came into direct contact with a major hacking/malware operation.
The attack was extraordinary because the intruders didn't try to conceal their identity.
Using my keyboard, I told them it was obvious they worked for Microsoft and Google. Then I wrote that I now had an obligation. Everyone would know about their crooked activities.
They didn't like that. The hackers deleted the words from my screen.
I continued writing, thanking them for revealing their secret and