The BillyGate Affair: How Hackers at Microsoft and Google Revealed Their Massive Malware Operation
By BW McKinzie
()
About this ebook
The BillyGate Affair describes a most remarkable invasion of the author's computers. The attackers didn't try to hide the fact that they work for two of the world's best-known tech companies.
I'm a journalist, so I informed them that I'm obligated to report their illegal activities. The threat of exposure caused panic, apparently. Their efforts to silence me were extensive, starting with the destruction of my hard drives and other electronic devices.
But the hackers were careless. They left an indelible record of their visit.
During the attacks, it became clear that Microsoft and Google run a hacking operation that also disseminates malicious software. The alliance has several obvious objectives. Microsoft and Google have joined to extend their control of the planet's information infrastructure and their influence over consumer behavior. In connection with that, the book provides a pointed critique of the companies' business practices.
The BillyGate Affair also examines the career of America's richest hacker and the hack job that led to his huge fortune. It includes a brief history of the personal computer software industry and recounts the accomplishments of Gary Kildall, the computer scientist whose inventions were instrumental in launching the digital age.
The narrative is unique in at least one sense. It’s an open invitation to the Microsoft/Google hackers. To quote from the chapter that discusses censorship, I challenge them to stop publication of this work: "Please pursue prior restraint. Go for a temporary restraining order or block access to my book on the Internet. Sue for libel if this narrative diverges from the facts. Perhaps I should be treated like Edward Snowden or Chelsea Manning. Please arrest me for espionage if this story damages America's wars on privacy, freedom and terrorism."
People have said the story is too incredible and couldn't be true, but it's not a fabrication. The account is fully backed with a digital record of the invasion, other physical evidence, witness accounts and police reports.
BW McKinzie
The author is a freelance journalist and currently resides in the United States.
Related to The BillyGate Affair
Related ebooks
A First Course In Ethical Hacking Rating: 0 out of 5 stars0 ratingsBreaking Computer Network with Internet Rating: 0 out of 5 stars0 ratingsLearn Ethical Hacking: A Help Book of Ethical Hacking Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsHacking: A Comprehensive Guide to Computer Hacking and Cybersecurity Rating: 0 out of 5 stars0 ratingsPentesting for Beginners - Short Stories Rating: 0 out of 5 stars0 ratingsGreatest Hackers in the History Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5The Core of Hacking Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Online Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratingsPHP Security and Session Management: Managing Sessions and Ensuring PHP Security (2022 Guide for Beginners) Rating: 3 out of 5 stars3/5Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code Rating: 4 out of 5 stars4/5Gray Hat Hacking the Ethical Hacker's Rating: 5 out of 5 stars5/5The Hacker Hunter Rating: 0 out of 5 stars0 ratingsI'm So Hacked Rating: 5 out of 5 stars5/5Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners Rating: 0 out of 5 stars0 ratingsPC Safety 101 Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsFirewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies Rating: 5 out of 5 stars5/5Amazon Echo: How to Get the Most Out of Your Amazon Echo: User Guide, Tips, Tricks & Commands (Revised, Expanded & Updated for 2016) Rating: 0 out of 5 stars0 ratingsKismet Hacking Rating: 0 out of 5 stars0 ratings
White Collar Crime For You
Billion Dollar Whale: the bestselling investigation into the financial fraud of the century Rating: 4 out of 5 stars4/5Disloyal: A Memoir: The True Story of the Former Personal Attorney to President Donald J. Trump Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5My Friend Anna: The True Story of a Fake Heiress Rating: 4 out of 5 stars4/5Lying for Money: How Legendary Frauds Reveal the Workings of the World Rating: 4 out of 5 stars4/5The Chickenshit Club: Why the Justice Department Fails to Prosecute Executives Rating: 5 out of 5 stars5/5Still Standing: Finding Light Inside a Guatemalan Prison, The Battle of an Innocent Woman Rating: 4 out of 5 stars4/5Manhattan Cult Story: My Unbelievable True Story of Sex, Crimes, Chaos, and Survival Rating: 5 out of 5 stars5/5TrafficKing: The Jeffrey Epstein Case Rating: 4 out of 5 stars4/5Moneyland: The Inside Story of the Crooks and Kleptocrats Who Rule the World Rating: 4 out of 5 stars4/5Whipping Boy: The Forty-Year Search for My Twelve-Year-Old Bully: An Edgar Award Winner Rating: 3 out of 5 stars3/5The Panama Papers: Breaking the Story of How the Rich and Powerful Hide Their Money Rating: 4 out of 5 stars4/5Licensed to Lie: Exposing Corruption in the Department of Justice Rating: 4 out of 5 stars4/5Practice to Deceive Rating: 3 out of 5 stars3/5Epstein: Dead Men Tell No Tales Rating: 4 out of 5 stars4/5Kids for Cash: Two Judges, Thousands of Children, and a $2.8 Million Kickback Scheme Rating: 0 out of 5 stars0 ratingsJonBenet: Inside the Ramsey Murder Investigation Rating: 4 out of 5 stars4/5The Best Way to Rob a Bank is to Own One: How Corporate Executives and Politicians Looted the S&L Industry Rating: 4 out of 5 stars4/5Fugitives: The Story of Clyde Barrow and Bonnie Parker Rating: 4 out of 5 stars4/5Golden Boy: A Murder Among the Manhattan Elite Rating: 4 out of 5 stars4/5Faith-Based Fraud: Learning from the Great Religious Scandals of Our Time Rating: 0 out of 5 stars0 ratingsFake Law: The Truth About Justice in an Age of Lies Rating: 4 out of 5 stars4/5Dark Victory: Ronald Reagan, MCA, and the Mob Rating: 5 out of 5 stars5/5A Deal with the Devil: The Dark and Twisted True Story of One of the Biggest Cons in History Rating: 4 out of 5 stars4/5Predator King: Peter Nygard's Dark Life of Rape, Drugs, and Blackmail Rating: 4 out of 5 stars4/5Chasing Aphrodite: The Hunt for Looted Antiquities at the World's Richest Museum Rating: 4 out of 5 stars4/5Phil Hellmuth's Texas Hold 'Em Rating: 3 out of 5 stars3/5
Reviews for The BillyGate Affair
0 ratings0 reviews
Book preview
The BillyGate Affair - BW McKinzie
The BillyGate Affair: How Hackers at Microsoft and Google
Revealed Their Massive Malware Operation
By BW McKinzie, Ph.D.
Copyright 2014 by BW McKinzie, Ph.D.
Smashwords Edition
Dedication
This book is dedicated to the memory of Dr. Gary Kildall. His creations continue to enhance the lives of many millions worldwide. Kildall is remembered as the Edison of the PC.
He was the father of personal computer software and the founder of the PC revolution.
Chapter 1
Summary: An Encounter With Careless Hackers
The material that follows describes a computer invasion by corporate hackers. They were obviously reckless and incompetent.
When they entered the author's computers, they forgot to conceal their affiliation with Google and Microsoft. And these people were foolish. They left an indelible record of their many visits.
I'm a journalist, so I told them I'm obligated to report their illegal activities. The threat of exposure caused panic in high places, apparently. Efforts to silence me were extensive, starting with the destruction of my hard drives and other electronic devices.
During the attacks, it became clear that Microsoft and Google run a hacking operation that disseminates a large variety of malicious software programs. The evidence strongly suggests that these companies have merged their efforts to track Internet users and extend their control over the planet's information infrastructure. (Of course, they probably have generous assistance from the U.S. government.) In this connection, the book offers a pointed critique of the alliance's highly questionable business practices.
The BillyGate Affair also examines the exploits of America's richest hacker, focusing on the hack that led to his incredible fortune. It includes a short history of the PC software industry and revisits the legacy of Gary Kildall, the mostly forgotten genius who launched the digital age.
Chapter 2
Hackers at Microsoft and Google Disclose Remarkable Capabilities
After the U.S. National Security Agency surveillance revelations, it won't surprise anyone to learn that two of the agency's accomplices are running what amounts to a criminal syndicate.
This came to my attention when hackers from Microsoft and Google raided my computers. I told them I was obligated to write about their attacks and let everyone know.
The companies had to stop my report, of course, so I became the target of multiple crimes. Along the way, the leaders at Microsoft and Google demonstrated their criminal inclinations and revealed a remarkable set of capabilities.
There's no doubt in my mind. They would have had me killed if they could have gotten away with it.
Chapter 3
Entering the Hidden Domain
When thieves invaded my computers, it was like moving through a looking glass. Security was breached somehow, and I came into direct contact with a major hacking/malware operation.
The attack was extraordinary because the intruders didn't try to conceal their identity.
Using my keyboard, I told them it was obvious they worked for Microsoft and Google. Then I wrote that I now had an obligation. Everyone would know about their crooked activities.
They didn't like that. The hackers deleted the words from my screen.
I continued writing, thanking them for revealing their secret and