Latest Intel Core Vpro chipsets are an NSA’s dream and your spying nightmare

New Intel based PC’s PERMANENTLY hackable

By Jim Stone (ex-National Security Agency)
http://www.jimstonefreelance.com/corevpro.html

So you think no one can access your data because your computer is turned off. Heck it’s more than turned off, you even took the main hard drive out, and only the backup disk is inside. There is no operating system installed at all. So you KNOW you are safe.

Frank from across the street is an alternative operating systems hobbyist, and he has tons of computers. He has Free BST on a couple, his own compilation of Linux on another, a Mac for the wife, and even has Solaris on yet another. Frank knows systems security, so he cannot be hacked . . . . . . . or so he thinks.

The government does not like Frank much, because they LOVE to look at everything. Privacy is a crime don’t you know, and it looks like Frank’s luck with privacy is about to run out.

The new Intel Core vPro processors contain a new remote access feature which allows 100 percent remote access to a PC 100 percent of the time, even if the computer is TURNED OFF. Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself. As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.

This is being touted as something that makes IT administration easy. It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC no matter what is wrong with it. It allows IT professionals to view the contents of hard drives, check the memory, or hunt for problems on a machine without actually being in front of it. And to that, I call B.S, outside of snooping it’s only real world applications would involve accessing a recovery partition and restoring the computer to out of box state, installing software outside the knowledge of the main operating system, and secretly placing or deleting files.

But the intelligence agencies LOVE THIS. Because Frank is going on vacation soon and they know it. They have listened to all of his calls. They KNOW frank is a terrorist, because they have never been able to access anything Frank has done with a PC, and who would hide their use, other than a criminal? Frank keeps his computers up to date, and THREE of them now have Core vPro processors in them, and when Frank is gone, they are going to get their chance to access ALL of his files because the main backup hard disk went into the newest machine.

Real world use for Core vPro processors will involve the following:
Accessing any PC ANYWHERE, no matter what operating system is installed, even if it is physically disconnected from the Internet. You see, Core vPro processors work in conjunction with Intel’s new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors. Users do not get to know about that 3g connection, but it IS there. Frank was not stupid so he unplugged his router. Unfortunately for Frank, that won’t work, because anti theft 3.0 always has that 3g connection on also, even if the computer is turned off. Sorry frank, you were good with operating systems, but did not know EVERYTHING about hardware. And now the real reason for your finicky security habits will be known to the NSA – you found a way to route photons to any place in the world without any sort of cable. You revolutionized communications. You were going public when you returned from your vacation, but thanks to your new Core vPro processors, a major communications firm is going to go public with your invention BEFORE you get home, and your research will be deleted and replaced with “criminal activity” so you will be arrested when you get back and unable to speak about the theft of your invention. Fascism is GREAT.

If a system has the ram chips pulled, a Core vPro processor will read the hard disk anyway because it has all the ram it needs embedded in the vPro core.

If you encrypted your hard drive, a Core vPro processor will read it anyway, because it snagged your encryption key

If your system has been taken apart, and has no video card, ram, floppy, or hard drive, your Core vPro processor nailed you, because you left a flash drive plugged in. Or a CD in the CD drive. And what about that web cam?

The bottom line? The Core vPro processor is the end of any pretend privacy. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web AT ALL, think again. There is now more than just a ghost in the machine.

The Zionist, Globalist, Banker scamming war mongering cabal has a history of using the marketing of security as a means to remove ALL security and nail you. If you believe Intel’s cheerful hype about these processors making things more secure than ever, think again, because any processor which allows a machine to be accessed even when it’s turned off equates to an information tyrant’s dream come true Please engage your brain while watching this, the security pitch is unadulterated B.S. These processors in fact represent an ABSOLUTE BREACH of security no matter HOW they are marketed. From the techinical viewpoint of someone who worked for an intelligence agency, I call B.S. on Intel, avoid these processors like the plague!

  • You can still purchase i3/6/7 processors but you must make sure they are not the Core Vpro high end processors which right now seem to be aimed at the business sector, I wonder why? A little espionage anyone? I would strongly suggest you purchase an i7 processor now whilst you can or a few of them and expect that to be your last computer unless you can shield out the transmission of the 3g by a Faraday cage type method or by disabling it completely.

    The only other ways around this would be to use the AMD processors if they do not carry similar technology or you can look at buying an Amiga X-1000 type machine by A-Eon Technology using modern Power-PC chips which definitely do not contain spy ware or microwave radiation.

    The article is wrong I believe by telling you that even with the computer having no power it will still transmit using the 3g wireless system inbuilt. Even 3g has to have a power source to exist and if there is no power it cannot work but this would mean making sure that no wall-plug socket is placed in the electrical outlet socket on the wall regardless of the machine being physically switched on or not. The idea is not to let any juice sit in the machine. Take for instance the Asrock motherboards with the instant boot system to load up Windows instantly. This needed the computer always plugged in thus acting as a standby. Unfortunately leaving things on standby is needed to prolong their life, one of the reasons they tell you to switch off machines now under the guise of cost and environment. No the reason they tell you to switch off is so your electronics get hot, cold, hot and cold and thus solder joints and metallic components fail quicker just aiding the consumerism and the planned obsolescence agenda. Also make sure there is no motherboard battery being used to backup power this processor.

    Do not rush to throw out older PCs which may aid you still in the future with more optimized operating system like Amiga OS4 and Linux (Crunchbang, Puppy, Archbang) etc. Stay one step ahead of these vermin daily. If you do not use wifi they are now forcing you to have the military microwave weaponry regardless with these chip sets. I suggest you study microwave weapon expert, Barrie Trower for more information on the negative effects of such technology.

    Strongly support independent systems like the Amiga X-1000 and men like Trevor Dickinson. Just hope when they do become a force to be reckoned with that they do not sell out to the pirates of the Livery aka The Worshipful Company of Information Technologists. Make sure you understand how Microsoft is in bed with the National Security Agency and even has an office at the NSA. Make sure you know what they have planned to try to stop people putting independent operating systems on their own computers doing away with dual-booting and forcing you onto the spy systems.

    -= The Unhived Mind

    INTEL TO RELEASE NEW BIG BROTHER HASWELL PROCESSORS TO SPY ON YOU
    http://theunhivedmind.com/wordpress2/?p=4906

    BARRIE TROWER – MICROWAVE WARFARE (FULL) [Video]
    http://theunhivedmind.com/wordpress/?p=10433

    Intel are going to destroy computing with suppression and bugs [Video]
    http://theunhivedmind.com/wordpress2/?p=2032

    http://www.a-eon.com/


    Time to dump The Worshipful Company of Information Technologists

  • truth19

    The FBI already has all emails and passwords since the early 90’s they have your history of the net.

    • What they do not have with ease is the content on your hard disks especially if you use independent operating systems and software which are compiled from source where you can see if any spyware code were added. Yes the FBI (Nazi Pink Triangle Boys) and the terrorist FBI Division #5 have been using spyware for years such as the hidden Magic Lantern trojan. Do not trust the big name security software out there because they were compromised years ago when they all agreed to let certain government spy-ware and viruses enter systems such as the Magic Lantern in the name of so-called National Security. Reminds me of VISTA being the Virtual Intelligence Surveillance Tactical Application of the National Security Agency and GCHQ. I believe in many ways that a lot of the hackers of windows are actually doing you a favor in aiding to eventually shut down back-doors in the software purposely put there for spying capabilities.

      People should start using PGP type software to encrypt everything but make sure they do not have the keys on any of these types of processor controller machines. Even if they can eventually be decrypted by the NSA it certainly frustrates them. We all know that it was GCHQ and the NSA behind Duqu, Stuxnet and Shamoon malwares. It all goes back to The Worshipful Company of Information Technologists as part of the pirates of the Livery serving the moneybags, The Worshipful Company of Mercers who controls the World through its financial power using proxies like TheCityUK. All for the City of London Corporation merchant pirates from hell headed by the hidden hand of Roman power that continues today (Congress of Vienna) using the veiled British Empire power who itself uses the overt U.S. Empire as its proxy whipping boy to take all the anti-Satan blame around the World. When did you ever see a City of London flag being burned in the Middle East? Maybe you should check into how the Livery have controlled the Muslim Brotherhood since its creation tied to The Honourable East India Company. Always diverting attention onto patsies & pawns just as they have done with the 9/11 attacks both mainstream and the alternative media.

      -= The Unhived Mind

  • I then changed the subject to how Bill Gates (a jew) stole EVERYTHING, he stole Dos from IBM (and was later forced to settle that by writing OS2 for IBM,) He infiltrated and stole everything from WordPerfect, he directly stole the Lotus Spreadsheet and released it as Access, He stole Stacker from Stac electronics outright; – get a load of this! Back in the day, hard disk space was valuable, and anything that could be done to optimize it was priceless. Stack electronics had a product called Stacker, that compressed data on the hard disk so at least twice as much would fit. Naturally, Stacker was not a cheap program, but it really paid to buy it because hard disks cost so much.

    Well, I had that computer center. And on the day Dos 6.0 came out, a customer dragged his PC in, I put it on the bench, and he wanted EVERYTHING wiped off the disk and Dos 6.0 put on it, because Dos 6.0 “encorporated disk compression into the operating system”. I watched the install screens go by, and they bragged about how this new feature could be implemented, just type dblspace at the command prompt immediately after install. Well I did that, and you know what happened? The screen said STACKER, BY STAK ELECTRONICS for about a second, went to a Microsoft screen and the hard disk compression started.

    That distro of Dos was recalled IMMEDIATELY and within a week Microsoft released dos 6.1, and the only difference was that screen did not come up.

    http://www.jimstonefreelance.com/luciferian.html

  • I have in the past stated that the always on cell connection in Intel processors made it’s debut with Sandy Bridge. BUT, Yesterday I sat down to an ancient computer here in Mexico, that said Windows Vista on it, and Equipped with Intel Corevpro Technology, with the Core2 logo on it. I think it was a Compaq. SO, now we know for sure that the Centrino technology, which was rolled into Core2 and every Intel processor since including the Pentiums and Celerons, have that cell connection on the processor die. With an always on cell connection and Corevpro, you can’t encrypt anything on your computer because Corevpro snags all encryption keys and holds them in a separate processor that runs parallel with the main processor and that second processor has as a feature an always on cell connection. It’s the ultimate back door.
    Centrino was designed exclusively in Israel. Leave it up to the Jewists to put a permanent back door into every processor they develop, there for their exploit. We have not had any data security with Intel processors since 2003 or so.

    The problem is a lot older and a lot worse than I thought. So I will apologize for not warning people how bad it really was, but won’t cry with that apology because WHO ELSE OUT THERE WILL SAY IT AT ALL?

    http://www.jimstonefreelance.com

Leave a Reply