Pages

2013-10-02

“Secret” 3G Intel Chip Gives Snoops Backdoor PC Access

Vatic Note:  One way to "control" behavior without a lot of expense is to use propoganda to convince the opposition that the PTB have the technology to spy on you.  If you believe it, not if its just true, but if you "believe its true", then you will self monitor.  I watched that work on a teenager based on a book I read.  They said if you tell a teen to do something and he says "no, and you can't make me do it",  Then all you have to do is "Talk to the police man in his head".

You say "Your right, I can't make you do it, but you are going to do it anyway."  I could not believe it.  It worked.  LOL  The "policeman in his head" is acknowledge and allowed to exist there by him.  Same with this below.  If you believe there is a "police man in your computer, than you will behave as if it is true and end your potential of being a threat to the power structure, since you won't do anything you can get caught at, and neither will I". The irony is, the actual chip is not necessary since the suggestion alone will control his behavior.

Good old fashion Social engineering.  Having said all that, we must remember there are a lot of rebels out here that did not come up through the current school system, so the chip may  well still be necessary.  I know a few of them and I am one.  They would have to sneak in when my dogs are not around and that is unlikely to happen.  Of course  they could use some sort of gas to put them out until they are done doing the computer while I am gone, but who is going to take that kind of risk at getting caught? 

I am just wondering..... isn't it a crime to violate the Constitution of the United States?  Is it?  Does anybody know?  I thought it was.  If it is and nothing is done, then its more than just privacy we have a problem with.   Its also the fact that the entire system is broken.  That means we have to take it over ourselves.

I am sure there are chip makers that could turn these chips around for us and return the favor.  I don't know since I am more of a Ludite than most.  lol  If anyone has enough expertise in this area, who can give us insight on our options, I would appreciate it.  Trolls need not apply.  Thanks anyway. 

“Secret” 3G Intel Chip Gives Snoops Backdoor PC Access
www.prisonplanet.com/secret-3g-intel-chip-gives-snoops-backdoor-pc-access.html

Paul Joseph Watson
Prison Planet.com
September 26, 2013

Intel Core vPro processors contain a “secret” 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.
Secret 3G Intel Chip Gives Snoops Backdoor PC Access 260913vpro
Image: Intel Core vPro.
Although the technology has actually been around for a while, the attendant privacy concerns are only just being aired. The “secret” 3G chip that Intel added to its processors in 2011 caused little consternation until the NSA spying issue exploded earlier this year as a result of Edward Snowden’s revelations.

In a promotional video for the technology, Intel brags that the chips actually offer enhanced security because they don’t require computers to be “powered on” and allow problems to be fixed remotely. The promo also highlights the ability for an administrator to shut down PCs remotely “even if the PC is not connected to the network,” as well as the ability to bypass hard drive encryption.

“Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro, might have a secret 3G connection nobody knew about until now,”reports Softpedia.

Jeff Marek, director of business client engineering for Intel, acknowledged that the company’s Sandy Bridge” microprocessor, which was released in 2011, had “the ability to remotely kill and restore a lost or stolen PC via 3G.”
“Core vPro processors contain a second physical processor embedded within the main processor which has it’s own operating system embedded on the chip itself,” writes Jim Stone. “As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.”

Although the technology is being promoted as a convenient way for IT experts to troubleshoot PC issues remotely, it also allows hackers or NSA snoops to view the entire contents of somebody’s hard drive, even when the power is off and the computer is not connected to a wi-fi network.

It also allows third parties to remotely disable any computer via the “secret” 3G chip that is built into Intel’s Sandy Bridge processors. Webcams could also be remotely accessed.

“This combination of hardware from Intel enables vPro access ports which operate independently of normal user operations,” reports TG Daily. “These include out-of-band communications (communications that exist outside of the scope of anything the machine might be doing through an OS or hypervisor), monitoring and altering of incoming and outgoing network traffic. In short, it operates covertly and snoops and potentially manipulates data.”

Not only does this represent a privacy nightmare, it also dramatically increases the risk of industrial espionage.

The ability for third parties to have remote 3G access to PCs would also allow unwanted content to be placed on somebody’s hard drive, making it easier for intelligence agencies and corrupt law enforcement bodies to frame people.

“The bottom line? The Core vPro processor is the end of any pretence of privacy,” writes Stone. “If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web at all, think again. There is now more than just a ghost in the machine.”

The article is reproduced in accordance with Section 107 of title 17 of the Copyright Law of the United States relating to fair-use and is for the purposes of criticism, comment, news reporting, teaching, scholarship, and research.

No comments:

Post a Comment

Vatic Clerk Tips: After 7 days, all comments to an article go into the moderation queue for approval which happens at least once a day. Please be patient.

Be respectful in your comments, keeping in mind that these discussions will become the Zeitgeist of our time that future database archeologists will discover. Make your comments worthy and on the founding father's level in their respectfulness, reasoning, and sound argumentation. Prove we weren't all idiots in our day and age. Comments that advocate sedition or violence are not encouraged. Racist, ad hominem, and troll-baiting comments might never see the light of day.