Archives‎ > ‎

Intel Core vPro processors contain a new remote access feature - for Spying, from Peter Myers

(1) Intel Core vPro processors contain a new remote access feature - for Spying

(2) Minix, Intel's-hidden-in-chip operating system

(3) Don't trust Apple, Google or Adobe; don't trust WiFi; don't Sync your Devices

(4) Do Your Kids Think Wi-Fi is Magic? Do You?

(5) CIA-whistleblower Ray McGovern man-handled and brutalized

(1) Intel Core vPro processors contain a new remote access feature - for Spying

From: peter marshall <>

greetings Peter, there is far more info out there re this exploit...this is just a taste...cheers, peter

The new Intel Core vPro processors contain a new remote access feature which allows absolute remote access to a PC all of the time, even if the computer is turned off. And if you thought not connecting your PC to the internet solves the issue, think again, the wifi system can do it for them.

Core vPro processors contain a second physical processor embedded within the main processor which has its own operating system embedded on the chip itself. As long as the power supply is available and in working condition, it can be woken up by the Core vPro processor, which runs on the system’s phantom power and is able to quietly turn individual hardware components on and access anything on them.

Real world use for Core vPro processors will involve the following :

Accessing any PC anywhere, no matter what operating system is installed, even if it is physically disconnected from the internet. You see, Core vPro processors work in conjunction with Intel’s new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors. Users do not get to know about that 3g connection, but it IS there. You might think, I am not stupid so I will unplugged his router. Unfortunately, that won’t work, because anti theft 3.0 always has that 3g connection on also, even if the computer is turned off. 

And now the real reason for your finicky security habits will be known to the NSA you found a way to route photons to any place in the world without any sort of cable. You revolutionised communications. You were going public when you returned from your vacation, but thanks to your new Core vPro processors, a major communications firm is going to go public with your invention Before you get home, and your research will be deleted and replaced with criminal activity so you will be arrested when you get back and unable to speak about the theft of your invention. Fascism is Great.

If a system has the ram chips pulled, a Core vPro processor will read the hard disk anyway because it has all the ram it needs embedded in the vPro core.

If you encrypted your hard drive, a Core vPro processor will read it anyway, because it snagged your encryption key. If your system has been taken apart, and has no video card, ram, floppy, or hard drive, your Core vPro processor nailed you, because you left a flash drive plugged in. Or a CD in the CD drive. And what about that web cam?

The bottom line? The Core vPro processor is the end of any pretend privacy. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web at all, think again. There is now more than just a ghost in the machine.

If you believe<> Intel;s cheerful hype about these processors making things more secure than ever, think again, because any processor which allows a machine to be accessed even when it’s turned off equates to an information tyrant’s dream come true. Please engage your brain while<> watching this, the security pitch is unadulterated B.S. These processors in fact represent an absolute breach of security no matter how they are marketed. From the technical viewpoint of someone who worked for an intelligence agency, I call B.S. on Intel, avoid these processors like the plague!

(2) Minix, Intel's-hidden-in-chip operating system

From: peter marshall <>

In early 2016 another Edward Snowden (who was a hell of a lot worse than Snowden) smuggled ultra classified NSA spy software out of an NSA facility and dropped it on the dark web. This software uses hardware based back doors to allow itself to become permanently embedded in a system. I'll explain how it does this.

Every device you use has three different operating systems, running in layers. The layer you see is the OS the device sells with - Windows, Android, etc. Immediately below this top layer everyone sees is the bios layer, which in devices such as phones allows you to re-flash the device with "firmware updates". When you update "firmware", this is the layer you are working with. Most people think that's the root layer of any device. It is not. There is a layer below this that as it turns out, is specifically for the NSA. In all processors now, the bottom layer, which you cannot see, uses the MINIX operating system which is physically burned into the processor itself, and has a second processor you never know is there (but has ultimate control over the main processor). This second processor has approximately as much power as a 486DX2-66 processor. We may scorn that particular processor nowadays, but it is actually quite powerful, and more than enough to rape the main processor.

This second processor has flashable writable space that can be written to by the NSA for the purpose of planting bugs on a system that will not affect it's performance at all, because the bugs are executed by a processor the end user is not even aware exists. And even lowly devices, such as burner phones and other throwaway trash now have this second processor in them.

In early 2016, the software the NSA uses to exploit this second processor was dropped on the dark web, and hackers got it. You can still get illegal copies of this software, that is marketed as spy tools and phone location trackers that can be planted without whoever the bug was planted on ever knowing it. I had two such products posted on this site a couple months ago. The NSA knows this software was lost. The NSA does not want to tell anyone this happened, and is instead simply attempting to track down anyone who got ahold of this software, because they don't want to give up their toy. They are failing at this because the software is still available. And they don't care enough to warn people and plug the holes because they are pricks, who want to keep on raping people the same way the hackers that got their stuff are now doing.

Everything written to this point is CERTIFIED FACT. Take it to the bank, this has been reported "on the lower left hand side of page 52" by even mainstream publications such as Wired, but was not put front page for obvious reasons. I have also had those articles linked here before.


Hardware manufacturers in China also got the software and reverse engineered it because they actually care about their customers. Most likely Huawei and ZTE plugged the holes this software rips open, and got rid of the exploits. It was only after this happened that suddenly the U.S. government started ripping Chinese products. HEY, GUESS WHAT? IT WAS ALSO ONLY AFTER THIS SOFTWARE GOT OUT THERE TO BE REVERSE ENGINEERED AND PATCHED THAT THE GOVERNMENT STARTED RIPPING KASPERSKY ALSO.

And here is my bet: I'd bet Trump only started talking happy with ZTE, promising to "make China great again" by getting their products back into the U.S. market after they got shunned and banned out of it due to "security concerns with chinese products", because ZTE buckled under economic pressure, and agreed to put the NSA ass rapes right back into their products.

You see, you have to understand how the minds of criminals work. Any privacy on the part of the people the criminals exploit will allow good people to do things the criminals don't know about, and THAT amounts to "a security breach". fat chance the NSA is actually worried about the Chinese getting into American's business via their own spying. That is clearly not what "the security problems with Chinese products" are. The NSA could actually care less about that, if any American thinks agencies such as the FBI and NSA actually care about them, they need their head examined, these agencies are enemies on American soil AND THEY PROVED IT, BY NEVER ALLOWING ANY HOLES TO BE PLUGGED AFTER KNOWN CRIMINALS GOT AHOLD OF THEIR STUFF.

The writing is on the wall. WHY did American intelligence suddenly tell people to stop buying ZTE and Huawei, and to get rid of Kaspersky ALL AT ONCE and ONLY AFTER the NSA's hacking tools got released into the wild? Why was the timing like THAT? Answer: Because Apple, Microsoft, Google, Norton and all the other "big evils" are in bed with the NSA, and happily continued allowing their customers to be reamed by them, as well as be bare butt naked against hackers and crapware that can be had by anyone, and will rape people wholesale. After all, if the bug is so embedded the end user does not know it is even there why would Norton have to care? Their customers would not know their antivirus totally failed.

The good companies, like Huawei, ZTE, and Kaspersky said NO WAY. There is such a thing as ethics, and we are not going to be a part of this. And for that they got punished.

(3) Don't trust Apple, Google or Adobe; don't trust WiFi; don't Sync your Devices

- Peter Myers, May 26, 2018

You turn Wi-Fi off, but then find that a wifi process is still running. To tell, you check in Resource Monitor (Windows), Activity Monitor (Mac).

Your turn off Spotlight background indexing (Mac), but then find that Spotlight processes are still running (eg mdsworker & other mds -ones). I got rid of Spotlight; I use Easyfind, and Find Any File instead. These programs restore your control over your computer.

You tell Flash that no app can use the camera and microphone, then later find that those preferences have been altered without your permission.

Little Snitch (on Mac) blocks apps from "phoning home', ie sending messages to Apple or Google etc; it makes them ask permission. Once you run this program, you realize that apps are constantly in communication with Apple, Google etc. I have managed to stop most of it.

Is there similar software on Windows? Expect to BUY it.

You believe that you specified that a certain app must let YOU (not it) check for undates. Then you find it 'phoning home' several times a day.

If you sync devices, eg phone / tablet and computer, there are all the more apps phoning home, and you cannot block them.

Today's computers run many processes in the background, eg on the hour. With a Mac, you can see them in the Console utility; there would be similar program in Windows. But you, the owner and operator, have no idea what they are doing.

Wi-Fi is easy to hack.

(4) Do Your Kids Think Wi-Fi is Magic? Do You?

MAY 13, 2018

By B.N. Frank

Many people don’t know that Wi-Fi (Wireless Frequency) is Wireless Radiation or Microwave Radiation – like what cooks food in a microwave oven.

In June 2008, the University of California, Irvine provided a statement about Wi-Fi safety concerns and research.

In their statement, they recommended that small children not be exposed to Wi-Fi for long periods.  This is also sometimes referred to as The Precautionary Principle.  They listed cell phones and laptops as sources of Wi-Fi.  They also cautioned about children being exposed to multiple sources of Wi-Fi at the same time.

Since 2008, more research has been done and released to the public about health risks from exposure to Wi-Fi and other sources of Electrical Pollution (Electrosmog).  There have also been many warnings (see list below).

Despite this, there STILL has been no safe level of wireless Wi-Fi radiation exposure scientifically determined for children or pregnant women.

Since Wi-Fi is almost everywhere now, small children and everyone else are being exposed to individuals, businesses, medical facilities, schools, etc. operating and using multiple sources of Wi-Fi almost all the time.

Children growing up now probably think Wi-Fi is magic.  Most young adults probably think the same.  Why wouldn’t they?  Many older adults probably think Wi-Fi must be safe or there would be more warnings.

Since 2008, Wi-Fi warnings have been published by many medical professionals and media outlets but they always get lost in a sea of marketing campaigns and legal obstacles.

Of course, tech inventors – including the late Steve Jobs – must have been paying attention all along.  For several years they have been deliberately limiting their own kids’ exposure to wireless devices even sending them to private low-tech schools.

Regardless, telecom companies have continued making and marketing wireless devices, products and infrastructure to everyone under the sun from cradle to grave including state and federal elected officials and community leaders in the U.S. and all over the world.

Documentaries have been produced about this including Generation Zapped, Mobilize, Take Back Your Power, and Wi-Fried. also provides a running list of U.S. news stations that have aired segments about radiation concerns.

Here is a short list of additional media mentions about medical warnings since 2008:

2009: Dr. Oz warns about cell phone radiation exposure on Good Morning America

2010: GQ magazine:  Warning: Your Cell Phone May Be Hazardous to Your Health

2010: NBC News:  Is Electrosmog Harming Our Health?

2011: CNN:  World Health Organization (WHO): Cell phone use can increase possible cancer risk

2012: The American Academy of Pediatrics started expressing concerns about new technology harming kids.

2012: Research determined that cell phone and WiFi radiation can disrupt the blood-brain barrier which may cause it to leak.

2016: Mayo Clinic determined "Sending Text Messages On Your Smartphone Changes The Rhythm Of Your Brain Waves."

2018: CBS News posted "8 Dumb Things to Boost Cancer Risk"

2018: Dr. Oz airs segment,"The Rise of 5G Cell Towers"

2018: The Nation, Democracy Now, and NPR make accusations regarding cell phone radiation and 5G technology risks, compare The Telecom Industry to "Big Tobacco."

(5) CIA-whistleblower Ray McGovern man-handled and brutalized

CIA-whistleblower Ray McGovern (with a dislocated shoulder) is man-handled and brutalized by DC cops at the Gina Haspel hearing

   Gary Kohls<>        11 May 2018 at 05:37

Check out the video at:

And here are the details of Ray’s arrest at a David Petraeus (ex-CIA director) event back in 2014:

 Peter Myers