- ULTIMATE BACKDOORS - Encryption Compromised Since 2003
- https://www.quickleak.org/eDlAPcSi
- ULTIMATE BACKDOORS - Encryption Compromised Since 2003 or so -
- Electronic Spying Everywhere With Just About All Devices
- I have had this in the back of my mind for a while, why Snowden got such
- publicity, and I did not while I clearly stated the exact same things
- Snowden did, years before he did. And I still take things a step farther
- than Snowden ever did.
- Why did Snowden get all the attention all of a sudden? Perhaps because he
- never mentioned reactor 3, tsunami nukes, and a man made "9.1" earthquake
- that did absolutely no significant damage other than tsunami damage in
- Sendai, which was only 30 miles from the epicenter? Perhaps Snowden got
- all the attention because he has yet to mention that every Intel processor
- since Centrino has two processing sections, one for the NSA and one for the
- user? You can't secure your data from the NSA AT ALL with an always on cell
- connection from the heart of your CPU, and a separate smaller CPU on the
- same die that works exclusively for them, and snags your encryption keys
- to boot.
- In fact, Snowden only came out with his revelations after my CoreVpro and
- smart meter report, which spoke about how even your microwave can now be
- rigged to spy on you if it is smart meter compliant, and that every smart
- meter now has 3G, wifi, bluetooth, and several CPU's on board.
- But I did not see Snowden as a psy op early on, I saw him as vindication
- because all he did was stop people from shilling my inbox saying I had to
- be full of crap with all of this. SO, now what is Snowden NOT SAYING?
- He is not telling you that every car in America released after 2004 has,
- VIA FEDERAL MANDATE, an engine control computer that is always hooked up
- to the cell network complete with microphones, GPS and often in car cameras
- to spy on you. When I was in the NSA they made it clear that if you wanted
- to discuss anything classified outside a secure area the best thing to do
- was leave all cell phones and other transmitters behind and go for a drive,
- because there was no way to spy on a conversation in a moving car. But after
- 2004, that is no longer true no matter what car you have, and many cars
- before 2004 were already spy boxes with systems such as Onstar.
- Snowden is also not telling you that in many cases, (especially with cell
- phones that stopped delivering full battery life, which is a huge percentage
- now) that when this happens, it is because the phone is bugged and is sending
- out audio and usually video of everything happening around it. And this can
- happen to your phone even if you are completely innocent of everthing if
- their algorithms detect that at any time you get within the vicinity of
- anyone they are watching. They want YOUR PHONE switched on as a spy device
- in the event you get near anyone they are interested in, and they can
- calculate if you are likely to because they stole all your meta data. So
- now you have an Iphone that goes dead quickly, or other device that is now
- practially trash as far as usefulness because they hijacked it and basically
- stole it from you.
- Now, I know the above statements to be true, because all the technology
- surrounding it was discussed there. Now let me make a few guesses.
- It is my guess that all cars after 2004 have every conversation ever made
- in them recorded and permanently stored. Certainly every place they ever went
- is recorded and permanently stored. America's cell service is ridiculously
- expensive compared to other nations and I suspect it is because when you get
- a cell phone you are actually paying to support all the spy devices in
- everything else.
- One thing I do know is that with the old land lines, they could always record
- everything in every house in America because when you hang up, the phone's
- microphone remains connected to the system, only the earpiece cuts and a signal
- is sent to cut the call. But it was standard procedure for the NSA to over
- ride the system and just listen in on the microphones and record whatever
- they saw fit. At that time it was not policy to record everything in America,
- though they could have if they wanted to. 911 changed all that.
- It is my guess that a new system is going into place for total information
- awareness, and that smartmeters will play a central role in this. For what
- reason would a smartmeter need wifi, bluetooth, and cell connectivity, as
- well as an ability to communicate via the power outlets in the home? If all
- that smartmeter was doing is radioing in how much power you used, it would
- not need ANY of the above, a simple radio transmitter that had nothing to
- do with any of the above would do it.
- In fact, if smartmeters were legit, they would have their own protocols and
- if one could not reach the base station, it should be able to chat with a
- different smartmeter that was in it's vicinity and pass along your consumption
- by word of mouth. After all, it would only need to chat a few digits. A
- minimalist system is all that would be needed if the meters were legit, they
- don't need multiple processors, multiple connectivity options and gigabit
- bandwidth for legitimate business.
- But if their real purpose is to talk to the NSA via your Samsung SmartTV's
- camera, a microphone in your microwave compliments of the beeper that can
- double as a microphone, or hook up to your PC via your Intel processor, or
- your cell phone camera, or any other device you might have sitting around
- including even an Xbox, then such connectivity and processing power would
- be needed because it might have to negotiate with multiple devices in your
- house if you have them, and handle all that video and audio throughput.
- THAT MUCH is certain, my guess is that all devices will be recorded and
- stored all the time. I think they could probably do it now with all the
- taxes getting raped, to then turn around and screw you with.
- Heads up, I made a big error
- I have in the past stated that the always on cell connection in Intel
- processors made it's debut with Sandy Bridge. BUT, Yesterday I sat down to
- an ancient computer here in Mexico, that said Windows Vista on it, and
- Equipped with Intel Corevpro Technology, with the Core2 logo on it. I think
- it was a Compaq. SO, now we know for sure that the Centrino technology,
- which was rolled into Core2 and every Intel processor since including the
- Pentiums and Celerons, have that cell connection on the processor die.
- With an always on cell connection and Corevpro, you can't encrypt anything
- on your computer because Corevpro snags all encryption keys and holds them
- in a separate processor that runs parallel with the main processor and that
- second processor has as a feature an always on cell connection. It's the
- ultimate back door.
- Centrino was designed exclusively in Israel. Leave it up to the Jewists to
- put a permanent back door into every processor they develop, there for their
- exploit. We have not had any data security with Intel processors since 2003
- or so.
- The problem is a lot older and a lot worse than I thought. So I will apologize
- for not warning people how bad it really was, but won't cry with that apology
- because WHO ELSE OUT THERE WILL SAY IT AT ALL?
- Is Snowden authentic?
- There are numerous shill reports out there now shilling against Snowden,
- saying the NSA is compartmentalized and there is no way Snowden could have
- gotten access to so many files from so many places in the NSA. After all
- it's not easy to steal files from the NSA, is it?
- Having worked for the NSA I can confirm that it in fact would be if you
- were in the correct position. I am only saying this to address the shills
- out there in the MSM and even alternative media now who are saying it can't
- be done. WELL, IT CAN. Here is how.
- The NSA switched over a lot of the work from centralized computers to
- standalone workstations in the late 80's and going into the 90�s through
- today. This was done on ordinary computers you could get at Best Buy. And
- they used the AMI bios (and others, but AMI was very common).
- In the bios you have options. Boot from CD, boot from USB, boot from HDD0
- ect. So all Snowden would have had to do is smuggle in a flash drive with
- Linux Live loaded on it, and if he worked in maintenance (his actual position
- was unclear here,) NOT! it would have allowed him to get private access to
- any machine in the facility. You have to be allowed this access to do any
- maintenance with a computer. And I know when I was there the bios passwords
- were not set, and they really can't be from a maintenance perspective,
- sometimes you HAVE TO get in there. This means that in a maintenance position
- you could just go into the bios, set it to boot from USB, plug in a fingernail
- sized card reader with a 32 gig micro SD card and linux live loaded onto it,
- and when you start that computer, it will boot to Linux and from there you
- can rape anything you want. The NSA would not find a fingernail sized card
- reader on anyone, it's just too small and for expedience they can't look
- that close, you just wave your badge in front of the scanner, they might
- check any bags or briefcases you are carrying and you are in or out.
- Obviously Linux Live leaves no trace at all. And if the NSA removed the USB
- ports to prevent this, all it would then take is to bring a second hard drive
- in (if you worked maintenance, which Snowden did) and have Linux loaded on
- that, make it HDD0, boot linux and rape the machine that way. A little more
- work, but not too much more for anyone in the know, the difference would be
- about 45 seconds. Since Snowden reportedly had it all on flash drives, I
- doubt he had to take this step. AND, if Snowden came across a computer that
- had an inaccesible BIOS, working a maintenance position, all he would have
- to do is take the hard drive out, put it into a machine had an accessible
- BIOS and then rape that hard drive with Linux.
- For expediency none of the bios passwords are set, so even if Snowden did
- not work maintenance (which he did) this is how it would be done anyway. At
- least this would have been possible when I was there. The facilities are
- large, and not all areas are manned at all times. So all Snowden would
- have had to do if he did not work maintenance is pay attention to when
- people would be in an area, and in the off shifts just go over and rape
- them. It's that simple. Once you get through security things get easy, your
- security clearance really does pretty much do it all.
- You are never limited to a specific area once you get your clearance. You
- can walk through all of them to get to the operation floor snack table or
- anywhere else you want to go if you can state even the most tenuous reason,
- and you won't be asked anyway, your badge is basically a free pass.
- This is why I never called B.S. on Snowden, screwing an American intelligence
- agency once inside would actually be quite easy to do. I call B.S. on those
- who are calling B.S. on Snowden, anyone why says it is not possible has either
- never been there or a shill.
- New Intel based PC's PERMANENTLY hackable
- So you think no one can access your data because your computer is turned off.
- Heck it's more than turned off, you even took the main hard drive out, and
- only the backup disk is inside. There is no operating system installed at all.
- So you KNOW you are safe.
- Frank from across the street is an alternative operating systems hobbyist,
- and he has tons of computers. He has Free BSD on a couple, his own compilation
- of Linux on another, a Mac for the wife, and even has Solaris on yet another.
- Frank knows systems security, so he cannot be hacked . . . . or so he thinks.
- The government does not like Frank much, because they LOVE to look at
- everything. Privacy is a crime don't you know, and it looks like Frank's
- luck with privacy is about to run out because his latest and greatest machine
- was a Corevpro equipped I7.
- The new Intel Core vPro processors contain a new remote access feature which
- allows 100 percent remote acess to a PC 100 percent of the time, even if the
- computer is TURNED OFF. Core vPro processors contain a second physical processor
- embedded within the main processor which has it's own operating system embedded
- on the chip itself. As long as the power supply is available and and in working
- condition, it can be woken up by the Core vPro processor, which runs on the
- system's phantom power and is able to quietly turn individual hardware components
- on and access anything on them.
- This is being touted as something that makes IT administration easy. It is
- being advertised as something that will allow IT professionals the ability to
- remotely troubleshoot a PC no matter what is wrong with it. It allows IT
- professionals to view the contents of hard drives, check the memory, or hunt
- for problems on a machine without actually being in front of it. And to that,
- I call B.S, outside of snooping it's only real world applications would
- involve accessing a recovery partiton and restoring the computer to out of
- box state, installing software outside the knowledge of the main operating
- system, and secretly placing or deleting files.
- But the intelligence agencies LOVE THIS. Because Frank is going on vacation
- soon and they know it. They have listened to all of his calls. They KNOW
- frank is a terrorist, because they have never been able to access anything
- Frank has done with a PC, and who would hide their use, other than a criminal?
- Frank keeps his computers up to date, and THREE of them now have Core vPro
- processors in them, and when Frank is gone, they are going to get their
- chance to access ALL of his files because the main backup hard disk went
- into the newest machine.
- Real world use for Core vPro processors will involve the following:
- Accessing any PC ANYWHERE, no matter what operating system is installed,
- even if it is physically disconnected from the internet. You see, Core vPro
- processors work in conjunction with Intel's new Anti Theft 3.0, which put
- 3g connectivity into every Intel CPU after the Sandy Bridge version of the
- I3/5/7 processors. Users do not get to know about that 3g connection, but
- it IS there. Frank was not stupid so he unplugged his router. Unfortunately
- for Frank, that won't work, because anti theft 3.0 always has that 3g
- connection on also, even if the computer is turned off. Sorry frank, you
- were good with operating systems, but did not know EVERYTHING about
- hardware. And now the real reason for your finicky security habits will
- be known to the NSA - you found a way to route photons to any place in
- the world without any sort of cable. You revolutionized communications.
- You were going public when you returned from your vacation, but thanks to
- your new Core vPro processors, a major communications firm is going to go
- public with your invention BEFORE you get home, and your research will be
- deleted and replaced with "criminal activity" so you will be arrested when
- you get back and unable to speak about the theft of your invention.
- Fascism is GREAT.
- If a system has the ram chips pulled, a Core vPro processor will read
- the hard disk anyway because it has all the ram it needs embedded in
- the vPro core.
- If you encrypted your hard drive, a Core vPro processor will read it
- anyway, because it snagged your encryption key
- If your system has been taken apart, and has no video card, ram, floppy,
- or hard drive, your Core vPro processor nailed you, because you left a
- flash drive plugged in. Or a CD in the CD drive. And what about that
- web cam?
- The bottom line? The Core vPro processor is the end of any pretend privacy.
- If you think encryption, Norton, or anything else is going to ensure your
- privacy, including never hooking up to the web AT ALL, think again. There
- is now more than just a ghost in the machine.
- The Zionist, Globalist, Banker scamming war mongering cabal has a history
- of using the marketing of security as a means to remove ALL security and
- nail you. If you believe Intel's cheerful hype about these processors
- making things more secure than ever, think again, because any processor
- which allows a machine to be accessed even when it's turned off equates
- to an information tyrant's dream come true Please engage your brain while
- watching this, the security pitch is unadulterated B.S. These processors
- in fact represent an ABSOLUTE BREACH of security no matter HOW they are
- marketed. From the techinical viewpoint of someone who worked for an
- intelligence agency, I call B.S. on Intel, avoid these processors like
- the plague!
- Got AMD? What about your smart meter?
- Many people are interested in the issue of smart meters, and for good
- reason. Not only does a smart meter have a full time connection to the
- outside world via the cell phone network, but it also has direct access
- to the wiring in your house. Is this a cause for concern? I'd say
- definitely, and this article will outline the reasons why, and show you
- the security holes this obvious snooping device has introduced into your
- home or business.
- It has been publicly stated that your smart meter has a one watt wifi
- transmitter and reciever in it (which is far beyond legal power for
- little people), as well as a full time 3g or better connection to the
- cell network which is always on. It is fully admitted that smart meters
- can communicate with appliances designed to do so, and that eventually
- all appliances will be able to communicate with it and receive instructions
- from the meter to modify their functioning on demand from a centralized
- control center.
- Seemingly, to assuage fears, it is being stated that the smart meter
- only communicates with appliances in a minimal way, and I call B.S. on
- that. I call B.S. because "they" lie about everything. The diagram at
- this site, produced by processor manufacture ARM, (which has nothing
- to lose by telling it like it is), shows three wireless connectivity
- options per smart meter, PLUS an ability to communicate through the
- power system, as well as Ram, Rom, and Flash, complete with an ultra
- DMA hard drive controller (needed to provide storage to the flash memory)
- and FIVE CPU's TOTAL. ??!!??. It's a safe bet thatsuch extreme connectivity
- and CPU power, plus 3 memory options could only be needed for nefarious
- purposes. If your refrigerator is Wifi equipped (a ridiculous RF polluting
- waste) when it could simply receive commands through the wiring, your
- refrigerator, microwave, you name it, could also be equipped with audio
- and visual surveillance capabilities and have that ability remain
- perfectly hidden, all to be transmitted out through the smart meter.
- With advanced devices now available for less than $10 containing
- microphones and video sensors, as well as buttons and flash card support,
- the stated $10 cost of this so called wifi device that is to be put in
- all appliances could easily cover the cost of the sensors as well.
- But a microphone and video sensor would be obvious, and therefore they
- would never do it, right? Well, no. After having worked for the NSA and
- learning the tricks, I played around a LOT with common components no one
- would ever think could be used for snooping that work EXCELLENT. The most
- surprising of all is electronic beepers that use simple piezo drivers. The
- piezo element, never associated with anything other than an ability to beep
- makes an astonishing microphone. When properly coupled to a microphone
- amplifier (totally free to do at zero cost nowadays) a beeper element
- can be used to hear through the walls and into a detached neighboring
- house. That is not an exaggeration. Piezo elements are unbelievably
- powerful microphones, as are high impedance conventional magnetic speakers.
- They outperform all microphones hands down, and provide such strong input
- that they have to be strongly attenuated to be useful. So if your microwave
- or refrigerator has any ability to beep, and it is smart meter compliant,
- you can safely bet that it has ears that can hear you whisper from behind
- a closed door.
- Nowadays, any device that can accept remote control commands can easily
- conceal a camera.
- My first introduction to this was with 1980's vintage Scientific Atlanta
- cable TV boxes (the standard back then) which all came fully equipped with
- CCD sensors concealed in the remote sensor, and microphones. If you can
- get your hands on one of them, take it apart and look. I have seen this
- myself. If you have ever wondered why so many open channels were available
- on these cable boxes, it is because the unused channels could be accessed
- and used in reverse to snoop. And towards the end of their dominance these
- boxes still cost more than basic cable ready televisions, possibly because
- that CCD sensor was not cheap. What about your TV nowadays? I have not
- taken apart any HD televisions for a look, but knowing what happened in
- the past I'd say it will be a safe bet that many of these televisions will
- have the ability to use their remote sensor as a camera, and speakers as
- microphones. It's an obvious no brainer. Throw a smart meter into the mix,
- and there is your outgoing connection.
- But WAIT, there's more!
- What about the obvious ability to send signals to appliances via the home's
- wiring - what are the limits?
- I never paid attention to this in the past, and had to take a look at the
- guts of one of the circuit breakers that are used in homes to do this report.
- These circuit breakers use an electromagnet to trip, and pass all the current
- that gets delivered though the breaker through that electromagnet. When the
- current gets high enough, the magnet pulls hard enough and trips the breaker.
- So I knew the frequency you could send through a breaker would be limited by
- this electromagnet, which will operate as a choke because it has a coil with
- a magnetically attractive core, which will further increase the ability of
- that coil to stop high frequencies from passing. Question is, how much would
- it really choke off the signal from a smart meter?
- I no longer have my inductance meter after the Fuku report, so I cannot put
- it in a formula. However, I can make a guess based on experience and how
- things look. And my guess is that you won't get megabits to pass through
- it, but that it would be safe to assume you could easily get a 256 kbps
- connection through any household circuit breaker. Why would that be important,
- when wifi is megabits? Well, let me explain.
- Remember the dialup days, when 57.6 was the norm? How about five times that?
- Was it impossible to surf the web way back in the early days when the standard
- was 14.4? 14.4 actually worked pretty good. And even 500 baud will exceed the
- speed of the fastest typist. So I'd say 256kbps would represent a serious
- security problem if you have a power supply in your computer which can
- accept power line commands, switch on your hardware in secret, and raid you.
- I don't think this is a reality nowadays, but I do not know it is not either,
- and it's a safe bet with the government getting more and more snoopy that
- this will be a way to get into the most secure of computer systems. Forget
- about avoiding a CoreVPro processor, which has built in 3g, forget about
- removing all wifi and bluetooth - the final holy grail of information
- gathering would be a direct power line grab. You can bet they are working
- on it and your friendly smart meter will play a key role.
- The following got wiped and I had to retype it, they obviously do not like
- the punch line . . . .
- I am going to make a prediction here - that in the future, the very NEAR
- future, the only way you will keep a system secure is to have it run off an
- inverter bank, separated from the wall with a non electronic old transformer
- style battery charger constantly charging a battery. Filtering the smart
- meter signal while running directly off the line would have limited effect
- - If you used the right choke setup you could limit the smart meter baud
- rate to below 500 before you messed up the power factor too badly to run a
- PC, but even a 500 baud connection would only slow things down for the snoops.
- With patience (and they have a lot) they could at least raid every text file
- off your machine, 500 baud would allow them to nail 1 kilobyte of data in
- approximately 18 seconds (slower than actual baud because of parity checking
- and other technicalities, but the answer is still clear - filtering will not
- be good enough. The only answer is a complete isolated disconnect from the grid.)
- UPS power supplies and ordinary surge protectors will not be good enough,
- because surge protectors wont' filter the type of signal a smart meter would
- produce, and a UPS could be rigged to bypass the signal from the computer
- directly to the line while feeding the computer inverter power. On top of
- this a majority of UPS power supplies do not run full time inverter anyway.
- Normally they keep you connected to the main and switch you over to inverter
- very rapidly when the power goes out, before the capacitors in your computer's
- power supply run out of juice. The fact that UPS power supplies normally keep
- you directly connected, as well as the fact that UPS power supplies usually
- have processors that could pass the smart meter signal along to your PC
- anyway makes UPS power supplies an un acceptable method of blocking snooping
- via the power line. The only option is an old or totally brainless 1980's
- style car battery charger, a battery, and a standalone inverter if data
- security really is that important.
- I suggest governments and businesses take what I said here to heart and
- apply it, the ability to snoop via the power line against high priority
- targets is definitely possible, and definitely will be done in the future
- (and against the highest priority targets, is definitely happening now.)
- If you value your privacy, I'd implement these security measures now.
- Even if you have your wifi "turned off", it is not turned off. There is a
- separate channel that always stays open and sniffs out all available
- connections. And if your computer has been bugged to begin with, it will,
- through this back door channel, connect to any available wifi network hidden
- or not, and send everything you type or do straight to the NSA. And this
- connection will also allow "PC anywhere" type remote access to your machine.
- I had problems with this last night because I forgot to pull the wifi card
- out of the laptop I was working with, and someone went straight in and
- destroyed several hours of work on a machine that runs Linux and never
- screws up. Am I just paranoid?
Copyright © 2007-2011, n3t-t3z Team
Posted by ULTIMATE BACKDOO on June Thu 12th 3:32 PM - Never Expires
download | new post
Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.